Patents by Inventor Zhigang Luo

Zhigang Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210211439
    Abstract: Embodiments of the present disclosure relate to methods, devices and computer readable storage medium for tracing an attack source in a service function chain overlay network. In example embodiments, a request for tracing an attack source of an attacking data is sent at the attack tracer to a first service function chain domain of a plurality of service function chain domains through which the attacking data flow passes subsequently. The request includes flow characteristics of the attacking data flow. Then, the attack tracer receives a first set of results of flow matching based on the flow characteristics from the first service function chain domain. The attack tracer identifies the attack source in the plurality of service function chain domains at least in part based on the first set of results. In this way, the attack source may be traced efficiently in the service function chain overlay network.
    Type: Application
    Filed: May 22, 2018
    Publication date: July 8, 2021
    Inventors: Zhiyuan Hu, Jing Ping, Stephane Mahieu, Yueming Yin, Zhigang Luo
  • Patent number: 10923082
    Abstract: A processing unit includes a processor core that implements a physical function that supports multiple virtual functions. The processing unit includes a bus interface that supports communication between an external bus and the physical and virtual functions implemented using the processor core. During a reset of the processing unit, power is interrupted to the processor core power to the bus interface is maintained. The bus interface responds to requests for the physical and virtual functions received over the external bus concurrently with the power interruption. The bus interface responds based on state information associated with the virtual function. Power is restored to the processor core in response to the reinitialization of the GPU. The bus interface stops responding to requests for the physical and virtual functions received over the bus interface in response to restoring the power to the processor core and forwards requests received over the external bus from the bus interface to the processor core.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: February 16, 2021
    Assignee: ATI TECHNOLOGIES ULC
    Inventors: Yinan Jiang, Zhigang Luo
  • Publication number: 20200403967
    Abstract: A method, a device, an apparatus and a computer-readable storage medium for MAC address conflict detection. The method includes: in response to detecting a wireless local area network, transmitting, at a first device, a dummy MAC address of the first device to a second device in the wireless local area network, the dummy MAC address being different from a real MAC address of the first device; transmitting an address conflict detection request for the dummy MAC address to the second device; and in response to an address conflict detection response from the second device indicating that there is no conflict for the dummy MAC address, establishing a connection with the wireless local area network. The method may effectively protect privacy information for a user of a terminal device, while avoiding a MAC address conflict, such that the user can communicate in a secure network environment.
    Type: Application
    Filed: June 4, 2020
    Publication date: December 24, 2020
    Inventors: Zhiyuan HU, Duan Chen, Yueming Yin, Zhigang Luo
  • Publication number: 20200386717
    Abstract: An ultrasonic probe coupling assembly (1) and an ultrasonic probe mechanism are disclosed. The ultrasonic probe coupling assembly (1) includes a probe sleeve (11) and a solid-state coupling member (12). The probe sleeve (11) is sleeved on an ultrasonic probe (2). The solid-state coupling member (12) is fixed in the probe sleeve (11). One side of the solid-state coupling member (12) is located in the probe sleeve (11) for fitting to the ultrasonic probe (2), and the other side is protruded from the probe sleeve (11) to be in contact with the skin. The ultrasonic probe mechanism includes the ultrasonic probe coupling assembly (1) and the ultrasonic probe (2).
    Type: Application
    Filed: May 15, 2019
    Publication date: December 10, 2020
    Applicant: SHENZHEN LEPUYUAN MEDICAL TECHNOLOGY CO., LTD.
    Inventors: Caifeng WANG, Zhigang LUO, Junying MA
  • Publication number: 20200358696
    Abstract: Embodiments of the present disclosure relate to method and device for interworking between service function chain (i.e., service chain) domains In some embodiments, there is provided a communication method comprising: receiving, at a first logic node of a first service chain in a first domain, a first packet associated with a second service chain in a second domain; converting the first packet into a second packet comprising first interworking information between the first service chain and the second service chain, the first interworking information comprising a flag indicating that the second packet is an interworking packet, an address of the first logic node, a first flow identifier of the second packet, a first service path identifier of the second packet and metadata associated with the second service chain; transmitting the second packet to a second logic node in the second domain; and receiving from the second logic node a response to the metadata.
    Type: Application
    Filed: February 1, 2019
    Publication date: November 12, 2020
    Inventors: Zhiyuan HU, Mingyu ZHAO, Lina WANG, Zhigang LUO
  • Patent number: 10686728
    Abstract: Systems and methods are disclosed herein for allocating computing resources for execution of workloads in a distributed computing system with resource acquisition cycles and workload scheduling cycles. One or more resource offer managers transmit resource offers to each of one or more of schedulers. Each scheduler transmits a resource request and/or resource release request in response to each resource offer manager. Each resource offer manager computes a resource allocation for each scheduler after resolving conflicts and assigns the resources to each scheduler according to the resource allocation decisions. The resource acquisition cycle and the workload scheduling cycle are decoupled.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: June 16, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Zhenhua Hu, Xiaodi Ke, Khaled Ziya Aeen, Zhi Zhao, Zhigang Luo
  • Patent number: 10674416
    Abstract: Embodiments provide a user equipment (UE) device that includes a processor and a transceiver. The processor is configured to direct a handover request to an evolved packet core (EPC) access node via the transceiver. The access node may be, e.g. a wireless local area network (WLAN) access point or an E-UTRAN access point. The handover request may initiate a transfer of connectivity of the UE device from the WLAN access point to the E-UTRAN access point, or from the E-UTRAN access point to the WLAN access point. The processor is configured to receive a handover response from the current access node, wherein the response includes a cryptographic key identifier, and to derive a handover key from the key identifier. The processor may then operate the UE device to provide connectivity based on the handover key between the UE device and the other of the access nodes.
    Type: Grant
    Filed: November 18, 2015
    Date of Patent: June 2, 2020
    Assignee: Alcatel Lucent
    Inventors: Zhiyuan Hu, Zhigang Luo, Xueqiang Yan
  • Patent number: 10666689
    Abstract: At least one security policy is obtained from a policy creator at a controller in an SDN network. The security policy is implemented in the SDN network, via the controller, based on one or more attributes specifying a characteristic of the security policy, a role of the creator of the security policy, and a security privilege level of the role of the creator of the security policy.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: May 26, 2020
    Assignee: ALCATEL LUCENT
    Inventors: Zhiyuan Hu, Xueqiang Yan, Zhigang Luo
  • Publication number: 20200135151
    Abstract: A processing unit includes a processor core that implements a physical function that supports multiple virtual functions. The processing unit includes a bus interface that supports communication between an external bus and the physical and virtual functions implemented using the processor core. During a reset of the processing unit, power is interrupted to the processor core power to the bus interface is maintained. The bus interface responds to requests for the physical and virtual functions received over the external bus concurrently with the power interruption. The bus interface responds based on state information associated with the virtual function. Power is restored to the processor core in response to the reinitialization of the GPU. The bus interface stops responding to requests for the physical and virtual functions received over the bus interface in response to restoring the power to the processor core and forwards requests received over the external bus from the bus interface to the processor core.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Yinan JIANG, Zhigang LUO
  • Patent number: 10623333
    Abstract: Systems and methods are disclosed herein for allocating computing resources for execution of workloads in a distributed computing system with resource acquisition cycles and workload scheduling cycles. One or more resource offer managers transmit resource offers to each of one or more of schedulers. Each scheduler transmits a resource request and/or resource release request in response to each resource offer manager. Each resource offer manager computes a resource allocation for each scheduler after resolving conflicts and assigns the resources to each scheduler according to the resource allocation decisions. The resource acquisition cycle and the workload scheduling cycle are decoupled.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: April 14, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Zhenhua Hu, Xiaodi Ke, Khaled Ziya Aeen, Zhi Zhao, Zhigang Luo
  • Publication number: 20200045082
    Abstract: Embodiments of the present disclosure relate to method and device for providing a security service. For example, a method comprises: in response to receiving, at a first controller, a first request to create a first service chain for an application in a network, obtaining configuration information associated with the security service from the first request; generating, based on the configuration information, a second request to create a sequence of security functions associated with the first service chain; sending the second request to a second controller so as to create the sequence of security functions in the network; and in response to receiving from the second controller an acknowledgement for the sequence of security functions, creating the first service chain based on the sequence of security functions. Embodiments of the present disclosure further provide a device capable of implementing the above method.
    Type: Application
    Filed: February 6, 2018
    Publication date: February 6, 2020
    Applicant: Alcatel Lucent
    Inventors: Zhiyuan Hu, Lina Wang, Zhigang Luo
  • Patent number: 10528749
    Abstract: A computing device has first and second operating systems with access to separate first and second memories. The second operating system hosts containers which provide separate execution environments. The containers have secure computing resources. A software module in the second operating system receives access requests from applications in the first operating system and selectively passes the requests based on rules for accessing the containers.
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: January 7, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Zhigang Luo, Yuri Poeluev, Alan Pak-Lun Ho
  • Publication number: 20190268384
    Abstract: A first security service function chain is generated that identifies at least a first service function path comprising an identified set of security service functions, with at least one of the identified set of security service functions comprising a virtualized network function in a software defined networking (SDN) network architecture. The first security service function chain is utilized to create classification policies associating packets of a given packet type with the first security service function chain, and the first service function path is utilized to create forwarding policies specifying handling of packets of the given packet type by respective ones of the identified set of security service functions. The classification policies are provided to one or more nodes in a communication network comprising the SDN network architecture, and the forwarding policies are provided to one or more of the identified set of security service functions in the communication network.
    Type: Application
    Filed: August 5, 2016
    Publication date: August 29, 2019
    Applicant: Alcatel Lucent
    Inventors: Zhiyuan HU, Xueqiang YAN, Zhigang LUO
  • Publication number: 20190261179
    Abstract: A security service function chain is created including a set of security service functions. The security service function chain is created in response to instantiation of a given network partition (e.g., network slice) in a communication network (5G or similar network). The communication network supports instantiation of a plurality of network partitions for providing a respective plurality of network services. The security service function chain is utilized to perform at least one security service (e.g., authentication) for an entity (e.g., a subscriber or a device) accessing or seeking access to a network service (e.g., one of eMBB, massive IoT, and mission-critical IoT) corresponding to the given network partition.
    Type: Application
    Filed: September 18, 2016
    Publication date: August 22, 2019
    Applicant: Alcatel Lucent
    Inventors: Zhiyuan HU, Zhigang LUO, Xueqiang YAN
  • Patent number: 10387681
    Abstract: A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating system receives requests for secure computing resources, adds access credentials and passes the requests to a software module in the second operating system.
    Type: Grant
    Filed: March 20, 2017
    Date of Patent: August 20, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yuri Poeluev, Zhigang Luo
  • Publication number: 20190054319
    Abstract: The present disclosure discloses a boron neutron capture therapy system comprising: a boron neutron capture therapy device and an ?-amino acid-like boron trifluoride compound having a structure shown as formula (I) below: Wherein: R is selected from hydrogen, methyl, isopropyl, 1-methylpropyl, 2-methylpropyl, hydroxymethyl, 1-hydroxyethyl, benzyl or hydroxybenzyl; M is H or metal atom. The energy generated from the action of the neutron beam generated by the boron neutron capture therapy device on the ?-amino acid-like boron trifluoride compound destroys tumor cell DNA. In another aspect, the present disclosure discloses a use of an ?-amino acid-like boron trifluoride compound in the preparation of a medicament for tumor therapy.
    Type: Application
    Filed: September 18, 2018
    Publication date: February 21, 2019
    Inventors: Zheng WANG, Shihong Li, Zhigang Luo, Yuanhao Liu
  • Publication number: 20190014059
    Abstract: Systems and methods are disclosed herein for allocating computing resources for execution of workloads in a distributed computing system with resource acquisition cycles and workload scheduling cycles. One or more resource offer managers transmit resource offers to each of one or more of schedulers. Each scheduler transmits a resource request and/or resource release request in response to each resource offer manager. Each resource offer manager computes a resource allocation for each scheduler after resolving conflicts and assigns the resources to each scheduler according to the resource allocation decisions. The resource acquisition cycle and the workload scheduling cycle are decoupled.
    Type: Application
    Filed: July 6, 2017
    Publication date: January 10, 2019
    Inventors: Zhenhua HU, Xiaodi KE, Khaled ZIYA AEEN, Zhi ZHAO, Zhigang LUO
  • Publication number: 20180352490
    Abstract: Embodiments provide a user equipment (UE) device that includes a processor and a transceiver. The processor is configured to direct a handover request to an evolved packet core (EPC) access node via the transceiver. The access node may be, e.g. a wireless local area network (WLAN) access point or an E-UTRAN access point. The handover request may initiate a transfer of connectivity of the UE device from the WLAN access point to the E-UTRAN access point, or from the E-UTRAN access point to the WLAN access point. The processor is configured to receive a handover response from the current access node, wherein the response includes a cryptographic key identifier, and to derive a handover key from the key identifier. The processor may then operate the UE device to provide connectivity based on the handover key between the UE device and the other of the access nodes.
    Type: Application
    Filed: November 18, 2015
    Publication date: December 6, 2018
    Applicant: Alcatel Lucent
    Inventors: Zhiyuan Hu, Zhigang Luo, Xueqiang Yan
  • Publication number: 20180268127
    Abstract: A computing device has first and second operating systems with access to first and second memories, respectively. The second memory is provided for secure computing resources and is not accessible by applications in the first operating system. A software module executable within the first operating system receives requests for secure computing resources, adds access credentials and passes the requests to a software module in the second operating system.
    Type: Application
    Filed: March 20, 2017
    Publication date: September 20, 2018
    Inventors: Yuri POELUEV, Zhigang LUO
  • Publication number: 20180268156
    Abstract: A computing device has first and second operating systems with access to separate first and second memories. The second operating system hosts containers which provide separate execution environments. The containers have secure computing resources. A software module in the second operating system receives access requests from applications in the first operating system and selectively passes the requests based on rules for accessing the containers.
    Type: Application
    Filed: March 20, 2017
    Publication date: September 20, 2018
    Inventors: Zhigang LUO, Yuri POELUEV, Alan Pak-Lun HO