- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 9/40 H04W 12/06 H04W 12/48 H04W 12/088
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
Location Based Security In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. A system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06 H04W 12/06 H04W 12/00 H04W 12/08
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
- Palo Alto CA, US Aaron Sekhri - Palo Alto CA, US Andreja Kogovsek - London, GB Benjamin Dawes - Claverley, GB Brandon Burr - San Francisco CA, US Chang Li - Palo Alto CA, US Elizabeth Caudill - San Francisco CA, US Zachary Romanow - Washington DC, US
International Classification:
G01C 21/34 G01C 21/36 G06Q 10/08
Abstract:
Systems and methods are provided for event-based route planning. Information of events taking place in a predetermined geographic area is received. An origin and at least one destination are determined. One or more first routes for traveling from the origin to the destination are determined from the predetermined geographic area. One or more segments in each of the first routes are determined based on the received information, each segment being associated with a corresponding recommendation for travelling via the segment.
Location Based Security In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06
Abstract:
Techniques for location based security in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for location based security in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a location for a new session; associating the location with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the location.
Mobile Equipment Identity And/Or Iot Equipment Identity And Application Identity Based Security Enforcement In Service Provider Networks
- Santa Clara CA, US Leonid Burakovsky - Pleasanton CA, US Jesse C. Shu - Palo Alto CA, US Chang Li - San Jose CA, US
International Classification:
H04L 29/06 H04W 12/06
Abstract:
Techniques for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for mobile equipment identity and/or IoT equipment identity and application identity based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify a device identifier for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the device identifier and the application identifier.
Techniques for latency-based policy activation are disclosed. In some embodiments, a system for latency-based policy activation includes collecting a plurality of latency measures associated with monitored network communications; correlating the plurality of latency measures associated with the monitored network communications to detect anomalous network activity based on a profile; and performing a mitigation response to the anomalous network activity based on a policy.
Layered Linear Inversion Techniques For Locating Microseismic Activity
Chang Li - Katy TX, US Sudipta Sarkar - Moon Township PA, US Chunquan Yu - Cambridge MA, US
Assignee:
Chevron U.S.A. Inc. - San Ramon CA
International Classification:
G01V 1/28 G01V 1/30
Abstract:
A method for locating a microseismic event in a subsurface formation, in some embodiments, comprises: receiving a microseismic signal at a detector; obtaining a velocity model representative of the subsurface formation, the velocity model comprising multiple velocity layers; estimating, for each of the multiple velocity layers in the subsurface formation, a microseismic event location and a microseismic event origin time; and selecting one of the estimated locations and times using a parameter of the microseismic signal received at the detector.
Queens Eye Center 6010 Main St FL 1, Flushing, NY 11355 (718)6618800 (phone), (718)4609351 (fax)
Languages:
Chinese English Korean Spanish
Description:
Dr. Li works in Flushing, NY and specializes in Optometry. Dr. Li is affiliated with New York Presbyterian Hospital Weill Cornell Medical Center and Queens Hospital Center.
U.s. Department of the Treasury Oct 2014 - Jun 2018
Solutions Architect
Smartronix Oct 2014 - Jun 2018
Senior .Solution Architect
Smartronix Jul 2005 - Oct 2014
Senior Data Architect
Innolog Sep 2003 - Jul 2005
Principal Software Engineer
Netdecide Aug 2000 - Sep 2004
Technical Lead
Education:
George Mason University 1995 - 1997
Fudan University 1983 - 1990
Master of Science, Masters, Bachelors, Bachelor of Science, Computer Science
Skills:
Data Warehousing Enterprise Architecture Integration Sharepoint Software Development Life Cycle Cloud Computing Software Development Javascript Solution Architecture Databases .Net Framework Requirements Analysis Amazon Web Services Internet Information Services C# Mysql Linux Web Development Java Html Business Intelligence Agile Methodologies Php Git Perl Microsoft Azure Information Security Postgresql Mongodb C++ Node.js Service Oriented Architecture Devops Microsoft Sql Server Information Technology Software Project Management
Certifications:
Google Cloud Certified Professional Data Engineer Google Cloud Certified Associate Cloud Engineer Google Cloud Certified Professional Cloud Architect Microsoft Certified: Azure Administrator Associate Amazon Web Services Solutions Architect Associate Amazon Web Services Solutions Architect - Professional Amazon Web Services Big Data Specialty Amazon Web Services Machine Learning Specialty
Apple
Software Engineer - System
Megvii旷视 Jun 2018 - Sep 2018
Research Intern
New Oriental Education & Technology Group (Nyse:edu) Sep 2016 - May 2017
Toefl Teacher
Education:
University of Washington 2017 - 2018
Master of Science, Masters, Computer Engineering
Shanghai Jiao Tong University 2013 - 2017
Bachelors, Bachelor of Science, Electrical Engineering
University of Melbourne 2015 - 2015
Marathon Petroleum Corporation
Senior Mechanical Engineer
Cb&I Aug 2015 - Nov 2016
Senior Mechanical Engineer
Foster Wheeler Mar 2011 - Aug 2015
Mechanical Engineer
University of Missouri Aug 2006 - Mar 2011
Research Assistant
Shanghai Jiao Tong University Sep 2003 - Jun 2006
Research Assistant
Education:
University of Missouri - Columbia 2006 - 2011
Doctorates, Doctor of Philosophy, Philosophy, Mechanical Engineering
Shanghai Jiao Tong University 2000 - 2004
Bachelors
Chevron
Senior Research Geophysicist
Hess Corporation May 2008 - Jun 2013
Senior Geophysicist
Massachusetts Institute of Technology (Mit) Jun 2007 - May 2008
Postdoctoral Researcher
Education:
Massachusetts Institute of Technology 2001 - 2007
Doctorates, Doctor of Philosophy, Philosophy, Geophysics
Peking University 1992 - 2001
Master of Science, Masters, Bachelors, Bachelor of Science, Geophysics