Patents by Inventor Victor Liang
Victor Liang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240154087Abstract: Provided herein is a method of producing cathode materials. The method can include heating precursors in a first vessel to a first temperature to form heated precursors. The first temperature can be below a melting point of a solid including a compound formed from the precursors. The method can include transferring the heated precursors from the first vessel to a second vessel. The method can include heating the heated precursors to a second temperature to form a liquid. The second temperature can be at or above the melting point of the solid including the compound formed from the precursors.Type: ApplicationFiled: October 24, 2023Publication date: May 9, 2024Applicant: Rivian IP Holdings, LLCInventors: Majid Talebiesfandarani, Guoxian Liang, Victor Ken Prajapati
-
Patent number: 11973225Abstract: Described are embodiments of a lithium metal phosphate production methods and systems. The systems and methods can include combining lithium extraction from spodumene, lithium recycling from lithium ion battery (“LIB”) black mass, and/or lithium metal phosphate synthesis from metal phosphates.Type: GrantFiled: October 4, 2022Date of Patent: April 30, 2024Assignee: Rivian IP Holdings, LLCInventors: Guoxian Liang, Majid Talebiesfandarani, Cary Michael Hayner, Ki Tae Park, Victor Prajapati
-
Publication number: 20240126120Abstract: A display may have a pixel array such as a liquid crystal pixel array. The pixel array may be illuminated with backlight illumination from a direct-lit backlight unit. The backlight unit may include an array of light-emitting diodes (LEDs) on a printed circuit board. The display may have a notch to accommodate an input-output component. Reflective layers may be included in the notch. The backlight may include a color conversion layer with a property that varies as a function of position. The light-emitting diodes may be covered by a slab of encapsulant with recesses in an upper surface.Type: ApplicationFiled: December 8, 2023Publication date: April 18, 2024Inventors: Meizi Jiao, Joshua A. Spechler, Jie Xiang, Zhenyue Luo, Chungjae Lee, Morteza Amoorezaei, Mengyang Liang, Xinyu Zhu, Mingxia Gu, Jun Qi, Eric L. Benson, Victor H. Yin, Youchul Jeong, Xiang Fang, Yanming Li, Michael J. Lee, Marianna C. Sbordone, Ari P. Miller, Edward J. Cooper, Michael C. Sulkis, Francesco Ferretti, Seth G. McFarland, Mary M. Morrison, Eric N. Vergo, Terence Chan, Ian A. Guy, Keith J. Hendren, Sunitha Chandra
-
Publication number: 20240113295Abstract: Described are embodiments of a lithium metal phosphate production methods and systems. The systems and methods can include combining lithium extraction from spodumene, lithium recycling from lithium ion battery (“LIB”) black mass, and/or lithium metal phosphate synthesis from metal phosphates.Type: ApplicationFiled: October 4, 2022Publication date: April 4, 2024Inventors: Guoxian LIANG, Majid TALEBIESFANDARANI, Cary Michael HAYNER, Ki Tae PARK, Victor PRAJAPATI
-
Patent number: 11918132Abstract: Apparatuses and methods for a self-deploying tree are disclosed. In an exemplary embodiment, a self-deploying tree system comprises a top tree assembly, a main tree assembly, and a base. The lower end of the top tree assembly may be coupled to the upper end of the main tree assembly, and the lower end of the main tree assembly may be coupled to the base, providing a vertical orientation of the self-deploying tree system. The self-deploying tree system further comprises a deployment mechanism which may be activated to automatically convert the tree from a collapsed configuration to a deployed configuration or from a deployed configuration to a collapsed configuration. The collapsed configuration comprises a reduced height and a reduced circumference to allow for ease of handling and storage. The deployed configuration provides for the tree to be extended to a desired height and for deployment of the limbs as desired for display.Type: GrantFiled: December 29, 2020Date of Patent: March 5, 2024Assignee: Polygroup Macau Limited (BVI)Inventors: Victor Hugo Ocegueda Gallaga, Bailin Liang, Jason Loomis
-
Patent number: 11108830Abstract: In some aspects, the disclosure is directed to methods and systems for providing coordinative security among network devices across multi-level networks. Shared cryptographic secrets among the network devices are used as the basis for mutual security authentication and peering among these devices. The cryptographic secrets can be embedded in the SoC devices for these devices or dynamically generated based on unique identification information and attributes of these SoC devices. The messages for authentication and peering can be communicated directly among the network devices or indirectly via a cloud security portal entity that acts as a messaging proxy. The mutual authentication and peering process can be carried out coordinately among the network devices and a cloud security portal in a one-to-one mesh relationship, or in a transitive layering relationship, where each network entity authenticates and peers with its direct subordinates in a multi-level network.Type: GrantFiled: July 30, 2018Date of Patent: August 31, 2021Assignee: Avago Technologies International Sales Pte. LimitedInventors: Yong Li, Xuemin Chen, Weimin Zhang, Victor Liang, Binfan Liu
-
Publication number: 20190289038Abstract: In some aspects, the disclosure is directed to methods and systems for providing coordinative security among network devices across multi-level networks. Shared cryptographic secrets among the network devices are used as the basis for mutual security authentication and peering among these devices. The cryptographic secrets can be embedded in the SoC devices for these devices or dynamically generated based on unique identification information and attributes of these SoC devices. The messages for authentication and peering can be communicated directly among the network devices or indirectly via a cloud security portal entity that acts as a messaging proxy. The mutual authentication and peering process can be carried out coordinately among the network devices and a cloud security portal in a one-to-one mesh relationship, or in a transitive layering relationship, where each network entity authenticates and peers with its direct subordinates in a multi-level network.Type: ApplicationFiled: July 30, 2018Publication date: September 19, 2019Applicant: Avago Technologies General IP (Singapore) Pte. .Ltd.Inventors: Yong LI, Xuemin CHEN, Weimin ZHANG, Victor LIANG, Binfan LIU
-
Patent number: 9225999Abstract: Aspects of a virtualized security processor are described herein. In various embodiments, one or more virtual security modules may be instantiated at a port interface between a security module and a processing environment of a host device. In one embodiment, a virtual security module is instantiated for each service of the host device. Each virtual security module is configured for at least one command supported by the security module for an associated service of the host device. After being configured, a virtual security module may receive a security command request from an associated service and, before submitting the security command request to the security module, verify and prioritize the security command request. In certain aspects, the use of virtual security modules assists the host device to interface multiple services with the security module, while prioritizing tasks for and offloading certain tasks from the security module.Type: GrantFiled: February 21, 2013Date of Patent: December 29, 2015Assignee: BROADCOM CORPORATIONInventor: Victor Liang
-
Publication number: 20140230073Abstract: Aspects of a virtualized security processor are described herein. In various embodiments, one or more virtual security modules may be instantiated at a port interface between a security module and a processing environment of a host device. In one embodiment, a virtual security module is instantiated for each service of the host device. Each virtual security module is configured for at least one command supported by the security module for an associated service of the host device. After being configured, a virtual security module may receive a security command request from an associated service and, before submitting the security command request to the security module, verify and prioritize the security command request. In certain aspects, the use of virtual security modules assists the host device to interface multiple services with the security module, while prioritizing tasks for and offloading certain tasks from the security module.Type: ApplicationFiled: February 21, 2013Publication date: August 14, 2014Applicant: BROADCOM CORPORATIONInventor: Victor Liang
-
Patent number: 8724809Abstract: A method and system for tuning to a scrambled television channel is provided. One implementation involves receiving a channel selection from a user, tuning to the selected scrambled channel, checking a cache for Conditional Access (CA) descrambling information associated with the selected channel, and in case of a cache hit, then retrieving the descrambling information associated with the selected channel from the cache for descrambling the scrambled channel.Type: GrantFiled: August 12, 2008Date of Patent: May 13, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Fei Xie, Victor Liang, Kitae Nahm, Juan Carlos Trujillo
-
Patent number: 8089966Abstract: System and method for filtering a data packet using a combined filter are disclosed. In one aspect, the method includes receiving a data packet and N filters. The method includes receiving a data packet and N (wherein N is an integer and N>1) filters, each filter comprising a bit mask and corresponding bit values. The method further includes, for each of the N filters, identifying a key element from a portion of the filter corresponding to a combined filter, the key element being a segment of the filter portion having the richest bit pattern. The method further includes generating the combined filter by combining the key element of the N filters. The method further includes filtering the data packet with the combined filter to determine whether there is a match between the data packet and each key element.Type: GrantFiled: April 22, 2009Date of Patent: January 3, 2012Assignee: Samsung Electronics Co., Ltd.Inventors: Victor Liang, Ashish Singhal, Fei Xie, David Ho Suk Chung
-
Patent number: 8064457Abstract: System and method for filtering a data packet using a combined filter are disclosed. In one aspect, the method includes receiving a data packet and N filters each comprising a mask and value. The method includes receiving a data packet and N (wherein N is an integer and N>1) filters, each filter comprising a bit mask and corresponding bit values. The method further includes generating a common filter mask and the corresponding bit values by taking the overlapping mask bits among portions of the N filters corresponding to the common filter, the common filter being of a length smaller than each filter. The method further includes applying the common filter mask to the data packet to determine whether there is a match between the filtered data packet and each of the N filters.Type: GrantFiled: April 22, 2009Date of Patent: November 22, 2011Assignee: Samsung Electronics Co., Ltd.Inventors: Victor Liang, Shiang-feng Lee, David Ho Suk Chung
-
Publication number: 20100272120Abstract: System and method for filtering a data packet using a combined filter are disclosed. In one aspect, the method includes receiving a data packet and N filters each comprising a mask and value. The method includes receiving a data packet and N (wherein N is an integer and N>1) filters, each filter comprising a bit mask and corresponding bit values. The method further includes generating a common filter mask and the corresponding bit values by taking the overlapping mask bits among portions of the N filters corresponding to the common filter, the common filter being of a length smaller than each filter. The method further includes applying the common filter mask to the data packet to determine whether there is a match between the filtered data packet and each of the N filters.Type: ApplicationFiled: April 22, 2009Publication date: October 28, 2010Applicant: Samsung Electronics Co., Ltd.Inventors: Victor Liang, Shiang-feng Lee, David Ho Suk Chung
-
Publication number: 20100272119Abstract: System and method for filtering a data packet using a combined filter are disclosed. In one aspect, the method includes receiving a data packet and N filters. The method includes receiving a data packet and N (wherein N is an integer and N>1) filters, each filter comprising a bit mask and corresponding bit values. The method further includes, for each of the N filters, identifying a key element from a portion of the filter corresponding to a combined filter, the key element being a segment of the filter portion having the. richest bit pattern. The method further includes generating the combined filter by combining the key element of the N filters. The method further includes filtering the data packet with the combined filter to determine whether there is a match between the data packet and each key element.Type: ApplicationFiled: April 22, 2009Publication date: October 28, 2010Applicant: Samsung Electronics Co., Ltd.Inventors: Victor Liang, Ashish Singhal, Fei Xie, David Ho Suk Chung
-
Patent number: 7808990Abstract: A method and system for filtering data packets, is provided. One implementation involves filtering data packets using a set of filters, each filter having a bit mask and corresponding bit values, by categorizing the filters into different groups based on their bit mask value differences, and generating a new mask of bits having corresponding bit values, applying the new mask to the incoming packet to select a filter category for the incoming packet, and filtering the incoming packet by applying the group of filters for the selected category to the incoming packet.Type: GrantFiled: July 25, 2008Date of Patent: October 5, 2010Assignee: Samsung Electronics Co., Ltd.Inventors: Shiangfeng Lee, Victor Liang, Fei Xie
-
Publication number: 20100040229Abstract: A method and system for tuning to a scrambled television channel is provided. One implementation involves receiving a channel selection from a user, tuning to the selected scrambled channel, checking a cache for Conditional Access (CA) descrambling information associated with the selected channel, and in case of a cache hit, then retrieving the descrambling information associated with the selected channel from the cache for descrambling the scrambled channel.Type: ApplicationFiled: August 12, 2008Publication date: February 18, 2010Applicant: Samsung Electronics Co., Ltd.Inventors: Fei Xie, Victor Liang, Kitae Nahm, Juan Carlos Trujillo
-
Publication number: 20100020799Abstract: A method and system for filtering data packets, is provided. One implementation involves filtering data packets using a set of filters, each filter having a bit mask and corresponding bit values, by categorizing the filters into different groups based on their bit mask value differences, and generating a new mask of bits having corresponding bit values, applying the new mask to the incoming packet to select a filter category for the incoming packet, and filtering the incoming packet by applying the group of filters for the selected category to the incoming packet.Type: ApplicationFiled: July 25, 2008Publication date: January 28, 2010Applicant: Samsung Electronics Co., Ltd.Inventors: Shiangfeng Lee, Victor Liang, Fei Xie
-
Publication number: 20070181973Abstract: A capacitor structure including a plurality of conductive layers, a dielectric layer and a plurality of contacts is disclosed. The conductive layers are stacked, and each conductive layer has a first conductive pattern and a second conductive pattern. The dielectric layer is disposed between the first conductive pattern and the second conductive pattern and between two adjacent conductive layers. The contacts are disposed in the dielectric layer, and electrically connected to the first conductive patterns in two adjacent conductive layers and electrically connected to the second conductive patterns in two adjacent conductive layers. Wherein, the contact electrically connecting to the first conductive patterns in two adjacent conducive layers is a first strip contact, which extends between the first conductive patterns in two adjacent conductive layers, and the boundary of the first strip contact is located within the boundary of the first conductive pattern.Type: ApplicationFiled: February 6, 2006Publication date: August 9, 2007Inventors: Cheng-Chou Hung, Victor Liang, Hua-Chou Tseng, Chih-Yu Tseng
-
Publication number: 20070098210Abstract: A correlation-based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the underlying compression algorithm is required. Per each compressed media frame, a current unique digital signature is generated based on the data from the current compressed frame plus the digital signature that has been previously generated. The signature thus generated is then used in conjunction with the next compressed frame to generate the next unique digital signature. All digital signatures are correlated according to the above process until a “reset” signal is issued. A new chain of correlated digital signatures is produced by the system with a pre-determined initial signature.Type: ApplicationFiled: October 28, 2005Publication date: May 3, 2007Applicant: GLOBAL ePOINT, Inc.Inventors: Shien-Tai Pan, Victor Liang, Yi Li, Bing Wang, Maurice Chow, Hoai Le, Richard Thai
-
Publication number: 20070098212Abstract: A two level cross-correlation based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the underlying compression algorithm is required. Per each compressed media frame, a current unique digital signature is generated based on the data from the current compressed frame plus the digital signature that has been previously generated. The signature thus generated is then used in conjunction with the next compressed frame to generate the next unique digital signature. All digital signatures are correlated according to the above process until a “reset” signal is issued. A new chain of correlated digital signatures is produced by the system with a pre-determined initial signature.Type: ApplicationFiled: October 28, 2005Publication date: May 3, 2007Applicant: GLOBAL ePOINT, Inc.Inventors: Shien-Tai Pan, Bing Wang, Hoai Le, Yi Li, Victor Liang, Maurice Chow, Richard Thai