Patents by Inventor Jisheng Wang
Jisheng Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11496373Abstract: Disclosed is a network management system that provides an interface to enable diagnostics and troubleshoot of a remotely managed multi-site network. Some embodiments provide a natural language interface, while other embodiments provide a chatbot type interface that communicates with a technician via traditional text information on a display screen. The diagnostic and troubleshooting capabilities search a central data store that receives device property information from each site of the multi-site network. Based on devices or users that match portions of the entity, queries to the data store are initiated to obtain additional data on the devices. A response to the query is then provided based on the properties of the devices.Type: GrantFiled: January 26, 2021Date of Patent: November 8, 2022Assignee: JUNIPER NETWORKS, INC.Inventors: Xiaoying Wu, Jisheng Wang, Amin Toghi Eshghi
-
Patent number: 11494255Abstract: Disclosed are embodiments for improving remote diagnostics of a computer system. Some embodiments obtain operational parameter values and log data from a plurality of network devices, and provide the operational parameter values and log data to a machine learning model. The model is trained to identify a root cause of a degradation of the computer system based on the operational parameter values and log data, and to provide recommendations of log data level settings for the network devices. If the model identifies a root cause of the degradation with sufficient confidence, a remedial action is identified and applied to the computer system. If the confidence level is insufficient, log data level settings of the network devices are modified based on the recommendations of the model. This process is performed iteratively, for example, such that the model receives log data based on its recommended log data levels, until a root cause is identified with sufficient confidence.Type: GrantFiled: March 12, 2021Date of Patent: November 8, 2022Assignee: JUNIPER NETWORKS, INC.Inventor: Jisheng Wang
-
Publication number: 20220321379Abstract: Disclosed are methods for detecting misconfigured VLANs. In some embodiments, traffic on a VLAN across multiple access points is categorized. Traffic on the VLAN at a single access point is then also categorized. The categorization of the VLAN traffic at the single access point can be in response to, for example, communication errors or other conditions. The two categorizations are then compared to determine if the VLAN traffic at the AP is consistent with the VLAN traffic across a network (e.g., an enterprise network). If the VLAN traffic at the AP is generally consistent with that across the network, this may indicate that a downstream network component, such as a switch or router, is misconfigured. Thus, some embodiments programmatically reconfigure the downstream component to forward traffic for the VLAN.Type: ApplicationFiled: June 22, 2022Publication date: October 6, 2022Inventor: Jisheng Wang
-
Publication number: 20220291989Abstract: Disclosed are embodiments for improving remote diagnostics of a computer system. Some embodiments obtain operational parameter values and log data from a plurality of network devices, and provide the operational parameter values and log data to a machine learning model. The model is trained to identify a root cause of a degradation of the computer system based on the operational parameter values and log data, and to provide recommendations of log data level settings for the network devices. If the model identifies a root cause of the degradation with sufficient confidence, a remedial action is identified and applied to the computer system. If the confidence level is insufficient, log data level settings of the network devices are modified based on the recommendations of the model. This process is performed iteratively, for example, such that the model receives log data based on its recommended log data levels, until a root cause is identified with sufficient confidence.Type: ApplicationFiled: March 12, 2021Publication date: September 15, 2022Inventor: Jisheng Wang
-
Publication number: 20220239569Abstract: Disclosed is a network management system that provides an interface to enable diagnostics and troubleshoot of a remotely managed multi-site network. Some embodiments provide a natural language interface, while other embodiments provide a chatbot type interface that communicates with a technician via traditional text information on a display screen. The diagnostic and troubleshooting capabilities search a central data store that receives device property information from each site of the multi-site network. Based on devices or users that match portions of the entity, queries to the data store are initiated to obtain additional data on the devices. A response to the query is then provided based on the properties of the devices.Type: ApplicationFiled: January 26, 2021Publication date: July 28, 2022Inventors: Xiaoying Wu, Jisheng Wang, Amin Toghi Eshghi
-
Patent number: 11388022Abstract: Disclosed are methods for detecting misconfigured VLANs. In some embodiments, traffic on a VLAN across multiple access points is categorized. Traffic on the VLAN at a single access point is then also categorized. The categorization of the VLAN traffic at the single access point can be in response to, for example, communication errors or other conditions. The two categorizations are then compared to determine if the VLAN traffic at the AP is consistent with the VLAN traffic across a network (e.g., an enterprise network). If the VLAN traffic at the AP is generally consistent with that across the network, this may indicate that a downstream network component, such as a switch or router, is misconfigured. Thus, some embodiments programmatically reconfigure the downstream component to forward traffic for the VLAN.Type: GrantFiled: February 5, 2020Date of Patent: July 12, 2022Assignee: Juniper Networks, Inc.Inventor: Jisheng Wang
-
Patent number: 11323469Abstract: Entity group behavior profiling. An entity group is created that includes multiple entities, where each entity represents one of a user, a machine, and a service. A behavior profile is created for each one of the entities of the entity group. The behavior of each of one of the entities of the entity group is monitored to detect behavior change. An indicator of compromise is detected based on multiple ones of the entities experiencing substantially a same behavior change.Type: GrantFiled: May 22, 2020Date of Patent: May 3, 2022Assignee: Hewlett Packard Enterprise Development LPInventor: Jisheng Wang
-
Publication number: 20220075679Abstract: The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file. In some example embodiments, messages from the system log file are used as input to generate vectors within a vector space. Portions of the log messages may generate vectors that cluster into a region in the vector space. The region of vector space is associated with one or more remedial actions. The disclosed embodiments are configured, in some example embodiments, to perform the one or more remedial actions when activity in the log file maps to the region of vector space associated with the one or more remedial actions. In some example embodiments, a remedial action can include submitting a problem report to a problem tracking database.Type: ApplicationFiled: September 20, 2021Publication date: March 10, 2022Inventors: Jisheng Wang, Gaurav Sunil Nandode, Winson Benedict Fernandes
-
Patent number: 11162612Abstract: The device includes a main valve, first and second auxiliary valves, a valve body and a filter. The main, which has first and second auxiliary valves are mounted on the valve body, which has an air inlet, a cylinder port and an air discharging port. The air inlet is in communication with the main valve through a first air passage, the cylinder port is sequentially in communication with the first and second auxiliary valves, and the main valve through a second air passage. The air discharging port is sequentially in communication with the first and second auxiliary valves and the main valve through a third air passage. The main and the second auxiliary valves are solenoid valves, and the first auxiliary valve is a hand-operated valve. An air outlet of the filter is in communication with the air inlet. The filter is used for filtering out impurities in gas.Type: GrantFiled: September 12, 2019Date of Patent: November 2, 2021Assignee: Ningxia Danchen Technology Co., LTDInventor: Jisheng Wang
-
Patent number: 11138059Abstract: The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file. In some example embodiments, messages from the system log file are used as input to generate vectors within a vector space. Portions of the log messages may generate vectors that cluster into a region in the vector space. The region of vector space is associated with one or more remedial actions. The disclosed embodiments are configured, in some example embodiments, to perform the one or more remedial actions when activity in the log file maps to the region of vector space associated with the one or more remedial actions. In some example embodiments, a remedial action can include submitting a problem report to a problem tracking database.Type: GrantFiled: September 25, 2019Date of Patent: October 5, 2021Assignee: Juniper Networks, Inc.Inventors: Jisheng Wang, Gaurav Sunil Nandode, Winson Benedict Fernandes
-
Patent number: 11137084Abstract: A solenoid valve includes a main valve, a first auxiliary valve, a second auxiliary valve, a main valve body, and an auxiliary valve body. The main and auxiliary valve bodies are axially parallel and detachably connected. The main valve is mounted on the main valve body, the first and second auxiliary valves are mounted on the auxiliary valve body, which is provided with an air inlet, a cylinder port and an air discharging port. The air inlet communicates with the main valve through a first air passage. The cylinder port is sequentially in communication with the first and second auxiliary valves and the main valve through a second air passage. The air discharging port sequentially communicates with the first and second auxiliary valves and the main valve through a third air passage. The main and second auxiliary valves are solenoid valves. The first auxiliary valve is a hand-operated valve.Type: GrantFiled: September 12, 2019Date of Patent: October 5, 2021Assignee: NINGXIA DANCHEN TECHNOLOGY CO., LTDInventor: Jisheng Wang
-
Publication number: 20210306201Abstract: Disclosed are embodiments for automatically resolving faults in a complex network system. Some embodiments monitor one or more of system operational parameter values and message exchanges between network components. A machine learning model detects a fault in the complex network system, and an action is selected based on a cause of the fault. After the action is applied to the complex network system, additional monitoring is performed to either determine the fault has been resolved or additional actions are to be applied to further resolve the fault.Type: ApplicationFiled: March 31, 2020Publication date: September 30, 2021Inventors: Jisheng Wang, Xiaoying Wu, Shmuel Shaffer, David Jea
-
Publication number: 20210243051Abstract: Disclosed are methods for detecting misconfigured VLANs. In some embodiments, traffic on a VLAN across multiple access points is categorized. Traffic on the VLAN at a single access point is then also categorized. The categorization of the VLAN traffic at the single access point can be in response to, for example, communication errors or other conditions. The two categorizations are then compared to determine if the VLAN traffic at the AP is consistent with the VLAN traffic across a network (e.g., an enterprise network). If the VLAN traffic at the AP is generally consistent with that across the network, this may indicate that a downstream network component, such as a switch or router, is misconfigured. Thus, some embodiments programmatically reconfigure the downstream component to forward traffic for the VLAN.Type: ApplicationFiled: February 5, 2020Publication date: August 5, 2021Inventor: Jisheng Wang
-
Publication number: 20210089377Abstract: The disclosed embodiments provide for identification of a remedial action based on analysis of a system log file. In some example embodiments, messages from the system log file are used as input to generate vectors within a vector space. Portions of the log messages may generate vectors that cluster into a region in the vector space. The region of vector space is associated with one or more remedial actions. The disclosed embodiments are configured, in some example embodiments, to perform the one or more remedial actions when activity in the log file maps to the region of vector space associated with the one or more remedial actions. In some example embodiments, a remedial action can include submitting a problem report to a problem tracking database.Type: ApplicationFiled: September 25, 2019Publication date: March 25, 2021Inventors: Jisheng Wang, Gaurav Sunil Nandode, Winson Benedict Fernandes
-
Publication number: 20200326002Abstract: A solenoid valve includes a main valve, a first auxiliary valve, a second auxiliary valve, a main valve body, and an auxiliary valve body. The main and auxiliary valve bodies are axially parallel and detachably connected. The main valve is mounted on the main valve body, the first and second auxiliary valves are mounted on the auxiliary valve body, which is provided with an air inlet, a cylinder port and an air discharging port. The air inlet communicates with the main valve through a first air passage. The cylinder port is sequentially in communication with the first and second auxiliary valves and the main valve through a second air passage. The air discharging port sequentially communicates with the first and second auxiliary valves and the main valve through a third air passage. The main and second auxiliary valves are solenoid valves. The first auxiliary valve is a hand-operated valve.Type: ApplicationFiled: September 12, 2019Publication date: October 15, 2020Inventor: Jisheng WANG
-
Publication number: 20200326016Abstract: The device includes a main valve, first and second auxiliary valves, a valve body and a filter. The main, which has first and second auxiliary valves are mounted on the valve body, which has an air inlet, a cylinder port and an air discharging port. The air inlet is in communication with the main valve through a first air passage, the cylinder port is sequentially in communication with the first and second auxiliary valves, and the main valve through a second air passage. The air discharging port is sequentially in communication with the first and second auxiliary valves and the main valve through a third air passage. The main and the second auxiliary valves are solenoid valves, and the first auxiliary valve is a hand-operated valve. An air outlet of the filter is in communication with the air inlet. The filter is used for filtering out impurities in gas.Type: ApplicationFiled: September 12, 2019Publication date: October 15, 2020Inventor: Jisheng WANG
-
Publication number: 20200287925Abstract: Entity group behavior profiling. An entity group is created that includes multiple entities, where each entity represents one of a user, a machine, and a service. A behavior profile is created for each one of the entities of the entity group. The behavior of each of one of the entities of the entity group is monitored to detect behavior change. An indicator of compromise is detected based on multiple ones of the entities experiencing substantially a same behavior change.Type: ApplicationFiled: May 22, 2020Publication date: September 10, 2020Inventor: Jisheng Wang
-
Patent number: 10505959Abstract: A security appliance with one or more processors and a memory communicatively coupled to the one or more processors is described. The memory includes behavior profiling service logic that, when executed by the one or more processors, (i) creates a behavior profile for a particular entity based on received incoming data, and (ii) determines whether the behavior profile identifies that a malicious attack is being performed by the particular entity based on a comparison of the behavior profile to a reference profile. The reference profile represents historical behavior of the particular entity that is monitored over a prescribed period of time.Type: GrantFiled: December 9, 2016Date of Patent: December 10, 2019Assignee: Hewlett Packard Enterprise Development LPInventors: Jisheng Wang, Madhusudana Shashanka, Chao Yang, Min-Yi Shen
-
Patent number: 10469514Abstract: Collaborative and adaptive threat intelligence. Data collected on a first customer network is received. One or more local models are trained with at least the received data, where the one or more local models are related to security. An amount of data to transmit to a centralized controller is determined based at least on a result of the training one or more local models and the determined amount of data is transmitted to the centralized controller. Result data is received from the centralized controller that is a result of one or more global models trained on the centralized controller using data collected on multiple customer networks including the first customer network. The one or more local models are adjusted using the received result data and the one or more adjusted local models are trained.Type: GrantFiled: June 18, 2015Date of Patent: November 5, 2019Assignee: Hewlett Packard Enterprise Development LPInventors: Jisheng Wang, Min-yi Shen, Prasad Palkar, Sriram Ramachandran
-
Patent number: D875158Type: GrantFiled: July 10, 2018Date of Patent: February 11, 2020Assignee: GUANGZHOU BOSMA CORPInventors: Jisheng Wang, Dexiang Zeng