Patents by Inventor Dai Li
Dai Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240249768Abstract: The present application relates to a method for generating a random sample of an arbitrary distribution. The method includes precomputing a cumulative distribution table (CDT) of the distribution; storing the CDT in an array of range matching content-addressable memory (CAM) cells; inputting data through a search line (SL); comparing the input data against stored data in the CDT using the array of range matching CAM cells; when the input data match the stored data, turning on all pass gates that are controlled by logic gates and shorting a match line (ML) from MSB to LSB; and determining the range matching result on the ML and outputting data points corresponding to an index of the matched row in CDT, when the input data do not match the stored data, determining an interval of stored data that the input data falls into, and outputting the data points corresponding to the interval.Type: ApplicationFiled: May 31, 2022Publication date: July 25, 2024Applicant: William Marsh Rice UniversityInventors: Kaiyuan Yang, Dai Li
-
Patent number: 11995303Abstract: In accordance with one disclosed method, a determination may be made that a user has provided a first input to a client device to begin taking an action with respect to an application presented in a first window of an operating system while the first window is an active window of the operating system. It may then be determined that a second window has become the active window of the operating system, and that the user has not provided a second input to the client device to complete the action with respect to the application. Based at least in part on the second window having become the active window and the user not having provided the second input, the client device may be caused to present a notification indicative of the action being incomplete.Type: GrantFiled: January 4, 2022Date of Patent: May 28, 2024Assignee: Citrix Systems, Inc.Inventors: Qiming Li, Dai Li, Zhenxing Liu
-
Patent number: 11994686Abstract: A computing device includes an image sensor, an IMU, a display, and a processor coupled to the image sensor, the IMU, and the display. The processor is configured to generate a GUI current screen on the display. The GUI current screen includes a background, and foreground GUI elements overlaying the background. The processor is configured to when the IMU generates motion data indicative of movement, render the background to comprise a video image from the image sensor.Type: GrantFiled: January 5, 2022Date of Patent: May 28, 2024Assignee: Citrix Systems, Inc.Inventors: Qiming Li, Dai Li, Zhenxing Liu
-
Patent number: 11748513Abstract: Systems and methods described herein provide for management of notifications. A server may receive proximity information indicative of a distance between the client device and a user of the client device, and idle state information of the client device. The server may determine a notification protection level using the proximity information and the idle state information. The server may receive a notification from the at least one notification source. The notification is for rendering on a screen of the client device. The notification manager may manage delivery of the received notification, according to the determined notification protection level.Type: GrantFiled: November 8, 2021Date of Patent: September 5, 2023Inventors: Xiaolu Chu, Dai Li
-
Publication number: 20230195294Abstract: In accordance with one disclosed method, a determination may be made that a user has provided a first input to a client device to begin taking an action with respect to an application presented in a first window of an operating system while the first window is an active window of the operating system. It may then be determined that a second window has become the active window of the operating system, and that the user has not provided a second input to the client device to complete the action with respect to the application. Based at least in part on the second window having become the active window and the user not having provided the second input, the client device may be caused to present a notification indicative of the action being incomplete.Type: ApplicationFiled: January 4, 2022Publication date: June 22, 2023Inventors: Qiming Li, Dai Li, Zhenxing Liu
-
Publication number: 20230161168Abstract: A computing device includes an image sensor, an IMU, a display, and a processor coupled to the image sensor, the IMU, and the display. The processor is configured to generate a GUI current screen on the display. The GUI current screen includes a background, and foreground GUI elements overlaying the background. The processor is configured to when the IMU generates motion data indicative of movement, render the background to comprise a video image from the image sensor.Type: ApplicationFiled: January 5, 2022Publication date: May 25, 2023Inventors: QIMING LI, DAI LI, ZHENXING LIU
-
Publication number: 20230116273Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, determining whether a user interface element having focus is a secure input and, responsive to a determination that the user interface element is a secure input, preventing the focus from changing away from the user interface element. The method also includes, by the computing device, responsive to a determination that the user interface element is a secure input, allowing the focus to change away from the user interface element in response to a determination that an input to the user interface element is complete. The method may further include, by the computing device, responsive to a determination that the user interface element is not a secure input, allowing the focus to be moved to another user interface element.Type: ApplicationFiled: November 18, 2021Publication date: April 13, 2023Inventors: Qiming Li, Dai Li, Zhenxing Liu
-
Patent number: 11381577Abstract: A technique utilizes a security heat map associated with a geographic region. The technique involves receiving, by a server, current heat scores for one or more endpoint devices located within the geographic region. The technique further involves providing, by the server, for areas within the geographic region, respective aggregate heat scores based on the current heat scores for the one or more endpoint devices. The technique further involves, based on the respective aggregate heat scores for the areas within the geographic region, generating, by the server, a security heat map defining one or more security zones within the geographic region. The technique further involves imposing, by the server, security policies on the one or more endpoint devices based on the security heat map.Type: GrantFiled: March 29, 2019Date of Patent: July 5, 2022Assignee: Citrix Systems, Inc.Inventors: Xiaolu Chu, Jiandong Hong, Dai Li
-
Patent number: 11307910Abstract: Systems and methods described herein provide for management of notifications. A computing device in communication with a client device receives a notification from at least one notification source. The notification may be for rendering on a screen at the client device. A policy engine of the computing device may identify a context of the notification. The policy engine may add a tag to the notification according to the identified context to control rendering of the notification at the client device. The computing device may transmit the notification with the tag to a notification service at the client device. The notification service may be configured to manage the notification at the client device in accordance with the tag.Type: GrantFiled: June 10, 2019Date of Patent: April 19, 2022Assignee: Citrix Systems, Inc.Inventors: Xiaolu Chu, Dai Li
-
Patent number: 11284242Abstract: Systems and methods for providing privacy protection with regard to location data of an electronic device. The methods comprise: receiving a request to access the location data of the electronic device; determining a privacy protection level associated with the electronic device based on condition related information of the electronic device; blocking access to the location data of the electronic device by the software application based on the privacy protection level; modifying the location data to generate remapped location data of the electronic device based on the privacy protection level associated with the electronic device; and providing the remapped location data to the software application so as to operate the software application without using the location data of electronic device.Type: GrantFiled: March 12, 2020Date of Patent: March 22, 2022Assignee: CITRIX SYSTEMS, INC.Inventors: Xiaolu Chu, Dai Li
-
Patent number: 11272368Abstract: A technique controls access to a set of protected resources. The technique involves receiving a location signal which identifies a current geolocation of an endpoint device. The technique further involves, based on the current geolocation identified by the location signal, generating a heat map corresponding to a geographic region that includes the current geolocation of the endpoint device, the heat map defining one or more security zones within the geographic region. The technique further involves, selecting a particular security level from multiple security levels based on a security zone of the heat map associated with the current geolocation of the endpoint device, and communicating the selected security level to the endpoint device. The selected security level is associated with security requirements to be satisfied by the endpoint device in order for the endpoint device to access the set of protected resources.Type: GrantFiled: July 29, 2019Date of Patent: March 8, 2022Assignee: Citrix Systems, Inc.Inventors: Xiaolu Chu, Jiandong Hong, Dai Li
-
Publication number: 20220067197Abstract: Systems and methods described herein provide for management of notifications. A server may receive proximity information indicative of a distance between the client device and a user of the client device, and idle state information of the client device. The server may determine a notification protection level using the proximity information and the idle state information. The server may receive a notification from the at least one notification source. The notification is for rendering on a screen of the client device. The notification manager may manage delivery of the received notification, according to the determined notification protection level.Type: ApplicationFiled: November 8, 2021Publication date: March 3, 2022Applicant: Citrix Systems, Inc.Inventors: Xiaolu CHU, Dai LI
-
Patent number: 11170126Abstract: Systems and methods described herein provide for management of notifications. A server may receive proximity information indicative of a distance between the client device and a user of the client device, and idle state information of the client device. The server may determine a notification protection level using the proximity information and the idle state information. The server may receive a notification from the at least one notification source. The notification is for rendering on a screen of the client device. The notification manager may manage delivery of the received notification, according to the determined notification protection level.Type: GrantFiled: January 3, 2019Date of Patent: November 9, 2021Assignee: CITRIX SYSTEMS, INC.Inventors: Xiaolu Chu, Dai Li
-
Publication number: 20210328999Abstract: A technique utilizes a security heat map associated with a geographic region. The technique involves receiving, by a server, current heat scores for one or more endpoint devices located within the geographic region. The technique further involves providing, by the server, for areas within the geographic region, respective aggregate heat scores based on the current heat scores for the one or more endpoint devices. The technique further involves, based on the respective aggregate heat scores for the areas within the geographic region, generating, by the server, a security heat map defining one or more security zones within the geographic region. The technique further involves imposing, by the server, security policies on the one or more endpoint devices based on the security heat map.Type: ApplicationFiled: March 29, 2019Publication date: October 21, 2021Inventors: Xiaolu Chu, Jiandong Hong, Dai Li
-
Publication number: 20200387411Abstract: Systems and methods described herein provide for management of notifications. A computing device in communication with a client device receives a notification from at least one notification source. The notification may be for rendering on a screen at the client device. A policy engine of the computing device may identify a context of the notification. The policy engine may add a tag to the notification according to the identified context to control rendering of the notification at the client device. The computing device may transmit the notification with the tag to a notification service at the client device. The notification service may be configured to manage the notification at the client device in accordance with the tag.Type: ApplicationFiled: June 10, 2019Publication date: December 10, 2020Inventors: Xiaolu Chu, Dai Li
-
Patent number: 10812995Abstract: Methods and systems are described herein for optimized selection of wireless communications networks when multiple wireless communications networks are available to or for selection by a wireless communications device. A wireless communications device may select an optimal network on a per-application and/or per-transmission basis based on one or more policies defined and managed by the device and/or based on dynamic selection of a wireless network based on one or more probed network characteristics (e.g., latency, cost of traffic, data security, etc.). When a state of the device satisfies conditions specified by the policies managed and enforced on the device (e.g., in an enterprise mobility management system), then the wireless network may be selected as defined by the applicable policy. However, when the state of the device does not match an existing policy, then wireless network selection may be based on the dynamic probing of the various networks to determine a preferred wireless network.Type: GrantFiled: February 27, 2019Date of Patent: October 20, 2020Assignee: Citrix Systems, Inc.Inventors: Xiaolu Chu, Dai Li
-
Publication number: 20200314650Abstract: A technique controls access to a set of protected resources. The technique involves receiving a location signal which identifies a current geolocation of an endpoint device. The technique further involves, based on the current geolocation identified by the location signal, generating a heat map corresponding to a geographic region that includes the current geolocation of the endpoint device, the heat map defining one or more security zones within the geographic region. The technique further involves, selecting a particular security level from multiple security levels based on a security zone of the heat map associated with the current geolocation of the endpoint device, and communicating the selected security level to the endpoint device. The selected security level is associated with security requirements to be satisfied by the endpoint device in order for the endpoint device to access the set of protected resources.Type: ApplicationFiled: July 29, 2019Publication date: October 1, 2020Inventors: Xiaolu Chu, Jiandong Hong, Dai Li
-
Publication number: 20200245160Abstract: Methods and systems are described herein for optimized selection of wireless communications networks when multiple wireless communications networks are available to or for selection by a wireless communications device. A wireless communications device may select an optimal network on a per-application and/or per-transmission basis based on one or more policies defined and managed by the device and/or based on dynamic selection of a wireless network based on one or more probed network characteristics (e.g., latency, cost of traffic, data security, etc.). When a state of the device satisfies conditions specified by the policies managed and enforced on the device (e.g., in an enterprise mobility management system), then the wireless network may be selected as defined by the applicable policy. However, when the state of the device does not match an existing policy, then wireless network selection may be based on the dynamic probing of the various networks to determine a preferred wireless network.Type: ApplicationFiled: February 27, 2019Publication date: July 30, 2020Inventors: Xiaolu Chu, Dai Li
-
Publication number: 20200218824Abstract: Systems and methods described herein provide for management of notifications. A server may receive proximity information indicative of a distance between the client device and a user of the client device, and idle state information of the client device. The server may determine a notification protection level using the proximity information and the idle state information. The server may receive a notification from the at least one notification source. The notification is for rendering on a screen of the client device. The notification manager may manage delivery of the received notification, according to the determined notification protection level.Type: ApplicationFiled: January 3, 2019Publication date: July 9, 2020Inventors: Xiaolu CHU, Dai LI
-
Publication number: 20200213832Abstract: Systems and methods for providing privacy protection with regard to location data of an electronic device. The methods comprise: receiving a request to access the location data of the electronic device; determining a privacy protection level associated with the electronic device based on condition related information of the electronic device; blocking access to the location data of the electronic device by the software application based on the privacy protection level; modifying the location data to generate remapped location data of the electronic device based on the privacy protection level associated with the electronic device; and providing the remapped location data to the software application so as to operate the software application without using the location data of electronic device.Type: ApplicationFiled: March 12, 2020Publication date: July 2, 2020Inventors: Xiaolu Chu, Dai Li