Patents by Inventor Xingshui Dong

Xingshui Dong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10909221
    Abstract: A container license management method and an apparatus, where the method includes receiving an image download request including information for requesting a license from a container management background, obtaining an image according to the image download request, obtaining the information for requesting a license in the image download request, generating a license image layer corresponding to the information for requesting a license, adding the license image layer to the obtained image, and sending, to the container management background, the image to which the license image layer is added such that the container management background starts a container corresponding to the image, and detects whether the license image layer is valid. Hence, container license management efficiency can be improved.
    Type: Grant
    Filed: March 16, 2018
    Date of Patent: February 2, 2021
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Liang Zhang, Jianrui Yang, Xingshui Dong
  • Patent number: 10712974
    Abstract: A virtual disk processing method and apparatus belong to the field of storage technologies, where the method includes receiving delete information from a client system of a first virtual machine, determining, according to the delete information, at least one data cluster in a first virtual disk corresponding to a designated file, where the first virtual disk is a virtual disk corresponding to the first virtual machine, setting the at least one data cluster to be available, determining, according to a storage mapping table, a target physical disk block corresponding to the at least one data cluster, where a correspondence between a data cluster in the first virtual disk and a physical disk block is recorded in the storage mapping table, and setting the target physical disk block to be available.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: July 14, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Jianqing Liu, Xingshui Dong, Lin Zhang
  • Patent number: 10673874
    Abstract: A method, an apparatus, and a device for detecting an electronic mail (E-mail) attack. The device receives a data flow, obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow, and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: June 2, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Wu Jiang, Xingshui Dong
  • Publication number: 20190044962
    Abstract: A method, an apparatus, and a device for detecting an electronic mail (E-mail) attack. The device receives a data flow, obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow, and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold.
    Type: Application
    Filed: October 10, 2018
    Publication date: February 7, 2019
    Inventors: Wu Jiang, Xingshui Dong
  • Patent number: 10135844
    Abstract: A method, an apparatus, and a device for detecting an E-mail attack. The device receives a data flow; obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow; and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold. By applying the disclosed embodiments, a detection result of the E-mail attack is more accurate.
    Type: Grant
    Filed: October 13, 2014
    Date of Patent: November 20, 2018
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Wu Jiang, Xingshui Dong
  • Publication number: 20180268115
    Abstract: A container license management method and an apparatus, where the method includes receiving an image download request including information for requesting a license from a container management background, obtaining an image according to the image download request, obtaining the information for requesting a license in the image download request, generating a license image layer corresponding to the information for requesting a license, adding the license image layer to the obtained image, and sending, to the container management background, the image to which the license image layer is added such that the container management background starts a container corresponding to the image, and detects whether the license image layer is valid. Hence, container license management efficiency can be improved.
    Type: Application
    Filed: March 16, 2018
    Publication date: September 20, 2018
    Inventors: Liang Zhang, Jianrui Yang, Xingshui Dong
  • Publication number: 20180136881
    Abstract: A virtual disk processing method and apparatus belong to the field of storage technologies, where the method includes receiving delete information from a client system of a first virtual machine, determining, according to the delete information, at least one data cluster in a first virtual disk corresponding to a designated file, where the first virtual disk is a virtual disk corresponding to the first virtual machine, setting the at least one data cluster to be available, determining, according to a storage mapping table, a target physical disk block corresponding to the at least one data cluster, where a correspondence between a data cluster in the first virtual disk and a physical disk block is recorded in the storage mapping table, and setting the target physical disk block to be available.
    Type: Application
    Filed: November 14, 2017
    Publication date: May 17, 2018
    Inventors: Jianqing Liu, Xingshui Dong, Lin Zhang
  • Publication number: 20150033343
    Abstract: A method, an apparatus, and a device for detecting an E-mail attack. The device receives a data flow; obtains an E-mail traffic parameter of each statistic period within a predetermined number of statistic periods, where within each statistic period, the E-mail traffic parameter of each of the statistic periods is determined according to a protocol type of the received data flow; and determines that an E-mail attack is detected when the E-mail traffic parameter of each statistic period within the predetermined number of statistic periods matches a first threshold. By applying the disclosed embodiments, a detection result of the E-mail attack is more accurate.
    Type: Application
    Filed: October 13, 2014
    Publication date: January 29, 2015
    Inventors: Wu Jiang, Xingshui Dong