Patents by Inventor Zikang Chen

Zikang Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250227066
    Abstract: This specification provides a method and an apparatus for controlling a flow entry. The method includes: receiving a data message sent by a user, and determining a target flow entry matched with the data message, where the target flow entry is one of at least one flow entry corresponding to a target virtual machine in a local position; in a case that a first version number of the target virtual machine included in the target flow entry is inconsistent with a second version number of the target virtual machine recorded in the local position, deleting a flow entry including the first version number in the local position; and sending the data message to a centrex, so that the centrex forwards the data message to a target host machine, where the second version number is generated in a case that the target virtual machine is migrated to the target host machine.
    Type: Application
    Filed: January 29, 2023
    Publication date: July 10, 2025
    Inventors: Shunmin ZHU, Yisong QIAO, Nianbing YU, Zikang CHEN
  • Publication number: 20240370282
    Abstract: Embodiments of the present application provide a data processing method, a programmable network card device, a physical server and a storage medium. In an embodiment of the present application, for a virtual network card of a virtual machine, on the one hand, a network card acceleration module corresponding to the virtual network card is implemented in the programmable network card device based on programmable hardware, and on the other hand, a service interface component used to implement hardware offloading of the virtual network card is provided in the virtual machine for its upper layer application, so that hardware offloading can be performed on functions of the virtual network card of the virtual machine based on the programmable network card device.
    Type: Application
    Filed: September 28, 2022
    Publication date: November 7, 2024
    Inventors: Yilong LYU, Chao XU, Shangwei XIE, Zikang CHEN, Shunmin ZHU
  • Patent number: 11570147
    Abstract: Some embodiments of the invention provide a method for a first security controller that performs security operations on the packets that are transmitted within a network. The method of some embodiments receives a packet from a forwarding element in the network based on a decision made by a security agent that operates along with the forwarding element. When the first security controller stores a security rule for the packet, the method processes the packet according to the stored security rule. When the first security controller does not store a security rule for the packet, the method (i) determines that a second security controller stores a security rule for the packet based on a set of header values of the packet, and (ii) sends the packet to the second security controller for security processing according to the security rule for the packet stored on the second security controller.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: January 31, 2023
    Assignee: NICIRA, INC.
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Publication number: 20190075079
    Abstract: Some embodiments of the invention provide a method for a first security controller that performs security operations on the packets that are transmitted within a network. The method of some embodiments receives a packet from a forwarding element in the network based on a decision made by a security agent that operates along with the forwarding element. When the first security controller stores a security rule for the packet, the method processes the packet according to the stored security rule. When the first security controller does not store a security rule for the packet, the method (i) determines that a second security controller stores a security rule for the packet based on a set of header values of the packet, and (ii) sends the packet to the second security controller for security processing according to the security rule for the packet stored on the second security controller.
    Type: Application
    Filed: November 2, 2018
    Publication date: March 7, 2019
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Patent number: 10142287
    Abstract: Some embodiments of the invention provide a method for a first security controller that performs security operations on the packets that are transmitted within a network. The method of some embodiments receives a packet from a forwarding element in the network based on a decision made by a security agent that operates along with the forwarding element. When the first security controller stores a security rule for the packet, the method processes the packet according to the stored security rule. When the first security controller does not store a security rule for the packet, the method (i) determines that a second security controller stores a security rule for the packet based on a set of header values of the packet, and (ii) sends the packet to the second security controller for security processing according to the security rule for the packet stored on the second security controller.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: November 27, 2018
    Assignee: NICIRA, INC.
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Patent number: 9930010
    Abstract: Some embodiments of the invention provide a method that performs security operations for packets that are processed by a forwarding element. The method of some embodiments receives, at a security agent operating on a physical machine, a packet from a forwarding element that also operates on the physical machine. The method then determines whether a security rule is stored for the packet at the security agent. When no security rule is stored for the packet, the method transmits the packet to a default security controller of several security controllers that store security rules for a network and process packets according to the stored security rules. When the security rule is stored for the packet, the method processes the packet according to the stored security rule for the packet.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: March 27, 2018
    Assignee: NICIRA, INC.
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Publication number: 20160294776
    Abstract: Some embodiments of the invention provide a method for a first security controller that performs security operations on the packets that are transmitted within a network. The method of some embodiments receives a packet from a forwarding element in the network based on a decision made by a security agent that operates along with the forwarding element. When the first security controller stores a security rule for the packet, the method processes the packet according to the stored security rule. When the first security controller does not store a security rule for the packet, the method (i) determines that a second security controller stores a security rule for the packet based on a set of header values of the packet, and (ii) sends the packet to the second security controller for security processing according to the security rule for the packet stored on the second security controller.
    Type: Application
    Filed: July 28, 2015
    Publication date: October 6, 2016
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen
  • Publication number: 20160294874
    Abstract: Some embodiments of the invention provide a method that performs security operations for packets that are processed by a forwarding element. The method of some embodiments receives, at a security agent operating on a physical machine, a packet from a forwarding element that also operates on the physical machine. The method then determines whether a security rule is stored for the packet at the security agent. When no security rule is stored for the packet, the method transmits the packet to a default security controller of several security controllers that store security rules for a network and process packets according to the stored security rules. When the security rule is stored for the packet, the method processes the packet according to the stored security rule for the packet.
    Type: Application
    Filed: July 28, 2015
    Publication date: October 6, 2016
    Inventors: Keyong Sun, Yonggang Wang, Frank Guo, Liang Li, Zikang Chen