Patents by Inventor Xueqiang Ma

Xueqiang Ma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11711299
    Abstract: This disclosure describes various methods, systems, and devices related to mirrored traffic forwarding in a hybrid network. An example method includes receiving, from a source forwarder in a source network, a mirrored data packet. A session of the mirrored data packet may be identified based on a header of the mirrored data packet. A destination forwarder in a destination network may be identified based on the session. The destination network may be different than the source network. The mirrored data packet may be forwarded to the destination forwarder.
    Type: Grant
    Filed: April 30, 2020
    Date of Patent: July 25, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Xueqiang Ma, Dave Persaud, Kalyan Ghosh
  • Patent number: 11343234
    Abstract: Presented herein are methodologies for implementing multi-domain cloud security and ways to partition end-points in data center/cloud network topologies into hierarchical domains to increase security and key negotiation efficiency. The methodology includes receiving, from a first endpoint, at a cloud security protocol stack, a packet encrypted in accordance with a cloud security key negotiated between the first endpoint and a second endpoint; extracting a cloud security globally unique domain-id from the packet; querying a cloud security domain repository using the cloud security globally unique domain-id as an index to identify a first cloud security domain, among a plurality of cloud security domains, to which the first endpoint and the second endpoint belong; and selecting the first cloud security domain to process the packet.
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: May 24, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Xueqiang Ma, Dave Persaud, Kalyan Ghosh
  • Patent number: 11290436
    Abstract: Techniques for key distribution are provided. A first symmetric key is generated for a first downstream site, and a second symmetric key is generated for a second downstream site. The first symmetric key is transmitted to the first downstream site, and the second symmetric key is transmitted to the second downstream site. Upon receiving an indication that the first symmetric key was successfully deployed at the first downstream site, the first symmetric key is deployed on a first network node of an upstream site. Finally, upon determining that the second symmetric key was not successfully deployed at the second downstream site, techniques include refraining from deploying the second symmetric key to a second network node of the upstream site, where the second network node continues to communicate with the second downstream site using an original symmetric key.
    Type: Grant
    Filed: January 16, 2019
    Date of Patent: March 29, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Dave Persaud, Xueqiang Ma, Kalyan K. Ghosh, Kondal R. Boreddy
  • Patent number: 11212077
    Abstract: The disclosure provides an approach for authenticating the contents of a control message sent between data centers. The data centers are located in a computing system comprising multiple data centers. The computing system has a controller, and each data center has a local controller. The message contents comprise a tree of data objects. The tree is converted to a hash tree, and the root hash of the hash tree is stored on a distributed blockchain. Storage on the distributed blockchain ensures that the root hash is not tampered with by an attacker. The receiver of the message then authenticates that the hash tree has not been modified by comparing various hash values, as described herein.
    Type: Grant
    Filed: October 23, 2018
    Date of Patent: December 28, 2021
    Assignee: Cisco Technology, Inc.
    Inventor: Xueqiang Ma
  • Publication number: 20210218673
    Abstract: This disclosure describes various methods, systems, and devices related to mirrored traffic forwarding in a hybrid network. An example method includes receiving, from a source forwarder in a source network, a mirrored data packet. A session of the mirrored data packet may be identified based on a header of the mirrored data packet. A destination forwarder in a destination network may be identified based on the session. The destination network may be different than the source network. The mirrored data packet may be forwarded to the destination forwarder.
    Type: Application
    Filed: April 30, 2020
    Publication date: July 15, 2021
    Inventors: Xueqiang Ma, Dave Persaud, Kalyan Ghosh
  • Publication number: 20210176224
    Abstract: Presented herein are methodologies for implementing multi-domain cloud security and ways to partition end-points in data center/cloud network topologies into hierarchical domains to increase security and key negotiation efficiency. The methodology includes receiving, from a first endpoint, at a cloud security protocol stack, a packet encrypted in accordance with a cloud security key negotiated between the first endpoint and a second endpoint; extracting a cloud security globally unique domain-id from the packet; querying a cloud security domain repository using the cloud security globally unique domain-id as an index to identify a first cloud security domain, among a plurality of cloud security domains, to which the first endpoint and the second endpoint belong; and selecting the first cloud security domain to process the packet.
    Type: Application
    Filed: December 10, 2019
    Publication date: June 10, 2021
    Inventors: Xueqiang Ma, Dave Persaud, Kalyan Ghosh
  • Publication number: 20200127814
    Abstract: The disclosure provides an approach for authenticating the contents of a control message sent between data centers. The data centers are located in a computing system comprising multiple data centers. The computing system has a controller, and each data center has a local controller. The message contents comprise a tree of data objects. The tree is converted to a hash tree, and the root hash of the hash tree is stored on a distributed blockchain. Storage on the distributed blockchain ensures that the root hash is not tampered with by an attacker. The receiver of the message then authenticates that the hash tree has not been modified by comparing various hash values, as described herein.
    Type: Application
    Filed: October 23, 2018
    Publication date: April 23, 2020
    Inventor: Xueqiang MA
  • Publication number: 20200112605
    Abstract: For each node in a plurality of nodes corresponding to a particular computer network element, the performance metric data regarding the node based on a first time interval is received. The plurality of nodes is organized in a tree structure which comprises a plurality of spine nodes, a plurality of leaf nodes, a plurality of host nodes, and a plurality of container nodes. The metric data is applied for a recursive partitioning algorithm on the plurality of nodes to generate an allocation strategy for the plurality of container nodes. The allocation strategy defines a topology of the tree structure that maximizes usage of computing resources on each node based on the first time interval.
    Type: Application
    Filed: October 4, 2018
    Publication date: April 9, 2020
    Inventors: MANOJ RAGUPATHY, XUEQIANG MA
  • Publication number: 20200099672
    Abstract: Techniques for key distribution are provided. A first symmetric key is generated for a first downstream site, and a second symmetric key is generated for a second downstream site. The first symmetric key is transmitted to the first downstream site, and the second symmetric key is transmitted to the second downstream site. Upon receiving an indication that the first symmetric key was successfully deployed at the first downstream site, the first symmetric key is deployed on a first network node of an upstream site. Finally, upon determining that the second symmetric key was not successfully deployed at the second downstream site, techniques include refraining from deploying the second symmetric key to a second network node of the upstream site, where the second network node continues to communicate with the second downstream site using an original symmetric key.
    Type: Application
    Filed: January 16, 2019
    Publication date: March 26, 2020
    Inventors: Dave PERSAUD, Xueqiang MA, Kalyan K. GHOSH, Kondal R. BOREDDY
  • Patent number: 10601908
    Abstract: For each node in a plurality of nodes corresponding to a particular computer network element, the performance metric data regarding the node based on a first time interval is received. The plurality of nodes is organized in a tree structure which comprises a plurality of spine nodes, a plurality of leaf nodes, a plurality of host nodes, and a plurality of container nodes. The metric data is applied for a recursive partitioning algorithm on the plurality of nodes to generate an allocation strategy for the plurality of container nodes. The allocation strategy defines a topology of the tree structure that maximizes usage of computing resources on each node based on the first time interval.
    Type: Grant
    Filed: October 4, 2018
    Date of Patent: March 24, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Manoj Ragupathy, Xueqiang Ma