Patents by Inventor Jui-Yang Lu

Jui-Yang Lu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220244964
    Abstract: In an embodiment, responsive to determining: (a) a first command is not of a particular command type associated with one or more hardware modules associated with a particular routing node, or (b) at least one argument used for executing the first command is not available: transmitting the first command to another routing node in the hardware routing mesh. Upon receiving a second command of the command bundle and determining: (a) the second command is of the particular command type associated with the hardware module(s), and (b) arguments used by the second command are available: transmitting the second command to the hardware module(s) associated with the particular routing node for execution by the hardware module(s). Thereafter, the command bundle is modified based on execution of the second command by at least refraining from transmitting the second command of the command bundle to any other routing nodes in the hardware routing mesh.
    Type: Application
    Filed: April 19, 2022
    Publication date: August 4, 2022
    Applicant: Lilac Cloud, Inc.
    Inventors: Simon Luigi Sabato, Jay Shah, Harish Ramamurthy Devanagondi, Jui-Yang Lu
  • Patent number: 11354267
    Abstract: In an embodiment, a compiler for generating command bundles is configured to receive an execution definition that includes operations for execution. The compiler determines an ordered set of hardware functions corresponding to a hardware architecture to execute at least one operation. The hardware architecture may be selected from typical processor types or a command-aware hardware processor. The compiler generates a command bundle that includes a set of logically independent commands based on hardware functions and functionality of the hardware architecture to optimize execution of the operations. A command-aware hardware processor includes a hardware routing mesh that includes sets of routing nodes that form one or more hardware pipelines. Many hardware pipelines may be included in the hardware routing mesh. A command bundle is transmitted through a selected hardware pipeline via a control path, and is modified by the routing nodes based on execution of commands to achieve a desired outcome.
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: June 7, 2022
    Assignee: Lilac Cloud, Inc.
    Inventors: Jay Shah, Srikanth Lakshminarasimhan, Simon Luigi Sabato, Jui-Yang Lu
  • Patent number: 11340907
    Abstract: In an embodiment, responsive to determining: (a) a first command is not of a particular command type associated with one or more hardware modules associated with a particular routing node, or (b) at least one argument used for executing the first command is not available: transmitting the first command to another routing node in the hardware routing mesh. Upon receiving a second command of the command bundle and determining: (a) the second command is of the particular command type associated with the hardware module(s), and (b) arguments used by the second command are available: transmitting the second command to the hardware module(s) associated with the particular routing node for execution by the hardware module(s). Thereafter, the command bundle is modified based on execution of the second command by at least refraining from transmitting the second command of the command bundle to any other routing nodes in the hardware routing mesh.
    Type: Grant
    Filed: July 6, 2020
    Date of Patent: May 24, 2022
    Assignee: Lilac Cloud, Inc.
    Inventors: Simon Luigi Sabato, Jay Shah, Harish Ramamurthy Devanagondi, Jui-Yang Lu
  • Publication number: 20220004388
    Abstract: In an embodiment, responsive to determining: (a) a first command is not of a particular command type associated with one or more hardware modules associated with a particular routing node, or (b) at least one argument used for executing the first command is not available: transmitting the first command to another routing node in the hardware routing mesh. Upon receiving a second command of the command bundle and determining: (a) the second command is of the particular command type associated with the hardware module(s), and (b) arguments used by the second command are available: transmitting the second command to the hardware module(s) associated with the particular routing node for execution by the hardware module(s). Thereafter, the command bundle is modified based on execution of the second command by at least refraining from transmitting the second command of the command bundle to any other routing nodes in the hardware routing mesh.
    Type: Application
    Filed: July 6, 2020
    Publication date: January 6, 2022
    Applicant: Lilac Cloud, Inc.
    Inventors: Simon Luigi Sabato, Jay Shah, Harish Ramamurthy Devanagondi, Jui-Yang Lu
  • Patent number: 7827384
    Abstract: Various systems and methods for implementing a Galois-based incremental hash module are disclosed. For example, a method involves computing a first hash of a first string of an input stream. The first hash is computed by performing one or more Galois mathematical operations upon portions of the first string. A second hash of a second string, which overlaps the first string, can then be computed by processing the first hash.
    Type: Grant
    Filed: July 16, 2007
    Date of Patent: November 2, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Ming Zhang, Jui-Yang Lu, Jonathan J. Chang, Stephanie W. Ti
  • Publication number: 20090024826
    Abstract: Various systems and methods for implementing a Galois-based incremental hash module are disclosed. For example, a method involves computing a first hash of a first string of an input stream. The first hash is computed by performing one or more Galois mathematical operations upon portions of the first string. A second hash of a second string, which overlaps the first string, can then be computed by processing the first hash.
    Type: Application
    Filed: July 16, 2007
    Publication date: January 22, 2009
    Inventors: Ming Zhang, Jui-Yang Lu, Jonathan J. Chang, Stephanie W. Ti