Patents by Inventor Liang Xie
Liang Xie has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140289620Abstract: The present disclosure discloses method and device for triggering operations via interface components. The method comprises: triggering movement of a floating window corresponding to an interface component by operating on the floating window; moving the floating window to a first region; triggering a release command to release the floating window in the first region; running the interface component corresponding to the floating window in accordance with the release command. The device comprises: a triggering module that triggers movement of a floating window corresponding to an interface component by operating on the floating window; a movement module that moves the floating window to a first region; a release module that triggers a release command to release the floating window in the first region; and a running module that runs the interface component corresponding to the floating window in accordance with the release command. The present disclosure greatly enhances operational convenience.Type: ApplicationFiled: May 15, 2014Publication date: September 25, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Zhao Liang XIE, Wen Liang TANG, Xing ZENG, Rui Tian CAI
-
Patent number: 8815297Abstract: This present invention relates to methods, compositions, and kits useful for treating a patient having or at risk for developing a disorder associated with decreased expression of ?2 adrenergic receptors or need for increased 132 adrenergic receptor activity.Type: GrantFiled: March 31, 2010Date of Patent: August 26, 2014Assignee: Duke UniversityInventors: Jonathan S. Stamler, Liang Xie
-
Patent number: 8657628Abstract: A universal serial bus (USB) connector includes a main body and a conductive member. The main body is fastened to an enclosure. The main body includes at least one USB interface. The conductive member includes an engaging portion for engaging with the main body and abutting against each housing of the at least one USB interface, and a connection tab abutting against the enclosure.Type: GrantFiled: July 26, 2012Date of Patent: February 25, 2014Assignees: Hon Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.Inventor: Ze-Liang Xie
-
Publication number: 20140017939Abstract: A universal serial bus (USB) connector includes a main body and a conductive member. The main body is fastened to an enclosure. The main body includes at least one USB interface. The conductive member includes an engaging portion for engaging with the main body and abutting against each housing of the at least one USB interface, and a connection tab abutting against the enclosure.Type: ApplicationFiled: July 26, 2012Publication date: January 16, 2014Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD.Inventor: ZE-LIANG XIE
-
Patent number: 8621551Abstract: Techniques for managing and protecting computing environments are disclosed. A safe computing environment can be provided for ensuring the safety and/or management of a device. The safe computing environment can be secured by a safe component that isolates and protects it from unsafe computing environments which may also be operating. As a result, various security and management activities can be securely performed from a safe computing environment. A safe computing environment can, for example, be provided on a device as a safe virtual computing environment (e.g., a safe virtual machine) protected by a safe virtual computing monitor (e.g., a safe virtual machine monitor) from one or more other virtual computing environments that are not known or not believed to be safe for the device. It will also be appreciated that the safe components can, for example, be provided as trusted components for a device.Type: GrantFiled: April 18, 2008Date of Patent: December 31, 2013Assignee: Samsung Electronics Company, Ltd.Inventors: Xinwen Zhang, Liang Xie, Jean-Pierre Seifert, Onur Aciicmez, Afshin Latifi
-
Patent number: 8595834Abstract: Techniques for detecting unauthorized use (e.g., malicious attacks) of the computing systems (e.g., computing devices) are disclosed. Unauthorized use can be detected based on patterns of use (e.g., behavioral patterns of use typically associated with a human being) of the computing systems. Acceptable behavioral pattern data can be generated for a computing system by monitoring the use of a support system (e.g., an operating system, a virtual environment) operating on the computing system. For example, a plurality of system support provider components of a support system (e.g., system calls, device drivers) can be monitored in order to generate the acceptable behavioral pattern data in a form which effectively defines an acceptable pattern of use (usage pattern) for the monitored system support provider components, thereby allowing detection of unauthorized use of a computing system by detecting any deviation from the acceptable pattern of use of the monitored system support provider components.Type: GrantFiled: February 4, 2008Date of Patent: November 26, 2013Assignee: Samsung Electronics Co., LtdInventors: Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Onur Aciicmez, Afshin Latifi
-
Patent number: 8472170Abstract: An exemplary computer chassis includes a casing and a lid covering the casing. The casing includes a bottom wall, a first sidewall and second sidewall extending from the bottom wall, the first sidewall and the second sidewall each extending a curved engaging ledge. The lid includes a main body and baffles extending from the main body. The baffles fittedly engage with corresponding engaging ledges of the first sidewall and the second sidewall of the casing.Type: GrantFiled: August 1, 2011Date of Patent: June 25, 2013Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.Inventors: Shi-Xuan Feng, Ze-Liang Xie
-
Publication number: 20130148281Abstract: A power switch is used for protection against static electricity and includes a main body, a metal pin and a protection section. The metal pin and the protection section are positioned on the same side of the main body. The main body and the protection section are made of insulating material. The metal pin passes through the protection section and is partially received within the protection section, and the other part of the metal pin is exposed.Type: ApplicationFiled: June 13, 2012Publication date: June 13, 2013Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD.Inventor: ZE-LIANG XIE
-
Patent number: 8319117Abstract: A printed circuit board includes signal layers, ground layers, and a power layer, which are superposed. A closed trace is set along edges of each of the signal layers and the power layers. A number of vias are defined in each trace at intervals. Each via extends through the signal layers, the ground layers, and the power layer. Each via is electrically connected to the traces of the signal layers and the power layer, and electrically connected to the ground layers.Type: GrantFiled: July 21, 2010Date of Patent: November 27, 2012Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.Inventor: Ze-Liang Xie
-
Publication number: 20120293933Abstract: An exemplary computer chassis includes a casing and a lid covering the casing. The casing includes a bottom wall, a first sidewall and second sidewall extending from the bottom wall, the first sidewall and the second sidewall each extending a curved engaging ledge. The lid includes a main body and baffles extending from the main body. The baffles fittedly engage with corresponding engaging ledges of the first sidewall and the second sidewall of the casing.Type: ApplicationFiled: August 1, 2011Publication date: November 22, 2012Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTDInventors: SHI-XUAN FENG, ZE-LIANG XIE
-
Publication number: 20120121720Abstract: This present invention relates to methods, compositions, and kits useful for treating a patient having or at risk for developing a disorder associated with decreased expression of ?2 adrenergic receptors or need for increased 132 adrenergic receptor activity.Type: ApplicationFiled: March 31, 2010Publication date: May 17, 2012Inventors: Jonathan S. Stamler, Liang Xie
-
Publication number: 20120098732Abstract: An electromagnetic interference (EMI) detection apparatus includes a telescopic antenna and a detecting element. The telescopic antenna includes an antenna body and an adapter portion. The antenna body is rotatably mounted on the adapter portion. The adapter portion includes a connecting portion electrically connected to the antenna body. The detecting element includes a main body, a cable, and a probe. The main body includes a matching portion. The matching portion is electrically connected to the connecting portion of the adapter portion. A first terminal of the cable is electrically connected to the matching portion. A second terminal of the cable is electrically connected to the probe. This EMI detecting apparatus ,cooperating with hybrid biconical/log periodic antenna and spectrum analyzer, can detect the root cause of EMI conveniently.Type: ApplicationFiled: November 1, 2010Publication date: April 26, 2012Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD.Inventors: ZE-LIANG XIE, SHI-XUAN FENG
-
Publication number: 20120084350Abstract: A pure web browser based medical imaging system that requires no installation of application software or any browser plug-in and functions in the same way as traditional full blown medical imaging PACS (Picture Archiving and Communication Systems) viewer fat clients. In addition, the system intelligently distributes the computing tasks of image rendering between browser and servers from complete server-side rendering to complete client-side rendering and anything between. It comprises a JavaScript medical image rendering library that can process original DICOM (Digital Imaging and Communications in Medicine) data sets and all standard web images at pixel level, a medical imaging server and a rendering load balancing component that can dynamically split the rendering computing from server to client according to their capabilities.Type: ApplicationFiled: October 4, 2011Publication date: April 5, 2012Inventor: Liang Xie
-
Publication number: 20110297432Abstract: A printed circuit board includes signal layers, ground layers, and a power layer, which are superposed. A closed trace is set along edges of each of the signal layers and the power layers. A number of vias are defined in each trace at intervals. Each via extends through the signal layers, the ground layers, and the power layer. Each via is electrically connected to the traces of the signal layers and the power layer, and electrically connected to the ground layers.Type: ApplicationFiled: July 21, 2010Publication date: December 8, 2011Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTDInventor: ZE-LIANG XIE
-
Patent number: 7804606Abstract: A method for measuring a distance D2 between two points includes following steps. A first surface of a portable electronic device is parallel to a line defined by the two points. A distance D2 between the first surface and the line is obtained. A visible light beam B1 is rotated from an initial direction substantially perpendicular with the first surface and the line to direct at the point E1. A first angle defined by the visible light beam B1 striking the point E1 and the initial direction is computed. A visible light beam B2 is rotated from an initial direction to strike the point E2. A second angle defined by the visible light beam B2 striking the point E2 and the initial direction is computed. A distance D1 is computed based on the distance D2, the first angle and the second angle. The distance D1 is outputted.Type: GrantFiled: March 3, 2009Date of Patent: September 28, 2010Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.Inventors: Jing-Bo Yu, Liang Xie, Li-Yan Zheng, Guang-Yu Pei
-
Publication number: 20090265756Abstract: Techniques for managing and protecting computing environments are disclosed. A safe computing environment can be provided for ensuring the safety and/or management of a device. The safe computing environment can be secured by a safe component that isolates and protects it from unsafe computing environments which may also be operating. As a result, various security and management activities can be securely performed from a safe computing environment. A safe computing environment can, for example, be provided on a device as a safe virtual computing environment (e.g., a safe virtual machine) protected by a safe virtual computing monitor (e.g., a safe virtual machine monitor) from one or more other virtual computing environments that are not known or not believed to be safe for the device. It will also be appreciated that the safe components can, for example, be provided as trusted components for a device.Type: ApplicationFiled: April 18, 2008Publication date: October 22, 2009Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Xinwen Zhang, Liang Xie, Jean-Pierre Seifert, Onur Aciicmez, Afshin Latifi
-
Publication number: 20090228236Abstract: A method for measuring a distance D2 between two points includes following steps. A first surface of a portable electronic device is parallel to a line defined by the two points. A distance D2 between the first surface and the line is obtained. A visible light beam B1 is rotated from an initial direction substantially perpendicular with the first surface and the line to direct at the point E1. A first angle defined by the visible light beam B1 striking the point E1 and the initial direction is computed. A visible light beam B2 is rotated from an initial direction to strike the point E2. A second angle defined by the visible light beam B2 striking the point E2and the initial direction is computed. A distance D1 is computed based on the distance D2, the first angle and the second angle. The distance D1 is outputted.Type: ApplicationFiled: March 3, 2009Publication date: September 10, 2009Applicants: HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD, HON HAI PRECISION INDUSTRY CO., LTD.Inventors: JING-BO YU, LIANG XIE, LI-YAN ZHENG, GUANG-YU PEI
-
Publication number: 20090199296Abstract: Techniques for detecting unauthorized use (e.g., malicious attacks) of the computing systems (e.g., computing devices) are disclosed. Unauthorized use can be detected based on patterns of use (e.g., behavioral patterns of use typically associated with a human being) of the computing systems. Acceptable behavioral pattern data can be generated for a computing system by monitoring the use of a support system (e.g., an operating system, a virtual environment) operating on the computing system. For example, a plurality of system support provider components of a support system (e.g., system calls, device drivers) can be monitored in order to generate the acceptable behavioral pattern data in a form which effectively defines an acceptable pattern of use (usage pattern) for the monitored system support provider components, thereby allowing detection of unauthorized use of a computing system by detecting any deviation from the acceptable pattern of use of the monitored system support provider components.Type: ApplicationFiled: February 4, 2008Publication date: August 6, 2009Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Onur Aciicmez, Afshin Latifi
-
Publication number: 20090024502Abstract: An application method of On-line Charging System in Arrears Risk Control System: 1) The subsystem of OCS, Mediation, communicates with CC Client, receives a credit control request raised by the CC Client and processes with a fault-tolerant management. 2) The Credit Control analyses call request, identifies a type of service and request, selects necessary service transaction logic, and judges an authorized quota of the service, after receiving the quota, the Credit Control requests for real time forward modeling from the Rating. 3) After receiving a price of the service, the Credit Control requests real time inversion from the Rating and meanwhile transfers the price to the Rating. 4) The Rating requests account comparison from the Account after receiving the price. 5) The Account compares the price with a customer's account information to make decision of subsistence lock, if there is enough balance in the account, then the fee of the price will be deducted from the balance and then locked.Type: ApplicationFiled: March 25, 2008Publication date: January 22, 2009Applicant: NANJING LIANCHUANG SCIENCE & TECHNOLOGY INC., LTD.Inventors: LIANG XIE, ZHIQIANG SHAN