Patents by Inventor Xinyuan Wang
Xinyuan Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170111718Abstract: A line card is provided. The line card includes: a first processing module, configured to determine, according to a correspondence between a first optical serial signal flow and a logical interface, the logical interface, where bandwidth of the logical interface is configured to be first bandwidth, the logical interface is corresponding to a first optical interface, and the first optical interface is corresponding to an optical fiber, or a channel that is in an optical fiber and is used to transmit an optical signal with a wavelength. The line card also includes a second processing module, configured to determine, according to a correspondence between the logical interface and the first optical interface and the logical interface, the first optical interface. The line card also includes a scheduling module, configured to transmit the first optical serial signal flow through the first optical interface.Type: ApplicationFiled: December 29, 2016Publication date: April 20, 2017Inventors: Xinyuan Wang, Zhenyang Qian
-
Patent number: 9514799Abstract: In a memory scheduling method, a memory controller writes a first group of first row strobe commands (ACTs) into a first memory. The first group of first ACTs includes multiple first ACTs and a periodic interval exists between two adjacent first ACTs written by the memory controller into the first memory. The memory controller writes operation commands that correspond to the first group of first ACTs into the first memory after writing the first group of first ACTs into the first memory. The memory controller writes second ACTs into a second memory in periodic intervals for writing the first group of first ACTs into the first memory and/or in periodic intervals for writing the operation commands that correspond to the first group of first ACTs. The memory controller writes operation commands that correspond to the second ACTs into the second memory.Type: GrantFiled: November 11, 2014Date of Patent: December 6, 2016Assignee: Huawei Technologies Co., Ltd.Inventors: Xinyuan Wang, Haoyu Song
-
Patent number: 9483637Abstract: A computer system may be employed to verify program execution integrity by receiving a request to launch a program that has been instrumented to include at least one integrity marker, instantiating the program with an integrity marker value, and verifying the execution integrity of the program based on the integrity marker value and information received from the program during execution. A computer system may also be employed for program instrumentation by modifying the program to include at least one instruction for passing an integrity marker value to an operating system kernel during execution of the instruction.Type: GrantFiled: July 7, 2014Date of Patent: November 1, 2016Assignee: George Mason Research Foundation, Inc.Inventor: Xinyuan Wang
-
Publication number: 20160301498Abstract: An embodiment of the present invention discloses a data sending and receiving method. A first FEC unit of a sending device sends, by using a first channel, a first data stream on which first FEC encoding has been performed; a second FEC unit of the sending device sends, by using a second channel, a second data stream on which second FEC encoding has been performed; and the sending device performs interleaving on the first data stream and the second data stream, to obtain an output data stream, and sends the output data stream to a receiving device and error correction capability of a receiving device could be improved. In addition, in the present invention, an operation of writing by row and reading by column does not need to be performed. Therefore, no delay is generated.Type: ApplicationFiled: June 17, 2016Publication date: October 13, 2016Applicant: HUAWEI TECHNOLOGIES CO.,LTD.Inventors: Wenbin Yang, Tongtong Wang, Xinyuan Wang
-
Publication number: 20160241462Abstract: A data distribution method, a data aggregation method, and related apparatuses are disclosed. The data distribution method may include: receiving a first packet stream; dividing the first packet stream to obtain a first data block stream; sending the first data block stream to a first circuit; processing, by the first circuit, the first data block stream to obtain a first data stream; distributing, by the first circuit, the first data stream to N1 second circuits of M second circuits in a PHY, where M is greater than N1, N1 is a positive integer, and M is a positive integer; and processing, by the N1 second circuits, the received first data stream to obtain N1 first code streams. The technical solutions provided by the embodiments of the present invention help to meet a requirement for complex bandwidth configuration and extend an application scenario.Type: ApplicationFiled: April 28, 2016Publication date: August 18, 2016Applicant: HUAWEI TECHNOLOGIES CO.,LTD.Inventors: Xinyuan Wang, Wenbin Yang
-
Publication number: 20150326460Abstract: A network flow monitoring and analysis system comprises flow labeling agent(s), sensor(s), controller(s), and correlation engines(s). The flow labeling agent(s) label at data packet flow unique and covert label(s). The sensor(s) observe data packet flow for the unique and covert label(s) and generate examination report(s) from the observations. The examination report(s) comprise information such as: location information; time information; target information; path information; and flow information. The controller(s) communicate instructions to the labeling agent(s) and sensor(s), receive event information and manage the correlation engine(s). The correlation engine(s) correlate information from information such as the target information; event information; path information; and flow information.Type: ApplicationFiled: May 10, 2015Publication date: November 12, 2015Inventors: Xinyuan Wang, Zuotao Li
-
Patent number: 9160524Abstract: A computerized system and method for identifying one or more cryptographic operations from software code, comprising: performing processing associated with identifying, one or more cryptographic operations in the software code, the software code being run on a processor; and performing processing associated with identifying a boundary for each cryptographic operation in the software code.Type: GrantFiled: May 2, 2012Date of Patent: October 13, 2015Assignee: GEORGE MASON UNIVERSITYInventors: Xinyuan Wang, Xin Li
-
Publication number: 20150067249Abstract: In a memory scheduling method, a memory controller writes a first group of first row strobe commands (ACTs) into a first memory. The first group of first ACTs includes multiple first ACTs and a periodic interval exists between two adjacent first ACTs written by the memory controller into the first memory. The memory controller writes operation commands that correspond to the first group of first ACTs into the first memory after writing the first group of first ACTs into the first memory. The memory controller writes second ACTs into a second memory in periodic intervals for writing the first group of first ACTs into the first memory and/or in periodic intervals for writing the operation commands that correspond to the first group of first ACTs. The memory controller writes operation commands that correspond to the second ACTs into the second memory.Type: ApplicationFiled: November 11, 2014Publication date: March 5, 2015Inventors: Xinyuan Wang, Haoyu Song
-
Publication number: 20150007266Abstract: A computer system may be employed to verify program execution integrity by receiving a request to launch a program that has been instrumented to include at least one integrity marker, instantiating the program with an integrity marker value, and verifying the execution integrity of the program based on the integrity marker value and information received from the program during execution. A computer system may also be employed for program instrumentation by modifying the program to include at least one instruction for passing an integrity marker value to an operating system kernel during execution of the instruction.Type: ApplicationFiled: July 7, 2014Publication date: January 1, 2015Inventor: Xinyuan WANG
-
Patent number: 8806640Abstract: A computer system may be employed to verify program execution integrity by receiving a request to launch a program that has been instrumented to include at least one integrity marker, instantiating the program with an integrity marker value, and verifying the execution integrity of the program based on the integrity marker value and information received from the program during execution. A computer system may also be employed for program instrumentation by modifying the program to include at least one instruction for passing an integrity marker value to an operating system kernel during execution of the instruction.Type: GrantFiled: October 21, 2011Date of Patent: August 12, 2014Assignee: George Mason Intellectual Properties, Inc.Inventor: Xinyuan Wang
-
Patent number: 8644353Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.Type: GrantFiled: September 30, 2010Date of Patent: February 4, 2014Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Shiping Chen, Sushil Jajodia
-
Patent number: 8433796Abstract: Embodiments locate a botmaster on a network. A honeynet host is configured to join a botnet and generate a watermarked packet flow by applying a watermark to an outgoing packet flow in response to commands from the botmaster. The watermark is applied to the outgoing packet flow by: choosing distinct packets from the outgoing packet flow; forming packet pair(s) from the distinct packets, that include a reference packet and an encoding packet; and encoding bits in the watermark to the packet pair(s) by increasing the length of the encoding packet when watermark bits have a predetermined value. The cooperating node(s) are configured to: inspect passing packet flows for the watermarked packet flow and generate tracking information related to detection of the watermarked packet flow. The path determination processor is configured to analyze the tracking information to locate a path taken by the watermarked packet flow.Type: GrantFiled: April 6, 2012Date of Patent: April 30, 2013Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Daniel Ramsbrock
-
Publication number: 20120284532Abstract: A computerized system and method for identifying one or more cryptographic operations from software code, comprising: performing processing associated with identifying, one or more cryptographic operations in the software code, the software code being run on a processor; and performing processing associated with identifying a boundary for each cryptographic operation in the software code.Type: ApplicationFiled: May 2, 2012Publication date: November 8, 2012Inventors: Xinyuan WANG, Xin LI
-
Publication number: 20120203900Abstract: Embodiments locate a botmaster on a network. A honeynet host is configured to join a botnet and generate a watermarked packet flow by applying a watermark to an outgoing packet flow in response to commands from the botmaster. The watermark is applied to the outgoing packet flow by: choosing distinct packets from the outgoing packet flow; forming packet pair(s) from the distinct packets, that include a reference packet and an encoding packet; and encoding bits in the watermark to the packet pair(s) by increasing the length of the encoding packet when watermark bits have a predetermined value. The cooperating node(s) are configured to: inspect passing packet flows for the watermarked packet flow and generate tracking information related to detection of the watermarked packet flow. The path determination processor is configured to analyze the tracking information to locate a path taken by the watermarked packet flow.Type: ApplicationFiled: April 6, 2012Publication date: August 9, 2012Inventors: Xinyuan Wang, Daniel Ramsbrock
-
Publication number: 20120159630Abstract: A computer system may be employed to verify program execution integrity by receiving a request to launch a program that has been instrumented to include at least one integrity marker, instantiating the program with an integrity marker value, and verifying the execution integrity of the program based on the integrity marker value and information received from the program during execution. A computer system may also be employed for program instrumentation by modifying the program to include at least one instruction for passing an integrity marker value to an operating system kernel during execution of the instruction.Type: ApplicationFiled: October 21, 2011Publication date: June 21, 2012Inventor: Xinyuan WANG
-
Patent number: 8176173Abstract: Embodiments locate a botmaster on a network. A honeynet host is configured to join a botnet and generate a watermarked packet flow by applying a watermark to an outgoing packet flow in response to commands from the botmaster. The watermark is applied to the outgoing packet flow by: choosing distinct packets from the outgoing packet flow; forming packet pair(s) from the distinct packets, that include a reference packet and an encoding packet; and encoding bits in the watermark to the packet pair(s) by increasing the length of the encoding packet when watermark bits have a predetermined value. The cooperating node(s) are configured to: inspect passing packet flows for the watermarked packet flow and generate tracking information related to detection of the watermarked packet flow. The path determination processor is configured to analyze the tracking information to locate a path taken by the watermarked packet flow.Type: GrantFiled: September 11, 2009Date of Patent: May 8, 2012Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Daniel Ramsbrock
-
Patent number: 8131998Abstract: A system, apparatus and method for transparently authenticating continuous data streams. A continuous data stream is divided into data blocks. Block authentication code(s) are determined using the data in the data blocks, a hash function and a key. The block authentication code(s) are embedded into the data block(s) by adjusting the timing between the packets in the data block(s). Timing delays may be used to separate the blocks. The continuous data stream may be received and authenticated by comparing an extracted block authentication code with a new calculated content-based block authentication code.Type: GrantFiled: March 5, 2008Date of Patent: March 6, 2012Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Songqing Chen
-
Publication number: 20110069721Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.Type: ApplicationFiled: September 30, 2010Publication date: March 24, 2011Inventors: Sushil Jajodia, Shlping Chen, Xinyuan Wang
-
Patent number: 7830923Abstract: An interval centroid-based watermark encoder encodes a watermark into a packet flow. Intervals are defined for the packet flow. Some of the intervals are selected as group A intervals while other intervals are selected as group B intervals. Group A and group B intervals are paired and assigned to watermark bits. A first or second value may be encoded by increasing the relative packet time between packets in either the group A (for the first bit value) or group B (for the second bit value) interval(s) of the interval pair(s) assigned to the watermark bits that are to represent the first or second bit value and the beginning of the same group interval(s). The relative packet times may be measured by a decoder and used to calculate a centroid difference for each interval pair. The centroid differences may be used to reconstruct the watermark.Type: GrantFiled: April 12, 2010Date of Patent: November 9, 2010Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Shiping Chen
-
Patent number: 7822073Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.Type: GrantFiled: November 3, 2006Date of Patent: October 26, 2010Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Shiping Chen, Sushil Jajodia