Patents by Inventor Jeffrey Cai

Jeffrey Cai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11937998
    Abstract: Various embodiments of a hearing protection device and a method of forming such device are disclosed. The hearing protection device includes a first hearing protector, a second hearing protector, and an elongated connector including a first end that is connected to the first hearing protector and a second end that is connected to the second hearing protector. The device further includes a frangible attachment element disposed between a first portion of the elongated connector and a second portion of the elongated connector that temporarily connects the first portion to the second portion such that the elongated connector is in a compact configuration. The elongated connector is adapted to be disposed in an elongated configuration when the frangible attachment element is broken.
    Type: Grant
    Filed: March 31, 2017
    Date of Patent: March 26, 2024
    Assignee: 3M Innovative Properties Company
    Inventors: Feng Cai, Jeffrey L. Hamer
  • Patent number: 11777966
    Abstract: Systems and methods for causation analysis of network anomalies in a network include detecting an alarm condition at a network device, the alarm condition pertaining to an anomaly or increase in a traffic condition such as packet loss. A dominant key is identified in each of one or more key types which contributed to the alarm condition, the key types including dimensions of traffic flow. Two or more dominant keys of two or more key types are aggregated and clustered to determine a combination of dominant keys which contributed to the alarm condition. A dominant traffic flow comprising the combination of dominant keys which contributed to the alarm condition is identified based on the aggregation and clustering. Malware or security threats can be identified from detecting a dominant source IP address or host which contributed to a predominant number of packet drops or retransmissions at ports of the network.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: October 3, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Yu Jiang, Saravanan Radhakrishnan, Jeffrey Cai, Yuefeng Jiang
  • Publication number: 20210160263
    Abstract: Systems and methods for causation analysis of network anomalies in a network include detecting an alarm condition at a network device, the alarm condition pertaining to an anomaly or increase in a traffic condition such as packet loss. A dominant key is identified in each of one or more key types which contributed to the alarm condition, the key types including dimensions of traffic flow. Two or more dominant keys of two or more key types are aggregated and clustered to determine a combination of dominant keys which contributed to the alarm condition. A dominant traffic flow comprising the combination of dominant keys which contributed to the alarm condition is identified based on the aggregation and clustering. Malware or security threats can be identified from detecting a dominant source IP address or host which contributed to a predominant number of packet drops or retransmissions at ports of the network.
    Type: Application
    Filed: November 25, 2019
    Publication date: May 27, 2021
    Inventors: Yu Jiang, Saravanan Radhakrishnan, Jeffrey Cai, Yuefeng Jiang
  • Publication number: 20190085219
    Abstract: The present invention is related to an electrically conductive, hot-melt adhesive or molding composition, said composition comprising: a) a binding agent which comprises at least one (co)polymer selected from the group consisting of polyamide, thermoplastic polyamide, copolyamide, polyolefins, poly(meth)acrylates, polystyrene, polyurethanes, polyesters, ethylene copolymers, ethylene vinyl copolymers, styrenic block copolymers, polylactic acid, silicones, epoxies and polyols; and, b) a conductive filler comprising particles (p1) which have a mass median diameter (D50) of ?100 microns and which are selected from the group consisting of flakes, platelets, leaf-like particles, dendritic particles, rods, tubes, fibres, needles and mixtures thereof, wherein said composition has a melt viscosity of from 2500 to 25000 mPa·s as measured at 210° C. and is further characterized in that said particles (p1) constitute from 15 to 70 wt. %, by weight of the composition.
    Type: Application
    Filed: October 19, 2018
    Publication date: March 21, 2019
    Inventors: Jeffrey CAI, David Briers, Callum Poole, Gunther Dreezen, Anthony Chapman, Dale R. Starkey
  • Patent number: 9929941
    Abstract: In one embodiment, a method includes identifying at a first edge device, a failure at a second edge device, the first and second edge devices located in a local network site in communication with remote network sites in an overlay network, changing a state of a routing locator address at the first edge device from down to up in response to the failure at the second edge device, the routing locator address initially associated with the second edge device, and advertising the routing locator address at the first edge device in an underlay network so that packets from the remote network sites are forwarded to the first edge device upon convergence in the underlay network. An apparatus and logic are also disclosed herein.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: March 27, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Peng Wang, Jeffrey Cai, Bo Sun, Yu Jiang
  • Patent number: 9596099
    Abstract: Techniques provided herein use aggregate endpoints in a virtual overlay network. In general, aggregate endpoints operate as a single receiving entity for certain packets/frames sent between different physical proximities of the virtual overlay network.
    Type: Grant
    Filed: May 6, 2015
    Date of Patent: March 14, 2017
    Assignee: Cisco Technology, Inc.
    Inventors: Yibin Yang, Liqin Dong, Chia Tsai, Weng Hong Chan, Yuchen Zhou, Fang Yang, Jeffrey Cai, Yuefeng Jiang, Xiaopu Zhang
  • Publication number: 20160352617
    Abstract: In one embodiment, a method includes identifying at a first edge device, a failure at a second edge device, the first and second edge devices located in a local network site in communication with remote network sites in an overlay network, changing a state of a routing locator address at the first edge device from down to up in response to the failure at the second edge device, the routing locator address initially associated with the second edge device, and advertising the routing locator address at the first edge device in an underlay network so that packets from the remote network sites are forwarded to the first edge device upon convergence in the underlay network. An apparatus and logic are also disclosed herein.
    Type: Application
    Filed: May 26, 2015
    Publication date: December 1, 2016
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Peng Wang, Jeffrey Cai, Bo Sun, Yu Jiang
  • Publication number: 20160330046
    Abstract: Techniques provided herein use aggregate endpoints in a virtual overlay network. In general, aggregate endpoints operate as a single receiving entity for certain packets/frames sent between different physical proximities of the virtual overlay network.
    Type: Application
    Filed: May 6, 2015
    Publication date: November 10, 2016
    Inventors: Yibin Yang, Liqin Dong, Chia Tsai, Weng Hong Chan, Yuchen Zhou, Fang Yang, Jeffrey Cai, Yuefeng Jiang, Xiaopu Zhang
  • Publication number: 20140317256
    Abstract: A controller, e.g., a software-defined network (SDN) controller, stores data representing a topology of a network that includes a plurality of network elements. A move is detected of a host between network elements in the network and a destination network element to which the host has moved is determined. The destination network element is designated as a root of a tree in the network. A topology for the tree is generated using the destination network element as the root of the tree. Following the topology of the tree, starting with the root, parent network elements in the tree are updated for a traffic flow for the host before child network elements are updated.
    Type: Application
    Filed: April 18, 2013
    Publication date: October 23, 2014
    Applicant: Cisco Technology, Inc.
    Inventors: Yu Jiang, Jerry Ziyi Lu, Jeffrey Cai, Kevin Fang