Patents by Inventor Lu Xiao

Lu Xiao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220026433
    Abstract: Provided herein are methods for multiplexed in situ analysis of biomolecules in a tissue. In particular, provided herein are methods for multiplexed single-cell in situ protein and nucleic acid profiling in fixed or fresh tissues, and also allows the investigation of the different cell compositions and their spatial organizations in intact tissues through consecutive cycles of probe hybridization, fluorescence imaging, and signal removal.
    Type: Application
    Filed: November 11, 2019
    Publication date: January 27, 2022
    Inventors: Jia GUO, Manas MONDAL, Renjie LIAO, Lu XIAO
  • Publication number: 20210398892
    Abstract: Provided are an adapter board and a method for forming the same, a packaging method, and a package structure. One form of a method for forming an adapter board includes: providing a base, including an interconnect region and a capacitor region, the base including a front surface and a rear surface that are opposite each other; etching the front surface of the base, to form a first trench in the base of the interconnect region and form a second trench in the base of the capacitor region; forming a capacitor in the second trench; etching a partial thickness of the base under the first trench, to form a conductive via; forming a via interconnect structure in the conductive via; and thinning the rear surface of the base, to expose the via interconnect structure.
    Type: Application
    Filed: January 22, 2021
    Publication date: December 23, 2021
    Applicant: Semiconductor Manufacturing North China (Beijing) Corporation
    Inventors: Cai Qiaoming, Yang Lie Yong, Chen Wei, Lu Xiao Yu
  • Publication number: 20210375182
    Abstract: Disclosed are display panel and display device. The display panel includes plurality of pixel repetitive units arranged in array. Each pixel repetitive unit includes two first sub-pixels, two second sub-pixels and four third sub-pixels, and light emitting colors of two first sub-pixels, two second sub-pixels and four third sub-pixels are different. For each pixel repetitive unit, centers of four third sub-pixels constitute first virtual square, one first sub-pixel located inside the first virtual square, and center of the first virtual square doesn't overlap center of one first sub-pixel located inside the first virtual square; and centers of two first sub-pixels and centers of two second sub-pixels constitute first virtual parallelogram, and one third sub-pixel located inside the first virtual parallelogram. The arrangement of the third sub-pixels can reduce display serrated sense of vertical line array and improve display effect of vertical line, thereby improving display effect of display panel.
    Type: Application
    Filed: August 12, 2021
    Publication date: December 2, 2021
    Applicant: WUHAN TIANMA MICRO-ELECTRONICS CO., LTD.
    Inventors: Wei HUANG, Lu Xiao, Qin Yue, Yangzhao Ma, Zhongjie Zhang
  • Patent number: 11149257
    Abstract: The present invention provides an ascorbate peroxidase mutant MaAPX1M36K and an application thereof, belonging to the technical field of biotechnology. An amino acid sequence of the mutant MaAPX1M36K of the present invention is shown in SEQ ID NO. 3. In the present invention, the mutant MaAPX1M36K reconstruction protein is obtained by the method of prokaryotic expression. It is found that the mutant MaAPX1M36K improves catalytic efficiency by nearly 5 times, providing a technical reference for further study and application of APX1.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: October 19, 2021
    Assignee: SOUTH CHINA BOTANICAL GARDEN, CHINESE ACADEMY OF SCIENCES
    Inventors: Xuewu Duan, Lu Xiao, Guoxiang Jiang, Yueming Jiang, Huiling Yan, Zhiwei Li, Jing Zeng, Xiaochun Ding
  • Publication number: 20200387405
    Abstract: A communication method includes monitoring, by a shared agent, shared memory, wherein the shared memory is used by a first application, wherein the first application runs on a virtual device, wherein the virtual device is located on a host, wherein the shared memory belongs to a part of memory of the host and does not belong to memory specified by the host for the virtual device, and wherein the shared agent is disposed on the host independent of the virtual device, determining, by the shared agent, whether data of the first application is written to the shared memory, reading, by the shared agent, the data from the shared memory and sending the data to a second application in response to the data of the first application is written to the shared memory, wherein the second application is a data sharing party specified by the first application.
    Type: Application
    Filed: August 21, 2020
    Publication date: December 10, 2020
    Inventors: Lu Xiao, Mingchang Wei
  • Publication number: 20200354691
    Abstract: The present invention provides an ascorbate peroxidase mutant MaAPX1M36K and an application thereof, belonging to the technical field of biotechnology. An amino acid sequence of the mutant MaAPX1M36K of the present invention is shown in SEQ ID NO. 3. In the present invention, the mutant MaAPX1M36K reconstruction protein is obtained by the method of prokaryotic expression. It is found that the mutant MaAPX1M36K improves catalytic efficiency by nearly 5 times, providing a technical reference for further study and application of APX1.
    Type: Application
    Filed: December 20, 2019
    Publication date: November 12, 2020
    Inventors: Xuewu DUAN, Lu XIAO, Guoxiang JIANG, Yueming JIANG, Huiling YAN, Zhiwei LI, Jing ZENG, Xiaochun DING
  • Patent number: 10367637
    Abstract: A method of implementing security in a modular exponentiation function for cryptographic operations is provided. A key is obtained as a parameter when the modular exponentiation function is invoked. The key may be one of either a public key or a private key of a cryptographic key pair. Within the modular exponentiation function, the method ascertains whether the key is greater than L bits long, where L is a positive integer. A countermeasure against an attack is implemented if the key is greater than L bits long. The countermeasure may include one or more techniques (e.g., hardware and/or software techniques) that inhibit or prevent information about the key from being ascertained through analysis. One or more exponentiation operations may then be performed using the key. The same modular exponentiation function may be used to perform encryption and decryption operations but with different keys.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: July 30, 2019
    Assignee: QUALCOMM Incorporated
    Inventors: Lu Xiao, Jing Deng, Justin Yongjin Kim
  • Patent number: 10204028
    Abstract: Errors in software may be detected via the use of design rule spaces and architecture root detection. Design rule spaces may reveal multiple overlapping modular structures of a software system, and reveal structural relations among error-prone files and structural problems contributing to error-proneness. Root detection may extract a few groups of architecturally connected files, which may be connected through problematic architecture relations that propagate errors among these files, and thus influence system error-proneness. The root detector may locate the core architecturally connected file groups that contribute to the error-proneness of a system. The root detection process may, beginning with a set of error-prone files, search and link other files that are architecturally related. The output of the root detection process may be a set of design rule spaces ordered by the number of error-prone contained therein.
    Type: Grant
    Filed: September 19, 2014
    Date of Patent: February 12, 2019
    Assignee: Drexel University
    Inventors: Yuanfang Cai, Lu Xiao
  • Publication number: 20180374024
    Abstract: Groups of architecturally connected files may incur and accumulate high maintenance costs as architectural debts. To quantify such debts, architectural debt, which is a term used herein, may be identified, quantified, measured, and modeled. A history coupling probability matrix for this purpose may search for architecture debts through the lens of 4 patterns of prototypical architectural flaws shown to correlate with reduced software quality. Further, a new architecture maintainability metric—Decoupling Level (DL)—measures how well the software can be decoupled into small and independently replaceable modules. The DL metric opens the possibility of quantitatively comparing maintainability between different projects, as well as monitoring architecture decay throughout software evolution.
    Type: Application
    Filed: June 22, 2017
    Publication date: December 27, 2018
    Applicants: Drexel University, University of Hawaii
    Inventors: Yuanfang CAI, Lu XIAO, Frederick KAZMAN, Ran MO
  • Patent number: 10091188
    Abstract: Systems and methods for providing accelerated passphrase verification are disclosed. In one embodiment, a method includes receiving a full security string, generating a full security string hash code, storing the full security string hash code in a memory, determining at least one substring based on an entropy value associated with one or more leading characters in the full security string, generating at least one substring hash code and at least one corresponding character count value, such that the corresponding character count value equals a number of characters in the at least one substring, and storing the at least one substring hash code and the at least one corresponding character count value in the memory.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: October 2, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Lu Xiao, Satyajit Patne
  • Publication number: 20180139789
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: October 2, 2014
    Publication date: May 17, 2018
    Inventors: Avneesh Agrawal, Chong Uk Lee, Kamran Moallemi, David Jonathan Julian, Manuel Eduardo Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
  • Publication number: 20180129826
    Abstract: Techniques for authenticating data on a computing device are provided. An example method according to these techniques includes generating a first cryptographic output by applying a first cryptographic algorithm to each block of a first subset of the plurality of blocks of data to be authenticated, combining a last block of the first cryptographic output with a second subset of the plurality of blocks of data to generate an intermediate result, and generating an authentication output by applying a second cryptographic algorithm to the intermediate result, the second cryptographic algorithm being different than the first cryptographic algorithm.
    Type: Application
    Filed: November 4, 2016
    Publication date: May 10, 2018
    Inventors: Justin Yongjin KIM, Lu XIAO, Shenghu LIU
  • Patent number: 9892269
    Abstract: Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager compliant application by tagging source code for the application with a data tag to indicate that a data element associated with the source code is a sensitive data element, accessing a policy file comprising transitive rules associated with the sensitive data element, and generating one or more object files for the application from the source code. These techniques also include storing a sensitive data element in a secure memory region managed by a secure asset manager, and managing the sensitive data element according to a policy associated with the sensitive data element by an application from which the sensitive data element originates, the policy defining transitive rules associated with the sensitive data element.
    Type: Grant
    Filed: June 11, 2015
    Date of Patent: February 13, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Michael J. T. Chan, Lu Xiao, Rosario Cammarota, Olivier Jean Benoit, Saurabh Sabnis, Yin Ling Liong, Manish Mohan
  • Publication number: 20180026782
    Abstract: A method of implementing security in a modular exponentiation function for cryptographic operations is provided. A key is obtained as a parameter when the modular exponentiation function is invoked. The key may be one of either a public key or a private key of a cryptographic key pair. Within the modular exponentiation function, the method ascertains whether the key is greater than L bits long, where L is a positive integer. A countermeasure against an attack is implemented if the key is greater than L bits long. The countermeasure may include one or more techniques (e.g., hardware and/or software techniques) that inhibit or prevent information about the key from being ascertained through analysis. One or more exponentiation operations may then be performed using the key. The same modular exponentiation function may be used to perform encryption and decryption operations but with different keys.
    Type: Application
    Filed: July 22, 2016
    Publication date: January 25, 2018
    Inventors: Lu Xiao, Jing Deng, Justin Yongjin Kim
  • Patent number: 9800407
    Abstract: One feature pertains to a method for generating a prime number by repeatedly generating a random number seed S having k bits, generating a random number R having n bits based on the seed S, where k is less than n, and determining whether the random number R is prime. The steps are repeated until it is determined that the random number R generated is prime, upon which the random number seed S used to generate the random number R is stored in a memory circuit. Later, the stored random number seed S may be retrieved from the memory circuit, and the prime number is regenerated based on the random number seed S. In one example, the random number R generated is further based on a secret key kS that may be stored in a secure memory circuit.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: October 24, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Bijan Ansari, Lu Xiao
  • Patent number: 9774614
    Abstract: A computing device may use machine learning techniques to determine whether a side channel attack is underway and perform obfuscation operations (e.g., operations to raise the noise floor) or other similar operations to stop or prevent a detected side channel attack. The computing device may determine that a side channel attack is underway in response to determining that the computing device is in airplane mode, that the battery of the computing device the battery has been replaced with a stable DC power supply, that the touch-screen display of the computing device has been disconnected, that there are continuous calls to a cipher application programming interface (API) using the same cipher key, that there has been tampering with a behavioral analysis engine of the computing device, or any combination thereof.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: September 26, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Satyajit Prabhakar Patne, Rajarshi Gupta, Lu Xiao
  • Publication number: 20170134390
    Abstract: Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager compliant application by tagging source code for the application with a data tag to indicate that a data element associated with the source code is a sensitive data element, accessing a policy file comprising transitive rules associated with the sensitive data element, and generating one or more object files for the application from the source code. These techniques also include storing a sensitive data element in a secure memory region managed by a secure asset manager, and managing the sensitive data element according to a policy associated with the sensitive data element by an application from which the sensitive data element originates, the policy defining transitive rules associated with the sensitive data element.
    Type: Application
    Filed: January 13, 2017
    Publication date: May 11, 2017
    Inventors: Michael J.T. CHAN, Lu XIAO, Rosario CAMMAROTA, Olivier Jean BENOIT, Saurabh SABNIS, Yin Ling LIONG, Manish MOHAN
  • Patent number: 9602276
    Abstract: One feature provides a method for a client node to establish a session key with a group node by obtaining an epoch identity value associated with a current epoch, wherein obtaining the epoch identity value includes one of computing the epoch identity value based on a node real time or negotiating the epoch identity value with the group node, computing a restricted key using a shared secret key, the epoch identity value, and a group node identity associated with the group node, and executing a session key establishment protocol with the group node to derive the session key using the restricted key as a master key in the session key establishment protocol. The session key may be established between the group node and the client node even though communications between the group node and the central node is only intermittently available during the current epoch.
    Type: Grant
    Filed: June 9, 2011
    Date of Patent: March 21, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: David M. Jacobson, Lu Xiao, David J. Julian, Zhanfeng Jia, Brian M. Buesker, Vito R. Bica, Edward H. Teague
  • Patent number: 9591470
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Grant
    Filed: October 30, 2014
    Date of Patent: March 7, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: David Jonathan Julian, Chong Uk Lee, Kamran Moallemi, Avneesh Agrawal, Manuel Eduardo Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
  • Publication number: 20160364573
    Abstract: Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager compliant application by tagging source code for the application with a data tag to indicate that a data element associated with the source code is a sensitive data element, accessing a policy file comprising transitive rules associated with the sensitive data element, and generating one or more object files for the application from the source code. These techniques also include storing a sensitive data element in a secure memory region managed by a secure asset manager, and managing the sensitive data element according to a policy associated with the sensitive data element by an application from which the sensitive data element originates, the policy defining transitive rules associated with the sensitive data element.
    Type: Application
    Filed: June 11, 2015
    Publication date: December 15, 2016
    Inventors: Michael J.T. CHAN, Lu XIAO, Rosario CAMMAROTA, Olivier Jean BENOIT, Saurabh SABNIS, Yin Ling LIONG, Manish MOHAN