Patents by Inventor Zhenbin Xu

Zhenbin Xu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11957712
    Abstract: An application of a hydrogel in the preparation of products for the treatment of bacterial infection is disclosed. Ferrous ion was used in the antibacterial activity test of Staphylococcus aureus and showed a strong bactericidal effect, which the survival rate of Staphylococcus aureus is less than 0.001%, as well as the survival rate of methicillin-resistant Staphylococcus aureus (MRSA) was less than 0.01%. Ferrous ion hydrogel was used for the treatment of keratitis and skin wound infection. Ferrous ion hydrogel for the treatment of keratitis and skin wound infection, which can significantly reduce the risk of pulmonary MRSA infection, prevented the dissimilation of MRSA to the lung, and alleviated systemic inflammation in the body in a timely and effective manner, revealing the therapeutic potential of ferrous compounds for treatment of Staphylococcus aureus infections, including MRSA.
    Type: Grant
    Filed: April 19, 2023
    Date of Patent: April 16, 2024
    Assignee: SHAANXI UNIVERSITY OF SCIENCE & TECHNOLOGY
    Inventors: Liangbin Hu, Haizhen Mo, Xiaohui Zhou, Hongbo Li, Dan Xu, Zhenbin Liu, Zhen Wang
  • Patent number: 10762195
    Abstract: Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.
    Type: Grant
    Filed: June 9, 2018
    Date of Patent: September 1, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Helen J. Wang, Xiaofeng Fan, Collin Edward Jackson, Jonathan Ryan Howell, Zhenbin Xu
  • Publication number: 20180293375
    Abstract: Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.
    Type: Application
    Filed: June 9, 2018
    Publication date: October 11, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Helen J. Wang, Xiaofeng Fan, Collin Edward Jackson, Jonathan Ryan Howell, Zhenbin Xu
  • Patent number: 10019570
    Abstract: Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.
    Type: Grant
    Filed: June 14, 2007
    Date of Patent: July 10, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jiahe Helen Wang, Xiaofeng Fan, Collin Edward Jackson, Jonathan Ryan Howell, Zhenbin Xu
  • Patent number: 9825971
    Abstract: Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device.
    Type: Grant
    Filed: April 24, 2013
    Date of Patent: November 21, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Shuo Chen, Zhenbin Xu, Boxin Li
  • Publication number: 20160050218
    Abstract: Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device.
    Type: Application
    Filed: April 24, 2013
    Publication date: February 18, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Shuo Chen, Zhenbin Xu, Boxin Li
  • Patent number: 9178887
    Abstract: A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    Type: Grant
    Filed: May 6, 2013
    Date of Patent: November 3, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sunava Dutta, Zhenbin Xu
  • Patent number: 8887039
    Abstract: An identification of one of multiple types of Web browsers that a Web page supports, as well as an identification of one of multiple versions of that one type of Web browser that the Web page supports, is obtained. The Web page is displayed using the identified version of the identified Web browser type. A request for an identification of the identified version of the identified Web browser type can also be received from a program, such as a Web page script. In response to the request, an identification of the identified version of the identified Web browser type is being used to display the Web page is returned, and instructions of the program are executed based at least in part on the identified version of the identified Web browser type.
    Type: Grant
    Filed: January 2, 2008
    Date of Patent: November 11, 2014
    Assignee: Microsoft Corporation
    Inventors: Zhenbin Xu, Alex Mogilevsky, Markus W. Mielke
  • Publication number: 20130247227
    Abstract: A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    Type: Application
    Filed: May 6, 2013
    Publication date: September 19, 2013
    Applicant: Microsoft Corporation
    Inventors: Sunava Dutta, Zhenbin Xu
  • Patent number: 8438653
    Abstract: A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    Type: Grant
    Filed: April 10, 2007
    Date of Patent: May 7, 2013
    Assignee: Microsoft Corporation
    Inventors: Sunava Dutta, Zhenbin Xu
  • Patent number: 7917773
    Abstract: The present visibility-aware service reduces power-intensive activities when a window associated with the visibility-aware service is not visible. The window is not visible when the window is minimized or when the window is switched from a foreground position to a background position on a display.
    Type: Grant
    Filed: May 2, 2007
    Date of Patent: March 29, 2011
    Assignee: Microsoft Corporation
    Inventors: Zhenbin Xu, Peter A. Gurevich, Joseph S. Laughlin, Andrei Pascovici, David A. McCalib, Sandra G. Roberts
  • Patent number: 7783657
    Abstract: A search authoring tool for mapping queries to assets for use in an information retrieval system has a query-to-asset mappings database, a search authoring engine, and a search evaluation engine. The query-to-asset mappings database is built from search author input and user mappings. The search authoring engine is adapted to receive operator input and to generate one or more new query-to-asset mappings based on the received operator input. The search evaluation engine is adapted to compare the one or more new query-to-asset mappings to the existing mappings to determine if the one or more new query-to-asset mappings will cause performance degradation of the information retrieval system.
    Type: Grant
    Filed: June 3, 2005
    Date of Patent: August 24, 2010
    Assignee: Microsoft Corporation
    Inventors: Steven Fox, Zhenbin Xu, Zijian Zheng
  • Publication number: 20090172519
    Abstract: An identification of one of multiple types of Web browsers that a Web page supports, as well as an identification of one of multiple versions of that one type of Web browser that the Web page supports, is obtained. The Web page is displayed using the identified version of the identified Web browser type. A request for an identification of the identified version of the identified Web browser type can also be received from a program, such as a Web page script. In response to the request, an identification of the identified version of the identified Web browser type is being used to display the Web page is returned, and instructions of the program are executed based at least in part on the identified version of the identified Web browser type.
    Type: Application
    Filed: January 2, 2008
    Publication date: July 2, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Zhenbin Xu, Alex Mogilevsky, Markus W. Mielke
  • Publication number: 20090132713
    Abstract: An anonymous cross-domain data request message is sent to a target domain, the request message including a cross-domain data request header. A cross-domain response message is also received from the target domain if cross-domain data requests are supported by the computing device and if the data requested by the anonymous cross-domain data request message is available for cross-domain data requests. The cross-domain response message includes a cross-domain request allowed header as well as the data requested by the anonymous cross-domain data request message. The requested data can be thoroughly examined, without restriction, by a Web page initiating the request. The target domain is a different domain than the domain that includes a Web page that requested that the anonymous cross-domain data request message be sent.
    Type: Application
    Filed: November 20, 2007
    Publication date: May 21, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Sunava Dutta, Zhenbin Xu
  • Publication number: 20080313648
    Abstract: Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.
    Type: Application
    Filed: June 14, 2007
    Publication date: December 18, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Jiahe Helen Wang, Xiaofeng Fan, Collin Edward Jackson, Jonathan Ryan Howell, Zhenbin Xu
  • Publication number: 20080276248
    Abstract: The present visibility-aware service reduces power-intensive activities when a window associated with the visibility-aware service is not visible. The window is not visible when the window is minimized or when the window is switched from a foreground position to a background position on a display.
    Type: Application
    Filed: May 2, 2007
    Publication date: November 6, 2008
    Applicant: Microsoft Corporation
    Inventors: Zhenbin Xu, Peter A. Gurevich, Joseph S. Laughlin, Andrei Pascovici, David A. McCalib, Sandra G. Roberts
  • Publication number: 20080256601
    Abstract: A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    Type: Application
    Filed: April 10, 2007
    Publication date: October 16, 2008
    Applicant: Microsoft Corporation
    Inventors: Sunava Dutta, Zhenbin Xu
  • Patent number: 7386558
    Abstract: Methods for filtering a file written in Extensible Application Markup Language (XAML) and incrementally returning the logical content contained therein to the environment, e.g., a search engine, are provided. Additionally provided are methods for extracting logical content contained in a XAML file to facilitate searching and/or indexing thereof. The methods provided permit the filtering of files containing only flow-format elements, files containing only elements representing fixed-format pages, and/or files containing both flow-format and elements representing fixed-format pages.
    Type: Grant
    Filed: April 22, 2005
    Date of Patent: June 10, 2008
    Assignee: Microsoft Corporation
    Inventors: Jean-Marie H. Larcheveque, Andrey Shur, Young Gah Kim, David C. Brown, Mikhail V. Leonov, Robert A. Relyea, Zhenbin Xu, Jerry J. Dunietz
  • Publication number: 20060277190
    Abstract: A search authoring tool for mapping queries to assets for use in an information retrieval system has a query-to-asset mappings database, a search authoring engine, and a search evaluation engine. The query-to-asset mappings database is built from search author input and user mappings. The search authoring engine is adapted to receive operator input and to generate one or more new query-to-asset mappings based on the received operator input. The search evaluation engine is adapted to compare the one or more new query-to-asset mappings to the existing mappings to determine if the one or more new query-to-asset mappings will cause performance degradation of the information retrieval system.
    Type: Application
    Filed: June 3, 2005
    Publication date: December 7, 2006
    Applicant: Microsoft Corporation
    Inventors: Steven Fox, Zhenbin Xu, Zijian Zheng
  • Publication number: 20060242166
    Abstract: Methods for filtering a file written in Extensible Application Markup Language (XAML) and incrementally returning the logical content contained therein to the environment, e.g., a search engine, are provided. Additionally provided are methods for extracting logical content contained in a XAML file to facilitate searching and/or indexing thereof. The methods provided permit the filtering of files containing only flow-format elements, files containing only elements representing fixed-format pages, and/or files containing both flow-format and elements representing fixed-format pages.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Jean-Marie Larcheveque, Andrey Shur, Young Kim, David Brown, Mikhail Leonov, Robert Relyea, Zhenbin Xu, Jerry Dunietz