Patents by Inventor Kan Xiao

Kan Xiao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240133975
    Abstract: A computerized simulation validating method for a full-scale distribution network single phase-to-ground fault test is implemented by simulating a full-scale test system with external quantities being controlled to be conformant and validating the full-scale distribution network single phase-to-ground fault test based on a conformance check result between the internal quantities of the field testing and the internal quantities of the simulation testing. The simulation validating method for a full-scale distribution network single phase-to-ground fault test improves normalization and conformance of the full-scale distribution network ground fault test. The computerized simulation validating system, apparatus, and medium for a full-scale distribution network single phase-to-ground fault test also achieve the benefits noted above.
    Type: Application
    Filed: August 10, 2023
    Publication date: April 25, 2024
    Inventors: Zhi LI, Shaofeng YU, Dingfang KE, Peibo WANG, Kan SUN, Weiqiang LANG, Haijiang XU, Kelong WANG, Zhiyong LI, Kun YU, Guangyao YING, Xuqiang HE, Yezhao CHEN, Xiang ZHANG, Mingxiao DU, Huijuan GUI, Hongling HU, Biao PENG, Xubin XIAO
  • Patent number: 11223562
    Abstract: Systems and methods for selectively processing packets based on their classification by a CBF are provided. According to one embodiment, a network device receives a packet, extracts n-tuple values from the header of the packet that are indicative of a particular transport protocol connection with which the packet is associated, determines whether the particular transport protocol connection represents an active transport protocol connection represented within the CBF by searching the CBF based on the n-tuple values. When the packet is a first packet of a new connection, counters maintained by the CBF corresponding to the n-tuple values are incremented. When a decrement event is detected for one or more of the counters, they are decremented. Finally, the packet is processed in accordance with its classification as a first packet of a new connection or a subsequent packet of an existing connection.
    Type: Grant
    Filed: August 11, 2020
    Date of Patent: January 11, 2022
    Assignee: Fortinet, Inc.
    Inventors: Zhi Guo, Xu Zhou, Kan Xiao
  • Publication number: 20210303984
    Abstract: Systems and methods for a machine-learning based approach for classification of encrypted network traffic data are provided. According to various embodiment of the present disclosure, a network security device receives a stream of packets representing a network flow. Metadata relating to the stream of packets is determined. Application layer payload data of one or more packets of the stream of packets is matched against string patterns and regular expression patterns. Statistics relating to the application layer payload data are collected. The network flow is then classified as being associated with a particular network service of various network services by applying a machine-learning model to the metadata, results of the matching, and the collected statistics.
    Type: Application
    Filed: March 24, 2020
    Publication date: September 30, 2021
    Applicant: Fortinet, Inc.
    Inventors: Jing Lan, Kan Xiao, Zhi Guo
  • Patent number: 9218506
    Abstract: Provided are methods and systems for preventing hardware Trojan insertion. An example method can comprise determining unused space in an integrated circuit (IC), selecting a plurality of built-in self-authentication (BISA) filler cells based on the determined unused space, and placing the selected plurality of BISA filler cells onto the unused space. The plurality of BISA filler cells can be connected to form a plurality of BISA blocks. The plurality of BISA blocks can correspond to a plurality of signatures. A modification of one or more BISA filler cell can lead to an alteration of one or more signatures.
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: December 22, 2015
    Assignee: University of Connecticut
    Inventors: Mohammad Tehranipoor, Kan Xiao
  • Publication number: 20140283147
    Abstract: Provided are methods and systems for preventing hardware Trojan insertion. An example method can comprise determining unused space in an integrated circuit (IC), selecting a plurality of built-in self-authentication (BISA) filler cells based on the determined unused space, and placing the selected plurality of BISA filler cells onto the unused space. The plurality of BISA filler cells can be connected to form a plurality of BISA blocks. The plurality of BISA blocks can correspond to a plurality of signatures. A modification of one or more BISA filler cell can lead to an alteration of one or more signatures.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 18, 2014
    Inventors: Mohammad Tehranipoor, Kan Xiao