Patents by Inventor Xiaoyang FU

Xiaoyang FU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11977334
    Abstract: A method for determining a wavefront parameter of a patterning process. The method includes obtaining a reference performance (e.g., a contour, EPE, CD) of a reference apparatus (e.g., a scanner), a lens model for a patterning apparatus configured to convert a wavefront parameter of a wavefront to actuator movement, and a lens fingerprint of a tuning apparatus (e.g., a to-be-matched scanner). Further, the method involves determining the wavefront parameter (e.g., a wavefront parameter such as tilt, offset, etc.) based on the lens fingerprint of the tuning apparatus, the lens model, and a cost function, wherein the cost function is a difference between the reference performance and a tuning apparatus performance.
    Type: Grant
    Filed: December 28, 2022
    Date of Patent: May 7, 2024
    Assignee: ASML NETHERLANDS B.V.
    Inventors: Duan-Fu Stephen Hsu, Christoph Rene Konrad Cebulla Hennerkes, Rafael C. Howell, Zhan Shi, Xiaoyang Jason Li, Frank Staals
  • Publication number: 20240146608
    Abstract: In implementations of the present disclosure, there is provided a method for access point (AP) validation. The method comprises detecting a trigger event for validating a network including a plurality of APs, and selecting a target AP from the plurality of APs based on a neighbor table of an AP associated with the detected trigger event. The method further comprises determining a validation case corresponding to the detected trigger event from a knowledge base. The method further comprises sending the validation case to the target AP, and, receiving a result of performance of the validation case from the target AP in response to the validation case being performed. Implementations of the present disclosure can validate whether the network change takes effect in the network automatically, and can improve the validation efficiency of the network changes.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: Junyu PEI, Xiaohang WEI, Xiaoyang FU, Kangchang HUANG
  • Publication number: 20240119212
    Abstract: Methods for configuring a patterning process based on results of another patterning process is described. The method includes obtaining a first set of contours by simulating a first patterning process using a design layout in a first orientation. The contours satisfy a design specification associated with the design layout and correspond to a first set of process window conditions. A second patterning process is configured based on a second orientation of the design layout, the first set of process window conditions and the first set of contours. The second patterning process is associated with one or more design variables (e.g., illumination, mask pattern) that affect a second set of contours. The configuring includes adjusting one or more design variables until the second set of contours are within a desired matching threshold with the first set of contours.
    Type: Application
    Filed: February 25, 2022
    Publication date: April 11, 2024
    Applicant: ASML NETHERLANDS B.V.
    Inventors: Jung Hoon SER, Sungwoon PARK, Xin LEI, Jinwoong JEONG, Rongkuo ZHAO, Duan-Fu Stephen HSU, Xiaoyang LI
  • Publication number: 20230388896
    Abstract: Systems and methods are provided for a computing system for managing a mesh network deployment that includes a memory storing machine-executable instructions, and a processor configured to access the memory and execute the machine executable instructions to receive, link performance measurements from a plurality of access points in a mesh network, and determining a topology of the mesh network by: determining a first node competition index (NCI) for each interfering access point of the plurality of access points in the mesh network; comparing the NCI for each interfering access point to determine a maximum transmission time for each mesh link; and altering the network topology by assigning an active or backup mesh link to each access point based on the maximum transmission time for each mesh link.
    Type: Application
    Filed: May 31, 2022
    Publication date: November 30, 2023
    Inventors: XIONG ZHANG, Xiaoyang Fu, Kangchang Huang
  • Patent number: 11805571
    Abstract: In embodiments of the present disclosure, a method is provided for managing a mesh point. A request is transmitted from a mesh point to a mesh portal, and the request indicates that Reduced Neighbor Report (RNR) information is required. A beacon with the RNR information is received from the mesh portal. A mesh link is established with a target mesh portal based on the beacon with the RNR information. Therefore, the time cost and the data communication of a scanning procedure of the mesh point may be greatly reduced. Further, communications in the scanning procedure are lowered, such that conflicts in the air may be alleviated.
    Type: Grant
    Filed: April 29, 2021
    Date of Patent: October 31, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Xiaoyang Fu, Xuguang Jia, Qiang Zhou
  • Patent number: 11750375
    Abstract: Disclosed are an encryption and decryption method and device based on bit permutation and bit transformation. The method includes: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file and a key file; changing a bit value of an initial key stream according to a bit operation rule, so as to obtain a bit-transformed key stream, changing a bit value of a plaintext according to the bit operation rule depending on the key stream; on the basis of a bit-transformed plaintext stream, according to a bit permutation rule depending on the key stream, performing a bit permutation operation on the bit-transformed plaintext stream, and randomly distributing the plaintext stream in a ciphertext stream, so as to obtain a target ciphertext and store the same as a file.
    Type: Grant
    Filed: April 19, 2019
    Date of Patent: September 5, 2023
    Assignees: Zhuhai College of Science And Technology, Jilin University
    Inventors: Yujuan Si, Guanghui Feng, Liuqi Lang, Xiaoyang Fu, Hao Wu
  • Publication number: 20230125405
    Abstract: Implementations of the present disclosure relate to automatic AP failure recovery with assistance of a neighbor AP. A method includes detecting, by a first access point (AP), a failure at the first AP. The method further includes transmitting, by the first AP to a second AP, a query about an operating status of the second AP. The first AP then receives, from the second AP, a response to the query, the response indicating the operating status of the second AP. The method also includes determining, by the first AP and based at least in part on the operating status of the second AP, that the failure is not indicative of an event also impacting the second AP. The method further includes utilizing, by the first AP, the second AP to assist with recovery from the failure.
    Type: Application
    Filed: October 6, 2021
    Publication date: April 27, 2023
    Inventors: Junyu PEI, Xiaohang WEI, Pengfei JIN, Xiaoyang FU, Kangchang HUANG
  • Publication number: 20220353953
    Abstract: In embodiments of the present disclosure, a method is provided for managing a mesh point. A request is transmitted from a mesh point to a mesh portal, and the request indicates that Reduced Neighbor Report (RNR) information is required. A beacon with the RNR information is received from the mesh portal. A mesh link is established with a target mesh portal based on the beacon with the RNR information. Therefore, the time cost and the data communication of a scanning procedure of the mesh point may be greatly reduced. Further, communications in the scanning procedure are lowered, such that conflicts in the air may be alleviated.
    Type: Application
    Filed: April 29, 2021
    Publication date: November 3, 2022
    Inventors: Xiaoyang FU, Xuguang JIA, Qiang ZHOU
  • Patent number: 11405275
    Abstract: An example device comprising: a processor to determine whether an uplink of the network device in a mesh network is operational, to determine whether a host is reachable through the uplink in response to the uplink being operational, and to periodically determine a mesh network role of the network device based on the determination of whether the host is reachable through the uplink.
    Type: Grant
    Filed: March 18, 2019
    Date of Patent: August 2, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Kangchang Huang, Xiaoyang Fu, Xuefu Wang
  • Publication number: 20220225231
    Abstract: In embodiments of the present disclosure, there is provided an approach for power saving in a mesh network. According to embodiments of the present disclosure, a mesh portal transmits, to a mesh point in a sleep mode, a packet for waking up the mesh point during a predetermined time period. The mesh point in the sleep mode detects the packet during the predetermined time period. In accordance with a determination that the mesh point is waked up, the mesh portal establishes a mesh link with the mesh point. Embodiments of the present disclosure provide an effective way for power saving in a mesh network.
    Type: Application
    Filed: January 11, 2021
    Publication date: July 14, 2022
    Inventors: Junyu PEI, Xuguang JIA, Xiaoyang FU
  • Publication number: 20220150054
    Abstract: Disclosed are an encryption and decryption method and device based on bit permutation and bit transformation. The method includes: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file and a key file; changing a bit value of an initial key stream according to a bit operation rule, so as to obtain a bit-transformed key stream, changing a bit value of a plaintext according to the bit operation rule depending on the key stream; on the basis of a bit-transformed plaintext stream, according to a bit permutation rule depending on the key stream, performing a bit permutation operation on the bit-transformed plaintext stream, and randomly distributing the plaintext stream in a ciphertext stream, so as to obtain a target ciphertext and store the same as a file.
    Type: Application
    Filed: April 19, 2019
    Publication date: May 12, 2022
    Applicants: Zhuhai College of Science And Technology, Jilin University
    Inventors: Yujuan Si, Guanghui Feng, Liuqi Lang, Xiaoyang Fu, Hao Wu
  • Publication number: 20220109566
    Abstract: Disclosed are an encryption and decryption method and device based on a random hash and bit operation. The method includes the steps of: S1: configuring a memory space, and preparing corresponding storage spaces for a plaintext file, a ciphertext file, and a key file, wherein the key file comes from an existing coding sequence and serves as a shared file for encryption and decryption; S2: providing a reversible hash function set used for encryption and decryption, and then uniformly scattering the plaintext in a known binary random hash by an encryption hash function; and S3: introducing a bit operation rule set, changing values of all or partial binary bits of the binary random hash by a bit operation, and mapping the values to a ciphertext space. The device includes a memory and a processor, and is configured to implement the above method.
    Type: Application
    Filed: April 19, 2019
    Publication date: April 7, 2022
    Applicants: Jilin University, Zhuhai College of Science And Technology
    Inventors: Yujuan SI, Guanghui FENG, Liuqi LANG, Xiaoyang FU, Hao WU
  • Publication number: 20190334772
    Abstract: An example device comprising: a processor to determine whether an uplink of the network device in a mesh network is operational, to determine whether a host is reachable through the uplink in response to the uplink being operational, and to periodically determine a mesh network role of the network device based on the determination of whether the host is reachable through the uplink.
    Type: Application
    Filed: March 18, 2019
    Publication date: October 31, 2019
    Inventors: Kangchang HUANG, Xiaoyang FU, Xuefu WANG