Patents by Inventor Guang Gong

Guang Gong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10747563
    Abstract: Systems and techniques are described for optimizing memory sharing. A described technique includes grouping virtual machines (VMs) into groups including a first group; initializing a first VM in the first group, wherein initializing the first VM includes identifying, for each of one or more first memory pages for the first VM, a respective base address for storing the first memory page using an address randomization technique, and storing, for each of the one or more first memory pages, data associating the first memory page with the respective base address for the first group, and initializing a second VM while the first VM is active, wherein initializing the second VM includes determining that the second VM is a member of the first group, and in response, storing one or more second memory pages for the second VM using the respective base addresses stored for the first group.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: August 18, 2020
    Assignee: VMware, Inc.
    Inventors: Guang Gong, Qi Kang, Le Tian, Chengxiao Wang, Yimin Zhao, Shiyao Yuan
  • Patent number: 10136315
    Abstract: A password-less authentication system is described herein. Also described are the devices used for such a system and the method and process implemented. The system employs asymmetric cryptography to enable users to log in to various systems or services on different platforms or computers by the aid of a mobile device. Users' credentials are kept privately in the mobile device, and not leaked to the network or any web service. In addition, the web service can verify users' authentication request by solely public information of users' credentials.
    Type: Grant
    Filed: April 15, 2015
    Date of Patent: November 20, 2018
    Inventors: Guang Gong, Xinxin Fan, Bo Zhu
  • Publication number: 20150304847
    Abstract: A password-less authentication system is described herein. Also described are the devices used for such a system and the method and process implemented. The system employs asymmetric cryptography to enable users to log in to various systems or services on different platforms or computers by the aid of a mobile device. Users' credentials are kept privately in the mobile device, and not leaked to the network or any web service. In addition, the web service can verify users' authentication request by solely public information of users' credentials.
    Type: Application
    Filed: April 15, 2015
    Publication date: October 22, 2015
    Inventors: Guang Gong, Xinxin Fan, Bo Zhu
  • Publication number: 20150261576
    Abstract: Systems and techniques are described for optimizing memory sharing. A described technique includes grouping virtual machines (VMs) into groups including a first group; initializing a first VM in the first group, wherein initializing the first VM includes identifying, for each of one or more first memory pages for the first VM, a respective base address for storing the first memory page using an address randomization technique, and storing, for each of the one or more first memory pages, data associating the first memory page with the respective base address for the first group, and initializing a second VM while the first VM is active, wherein initializing the second VM includes determining that the second VM is a member of the first group, and in response, storing one or more second memory pages for the second VM using the respective base addresses stored for the first group.
    Type: Application
    Filed: March 17, 2014
    Publication date: September 17, 2015
    Applicant: VMware, Inc.
    Inventors: Guang Gong, Qi Kang, Le Tian, Chengxiao Wang, Yimin Zhao, Shiyao Yuan
  • Patent number: 8953784
    Abstract: There is disclosed an apparatus and method for generating a keystream with ideal two-level autocorrelation, which can be efficiently implemented in both software and hardware on mobile devices requiring high security protection and in resource limited smart devices such as RFID chips. In one embodiment, a 16-bit Welch-Gong (WG) transformation is used as the filtering function, which is applied to 16-bit input values generated from a linear feedback shift register. In another embodiment, an 8-bit WG transformation is used which is applied to 8-bit input values generated from a linear feedback shift register.
    Type: Grant
    Filed: August 30, 2012
    Date of Patent: February 10, 2015
    Inventors: Guang Gong, Mark David Aagaard, Xinxin Fan
  • Publication number: 20130108039
    Abstract: There is disclosed an apparatus and method for generating a keystream with ideal two-level autocorrelation, which can be efficiently implemented in both software and hardware on mobile devices requiring high security protection and in resource limited smart devices such as RFID chips. In one embodiment, a 16-bit Welch-Gong (WG) transformation is used as the filtering function, which is applied to 16-bit input values generated from a linear feedback shift register. In another embodiment, an 8-bit WG transformation is used which is applied to 8-bit input values generated from a linear feedback shift register.
    Type: Application
    Filed: August 30, 2012
    Publication date: May 2, 2013
    Inventors: Guang GONG, Mark David AAGAARD, Xinxin FAN
  • Publication number: 20030072059
    Abstract: A system and method establishes a secure communication channel over an optical network. More specifically, the system and method can generally include securing a communications channel to prevent unauthorized access such as eavesdropping or masquerading by employing 1) an encryption scheme derived from the non-linear filtering of shift registers, 2) a method for authenticating and exchanging parameters between two parties over an unsecured data channel for deriving a shared encryption key having a property of perfect forward secrecy, and 3) employing a unique format of the messages that can transport non-secret key exchange parameters over an unsecured data channel and secure communications over a data channel.
    Type: Application
    Filed: September 10, 2002
    Publication date: April 17, 2003
    Applicant: Wave7 Optics, Inc.
    Inventors: Stephen A. Thomas, Thomas A. Berson, Deven J. Anthony, Guang Gong, James O. Farmer