Patents by Inventor Linlong Jiang

Linlong Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8850035
    Abstract: A system, comprising a plurality of geographically distributed colocation facilities (colos), each colo comprising a plurality of computing devices configured to establish local connections between the colo and user devices associated with a corresponding set of users; maintain local connection state information relating to the local connections; maintain remote connection state information relating to remote connections between other ones of the colos and user devices associated with the corresponding sets of users; and facilitate sessions between any of the user devices connected to any of the colos with reference to the local and remote connection state information.
    Type: Grant
    Filed: May 16, 2007
    Date of Patent: September 30, 2014
    Assignee: Yahoo! Inc.
    Inventors: Rajanikanth Vemulapalli, Linlong Jiang, Manish Godara, Gopalakrishnan Krishnan, Naveen Sanjeeva
  • Patent number: 7849318
    Abstract: A secret string is established so as to be known only to a client computing system and a server computing system. A non-encrypted version of a message, a message counter value, and first hash value are received by the server computing system from the client computing system. The first hash value, based on a content of the message, the message counter value, and the secret string, is generated at the client computing system using a first hash algorithm. Using the first hash algorithm, the server generates second hash value based on the content of the received message, the received message counter value, and the secret string. The server computing system accepts the received non-encrypted version of the message as authentic upon determining that the received message counter value is greater than a previously received message counter value and that the second hash value matches the first hash value.
    Type: Grant
    Filed: June 19, 2007
    Date of Patent: December 7, 2010
    Assignee: Yahoo! Inc.
    Inventors: Kai Zhang, Linlong Jiang
  • Publication number: 20090049190
    Abstract: Systems and methods are provided for multiple points of presence (MPOP) in the real time communication of data between or among users. More particularly, according to embodiments of the present invention, a messaging service network is provided that allows a user to connect to the messaging service network from multiple client devices and access features associated with the messaging service network from any one of the multiple client devices at any point in time. In this manner, a user can seamlessly transition among multiple client devices without interruption and access services provided by the messaging service network including, but not limited to, sending/receiving instant message (or “IM”) data to other user(s), publishing/subscribing presence to other user(s), making/receiving phone calls between user(s), etc.
    Type: Application
    Filed: August 16, 2007
    Publication date: February 19, 2009
    Applicant: YAHOO!, INC.
    Inventors: Linlong Jiang, Alan Li, Raj Vemulapalli, Manish Godara, Ming J. Lu
  • Publication number: 20090006532
    Abstract: Method, apparatus, and systems are directed to phishing detection and prevention in Instant Messaging (IM) environments. A variety of sources provide phishing data to a client phishing engine (CAE). The CAE may receive data from various applications local to the client device, from sources external to the client device, user input, and data from a plurality of other client devices. The CAE may employ the data to block access to a site and/or provide a warning message. At least some of the phishing data is provided to a centralized anti-phishing server (CAS) from a plurality of client devices. The CAS then attempts to use the received phishing data to search for the originator of the phishing site, and prevent future messages associated with the site. CAS will provide information about the detected phishing sites to a filtering application, such that the phishing site may be appropriately blocked.
    Type: Application
    Filed: June 28, 2007
    Publication date: January 1, 2009
    Applicant: Yahoo! Inc.
    Inventors: Richard Sinn, Miles Libbey, Linlong Jiang
  • Publication number: 20080320307
    Abstract: A secret string is established so as to be known only to a client computing system and a server computing system. A non-encrypted version of a message, a message counter value, and first hash value are received by the server computing system from the client computing system. The first hash value, based on a content of the message, the message counter value, and the secret string, is generated at the client computing system using a first hash algorithm. Using the first hash algorithm, the server generates second hash value based on the content of the received message, the received message counter value, and the secret string. The server computing system accepts the received non-encrypted version of the message as authentic upon determining that the received message counter value is greater than a previously received message counter value and that the second hash value matches the first hash value.
    Type: Application
    Filed: June 19, 2007
    Publication date: December 25, 2008
    Applicant: Yahoo! Inc.
    Inventors: Kai Zhang, Linlong Jiang
  • Publication number: 20080307037
    Abstract: A TCP connection is opened between a client and a server. An HTTP client request is transmitted from the client to the server over the open TCP connection. If client data is not pending at the server upon receipt of the HTTP client request at the server, the server waits for client data to become available before sending a server response to the client, thereby maintaining the open TCP connection. However, if client data is pending at the server upon receipt of the HTTP client request at the server, a server response including the client data is transmitted from the server to the client over the open TCP connection. Promptly upon receiving the server response, the client transmits a new HTTP client request to the server, thereby ensuring that an open TCP connection is maintained between the client and the server.
    Type: Application
    Filed: June 7, 2007
    Publication date: December 11, 2008
    Applicant: Yahoo! Inc.
    Inventors: Kai Zhang, Linlong Jiang
  • Publication number: 20080276002
    Abstract: Techniques are described for making the best connection between a client and a server. The best connection is determined based upon the proximity of the client to the server, and the load and availability of the server. Proximity is determined by connection racing in which response times to requests made to various sets of servers are compared. The load is determined by back-end monitoring logic for each set of servers and is indicated in the response sent by the server. The availability of the server is monitored by a virtual IP server located with each set of servers. The virtual IP server selects available servers to respond to the request from the client. When the client receives responses, the client selects a server based on (a) the response times and (b) load information in the responses in order to make the best connection.
    Type: Application
    Filed: May 1, 2007
    Publication date: November 6, 2008
    Inventors: Linlong Jiang, Michael F. Christian