Patents by Inventor Lu Xiao

Lu Xiao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9509707
    Abstract: A computing device may use machine learning techniques to determine the level, degree, and severity of its vulnerability to side channel attacks. The computing device may intelligently and selectively perform obfuscation operations (e.g., operations to raise the noise floor) to prevent side channel attacks based on the determined level, degree, or severity of its current vulnerability to such attacks. The computing device may also monitor the current level of natural obfuscation produced by the device, determining whether there is sufficient natural obfuscation to prevent a side channel attack during an ongoing critical activity, and perform the obfuscation operation during the ongoing critical activity and in response to determining that there is not sufficient natural obfuscation to adequately protect the computing device against side channel attacks.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: November 29, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Satyajit Prabhakar Patne, Rajarshi Gupta, Lu Xiao
  • Patent number: 9510383
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Grant
    Filed: October 2, 2014
    Date of Patent: November 29, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Avneesh Agrawal, Chong Uk Lee, Kamran Moallemi, David Jonathan Julian, Manuel Eduardo Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
  • Publication number: 20160295416
    Abstract: Disclosed is a method for performing a message integrity check. In the method, a processor reads a message from a storage device. The message comprises a plurality of first level sections. The processor determines one or more second level sections from the plurality of first level sections. Each second level section comprises a fixed number of first level sections. A crypto engine calculates a hash value for each second level section to generate a respective calculated hash value, and a hash value for each first level section not included in a second level section to generate a respective calculated hash value. The processor compares each of the respective calculated hash values with a corresponding stored hash value. The processor provides an integrity check indication if each respective calculated hash value is equal to the corresponding stored hash value.
    Type: Application
    Filed: April 2, 2015
    Publication date: October 6, 2016
    Inventors: Lu Xiao, Suresh Bollapragada
  • Publication number: 20160294802
    Abstract: Systems and methods for providing accelerated passphrase verification are disclosed. In one embodiment, a method includes receiving a full security string, generating a full security string hash code, storing the full security string hash code in a memory, determining at least one substring based on an entropy value associated with one or more leading characters in the full security string, generating at least one substring hash code and at least one corresponding character count value, such that the corresponding character count value equals a number of characters in the at least one substring, and storing the at least one substring hash code and the at least one corresponding character count value in the memory.
    Type: Application
    Filed: March 30, 2015
    Publication date: October 6, 2016
    Inventors: Lu XIAO, Satyajit PATNE
  • Publication number: 20160203071
    Abstract: Errors in software may be detected via the use of design rule spaces and architecture root detection. Design rule spaces may reveal multiple overlapping modular structures of a software system, and reveal structural relations among error-prone files and structural problems contributing to error-proneness. Root detection may extract a few groups of architecturally connected files, which may be connected through problematic architecture relations that propagate errors among these files, and thus influence system error-proneness. The root detector may locate the core architecturally connected file groups that contribute to the error-proneness of a system. The root detection process may, beginning with a set of error-prone files, search and link other files that are architecturally related. The output of the root detection process may be a set of design rule spaces ordered by the number of error-prone contained therein.
    Type: Application
    Filed: September 19, 2014
    Publication date: July 14, 2016
    Inventors: Yuanfang CAI, Lu XIAO
  • Patent number: 9344438
    Abstract: A multi-party commitment method is provided whereby a joining node uses contributions provided by contributor nodes in a peer-to-peer overlay network to generate a node identifier. The joining node generates a first contribution and sends a join request to an introducer node (or a plurality of contributor nodes), where the join request seeks to obtain one or more contributions for generating the node identifier within an identifier space of the overlay network. A hash of the first contribution may be included as part of the join request. In response, the joining node may receive a plurality of contributions, wherein the contributions are bound to each other and the first contribution by a prior external multi-node commitment operation. The joining node can then generate its node identifier as a function of the first contribution and the received contributions. Consequently, collusion between nodes and malicious manipulation during ID generation can be frustrated.
    Type: Grant
    Filed: December 22, 2008
    Date of Patent: May 17, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Lu Xiao, Vidya Narayanan, Edward Thomas Lingham Hardie, Ranjith S. Jayaram, Ramachandran Subramanian, Lakshminath Reddy Dondeti
  • Patent number: 9336160
    Abstract: A block cipher is provided that secures data by encrypting it based on the memory address where it is to be stored. When encrypting data for storage in the memory address, the memory address is encrypted in a first plurality of block cipher rounds. Data round keys are generated using information from the first plurality of block cipher rounds. Data to be stored is combined with the encrypted memory address and encrypted in a second plurality of block cipher rounds using the data round keys. The encrypted data is then stored in the memory location. When decrypting data, the memory address is again encrypted as before while the encrypted stored data is decrypted in a second plurality of the block cipher rounds using the data round keys to obtain a partially decrypted data. The partially decrypted data is combined with the encrypted memory address to obtain fully decrypted data.
    Type: Grant
    Filed: October 30, 2008
    Date of Patent: May 10, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Philip Michael Hawkes, Lu Xiao, Gregory Gordon Rose, Steve Millendorf
  • Publication number: 20150373036
    Abstract: A computing device may use machine learning techniques to determine whether a side channel attack is underway and perform obfuscation operations (e.g., operations to raise the noise floor) or other similar operations to stop or prevent a detected side channel attack. The computing device may determine that a side channel attack is underway in response to determining that the computing device is in airplane mode, that the battery of the computing device the battery has been replaced with a stable DC power supply, that the touch-screen display of the computing device has been disconnected, that there are continuous calls to a cipher application programming interface (API) using the same cipher key, that there has been tampering with a behavioral analysis engine of the computing device, or any combination thereof.
    Type: Application
    Filed: June 24, 2014
    Publication date: December 24, 2015
    Inventors: Satyajit Prabhakar Patne, Rajarshi Gupta, Lu Xiao
  • Publication number: 20150373035
    Abstract: A computing device may use machine learning techniques to determine the level, degree, and severity of its vulnerability to side channel attacks. The computing device may intelligently and selectively perform obfuscation operations (e.g., operations to raise the noise floor) to prevent side channel attacks based on the determined level, degree, or severity of its current vulnerability to such attacks. The computing device may also monitor the current level of natural obfuscation produced by the device, determining whether there is sufficient natural obfuscation to prevent a side channel attack during an ongoing critical activity, and perform the obfuscation operation during the ongoing critical activity and in response to determining that there is not sufficient natural obfuscation to adequately protect the computing device against side channel attacks.
    Type: Application
    Filed: June 24, 2014
    Publication date: December 24, 2015
    Inventors: Satyajit Prabhakar Patne, Rajarshi Gupta, Lu Xiao
  • Patent number: 9215581
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Grant
    Filed: March 27, 2007
    Date of Patent: December 15, 2015
    Assignee: QUALCOMM Incorported
    Inventors: David Jonathan Julian, Chong U. Lee, Kamran Moallemi, Avneesh Agrawal, Manuel E. Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
  • Patent number: 9182943
    Abstract: One feature pertains to a method that reduces the computational delay associated with generating prime numbers. The method includes generating a first random number having a plurality of bits. A first primality test is then executed on the first random number. Then, it is determined whether the first random number generated fails or passes the first primality test. If the first random number fails the primality test then a portion but not all of the plurality of bits of the first random number are replaced with an equal number of randomly generated bits to generate a second random number. Next, a primality test is again executed on the second random number. This process is repeated until a prime number is detected.
    Type: Grant
    Filed: March 8, 2013
    Date of Patent: November 10, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Lu Xiao, Bijan Ansari
  • Patent number: 9104854
    Abstract: Disclosed is a method for visual verification a Captcha's source. In the method, a Captcha is served to a user. The Captcha includes visual information related to a characteristic of a source of the Captcha and related to a puzzle question of the Captcha. The visual information is for visual verification by the user of the Captcha's source. A response is received from the user based on the served Captcha. A determination is made as to whether the received response is a solution of the puzzle question of the served Captcha.
    Type: Grant
    Filed: August 17, 2011
    Date of Patent: August 11, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Lu Xiao, Alexander Gantman
  • Publication number: 20150163658
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: October 30, 2014
    Publication date: June 11, 2015
    Inventors: David Jonathan Julian, Chong Uk Lee, Kamran Moallemi, Avneesh Agrawal, Manuel Eduardo Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
  • Patent number: 9042549
    Abstract: Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag.
    Type: Grant
    Filed: March 30, 2009
    Date of Patent: May 26, 2015
    Assignee: Qualcomm Incorporated
    Inventors: Lu Xiao, Yong Jin Kim, Zhanfeng Jia, David Jonathan Julian
  • Patent number: 9036301
    Abstract: A slider includes a substrate having a trailing edge, a leading edge opposite the trailing edge, and an air bearing surface connecting the trailing edge with the leading edge; a read/write transducer formed at the trailing edge; and a coat layer attached on the trailing edge and covering on the read/write transducer. The slider further includes a protection layer for shielding the read/write transducer thereby preventing the read/write transducer from damaging during a laser soldering process. The present invention can prevent the read/write transducer from damaging during the laser bonding process and, in turn improve the reading and writing performance of the slider. The invention also discloses an HGA and a disk drive unit.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: May 19, 2015
    Assignee: SAE Magnetics (H.K.) Ltd.
    Inventors: Shen kuang sidney Chou, Chi hung Yuen, Yan bin Wang, Li ping Peng, Lu Xiao
  • Patent number: 9030456
    Abstract: A liquid crystal display of a charge sharing mode comprises a control device for turning on the gates on the gate line in the black frame insertion timing. Each gate line of the liquid crystal display panel is connected with the control device. In the black insertion timing, the control device outputs to the gate line connected thereto a first control signal for controlling the gates on the gate line to be turned on, and the black frame insertion timing is a time when charge sharing is conducted among data lines from the gates on the gate line are turned off in the current frame until they are turned on in the next frame.
    Type: Grant
    Filed: January 9, 2012
    Date of Patent: May 12, 2015
    Assignee: Beijing Boe Optoelectronics Technology Co., Ltd.
    Inventors: Lu Xiao, Zhe Shi
  • Patent number: 9015487
    Abstract: Disclosed is a method for virtual pairing of a first peer device with a second peer device. In the method, a nonce is generated at the first peer device for use in virtually pairing the first and second peer devices to establish a first-type wireless connection. The nonce is forwarded from the first peer device to the second peer device over an already established second-type wireless connection between the first and second peer devices. At least one new key is generated from the nonce and a shared key for the already established second-type wireless connection. The first peer device is virtually paired with the second peer device using the at least one new key to establish the first-type wireless connection between the first and second peer devices.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: April 21, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Lu Xiao, Gregory Gordon Rose, David Jonathan Julian
  • Publication number: 20150063565
    Abstract: One feature pertains to a method for generating a prime number by repeatedly generating a random number seed S having k bits, generating a random number R having n bits based on the seed S, where k is less than n, and determining whether the random number R is prime. The steps are repeated until it is determined that the random number R generated is prime, upon which the random number seed S used to generate the random number R is stored in a memory circuit. Later, the stored random number seed S may be retrieved from the memory circuit, and the prime number is regenerated based on the random number seed S. In one example, the random number R generated is further based on a secret key kS that may be stored in a secure memory circuit.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Applicant: QUALCOMM Incorporated
    Inventors: Bijan Ansari, Lu Xiao
  • Publication number: 20150024689
    Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.
    Type: Application
    Filed: October 2, 2014
    Publication date: January 22, 2015
    Inventors: Avneesh Agrawal, Chong Uk Lee, Kamran Moallemi, David Jonathan Julian, Manuel Eduardo Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
  • Publication number: 20150015990
    Abstract: A head stack assembly includes at least one head gimbal assembly and a flexible printed circuit assembly. A flexure tail of the head gimbal assembly includes a row of first bonding pads, a first dual stage actuator pad and a first dummy pad arranged at two sides of said row of first bonding pads, and the first dual stage actuator pad and the first dummy pad are connected together via a jumping lead. The flexible printed circuit assembly includes at least one row of second bonding pads, at least one second dual stage actuator pad and at least one second dummy pad arranged for connecting with the row of first bonding pads, the first dual stage actuator pad and the first dummy pad respectively. The connection way between the head gimbal assembly and the flexible printed circuit assembly is simple, thereby less cross talk is generated on the preamplifier.
    Type: Application
    Filed: September 10, 2013
    Publication date: January 15, 2015
    Applicant: SAE Magnetics (H.K.) Ltd.
    Inventors: Sidney Shen Kuang Chou, Jackie Ka Yip Wong, Shu Deng, Xin Zhong, Lu Xiao