Patents by Inventor Hsisheng Wang

Hsisheng Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11777978
    Abstract: Systems and methods for assessing an application access risk are provided. An example method commences with collecting data concerning relationships between an application, one or more client devices, and one or more users in a computing environment. The method includes updating a graph database including nodes and edges. The nodes represent the application, the one or more client devices, and the one or more users and the edges represent relationships between the application, the one or more client devices, and the one or more users. The method continues with enriching the graph database by associating the nodes with metadata including information concerning the one or more users accessing the application from the one or more client devices. The method further includes analyzing the graph database to identify a subset of nodes used to access the application and displaying a graphical representation of the subset of nodes.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: October 3, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Paul Bigbee, Marc Woolward, Hsisheng Wang, Keith Stewart, Jason Parry
  • Patent number: 11711374
    Abstract: Methods and systems for understanding identity and organizational access to applications within an enterprise environment are provided.
    Type: Grant
    Filed: February 8, 2021
    Date of Patent: July 25, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Colin Ross, Marc Woolward, Keith Stewart, Paul Bigbee, Hsisheng Wang
  • Patent number: 11575563
    Abstract: Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: February 7, 2023
    Assignee: vArmour Networks, Inc.
    Inventors: Marc Woolward, Keith Stewart, Timothy Eades, Meng Xu, Myo Zarny, Matthew M. Williamson, Jason Parry, Hong Xiao, Hsisheng Wang, Cheng-Lin Hou
  • Publication number: 20200382363
    Abstract: Methods and systems for managing security in a cloud computing environment are provided. Exemplary methods include: gathering data about workloads and applications in the cloud computing environment; updating a graph database using the data, the graph database representing the workloads of the cloud computing environment as nodes and relationships between the workloads as edges; receiving a security template, the security template logically describing targets in the cloud computing environment to be protected and how to protect the targets; creating a security policy using the security template and information in the graph database; and deploying the security policy in the cloud computing environment.
    Type: Application
    Filed: May 31, 2019
    Publication date: December 3, 2020
    Inventors: Marc Woolward, Keith Stewart, Timothy Eades, Meng Xu, Myo Zarny, Matthew M. Williamson, Jason Parry, Hong Xiao, Hsisheng Wang, Cheng-Lin Hou
  • Patent number: 10333827
    Abstract: A network system includes a first network access device having an input/output (IO) module of a firewall to capture a packet of a network session originated from a first node associated with the first network access device, a first security device having a firewall processing module to determine based on the captured packet whether the first node is a destination node that is receiving VM migration from a second node that is associated with a second network access device. The first security device is to update a first flow table within the first network access device. The network system further includes a second security device to receive a message from the first security device concerning the VM migration to update a second flow table of the second network access device, such that further network traffic of the network session is routed to the first node without interrupting the network session.
    Type: Grant
    Filed: April 10, 2013
    Date of Patent: June 25, 2019
    Assignee: VARMOUR NETWORKS, INC.
    Inventors: Meng Xu, Yi Sun, Hsisheng Wang, Choung-Yaw Shieh
  • Publication number: 20160323245
    Abstract: A network system includes a security gateway that receives information from a virtual machine after the virtual machine has migrated from a first network access device to a second network access device, where the information identifies the virtual machine as one associated with a privilege level. The security gateway determines that access to the virtual machine at the first network access device was permitted by the privilege level and assigns the virtual machine at the second network access device to the privilege level. The security gateway then applies a set of rules associated with the privilege level to communications between the network and the virtual machine at the second network access device.
    Type: Application
    Filed: July 13, 2016
    Publication date: November 3, 2016
    Inventors: Choung-Yaw Shieh, Jia-Jyi Lian, Meng Xu, Yi Sun, Hsisheng Wang
  • Patent number: 9419941
    Abstract: A method and apparatus is disclosed herein for distributed zone-based security. In one embodiment, the method comprises: determining an ingress security zone associated with an ingress of a first network device based on a first key and a media access control (MAC) address of a source of a packet; determining an egress security zone of a second network device based on a MAC address of a destination for the packet and a second key; performing a policy lookup based on the ingress security zone and the egress security zone to identify a policy to apply to the packet; and applying the policy to the packet.
    Type: Grant
    Filed: March 22, 2013
    Date of Patent: August 16, 2016
    Assignee: VARMOUR NETWORKS, INC.
    Inventors: Yi Sun, Meng Xu, Lee Cheung, Hsisheng Wang, Chuong-Yaw Michael Shieh
  • Publication number: 20130275592
    Abstract: A network system includes a first network access device having an input/output (IO) module of a firewall to capture a packet of a network session originated from a first node associated with the first network access device, a first security device having a firewall processing module to determine based on the captured packet whether the first node is a destination node that is receiving VM migration from a second node that is associated with a second network access device. The first security device is to update a first flow table within the first network access device. The network system further includes a second security device to receive a message from the first security device concerning the VM migration to update a second flow table of the second network access device, such that further network traffic of the network session is routed to the first node without interrupting the network session.
    Type: Application
    Filed: April 10, 2013
    Publication date: October 17, 2013
    Inventors: Meng Xu, Yi Sun, Hsisheng Wang, Choung-Yaw Michael Shieh