Patents by Inventor Xun Wang

Xun Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170180316
    Abstract: In one embodiment, a method includes receiving capability information from an end host at a centralized security matrix in communication with a firewall and a plurality of end hosts, verifying at the centralized security matrix, a trust level of the end host, assigning at the centralized security matrix, a firewall function to the end host based on the trust level and capability information, and notifying the firewall of the firewall function assigned to the end host. Firewall functions are offloaded from the firewall to the end hosts by the centralized security matrix. An apparatus and logic are also disclosed herein.
    Type: Application
    Filed: December 22, 2015
    Publication date: June 22, 2017
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Jin Teng, Subharthi Paul, Thilan Niroshaka Ganegedara, Xun Wang, Saman Taghavi Zargar, Jayaraman Iyer
  • Publication number: 20170161496
    Abstract: Disclosed are a method and a device for identifying a virus APK. The method comprises: presetting a virus database comprising virus characteristic codes; detecting that a designated file in a target Android installation package APK contains at least one of the virus characteristic codes; and determining that the target Android installation package APK is a virus APK. In the application, the virus APK and a variation thereof can be rapidly, accurately and effectively identified, thereby improving the security of an APK application.
    Type: Application
    Filed: February 23, 2017
    Publication date: June 8, 2017
    Inventors: Xun Wang, Xu Zhang
  • Patent number: 9619650
    Abstract: Disclosed are a method and a device for identifying a virus APK. The method comprises: presetting a virus database comprising a virus characteristic code; detecting whether a designated file in a target Android installation package APK contains the virus characteristic code; and if yes, determining that the target Android installation package APK is a virus APK. In the application, the virus APK and a variation thereof can be rapidly, accurately and effectively identified, thereby improving the security of an APK application.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: April 11, 2017
    Assignee: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Xun Wang, Xu Zhang
  • Patent number: 9600668
    Abstract: Disclosed are a method and a device for extracting a characteristic code of an APK virus. The method comprises: scanning a designated file in an Android installation package APK; extracting an operation instruction in the designated file, and judging whether the operation instruction contains virus information; and if yes, generating a characteristic code of the virus according to the operation instruction. In the application, the characteristic code of the virus APK can be accurately and effectively extracted, so as to facilitate improvement of efficiency and accuracy of identification of the virus APK and a variation thereof, thereby improving the security of an APK application.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: March 21, 2017
    Assignee: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED
    Inventors: Xun Wang, Xu Zhang
  • Patent number: 9591062
    Abstract: Systems and methods are provided for data exchange in voice communication. For example, a first request message is sent to a server for playing background music in voice communication; an authorization granted by the server to play background music separately from the voice communication is received; and upon reception of a play instruction from a user, the background music is played and an identifier of the background music is sent to the server. The server broadcasts the background music to one or more clients based on at least information associated with the identifier of the background music.
    Type: Grant
    Filed: February 26, 2014
    Date of Patent: March 7, 2017
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventors: Donglin Pu, Shu Peng, Wenxin Si, Zhenyu Yu, Xun Wang, Taijun Zeng
  • Publication number: 20160337312
    Abstract: A method operable in a security device cluster having a plurality of security devices each configured to receive respective data flows. The method includes receiving a first segment of a flow at a first security device of the plurality of security devices, sending the first segment of the flow toward a destination node without the first security device of the plurality of security devices asserting ownership over the flow, receiving, from the destination node, a second segment of the flow at a second security device of the plurality of security devices, the second segment of the flow being responsive to the first segment, asserting, by the second security device of the plurality of security devices, ownership over the flow, and forwarding, from the first security device, packets of the flow subsequently received by the first security device to the second security device.
    Type: Application
    Filed: May 12, 2015
    Publication date: November 17, 2016
    Inventors: Kevin A. Buchanan, Andrew E. Ossipov, Kent Leung, Xun Wang, Zhijun Liu, Weiwei Kang
  • Patent number: 9464891
    Abstract: A method for measuring thickness or defect depth by pulsed infrared thermal wave technology is described. The method includes heating a measured object by pulsed heating devices, and at the same time, obtaining a thermal image sequence on the surface of the measured object by an infrared thermography device, and storing the thermal image sequence in a general-purpose memory. The method also includes multiplying a temperature-time curve at every point of the thermal image sequence by a corresponding time, thereby obtaining a new curve. The method also includes calculating a first-order differential and obtaining a peak time thereof. The method also includes use of one or more formulas to thereby determine the thickness or the defect depth of the measured object.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: October 11, 2016
    Assignees: CAPITAL NORMAL UNIVERSITY, BEIJING WAITEKSIN ADVANCED TECHNOLOGY CO., LTD., CHONGQING NORMAL UNIVERSITY
    Inventors: Zhi Zeng, Xun Wang, Ning Tao, Lichun Feng, Cunlin Zhang
  • Publication number: 20160234168
    Abstract: An example method for facilitating hierarchical clustering in a geographically dispersed network environment is provided and includes receiving a packet at one of a plurality of adaptive security appliance (ASA) units in one of a plurality of ASA clusters in a cluster domain of a network environment, identifying the packet as matching an inter-data center live traffic profile, identifying a target ASA cluster in the plurality of ASA clusters in the cluster domain, querying a domain director in the target ASA cluster for a flow owner, and if the flow owner is identified by the domain director, forwarding the packet to the flow owner in the target cluster, and if the flow owner is not identified by the domain director, and the domain director includes a flow state for a flow to which the packet belongs, designating the ASA unit as the flow owner.
    Type: Application
    Filed: February 11, 2015
    Publication date: August 11, 2016
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Kent K. Leung, Xun Wang, Andrew E. Ossipov, Zhijun Liu, Jonathan Augustine Kunder
  • Publication number: 20160191627
    Abstract: A computer implemented method of executing applications in a cloud server system is presented. The method comprises receiving a file identifier from a client device. The method also comprises receiving a file associated with the file identifier from a first server. Further, the method comprises accessing an application associated with the file from memory of the cloud server. Also, the method comprises executing by the cloud server the application using the file received from the first server. Finally, the method comprises streaming results from the executing the application as a video stream destined for the client device.
    Type: Application
    Filed: March 3, 2016
    Publication date: June 30, 2016
    Inventors: Jen-Hsun Huang, Xun Wang, Lorenzo Ibarria
  • Patent number: 9203753
    Abstract: Techniques are presented herein for optimizing and load balancing network traffic exchanged between devices in a network environment. At a first device in a cluster of devices in a network, a packet is received from a second device in the cluster. The packet comprises identifier information that is assigned to the first device. The identifier information is reassigned to the second device in the cluster such that subsequent packets with the identifier information are sent directly to the second device. A mapping table is updated to indicate that the identifier information is reassigned to the second device.
    Type: Grant
    Filed: November 25, 2013
    Date of Patent: December 1, 2015
    Assignee: Cisco Technology, Inc.
    Inventors: Kent Leung, Hy Quoc Pham, Jayaraman Iyer, Xun Wang, Andrew E. Ossipov
  • Publication number: 20150293905
    Abstract: A method for summarizing a document is provided. A concept is detected for each sentence in said document. Relevance measures between the sentences are computed according to the detected concepts. And then a concept-aware graph is constructed, wherein a node in said graph represents a sentence in the document and an edge between two nodes represents a relevance measure between these two sentences.
    Type: Application
    Filed: October 26, 2012
    Publication date: October 15, 2015
    Inventors: Lei Wang, Xun Wang, Min Wang, Tong Zhang, Bin Bai
  • Patent number: 9143439
    Abstract: A method is provided in one example and includes receiving a request message from a first network element using an out-of-band control link. The request message includes a request to bundle a first port associated with the first network element into a channel group associated with a cluster. The cluster includes a plurality of clustered network elements. The method further includes determining a status of the first port with respect to the channel group, and sending a reply message to the first network element using the out-of-band control link. The reply message indicates the determined status of the first port of the first network element.
    Type: Grant
    Filed: July 23, 2012
    Date of Patent: September 22, 2015
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Xun Wang, Diheng Qu
  • Publication number: 20150205626
    Abstract: The subject disclosure is directed towards a technology for efficiently emulating program code that is protected by one or more various code virtualization techniques to detect the presence of malware. An emulation engine emulates a program containing a mix of native code, custom (e.g., virtualized obfuscated) code, and at least one emulator and/or interpreter that understands the custom code, by building a custom emulation component that is built by detecting and analyzing the internal emulator or interpreter. The custom emulation component may access a translation table built from the analysis, and also may simplify a plurality of instructions in the program into a lesser number of instructions in an intermediate language used for emulation.
    Type: Application
    Filed: March 27, 2015
    Publication date: July 23, 2015
    Inventors: Xun Wang, Adrian Emil Stepan, Timothy David Ebringer
  • Publication number: 20150146724
    Abstract: Techniques are presented herein for optimizing and load balancing network traffic exchanged between devices in a network environment. At a first device in a cluster of devices in a network, a packet is received from a second device in the cluster. The packet comprises identifier information that is assigned to the first device. The identifier information is reassigned to the second device in the cluster such that subsequent packets with the identifier information are sent directly to the second device. A mapping table is updated to indicate that the identifier information is reassigned to the second device.
    Type: Application
    Filed: November 25, 2013
    Publication date: May 28, 2015
    Applicant: Cisco Technology, Inc.
    Inventors: Kent Leung, Hy Quoc Pham, Jayaraman Iyer, Xun Wang, Andrew E. Ossipov
  • Patent number: 9032526
    Abstract: The subject disclosure is directed towards a technology for efficiently emulating program code that is protected by one or more various code virtualization techniques to detect the presence of malware. An emulation engine emulates a program containing a mix of native code, custom (e.g., virtualized obfuscated) code, and at least one emulator and/or interpreter that understands the custom code, by building a custom emulation component that is built by detecting and analyzing the internal emulator or interpreter. The custom emulation component may access a translation table built from the analysis, and also may simplify a plurality of instructions in the program into a lesser number of instructions in an intermediate language used for emulation.
    Type: Grant
    Filed: May 12, 2011
    Date of Patent: May 12, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Xun Wang, Adrian Emil Stepan, Timothy David Ebringer
  • Publication number: 20150091836
    Abstract: A touch control input method includes the steps: displaying an application program interface; configuring multiple touch areas for the application program interface; determining one or more touch areas with a higher probability of touch control by predicting a next input after an input according to a rule of an input operation; dynamically enlarging the one or more touch areas. Besides, a corresponding system and a non-transitory computer storage medium are provided. In the method, system, and non-transitory computer storage medium, a touch control area with a higher or highest probability of user clicking is found, and an area of the touch area is enlarged, the user can perform touching at one time to complete a more accurate touch action, thereby reducing user operation steps and omitting a step of partial enlargement. Therefore, the user experience is improved, and system operation costs are reduced.
    Type: Application
    Filed: December 10, 2014
    Publication date: April 2, 2015
    Inventors: Xianzhi Li, Yong Fan, Lei Zhou, Xun Wang, Jun Zhang, Junhui Qin
  • Publication number: 20150052611
    Abstract: Disclosed are a method and a device for extracting a characteristic code of an APK virus. The method comprises: scanning a designated file in an Android installation package APK; extracting an operation instruction in the designated file, and judging whether the operation instruction contains virus information; and if yes, generating a characteristic code of the virus according to the operation instruction. In the application, the characteristic code of the virus APK can be accurately and effectively extracted, so as to facilitate improvement of efficiency and accuracy of identification of the virus APK and a variation thereof, thereby improving the security of an APK application.
    Type: Application
    Filed: March 12, 2013
    Publication date: February 19, 2015
    Inventors: Xun Wang, Xu Zhang
  • Publication number: 20150052612
    Abstract: Disclosed are a method and a device for identifying a virus APK. The method comprises: presetting a virus database comprising a virus characteristic code; detecting whether a designated file in a target Android installation package APK contains the virus characteristic code; and if yes, determining that the target Android installation package APK is a virus APK. In the application, the virus APK and a variation thereof can be rapidly, accurately and effectively identified, thereby improving the security of an APK application.
    Type: Application
    Filed: March 12, 2013
    Publication date: February 19, 2015
    Inventors: Xun Wang, Xu Zhang
  • Publication number: 20150009222
    Abstract: An apparatus for providing graphics processing. The apparatus includes a dual CPU socket architecture comprising a first CPU socket and a second CPU socket. The apparatus includes a plurality of GPU boards providing a plurality of GPU processors coupled to the first CPU socket and the second CPU socket, wherein each GPU board comprises two or more of the plurality of GPU processors. The apparatus includes a communication interface coupling the first CPU socket to a first subset of one or more GPU boards and the second CPU socket to a second subset of one or more GPU boards.
    Type: Application
    Filed: November 27, 2013
    Publication date: January 8, 2015
    Applicant: NVIDIA Corporation
    Inventors: FRANCK DIARD, TOM PUTNAM, JEN-HSUN HUANG, XUN WANG
  • Publication number: 20140344333
    Abstract: Systems and methods are provided for data exchange in voice communication. For example, a first request message is sent to a server for playing background music in voice communication; an authorization granted by the server to play background music separately from the voice communication is received; and upon reception of a play instruction from a user, the background music is played and an identifier of the background music is sent to the server. The server broadcasts the background music to one or more clients based on at least information associated with the identifier of the background music.
    Type: Application
    Filed: February 26, 2014
    Publication date: November 20, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventors: Donglin Pu, Shu Peng, Wenxin Si, Zhenyu Yu, Xun Wang, Taijun Zeng