Patents by Inventor Ly Loi

Ly Loi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230362140
    Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for processing data messages in parallel using multiple processors (e.g., cores) of each computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. In some embodiments, the multiple processors encrypt data messages according to a set of encryption parameters or multiple sets of encryption parameters that specify an encryption policy for data messages requiring encryption, an encryption algorithm, an encryption key, a destination network address, and an encryption-parameter-set identifier.
    Type: Application
    Filed: July 20, 2023
    Publication date: November 9, 2023
    Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
  • Patent number: 11729153
    Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for processing data messages in parallel using multiple processors (e.g., cores) of each computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. In some embodiments, the multiple processors encrypt data messages according to a set of encryption parameters or multiple sets of encryption parameters that specify an encryption policy for data messages requiring encryption, an encryption algorithm, an encryption key, a destination network address, and an encryption-parameter-set identifier.
    Type: Grant
    Filed: August 15, 2021
    Date of Patent: August 15, 2023
    Assignee: NICIRA, INC.
    Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
  • Patent number: 11398987
    Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance. Each host computer, in some embodiments, is responsible for collecting and reporting attributes of data flows associated with machines executing on a host computer. In some embodiments, the host computer includes a flow exporter that processes and publishes flow data to the analysis appliance, a set of agents for collecting context data relating to the flows from machines executing on the host, a set of additional modules that provide additional context data, an anomaly detection engine that analyzes flow data and context data and provides additional context data, and a context exporter for processing and publishing context data to the analysis appliance.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: July 26, 2022
    Assignee: VMWARE, INC.
    Inventors: Jayant Jain, Russell Lu, Ly Loi, Rick Lund, Sushruth Gopal
  • Patent number: 11288256
    Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance. The analysis appliance, in some embodiments, receives definitions of keys and provides them to the host computers. In some embodiments, existing keys are modified based on the analysis. Additionally, or alternatively, new keys are provided based on the analysis. In some embodiments, the analysis appliance receives the flow group records (e.g., sets of attributes) based on the keys and the configuration data from each host computer.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: March 29, 2022
    Assignee: VMWARE, INC.
    Inventors: Jayant Jain, Russell Lu, Ly Loi, Rick Lund, Arnold Poon
  • Publication number: 20210377232
    Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for processing data messages in parallel using multiple processors (e.g., cores) of each computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. In some embodiments, the multiple processors encrypt data messages according to a set of encryption parameters or multiple sets of encryption parameters that specify an encryption policy for data messages requiring encryption, an encryption algorithm, an encryption key, a destination network address, and an encryption-parameter-set identifier.
    Type: Application
    Filed: August 15, 2021
    Publication date: December 2, 2021
    Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
  • Patent number: 11188570
    Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance. Each host computer, in some embodiments, is responsible for collecting and reporting attributes of data flows associated with machines executing on a host computer. The host computer, in some embodiments, first eliminates duplicative flow group records and then aggregates the flow data according to a set of received keys that specify attributes that define the aggregation. For example, a simple key that specifies a set of machine identifiers (e.g., a VM ID) as attribute values will, for each machine identifier, aggregate all flows with that machine identifier into a single aggregated flow group record. In some embodiments, the host computer includes a flow exporter that processes and publishes flow data to the analysis appliance.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: November 30, 2021
    Assignee: VMWARE, INC.
    Inventors: Jayant Jain, Russell Lu, Ly Loi, Rick Lund, Sushruth Gopal
  • Patent number: 11095617
    Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for processing data messages in parallel using multiple processors (e.g., cores) of each computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. In some embodiments, the multiple processors encrypt data messages according to a set of encryption parameters or multiple sets of encryption parameters that specify an encryption policy for data messages requiring encryption, an encryption algorithm, an encryption key, a destination network address, and an encryption-parameter-set identifier.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: August 17, 2021
    Assignee: NICIRA, INC.
    Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
  • Patent number: 11075888
    Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for distributing data messages among processors of a destination computer that receives encrypted data messages from a source computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. The encrypted data messages are received at multiple interfaces of the destination computer and in some embodiments, include an identifier for a set of encryption parameters (e.g., a security parameter index). The encryption-parameter-set identifier is used to distribute encrypted data messages among processors of the destination computer.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: July 27, 2021
    Assignee: NICIRA, INC.
    Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
  • Publication number: 20210029050
    Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance. Each host computer, in some embodiments, is responsible for collecting and reporting attributes of data flows associated with machines executing on a host computer. In some embodiments, the host computer includes a flow exporter that processes and publishes flow data to the analysis appliance, a set of agents for collecting context data relating to the flows from machines executing on the host, a set of additional modules that provide additional context data, an anomaly detection engine that analyzes flow data and context data and provides additional context data, and a context exporter for processing and publishing context data to the analysis appliance.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Inventors: Jayant Jain, Russell Lu, Ly Loi, Rick Lund, Sushruth Gopal
  • Publication number: 20210026830
    Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance. The analysis appliance, in some embodiments, receives definitions of keys and provides them to the host computers. In some embodiments, existing keys are modified based on the analysis. Additionally, or alternatively, new keys are provided based on the analysis. In some embodiments, the analysis appliance receives the flow group records (e.g., sets of attributes) based on the keys and the configuration data from each host computer.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Inventors: Jayant Jain, Russell Lu, Ly Loi, Rick Lund, Arnold Poon
  • Publication number: 20210026870
    Abstract: Some embodiments provide a novel method for collecting and reporting attributes of data flows associated with machines executing on a plurality of host computers to an analysis appliance. Each host computer, in some embodiments, is responsible for collecting and reporting attributes of data flows associated with machines executing on a host computer. The host computer, in some embodiments, first eliminates duplicative flow group records and then aggregates the flow data according to a set of received keys that specify attributes that define the aggregation. For example, a simple key that specifies a set of machine identifiers (e.g., a VM ID) as attribute values will, for each machine identifier, aggregate all flows with that machine identifier into a single aggregated flow group record. In some embodiments, the host computer includes a flow exporter that processes and publishes flow data to the analysis appliance.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Inventors: Jayant Jain, Russell Lu, Ly Loi, Rick Lund, Sushruth Gopal
  • Patent number: 10701107
    Abstract: Certain embodiments described herein are generally directed to deterministic load balancing of processing encapsulated encrypted data packets at a destination tunnel endpoint. In some embodiments, an IPSec component residing within a destination tunnel endpoint is configured to select a CPU core ID of a virtual CPU using a CPU selection function. In some embodiments, the IPSec component selects an SPI value corresponding to the CPU core ID. In some embodiments, the IPsec component indicates the SPI value to a source tunnel endpoint for use in establishing an in-bound security association, wherein the in-bound security association is used by the source tunnel endpoint to encrypt a data packet received from the source endpoint and destined for the destination endpoint.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: June 30, 2020
    Assignee: Nicira, Inc.
    Inventors: Sushruth Gopal, Ly Loi, Yong Wang, Michael Parsa
  • Patent number: 10623372
    Abstract: Certain embodiments described herein are generally directed to load balancing IPSec tunnels at an extended Berkeley Packet Filter (eBPF) module of a destination tunnel endpoint for encapsulated ESP encrypted data packets for encapsulated encrypted data packets based on a security parameter index value of the encapsulated encrypted data packets.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: April 14, 2020
    Assignee: Nicira, Inc.
    Inventors: Yong Wang, Brenden Blanco, Ly Loi
  • Patent number: 10331973
    Abstract: Techniques disclosed herein provide an approach for automatically importing graphical topologies and deploying the same. In one embodiment, a topology importer tool uses a trained machine learning model to detect and classify objects in an image depicting a topology. The topology importer distinguishes between software (or hardware) components in the detected objects and properties of those components. In particular, the topology importer may determine a property is associated with a component based on an overlap between objects representing the property and the component, a distance between the objects representing the property and the component, or a learned model. The topology importer determines relationships between components in a similar manner, as well as based on detected links represented by objects between components indicating those components are connected. The topology importer further converts the topology to a format understood by an application which may then deploy the topology.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: June 25, 2019
    Assignee: Nicira, Inc.
    Inventors: Yong Wang, Jayant Jain, Ly Loi
  • Publication number: 20190173850
    Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for processing data messages in parallel using multiple processors (e.g., cores) of each computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. In some embodiments, the multiple processors encrypt data messages according to a set of encryption parameters or multiple sets of encryption parameters that specify an encryption policy for data messages requiring encryption, an encryption algorithm, an encryption key, a destination network address, and an encryption-parameter-set identifier.
    Type: Application
    Filed: December 4, 2017
    Publication date: June 6, 2019
    Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
  • Publication number: 20190173920
    Abstract: Certain embodiments described herein are generally directed to deterministic load balancing of processing encapsulated encrypted data packets at a destination tunnel endpoint. In some embodiments, an IPSec component residing within a destination tunnel endpoint is configured to select a CPU core ID of a virtual CPU using a CPU selection function. In some embodiments, the IPSec component selects an SPI value corresponding to the CPU core ID.
    Type: Application
    Filed: December 6, 2017
    Publication date: June 6, 2019
    Inventors: Sushruth GOPAL, Ly LOI, Yong WANG, Michael PARSA
  • Publication number: 20190173841
    Abstract: Certain embodiments described herein are generally directed to load balancing IPSec tunnels at an extended Berkeley Packet Filter (eBPF) module of a destination tunnel endpoint for encapsulated ESP encrypted data packets for encapsulated encrypted data packets based on a security parameter index value of the encapsulated encrypted data packets.
    Type: Application
    Filed: December 6, 2017
    Publication date: June 6, 2019
    Inventors: Yong WANG, Brenden BLANCO, Ly LOI
  • Publication number: 20190173851
    Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for distributing data messages among processors of a destination computer that receives encrypted data messages from a source computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. The encrypted data messages are received at multiple interfaces of the destination computer and in some embodiments, include an identifier for a set of encryption parameters (e.g., a security parameter index). The encryption-parameter-set identifier is used to distribute encrypted data messages among processors of the destination computer.
    Type: Application
    Filed: December 4, 2017
    Publication date: June 6, 2019
    Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
  • Publication number: 20180373961
    Abstract: Techniques disclosed herein provide an approach for automatically importing graphical topologies and deploying the same. In one embodiment, a topology importer tool uses a trained machine learning model to detect and classify objects in an image depicting a topology. The topology importer distinguishes between software (or hardware) components in the detected objects and properties of those components. In particular, the topology importer may determine a property is associated with a component based on an overlap between objects representing the property and the component, a distance between the objects representing the property and the component, or a learned model. The topology importer determines relationships between components in a similar manner, as well as based on detected links represented by objects between components indicating those components are connected. The topology importer further converts the topology to a format understood by an application which may then deploy the topology.
    Type: Application
    Filed: June 26, 2017
    Publication date: December 27, 2018
    Inventors: Yong WANG, Jayant JAIN, Ly LOI
  • Patent number: 9124564
    Abstract: Techniques are presented for establishing context awareness during first negotiation of secure key exchange. These techniques may be embodied as a method, apparatus or instructions in a computer-readable storage media. At a first network device, a message is received from a second network device as part of an initial exchange of information of a secure key exchange, the message containing information indicating one or more secure key exchange policies acceptable to the second network device and defining one or more associated security parameters. The message further contains context-specific information identifying a context of the second network device. The first network device selects a secure key exchange policy for communicating with the second network device based upon the context-specific information and sends a response message to the second network device containing the selected secure key exchange policy. If the context was understood, the response message also includes context-specific information.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: September 1, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Thamilarasu Kandasamy, Ly Loi, Rajeshwar Singh Jenwar