Patents by Inventor Lele Zhang
Lele Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12267682Abstract: A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.Type: GrantFiled: July 17, 2023Date of Patent: April 1, 2025Assignee: Cisco Technology, Inc.Inventors: Lele Zhang, Yajun Xia, Chuanwei Li, Li Zhao
-
Publication number: 20250036444Abstract: An example computing system includes software, executing on a hardware platform, configured to manage hypervisors and a distributed switch executing in a host cluster, the software including a control plane of the distributed switch, the hypervisors providing a data plane of the distributed switch, the host cluster including hosts, the distributed switch supporting features; a host membership manager of the software configured to track which of the hosts in the host cluster are members of a group that executes the distributed switch; a feature manager of the software configured to track which of the features of the distributed switch are enabled; and a compatibility checker of the software configured with compatibility data that relates the features of the distributed switch with hypervisor version requirements.Type: ApplicationFiled: August 17, 2023Publication date: January 30, 2025Inventors: Kejia CUI, Lele ZHANG, Honggang LIU, Qi WU, Donghai HAN
-
Patent number: 12149548Abstract: The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.Type: GrantFiled: October 29, 2021Date of Patent: November 19, 2024Assignee: Cisco Technology, Inc.Inventors: Lele Zhang, Li Zhao, Chuanwei Li, Feiliang Wang
-
Publication number: 20240236016Abstract: Example methods and systems for priority-based network bandwidth allocation are described. In one example, a first computer system may detect an event indicating that network bandwidth allocation is required for a virtualized computing instance. The first computer system may identify, from multiple priority levels, a first priority level that is associated with (a) the virtualized computing instance, (b) a logical network element to which the virtualized computing instance is attached, or (c) a group that includes the virtualized computing instance or the logical network element. The first computer system may obtain network bandwidth capacity information associated with physical network adapter(s) capable of forwarding traffic associated with the virtualized computing instance.Type: ApplicationFiled: April 10, 2023Publication date: July 11, 2024Applicant: VMware, Inc.Inventors: Rushikesh GHATPANDE, Nilesh Ramchandra NIPANE, Lele ZHANG, Shyam Sambasivan RAMACHANDRAN
-
Publication number: 20240205184Abstract: Example methods and systems for media access control (MAC) address assignment for virtual network interface cards (VNICs) are described. One example may involve a first computer system may determining a first MAC address portion that is uniquely associated with the first computer system. A first VNIC may be assigned with a first MAC address that includes (a) the first MAC address portion and (b) a third MAC address portion that is uniquely associated with the first VNIC on the first computer system. A second VNIC may be assigned with a second MAC address that includes (a) the first MAC address portion and (b) a fourth MAC address portion that is uniquely associated with the second VNIC on the first computer system. The first computer system may perform traffic handling by processing packets specifying the first MAC address or the second MAC address.Type: ApplicationFiled: February 6, 2023Publication date: June 20, 2024Applicant: VMware, Inc.Inventors: Kejia CUI, Lele ZHANG, Qi WU, Donghai HAN, Honggang LIU
-
Publication number: 20240106718Abstract: The disclosure provides an approach for virtual computing instance (VCI) migration. Embodiments include scanning logical segments associated with a customer gateway to identify network addresses associated with the logical segments. Embodiments include determining one or more recommended supernets based on the network addresses associated with the logical segments. Embodiments include providing output to a user based on the one or more recommended supernets. Embodiments include based on the output, receiving input from the user configuring an aggregation supernet for the customer gateway. Embodiments include advertising the aggregation supernet to one or more endpoints separate from the customer gateway.Type: ApplicationFiled: September 26, 2022Publication date: March 28, 2024Inventors: Rushikesh Shashank GHATPANDE, Nilesh Ramchandra NIPANE, Nikhil Ravindra RAJGURU, Lele ZHANG ZLELE
-
Patent number: 11929883Abstract: The disclosure provides an approach for virtual computing instance (VCI) migration. Embodiments include scanning logical segments associated with a customer gateway to identify network addresses associated with the logical segments. Embodiments include determining one or more recommended supernets based on the network addresses associated with the logical segments. Embodiments include providing output to a user based on the one or more recommended supernets. Embodiments include based on the output, receiving input from the user configuring an aggregation supernet for the customer gateway. Embodiments include advertising the aggregation supernet to one or more endpoints separate from the customer gateway.Type: GrantFiled: September 26, 2022Date of Patent: March 12, 2024Assignee: VMware, Inc.Inventors: Rushikesh Shashank Ghatpande, Nilesh Ramchandra Nipane, Nikhil Ravindra Rajguru, Lele Zhang Zlele
-
Patent number: 11909545Abstract: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.Type: GrantFiled: July 18, 2022Date of Patent: February 20, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Pascal Thubert, Huimin She, Chuanwei Li, Lele Zhang
-
Publication number: 20240038238Abstract: Embodiments of this application provide a speech recognition method. The speech recognition method includes: obtaining a facial depth image and a to-be-recognized voice of a user, where the facial depth image is an image collected by using a depth camera; recognizing a mouth shape feature from the facial depth image, and recognizing a voice feature from a to-be-recognized audio; and fusing the voice feature and the mouth shape feature into an audio-video feature, and recognizing, based on the audio-video feature, a voice uttered by the user.Type: ApplicationFiled: August 12, 2021Publication date: February 1, 2024Inventors: Lei QIN, Lele ZHANG, Hao LIU, Yuewan LU
-
Patent number: 11877708Abstract: A cleaning robot, includes a body provided with a dust box and a water tank, a water outlet for discharging liquid in the water tank and a dust suction port connected with the dust box are provided with on a bottom of the body, and the water outlet is disposed rearward of the dust suction port and adjacent thereto.Type: GrantFiled: April 4, 2022Date of Patent: January 23, 2024Assignee: ECOVACS ROBOTICS CO., LTD.Inventor: Lele Zhang
-
Publication number: 20230362654Abstract: A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.Type: ApplicationFiled: July 17, 2023Publication date: November 9, 2023Applicant: Cisco Technology, Inc.Inventors: Lele Zhang, Yajun Xia, Chuanwei Li, Li Zhao
-
Patent number: 11811648Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.Type: GrantFiled: September 6, 2022Date of Patent: November 7, 2023Assignee: Cisco Technology, Inc.Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Ismail Sheriff
-
Publication number: 20230319683Abstract: In one embodiment, a method comprises: creating, by a root network device in a wireless data network, a perimeter topology comprising a first distance vector-protocol path of a first group of perimeter devices and a second distance vector-protocol path of a second group of the perimeter devices, the creating comprising outputting first and second advertisement messages causing the perimeter devices to attach to only one parent of only one of the first or second distance vector-protocol paths and a junction device to attach at respective ends of the first and second distance vector-protocol paths; and causing the junction device to forward, from the first distance vector-protocol path, a data packet toward the root network device via the second distance vector-protocol path.Type: ApplicationFiled: April 4, 2022Publication date: October 5, 2023Inventors: PASCAL THUBERT, LELE ZHANG, HUIMIN SHE, LI ZHAO
-
Patent number: 11706625Abstract: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.Type: GrantFiled: September 3, 2020Date of Patent: July 18, 2023Assignee: Cisco Technology, Inc.Inventors: Lele Zhang, Yajun Xia, Chuanwei Li, Li Zhao
-
Patent number: 11677630Abstract: Techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VPAN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VPAN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.Type: GrantFiled: April 30, 2021Date of Patent: June 13, 2023Assignee: Cisco Technology, Inc.Inventors: Lele Zhang, Li Zhao, Haibo Dong, Yihua Dai
-
Patent number: 11653220Abstract: Systems, methods, and computer-readable media for identifying a deployment scheme for forming a wireless mesh network based on environmental characteristics and an optimum deployment scheme. In some examples, a geographical area for deployment of a wireless mesh network is identified. Additionally, environmental information of the geographical area can be collected. Network characteristics of an optimum deployment scheme for forming the wireless mesh network can be defined. As follows, a deployment scheme for forming the wireless mesh network can be identified based on the network characteristics of the optimum deployment scheme and the environmental information of the geographical area.Type: GrantFiled: April 4, 2019Date of Patent: May 16, 2023Assignee: Cisco Technology, Inc.Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Huimin She
-
Publication number: 20230139002Abstract: The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.Type: ApplicationFiled: October 29, 2021Publication date: May 4, 2023Inventors: Lele Zhang, Li Zhao, Chuanwei Li, Feiliang Wang
-
Publication number: 20220417135Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.Type: ApplicationFiled: September 6, 2022Publication date: December 29, 2022Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Sheriff
-
Publication number: 20220353149Abstract: Techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VPAN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VPAN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.Type: ApplicationFiled: April 30, 2021Publication date: November 3, 2022Inventors: Lele Zhang, Li Zhao, Haibo Dong, Yihua Dai
-
Publication number: 20220353103Abstract: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.Type: ApplicationFiled: July 18, 2022Publication date: November 3, 2022Inventors: PASCAL THUBERT, HUIMIN SHE, CHUANWEI LI, LELE ZHANG