Patents by Inventor Zhigang Luo
Zhigang Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210211439Abstract: Embodiments of the present disclosure relate to methods, devices and computer readable storage medium for tracing an attack source in a service function chain overlay network. In example embodiments, a request for tracing an attack source of an attacking data is sent at the attack tracer to a first service function chain domain of a plurality of service function chain domains through which the attacking data flow passes subsequently. The request includes flow characteristics of the attacking data flow. Then, the attack tracer receives a first set of results of flow matching based on the flow characteristics from the first service function chain domain. The attack tracer identifies the attack source in the plurality of service function chain domains at least in part based on the first set of results. In this way, the attack source may be traced efficiently in the service function chain overlay network.Type: ApplicationFiled: May 22, 2018Publication date: July 8, 2021Inventors: Zhiyuan Hu, Jing Ping, Stephane Mahieu, Yueming Yin, Zhigang Luo
-
Patent number: 10923082Abstract: A processing unit includes a processor core that implements a physical function that supports multiple virtual functions. The processing unit includes a bus interface that supports communication between an external bus and the physical and virtual functions implemented using the processor core. During a reset of the processing unit, power is interrupted to the processor core power to the bus interface is maintained. The bus interface responds to requests for the physical and virtual functions received over the external bus concurrently with the power interruption. The bus interface responds based on state information associated with the virtual function. Power is restored to the processor core in response to the reinitialization of the GPU. The bus interface stops responding to requests for the physical and virtual functions received over the bus interface in response to restoring the power to the processor core and forwards requests received over the external bus from the bus interface to the processor core.Type: GrantFiled: October 31, 2018Date of Patent: February 16, 2021Assignee: ATI TECHNOLOGIES ULCInventors: Yinan Jiang, Zhigang Luo
-
Publication number: 20200403967Abstract: A method, a device, an apparatus and a computer-readable storage medium for MAC address conflict detection. The method includes: in response to detecting a wireless local area network, transmitting, at a first device, a dummy MAC address of the first device to a second device in the wireless local area network, the dummy MAC address being different from a real MAC address of the first device; transmitting an address conflict detection request for the dummy MAC address to the second device; and in response to an address conflict detection response from the second device indicating that there is no conflict for the dummy MAC address, establishing a connection with the wireless local area network. The method may effectively protect privacy information for a user of a terminal device, while avoiding a MAC address conflict, such that the user can communicate in a secure network environment.Type: ApplicationFiled: June 4, 2020Publication date: December 24, 2020Inventors: Zhiyuan HU, Duan Chen, Yueming Yin, Zhigang Luo
-
Publication number: 20200386717Abstract: An ultrasonic probe coupling assembly (1) and an ultrasonic probe mechanism are disclosed. The ultrasonic probe coupling assembly (1) includes a probe sleeve (11) and a solid-state coupling member (12). The probe sleeve (11) is sleeved on an ultrasonic probe (2). The solid-state coupling member (12) is fixed in the probe sleeve (11). One side of the solid-state coupling member (12) is located in the probe sleeve (11) for fitting to the ultrasonic probe (2), and the other side is protruded from the probe sleeve (11) to be in contact with the skin. The ultrasonic probe mechanism includes the ultrasonic probe coupling assembly (1) and the ultrasonic probe (2).Type: ApplicationFiled: May 15, 2019Publication date: December 10, 2020Applicant: SHENZHEN LEPUYUAN MEDICAL TECHNOLOGY CO., LTD.Inventors: Caifeng WANG, Zhigang LUO, Junying MA
-
Publication number: 20200358696Abstract: Embodiments of the present disclosure relate to method and device for interworking between service function chain (i.e., service chain) domains In some embodiments, there is provided a communication method comprising: receiving, at a first logic node of a first service chain in a first domain, a first packet associated with a second service chain in a second domain; converting the first packet into a second packet comprising first interworking information between the first service chain and the second service chain, the first interworking information comprising a flag indicating that the second packet is an interworking packet, an address of the first logic node, a first flow identifier of the second packet, a first service path identifier of the second packet and metadata associated with the second service chain; transmitting the second packet to a second logic node in the second domain; and receiving from the second logic node a response to the metadata.Type: ApplicationFiled: February 1, 2019Publication date: November 12, 2020Inventors: Zhiyuan HU, Mingyu ZHAO, Lina WANG, Zhigang LUO
-
Patent number: 10686728Abstract: Systems and methods are disclosed herein for allocating computing resources for execution of workloads in a distributed computing system with resource acquisition cycles and workload scheduling cycles. One or more resource offer managers transmit resource offers to each of one or more of schedulers. Each scheduler transmits a resource request and/or resource release request in response to each resource offer manager. Each resource offer manager computes a resource allocation for each scheduler after resolving conflicts and assigns the resources to each scheduler according to the resource allocation decisions. The resource acquisition cycle and the workload scheduling cycle are decoupled.Type: GrantFiled: July 6, 2017Date of Patent: June 16, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Zhenhua Hu, Xiaodi Ke, Khaled Ziya Aeen, Zhi Zhao, Zhigang Luo
-
Patent number: 10674416Abstract: Embodiments provide a user equipment (UE) device that includes a processor and a transceiver. The processor is configured to direct a handover request to an evolved packet core (EPC) access node via the transceiver. The access node may be, e.g. a wireless local area network (WLAN) access point or an E-UTRAN access point. The handover request may initiate a transfer of connectivity of the UE device from the WLAN access point to the E-UTRAN access point, or from the E-UTRAN access point to the WLAN access point. The processor is configured to receive a handover response from the current access node, wherein the response includes a cryptographic key identifier, and to derive a handover key from the key identifier. The processor may then operate the UE device to provide connectivity based on the handover key between the UE device and the other of the access nodes.Type: GrantFiled: November 18, 2015Date of Patent: June 2, 2020Assignee: Alcatel LucentInventors: Zhiyuan Hu, Zhigang Luo, Xueqiang Yan
-
Patent number: 10666689Abstract: At least one security policy is obtained from a policy creator at a controller in an SDN network. The security policy is implemented in the SDN network, via the controller, based on one or more attributes specifying a characteristic of the security policy, a role of the creator of the security policy, and a security privilege level of the role of the creator of the security policy.Type: GrantFiled: June 30, 2014Date of Patent: May 26, 2020Assignee: ALCATEL LUCENTInventors: Zhiyuan Hu, Xueqiang Yan, Zhigang Luo
-
Publication number: 20200135151Abstract: A processing unit includes a processor core that implements a physical function that supports multiple virtual functions. The processing unit includes a bus interface that supports communication between an external bus and the physical and virtual functions implemented using the processor core. During a reset of the processing unit, power is interrupted to the processor core power to the bus interface is maintained. The bus interface responds to requests for the physical and virtual functions received over the external bus concurrently with the power interruption. The bus interface responds based on state information associated with the virtual function. Power is restored to the processor core in response to the reinitialization of the GPU. The bus interface stops responding to requests for the physical and virtual functions received over the bus interface in response to restoring the power to the processor core and forwards requests received over the external bus from the bus interface to the processor core.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Inventors: Yinan JIANG, Zhigang LUO
-
Patent number: 10623333Abstract: Systems and methods are disclosed herein for allocating computing resources for execution of workloads in a distributed computing system with resource acquisition cycles and workload scheduling cycles. One or more resource offer managers transmit resource offers to each of one or more of schedulers. Each scheduler transmits a resource request and/or resource release request in response to each resource offer manager. Each resource offer manager computes a resource allocation for each scheduler after resolving conflicts and assigns the resources to each scheduler according to the resource allocation decisions. The resource acquisition cycle and the workload scheduling cycle are decoupled.Type: GrantFiled: July 6, 2017Date of Patent: April 14, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Zhenhua Hu, Xiaodi Ke, Khaled Ziya Aeen, Zhi Zhao, Zhigang Luo
-
Publication number: 20200045082Abstract: Embodiments of the present disclosure relate to method and device for providing a security service. For example, a method comprises: in response to receiving, at a first controller, a first request to create a first service chain for an application in a network, obtaining configuration information associated with the security service from the first request; generating, based on the configuration information, a second request to create a sequence of security functions associated with the first service chain; sending the second request to a second controller so as to create the sequence of security functions in the network; and in response to receiving from the second controller an acknowledgement for the sequence of security functions, creating the first service chain based on the sequence of security functions. Embodiments of the present disclosure further provide a device capable of implementing the above method.Type: ApplicationFiled: February 6, 2018Publication date: February 6, 2020Applicant: Alcatel LucentInventors: Zhiyuan Hu, Lina Wang, Zhigang Luo
-
Patent number: 10528749Abstract: A computing device has first and second operating systems with access to separate first and second memories. The second operating system hosts containers which provide separate execution environments. The containers have secure computing resources. A software module in the second operating system receives access requests from applications in the first operating system and selectively passes the requests based on rules for accessing the containers.Type: GrantFiled: March 20, 2017Date of Patent: January 7, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Zhigang Luo, Yuri Poeluev, Alan Pak-Lun Ho
-
Publication number: 20190268384Abstract: A first security service function chain is generated that identifies at least a first service function path comprising an identified set of security service functions, with at least one of the identified set of security service functions comprising a virtualized network function in a software defined networking (SDN) network architecture. The first security service function chain is utilized to create classification policies associating packets of a given packet type with the first security service function chain, and the first service function path is utilized to create forwarding policies specifying handling of packets of the given packet type by respective ones of the identified set of security service functions. The classification policies are provided to one or more nodes in a communication network comprising the SDN network architecture, and the forwarding policies are provided to one or more of the identified set of security service functions in the communication network.Type: ApplicationFiled: August 5, 2016Publication date: August 29, 2019Applicant: Alcatel LucentInventors: Zhiyuan HU, Xueqiang YAN, Zhigang LUO
-
Publication number: 20190261179Abstract: A security service function chain is created including a set of security service functions. The security service function chain is created in response to instantiation of a given network partition (e.g., network slice) in a communication network (5G or similar network). The communication network supports instantiation of a plurality of network partitions for providing a respective plurality of network services. The security service function chain is utilized to perform at least one security service (e.g., authentication) for an entity (e.g., a subscriber or a device) accessing or seeking access to a network service (e.g., one of eMBB, massive IoT, and mission-critical IoT) corresponding to the given network partition.Type: ApplicationFiled: September 18, 2016Publication date: August 22, 2019Applicant: Alcatel LucentInventors: Zhiyuan HU, Zhigang LUO, Xueqiang YAN
-
Patent number: 10387681Abstract: A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating system receives requests for secure computing resources, adds access credentials and passes the requests to a software module in the second operating system.Type: GrantFiled: March 20, 2017Date of Patent: August 20, 2019Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yuri Poeluev, Zhigang Luo
-
Publication number: 20190054319Abstract: The present disclosure discloses a boron neutron capture therapy system comprising: a boron neutron capture therapy device and an ?-amino acid-like boron trifluoride compound having a structure shown as formula (I) below: Wherein: R is selected from hydrogen, methyl, isopropyl, 1-methylpropyl, 2-methylpropyl, hydroxymethyl, 1-hydroxyethyl, benzyl or hydroxybenzyl; M is H or metal atom. The energy generated from the action of the neutron beam generated by the boron neutron capture therapy device on the ?-amino acid-like boron trifluoride compound destroys tumor cell DNA. In another aspect, the present disclosure discloses a use of an ?-amino acid-like boron trifluoride compound in the preparation of a medicament for tumor therapy.Type: ApplicationFiled: September 18, 2018Publication date: February 21, 2019Inventors: Zheng WANG, Shihong Li, Zhigang Luo, Yuanhao Liu
-
Publication number: 20190014059Abstract: Systems and methods are disclosed herein for allocating computing resources for execution of workloads in a distributed computing system with resource acquisition cycles and workload scheduling cycles. One or more resource offer managers transmit resource offers to each of one or more of schedulers. Each scheduler transmits a resource request and/or resource release request in response to each resource offer manager. Each resource offer manager computes a resource allocation for each scheduler after resolving conflicts and assigns the resources to each scheduler according to the resource allocation decisions. The resource acquisition cycle and the workload scheduling cycle are decoupled.Type: ApplicationFiled: July 6, 2017Publication date: January 10, 2019Inventors: Zhenhua HU, Xiaodi KE, Khaled ZIYA AEEN, Zhi ZHAO, Zhigang LUO
-
Publication number: 20180352490Abstract: Embodiments provide a user equipment (UE) device that includes a processor and a transceiver. The processor is configured to direct a handover request to an evolved packet core (EPC) access node via the transceiver. The access node may be, e.g. a wireless local area network (WLAN) access point or an E-UTRAN access point. The handover request may initiate a transfer of connectivity of the UE device from the WLAN access point to the E-UTRAN access point, or from the E-UTRAN access point to the WLAN access point. The processor is configured to receive a handover response from the current access node, wherein the response includes a cryptographic key identifier, and to derive a handover key from the key identifier. The processor may then operate the UE device to provide connectivity based on the handover key between the UE device and the other of the access nodes.Type: ApplicationFiled: November 18, 2015Publication date: December 6, 2018Applicant: Alcatel LucentInventors: Zhiyuan Hu, Zhigang Luo, Xueqiang Yan
-
Publication number: 20180268127Abstract: A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating system receives requests for secure computing resources, adds access credentials and passes the requests to a software module in the second operating system.Type: ApplicationFiled: March 20, 2017Publication date: September 20, 2018Inventors: Yuri POELUEV, Zhigang LUO
-
Publication number: 20180268156Abstract: A computing device has first and second operating systems with access to separate first and second memories. The second operating system hosts containers which provide separate execution environments. The containers have secure computing resources. A software module in the second operating system receives access requests from applications in the first operating system and selectively passes the requests based on rules for accessing the containers.Type: ApplicationFiled: March 20, 2017Publication date: September 20, 2018Inventors: Zhigang LUO, Yuri POELUEV, Alan Pak-Lun HO