Patents by Inventor Wan-Yen Hsu

Wan-Yen Hsu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240078341
    Abstract: Examples described herein relate to a security management system to secure a container ecosystem. In some examples, the security management system may protect one or more entities such as container management applications, container images, containers, and/or executable applications within the containers. The security management system may make use of digital cryptography to generate digital signatures corresponding to one or more of these entities and verify them during the execution so that any compromised entities can be blocked from execution and the container ecosystem may be safeguarded from any malicious network attacks.
    Type: Application
    Filed: September 7, 2022
    Publication date: March 7, 2024
    Inventors: Wan-Yen Hsu, Chih-Hao Chang, Lin-Chan Hsiao
  • Publication number: 20240078342
    Abstract: Examples described herein relate to a security management system to secure a container ecosystem. In some examples, the security management system may protect one or more entities such as container management applications, container images, containers, and/or executable applications within the containers. The security management system may make use of digital cryptography to generate digital signatures corresponding to one or more of these entities and verify them during the execution so that any compromised entities can be blocked from execution and the container ecosystem may be safeguarded from any malicious network attacks.
    Type: Application
    Filed: September 7, 2022
    Publication date: March 7, 2024
    Inventors: Wan-Yen Hsu, Chih-Hao Chang, Lin-Chan Hsiao
  • Publication number: 20240078344
    Abstract: Examples described herein relate to a security management system to secure a container ecosystem. In some examples, the security management system may protect one or more entities such as container management applications, container images, containers, and/or executable applications within the containers. The security management system may make use of digital cryptography to generate digital signatures corresponding to one or more of these entities and verify them during the execution so that any compromised entities can be blocked from execution and the container ecosystem may be safeguarded from any malicious network attacks.
    Type: Application
    Filed: September 6, 2022
    Publication date: March 7, 2024
    Inventors: Wan-Yen Hsu, Chih-Hao Chang, Lin-Chan Hsiao
  • Patent number: 10567397
    Abstract: Examples disclosed herein relate to a security-based container scheduling system for allocating a container to a node. A discovery engine discovers a node in a cluster of nodes and a node security attribute associated with the node. A translation engine generates a node selector from a container security attribute specified in metadata associated with the container.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: February 18, 2020
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Wan-Yen Hsu, Hui-Zhi Zhao, Ligong Duan
  • Publication number: 20180219877
    Abstract: Examples disclosed herein relate to a security-based container scheduling system for allocating a container to a node. A discovery engine discovers a node in a cluster of nodes and a node security attribute associated with the node. A translation engine generates a node selector from a container security attribute specified in metadata associated with the container.
    Type: Application
    Filed: January 31, 2017
    Publication date: August 2, 2018
    Inventors: Wan-Yen Hsu, Hui-Zhi Zhao, Ligong Duan
  • Patent number: 9594590
    Abstract: Methods and systems of migrating applications (105-1 to 105-3) with dynamic operating system containers (205-1, 205-2) are disclosed, in which a number of applications (105-1 to 105-3) currently executed within a first operating system environment are identified for migration to a second operating system environment; a new operating system container (205-1, 205-2) is created within the first operating system environment; the number of identified applications (105-1 to 105-3) are transferred into the operating system container (205-1, 205-2); and the operating system container (205-1, 205-2) is migrated to the second operating system environment.
    Type: Grant
    Filed: June 29, 2011
    Date of Patent: March 14, 2017
    Assignee: Hewlett Packard Enterprise Development LP
    Inventor: Wan-Yen Hsu
  • Patent number: 8739288
    Abstract: An embodiment of the invention provides an apparatus and method for automatic detection of a vulnerability exploit. The apparatus and method are configured to post a security vulnerability warning indicating a vulnerability of software; provide an exploit detector; and use the exploit detector to detect an attempted exploit that targets the vulnerability.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: May 27, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: John R. Diamant, Wan-Yen Hsu, David Hsing Lin, Eric C. Scoredos
  • Publication number: 20140137125
    Abstract: Methods and systems of migrating applications (105-1 to 105-3) with dynamic operating system containers (205-1, 205-2) are disclosed, in which a number of applications (105-1 to 105-3) currently executed within a first operating system environment are identified for migration to a second operating system environment; a new operating system container (205-1, 205-2) is created within the first operating system environment; the number of identified applications (105-1 to 105-3) are transferred into the operating system container (205-1, 205-2); and the operating system container (205-1, 205-2) is migrated to the second operating system environment.
    Type: Application
    Filed: June 29, 2011
    Publication date: May 15, 2014
    Inventor: Wan-Yen Hsu
  • Publication number: 20090038015
    Abstract: An embodiment of the invention provides an apparatus and method for automatic detection of a vulnerability exploit. The apparatus and method are configured to post a security vulnerability warning indicating a vulnerability of software; provide an exploit detector; and use the exploit detector to detect an attempted exploit that targets the vulnerability.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 5, 2009
    Inventors: John R. Diamant, Wan-Yen Hsu, David Hsing Lin, Eric C. Scoredos
  • Publication number: 20080082658
    Abstract: Various embodiments of spam control systems and methods are disclosed. One method embodiment, among others, comprises identifying an IP address as a spam source, and monitoring the activity of the IP address to determine if the IP address is re-assigned to another source.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventors: Wan-Yen Hsu, Eric C. Scoredos
  • Patent number: 7254562
    Abstract: A rule-based selection, storage and access method and system for processing packets from network traffic. First, packet intercepted from network traffic are selected based on at least one rule. Second, the selected packets are stored in an in-kernel storage buffer, which can be tuned to a size that is appropriate to the number packets being captured and the ability of a packet usage application (e.g., a billing program) to process the packets. Third, an access mechanism is provided to a packet usage application for accessing the stored packets. The intercepted network traffic is provided to a receiving application.
    Type: Grant
    Filed: July 11, 2002
    Date of Patent: August 7, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Wan-Yen Hsu, Eric C. Scoredos, Nobuhisa Takahashi
  • Publication number: 20050283529
    Abstract: A connection from a client to a primary server is monitored and state information pertaining to a protocol stack used in the primary server is conveyed to a standby server. When the primary server becomes unhealthy, a crossover message is sent by the standby server to a client according to the conveyed state information.
    Type: Application
    Filed: June 22, 2004
    Publication date: December 22, 2005
    Inventors: Wan-Yen Hsu, Isaac Wong
  • Publication number: 20040098511
    Abstract: Packet routing method and system that routes packets to one of at least two processes based on at least one routing rule for processing packets from network traffic. First, at least one routing rule is received. The routing rule specifies one or more packet criteria (e.g., network card through which the packet is received or a predetermined source address of the packet). The routing rule also specifies a predetermined route or path for packets that meet the criteria described previously. Second, packets are received from a source (e.g., network traffic). Third, the routing rule is applied to the received packets. When the packet matches the criteria, the packet is routed to a predetermined process (e.g., a first application) through a corresponding route or path. The predetermined process then performs further packet processing on the routed packet. Otherwise, the packet is routed to a predetermined process (e.g., a second application) through a predetermined route.
    Type: Application
    Filed: November 16, 2002
    Publication date: May 20, 2004
    Inventors: David H. Lin, Wan-Yen Hsu
  • Publication number: 20040010473
    Abstract: A rule-based selection, storage and access method and system for processing packets from network traffic. First, packet intercepted from network traffic are selected based on at least one rule. Second, the selected packets are stored in an in-kernel storage buffer, which can be tuned to a size that is appropriate to the number packets being captured and the ability of a packet usage application (e.g., a billing program) to process the packets. Third, an access mechanism is provided to a packet usage application for accessing the stored packets. The intercepted network traffic is provided to a receiving application.
    Type: Application
    Filed: July 11, 2002
    Publication date: January 15, 2004
    Inventors: Wan-Yen Hsu, Eric C. Scoredos, Nobuhisa Takahashi