Patents by Inventor Peixue Li
Peixue Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11838319Abstract: Systems and methods for providing an integrated or Smart NIC-based hardware accelerator for a network security device to facilitate identification and mitigation of DoS attacks is provided. According to one embodiment, a processor of a network security device receives an application layer protocol request from a client, directed to a domain hosted by various servers and protected by the network security device. The application layer protocol request is parsed to extract a domain name and a path string. The hardware acceleration sub-system updates rate-based counters based on the application layer protocol request by performing a longest prefix match on the domain name and the path string. When a rate threshold associated with the rate-based counters is exceeded, a challenge message is created and transmitted to the client, having embedded therein the application layer protocol request; otherwise the application layer protocol request is allowed to pass through the network security device.Type: GrantFiled: May 2, 2022Date of Patent: December 5, 2023Assignee: Fortinet, Inc.Inventors: Zhi Guo, Peixue Li, Xu Zhou
-
Publication number: 20220263862Abstract: Systems and methods for providing an integrated or Smart NIC-based hardware accelerator for a network security device to facilitate identification and mitigation of DoS attacks is provided. According to one embodiment, a processor of a network security device receives an application layer protocol request from a client, directed to a domain hosted by various servers and protected by the network security device. The application layer protocol request is parsed to extract a domain name and a path string. The hardware acceleration sub-system updates rate-based counters based on the application layer protocol request by performing a longest prefix match on the domain name and the path string. When a rate threshold associated with the rate-based counters is exceeded, a challenge message is created and transmitted to the client, having embedded therein the application layer protocol request; otherwise the application layer protocol request is allowed to pass through the network security device.Type: ApplicationFiled: May 2, 2022Publication date: August 18, 2022Applicant: Fortinet, Inc.Inventors: Zhi Guo, Peixue Li, Xu Zhou
-
Patent number: 11349866Abstract: Systems and methods for providing an integrated or Smart NIC-based hardware accelerator for a network security device to facilitate identification and mitigation of DoS attacks is provided. According to one embodiment, a processor of a network security device receives an application layer protocol request from a client, directed to a domain hosted by various servers and protected by the network security device. The application layer protocol request is parsed to extract a domain name and a path string. The hardware acceleration sub-system updates rate-based counters based on the application layer protocol request by performing a longest prefix match on the domain name and the path string. When a rate threshold associated with the rate-based counters is exceeded, a challenge message is created and transmitted to the client, having embedded therein the application layer protocol request; otherwise the application layer protocol request is allowed to pass through the network security device.Type: GrantFiled: March 31, 2020Date of Patent: May 31, 2022Assignee: Fortinet, Inc.Inventors: Zhi Guo, Peixue Li, Xu Zhou
-
Publication number: 20210306373Abstract: Systems and methods for providing an integrated or Smart NIC-based hardware accelerator for a network security device to facilitate identification and mitigation of DoS attacks is provided. According to one embodiment, a processor of a network security device receives an application layer protocol request from a client, directed to a domain hosted by various servers and protected by the network security device. The application layer protocol request is parsed to extract a domain name and a path string. The hardware acceleration sub-system updates rate-based counters based on the application layer protocol request by performing a longest prefix match on the domain name and the path string. When a rate threshold associated with the rate-based counters is exceeded, a challenge message is created and transmitted to the client, having embedded therein the application layer protocol request; otherwise the application layer protocol request is allowed to pass through the network security device.Type: ApplicationFiled: March 31, 2020Publication date: September 30, 2021Applicant: Fortinet, Inc.Inventors: Zhi Guo, Peixue Li, Xu Zhou
-
Patent number: 11063905Abstract: Systems and methods for detecting Internet services by a network policy controller are provided. According to one embodiment, a network controller maintains an Internet service database (ISDB) in which multiple Internet services and corresponding protocols, port numbers, Internet Protocol (IP) address ranges and singularity levels of the IP ranges are stored. The network policy controller intercepts network traffic and detects the Internet service of the network traffic. If an IP address of the network traffic falls in an IP range with highest singularity level and the protocol type, port number of the network traffic are matched in the ISDB, the corresponding Internet service is identified as the Internet service of the network traffic. The network policy controller further controls transmission of the network traffic based on the Internet service.Type: GrantFiled: May 9, 2019Date of Patent: July 13, 2021Assignee: Fortinet, Inc.Inventors: Shangwei Duan, Peixue Li
-
Patent number: 11057304Abstract: Applications associated with the network data packet are identified by parsing the network data packet of the received network data packets to identify a second-level domain from a destination IP address and searching the second-level domain database to identify the application associated with the second-level domain. It is determined whether the network data packet comprises a DNS packet or a non-DNS packet. Responsive to the network data packet comprising a DNS packet, a second-level domain database in real-time is updated by storing the destination IP address in association with the second-level domain, the second-level domain associated with the application. Responsive to the network data packet comprising a non-DNS packet, a network policy for enforcement on the identified application and routing the network data packet in accordance with the network policy for the application is identified.Type: GrantFiled: December 22, 2019Date of Patent: July 6, 2021Assignee: Fortinet, Inc.Inventor: Peixue Li
-
Publication number: 20210194805Abstract: Applications associated with the network data packet are identified by parsing the network data packet of the received network data packets to identify a second-level domain from a destination IP address and searching the second-level domain database to identify the application associated with the second-level domain. It is determined whether the network data packet comprises a DNS packet or a non-DNS packet. Responsive to the network data packet comprising a DNS packet, a second-level domain database in real-time is updated by storing the destination IP address in association with the second-level domain, the second-level domain associated with the application. Responsive to the network data packet comprising a non-DNS packet, a network policy for enforcement on the identified application and routing the network data packet in accordance with the network policy for the application is identified.Type: ApplicationFiled: December 22, 2019Publication date: June 24, 2021Inventor: Peixue Li
-
Publication number: 20200358743Abstract: Systems and methods for detecting Internet services by a network policy controller are provided. According to one embodiment, a network controller maintains an Internet service database (ISDB) in which multiple Internet services and corresponding protocols, port numbers, Internet Protocol (IP) address ranges and singularity levels of the IP ranges are stored. The network policy controller intercepts network traffic and detects the Internet service of the network traffic. If an IP address of the network traffic falls in an IP range with highest singularity level and the protocol type, port number of the network traffic are matched in the ISDB, the corresponding Internet service is identified as the Internet service of the network traffic. The network policy controller further controls transmission of the network traffic based on the Internet service.Type: ApplicationFiled: May 9, 2019Publication date: November 12, 2020Applicant: Fortinet, Inc.Inventors: Shangwei Duan, Peixue Li
-
Patent number: 10706304Abstract: Systems and methods for authenticating a user by a combination of the user's fingerprint and a tactile pattern are provided. According to one embodiment, a computing device captures a tactile pattern that is drawn by a user's finger on a touch panel that is operationally connected to the computing device. The computing device captures one or more fingerprints of the user using a fingerprint reader component of the computing device at one or more locations on the touch panel while the user is drawing the tactile pattern. The computing device matches the captured tactile pattern and fingerprints with a stored tactile pattern and fingerprints and authenticates the user if both the captured tactile pattern and fingerprints match with the stored tactile pattern and fingerprints.Type: GrantFiled: September 28, 2017Date of Patent: July 7, 2020Assignee: Fortinet, Inc.Inventors: Kushal Arvind Shah, Peixue Li
-
Publication number: 20200204570Abstract: Systems and methods are provided for mitigating obsolete file format based attacks. In one embodiment, a security device captures a file on a computer or to be transmitted to the computer. The security device checks the format of the file and determines whether the file format is obsolete. The security device takes an action on the file when the file format is determined to be obsolete.Type: ApplicationFiled: December 20, 2018Publication date: June 25, 2020Applicant: Fortinet, Inc.Inventors: Kushal Arvind Shah, Peixue Li
-
Publication number: 20190095735Abstract: Systems and methods for authenticating a user by a combination of the user's fingerprint and a tactile pattern are provided. According to one embodiment, a computing device captures a tactile pattern that is drawn by a user's finger on a touch panel that is operationally connected to the computing device. The computing device captures one or more fingerprints of the user using a fingerprint reader component of the computing device at one or more locations on the touch panel while the user is drawing the tactile pattern. The computing device matches the captured tactile pattern and fingerprints with a stored tactile pattern and fingerprints and authenticates the user if both the captured tactile pattern and fingerprints match with the stored tactile pattern and fingerprints.Type: ApplicationFiled: September 28, 2017Publication date: March 28, 2019Applicant: Fortinet, Inc.Inventors: Kushal Arvind Shah, Peixue Li