Patents by Inventor Tao Wan
Tao Wan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9923874Abstract: A packet obfuscation method comprising receiving a data packet having a routing header portion and a payload portion, performing a first obfuscation on the routing header portion to generate an obfuscated routing header portion, performing a second obfuscation on at least the payload portion to generate an obfuscated payload portion, and combining the obfuscated routing header portion and the obfuscated payload portion to form an obfuscated packet. A packet forwarding method comprising obfuscating routing information using a packet obfuscation function, generating a plurality of forwarding rule entries in accordance with the obfuscated routing information, transmitting the plurality of forwarding rule entries to at least one network node in a network, transmitting the packet obfuscation function to at least one network node in the network, and transmitting a de-obfuscation function to at least one network node in the network.Type: GrantFiled: February 27, 2015Date of Patent: March 20, 2018Assignee: Huawei Technologies Co., Ltd.Inventors: Tao Wan, Peter Ashwood-Smith, Wen Tong
-
Patent number: 9923814Abstract: An address resolution method, comprising obtaining an Internet Protocol (IP) address for a destination network node, computing a Media Access Control (MAC) address for the destination network node using a mapping function and the IP address for the destination network node, and sending data traffic using the MAC address computed for the destination network node.Type: GrantFiled: February 17, 2015Date of Patent: March 20, 2018Assignee: Huawei Technologies Co., Ltd.Inventors: Tao Wan, Yapeng Wu, Xingjun Chu, Peter Ashwood-Smith, Guoli Yin
-
Publication number: 20180041428Abstract: A source routing method and apparatus are provided. The method includes receiving a data packet that comprises a destination address, a source address, and a payload, determining a plurality of next-hops along a service chain path between the source address and the destination address, generating a source routed data packet that comprises the destination address, the source address, the plurality of next-hops, and the payload, setting the destination address of the source routed data packet to a first next-hop from the plurality of next-hops along the service chain path, and forwarding the source routed data packet in accordance with the destination address.Type: ApplicationFiled: July 18, 2017Publication date: February 8, 2018Inventors: Tao Wan, Peter Ashwood-Smith, Mehdi Arashmid Akhavain Mohammdi, Yapeng Wu, Xingjun Chu, Guoli Yin
-
Publication number: 20170325134Abstract: A method and apparatus for connecting/attaching a mobile device to a network. Service information, such as pricing and plan information, associated with one or more networks is provided to a mobile device. The mobile device requests and receives configuration details for a selected one of the networks. The configuration details can include identity information such as is stored in a reprogrammable SIM, usable for connecting/attaching the mobile device to the selected network. The mobile device then registers and connects with the selected network based on the configuration details.Type: ApplicationFiled: October 19, 2016Publication date: November 9, 2017Applicant: Huawei Technologies Co., Ltd.Inventors: Tao WAN, Peter ASHWOOD-SMITH
-
Publication number: 20170295168Abstract: The present disclosure is drawn to systems and methods for activating a mobile device in an enterprise mobile management context. The mobile device is configured to generate a first device security certificate which comprises a device key and an identifier of the mobile device. The device key corresponds to a shared secret known to the mobile device and to an authentication server. The mobile device sends the first device security certificate to the authentication server. The authentication server validates the mobile device by comparing the device key to a server key and by locating the identifier in a list of known identifiers. When the mobile device is validated, the authentication server sends a first server security certificate to the mobile device. The first device and server security certificates may then be used to establish a secure connection, over which a second set of device and server certificates may be enrolled.Type: ApplicationFiled: April 11, 2016Publication date: October 12, 2017Inventor: Tao WAN
-
Patent number: 9788246Abstract: A measurement initiation method for inter-frequency/inter-system cell reselection and UE thereof are described. A signal quality value of a current serving cell is obtained for many times, and a signal quality value smaller than or equal to a threshold of measurement initiation of a neighboring inter-frequency/inter-system cell is stored storing until L signal quality values are obtained; a mean signal quality value is obtained by calculation according to the obtained L signal quality values, and when the mean signal quality value is greater than a signal quality reference threshold, UE initiates the measurement of the neighboring inter-frequency/inter-system cell. By using the method and UE, the problem that UE frequently initiates measurement of a neighboring inter-frequency/inter-system cell even when UE does not move or moves a little can be solved, the power of the UE can be saved, and the radiation produced by the UE on a mobile user can be reduced.Type: GrantFiled: July 19, 2013Date of Patent: October 10, 2017Assignee: XI'AN ZHONGXING NEW SOFTWARE CO. LTD.Inventors: Lei Zhao, Tao Wan, Minggang Gao, Chao Lei, Hairong Ma
-
Publication number: 20170264624Abstract: The present disclosure is drawn to systems, methods, and computer-readable media for mitigating cookie-injection and cookie-replaying attacks using a VPN client. The VPN client receives a session request regarding access to a private intranet. In response to the request, the VPN client retrieves cookie deleting criteria, and deletes all cookies which satisfy the cookie deleting criteria. Once all cookies satisfying the cookie deleting criteria are deleted, the VPN client proceeds with the session request.Type: ApplicationFiled: March 10, 2016Publication date: September 14, 2017Inventor: Tao WAN
-
Publication number: 20170257823Abstract: Aspects of the invention pertain to methods and devices that allow user equipment (UE), such as for example wireless devices, to reconfigure their respective antennas in a dynamic manner to allow connection to additional or fewer logical networks, also being referred to as network slices. Changing the configuration of the array of antennas may include changing an existing configuration, or allocation, of the antennas that are currently communicating with a first number of logical networks into a different configuration of antennas for communicating with a second, different second number of logical networks. In some cases this may mean that antennas that were allocated for communicating with a primary logical network are re-allocated for communicating with a second logical network, with other antennas remaining in communication with the primary logical network.Type: ApplicationFiled: March 1, 2016Publication date: September 7, 2017Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: PETER ASHWOOD-SMITH, TAO WAN
-
Patent number: 9736063Abstract: A service chaining method comprising receiving a source routed data packet, wherein the source routed data packet comprises a destination address and identifies a plurality of next-hops along a service chain path, identifying a next-hop for the source routed data packet using the plurality of next-hops, determining whether the next-hop is source routing capable, setting the destination address of the source routed data packet in accordance with the determination, wherein the destination address is set to the next-hop when the next-hop is source routing capable, and wherein the destination address is set to a next downstream network node that is source routing capable when the next-hop is not source routing capable, and forwarding the source routed data packet to the next-hop.Type: GrantFiled: February 17, 2015Date of Patent: August 15, 2017Assignee: Huawei Technologies Co., Ltd.Inventors: Tao Wan, Peter Ashwood-Smith, Mehdi Arashmid Akhavain Mohammadi, Yapeng Wu, Xingjun Chu, Guoli Yin
-
Publication number: 20170180241Abstract: A method for operating a source node includes receiving a data path validation request command requesting validation of a path associated with a traffic flow identified in the data path validation request command, and determining a first hop sequence in accordance with the path being validated, wherein the first hop sequence is identical to a second hop sequence associated with a non-validation request packet associated with the path being validated. The method also includes generating, by the source node, a validation request packet in accordance with the data path validation request command, the validation request packet comprises route information associated with the first hop sequence, an alert flag set to a specified value, and a path validation header specifying processing performed by nodes receiving the validation request packet, and transmitting, by the source node, the validation request packet in accordance with the route information.Type: ApplicationFiled: March 1, 2017Publication date: June 22, 2017Inventors: Mehdi Arashmid Akhavain Mohammadi, Peter Ashwood-Smith, Tao Wan
-
Patent number: 9647925Abstract: A method for operating a source node includes receiving a data path validation request command requesting validation of a path associated with a traffic flow identified in the data path validation request command, and determining a first hop sequence in accordance with the path being validated, wherein the first hop sequence is identical to a second hop sequence associated with a non-validation request packet associated with the path being validated. The method also includes generating, by the source node, a validation request packet in accordance with the data path validation request command, the validation request packet comprises route information associated with the first hop sequence, an alert flag set to a specified value, and a path validation header specifying processing performed by nodes receiving the validation request packet, and transmitting, by the source node, the validation request packet in accordance with the route information.Type: GrantFiled: November 5, 2014Date of Patent: May 9, 2017Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Mehdi Arashmid Akhavain Mohammadi, Peter Ashwood-Smith, Tao Wan
-
Patent number: 9584415Abstract: Routers using virtual routing and forwarding nodes to implement a service fabric of service chains. The router may configure M+1 virtual routing and forwarding instances, M being an integer representing a number of a plurality of service appliances in a data center network. Each virtual routing and forwarding instance may be associated with a routing table of routing rules to define various service chain routing paths. The routing rules are based on destination addresses in data packets.Type: GrantFiled: January 30, 2015Date of Patent: February 28, 2017Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Xingjun Chu, Tao Wan, Guoli Yin, Yapeng Wu, Peter Ashwood-Smith, Yinfeng Henry Yu, Khaldoon Al-Zoubi
-
Patent number: 9547570Abstract: The devices, systems, and methods test network connectivity, where the physical network is used to provide one or more service chains connecting service appliances, including firewalls, intrusion detection systems, load balancers, network address translators, web servers, and so on. A service chain may involve multiple routing paths. The devices, systems, and methods test network connectivity test network connectivity by injecting customized echo request packets on each routing path and collecting customized echo reply packets in response. The customized echo reply packets are processed and aggregated to isolate network connectivity problems.Type: GrantFiled: January 29, 2015Date of Patent: January 17, 2017Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Xingjun Chu, Yinfeng Henry Yu, Guoli Yin, Yapeng Wu, Tao Wan, Peter Ashwood-Smith, Khaldoon Al-Zoubi
-
Publication number: 20160366144Abstract: An authorization method comprising receiving command signals from a plurality of controlling accounts, determining whether the number of received command signals meets a threshold, wherein the threshold is at least two, and executing a controlled function in response to the determination. An authorization method comprising accessing a control interface as a first controlling account for a controlled function, communicating command instructions for sending a command with a second controlling account for the controlled function, and sending the command in accordance with the command instructions, wherein sending the command satisfies an authorization condition for executing the controlled function.Type: ApplicationFiled: June 10, 2015Publication date: December 15, 2016Inventors: Peter Ashwood-Smith, Tao Wan
-
Publication number: 20160337314Abstract: A method implemented by a network firewall, comprising obtaining a first authentication token for a network test, receiving a test request message for performing the network test on a network element (NE) connected to the network firewall, authenticating the test request message by determining whether the test request message includes a second authentication token that matches the first authentication token, and granting the network test on the NE when the second authentication token matches the first authentication token.Type: ApplicationFiled: May 11, 2015Publication date: November 17, 2016Inventors: Yinfeng Yu, Mehdi Arashmid Akhavain Mohammadi, Tao Wan, Guoli Yin, Xingjun Chu, Khaldoon Al Zoubi, Yapeng Wu
-
Publication number: 20160255054Abstract: A packet obfuscation method comprising receiving a data packet having a routing header portion and a payload portion, performing a first obfuscation on the routing header portion to generate an obfuscated routing header portion, performing a second obfuscation on at least the payload portion to generate an obfuscated payload portion, and combining the obfuscated routing header portion and the obfuscated payload portion to form an obfuscated packet. A packet forwarding method comprising obfuscating routing information using a packet obfuscation function, generating a plurality of forwarding rule entries in accordance with the obfuscated routing information, transmitting the plurality of forwarding rule entries to at least one network node in a network, transmitting the packet obfuscation function to at least one network node in the network, and transmitting a de-obfuscation function to at least one network node in the network.Type: ApplicationFiled: February 27, 2015Publication date: September 1, 2016Inventors: Tao Wan, Peter Ashwood-Smith, Wen Tong
-
Publication number: 20160241471Abstract: An address resolution method, comprising obtaining an Internet Protocol (IP) address for a destination network node, computing a Media Access Control (MAC) address for the destination network node using a mapping function and the IP address for the destination network node, and sending data traffic using the MAC address computed for the destination network node.Type: ApplicationFiled: February 17, 2015Publication date: August 18, 2016Inventors: Tao Wan, Yapeng Wu, Xingjun Chu, Peter Ashwood-Smith, Guoli Yin
-
Publication number: 20160241460Abstract: A service chaining method comprising receiving a source routed data packet, wherein the source routed data packet comprises a destination address and identifies a plurality of next-hops along a service chain path, identifying a next-hop for the source routed data packet using the plurality of next-hops, determining whether the next-hop is source routing capable, setting the destination address of the source routed data packet in accordance with the determination, wherein the destination address is set to the next-hop when the next-hop is source routing capable, and wherein the destination address is set to a next downstream network node that is source routing capable when the next-hop is not source routing capable, and forwarding the source routed data packet to the next-hop.Type: ApplicationFiled: February 17, 2015Publication date: August 18, 2016Inventors: Tao Wan, Peter Ashwood-Smith, Mehdi Arashmid Akhavain Mohammadi, Yapeng Wu, Xingjun Chu, Guoli Yin
-
Publication number: 20160226744Abstract: The devices, systems, and methods test network connectivity, where the physical network is used to provide one or more service chains connecting service appliances, including firewalls, intrusion detection systems, load balancers, network address translators, web servers, and so on. A service chain may involve multiple routing paths. The devices, systems, and methods test network connectivity test network connectivity by injecting customized echo request packets on each routing path and collecting customized echo reply packets in response. The customized echo reply packets are processed and aggregated to isolate network connectivity problems.Type: ApplicationFiled: January 29, 2015Publication date: August 4, 2016Inventors: Khaldoon AL-ZOUBI, Xingjun CHU, Peter ASHWOOD-SMITH, Henry YU, Guoli YIN, Yapeng WU, Tao WAN
-
Publication number: 20160226815Abstract: A virtual Internet Protocol (IP) address is assigned to a client device having a client IP address associated therewith. The virtual IP address is then mapped to the client IP address and to an identifier of a Secure Socket Layer (SSL) Virtual Private Network (VPN) tunnel. An incoming packet received through the SSL VPN tunnel and destined to a server device has the client IP address as its source address, which is in turn rewritten with the virtual IP address mapped to the client IP address, resulting in a modified incoming packet that is sent to the server device. An outgoing packet received from the server device for transmission to the client device has the virtual IP address as its destination address, which is in turn rewritten with the client IP address mapped to the virtual IP address, resulting in a modified outgoing packet that is forwarded into the tunnel.Type: ApplicationFiled: January 30, 2015Publication date: August 4, 2016Inventors: Tao WAN, Xingjun CHU, Yapeng WU, Guoli YIN