Patents by Inventor Hongbo Zhu

Hongbo Zhu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180095060
    Abstract: The present disclosure provides a method for conducting comprehensive chromatography analysis. Broadly, the method comprises separating a sample in a first chromatographic column to generate a primary stream, which is directed toward a non-modulator switching system comprising at least one micro-switch and at least one valve. The non-modulator switching system is continuously operated to: (a) selectively direct a portion of the primary stream to one of a plurality of thermal injectors and accumulating the portion of the primary stream for a predetermined amount of time; (b) inject the portion of the primary stream into one of a plurality of secondary chromatographic columns; (c) detect one or more analytes in a secondary stream exiting the secondary chromatographic column; and repeat (a)-(c) to selectively direct other portions of the primary stream to other thermal injectors and secondary chromatographic columns until all of the analytes in the sample are detected.
    Type: Application
    Filed: October 4, 2017
    Publication date: April 5, 2018
    Inventors: Xudong Fan, Jiwon Lee, Menglian Zhou, Hongbo Zhu, Katsuo Kurabayashi
  • Publication number: 20180059058
    Abstract: A discharge ionization current detector for ionizing and detecting a sample component where the sample component is ionized by UV light is provided. The detector includes a UV light source, and a microfluidic channel having a first surface including a conducting or semiconducting material and an opposing second surface including a conducting or semiconducting material, one of the first surface and the second surface being a collection electrode and the other of the first surface and the second surface being a bias electrode, the microfluidic channel being configured to receive a sample component. The microfluidic channel is in fluid communication with the UV light source such that, when activated, UV light from the UV light source can enter the microfluidic channel and ionize the sample component, which releases an electron, and the ionized sample component and electron are detected by the collection and bias electrodes.
    Type: Application
    Filed: August 24, 2017
    Publication date: March 1, 2018
    Applicant: THE REGENTS OF THE UNIVERSITY OF MICHIGAN
    Inventors: Xudong FAN, Hongbo ZHU, Katsuo KURABAYASHI
  • Patent number: 8510432
    Abstract: In a method and system for aggregating event information, events are received at a first plurality of nodes in a distributed system. For the events received at each node aggregated attribute information is determined in accordance with two or more rules and stored in distinct first tables, each table storing aggregated attribute information for a respective rule of the two or more rules. At each node of the first plurality of nodes, the two or more distinct first tables are transmitted to a respective node of a second set of nodes in the distributed system. At each node of the second set of nodes, two or more distinct second tables are generated by merging the aggregated attribute information in the tables transmitted to the node. Each rule of the two or more rules is evaluating using the aggregated attribute information obtained from a corresponding table of the second tables.
    Type: Grant
    Filed: June 24, 2010
    Date of Patent: August 13, 2013
    Assignee: Accelops, Inc.
    Inventors: Partha Bhattacharya, Sheng Chen, Hongbo Zhu
  • Patent number: 8347357
    Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode. Results of operations associated with security components may be transferred to other processors communicatively coupled to the security processor.
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: January 1, 2013
    Assignee: Broadcom Corporation
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
  • Patent number: 8150862
    Abstract: In a method and system for collecting event information, XML documents specifying event parsing logic for respective groups of related events are loaded. Representations for the parsing logic contained in the plurality of XML documents are stored in one or more parsing trees. Events are received, including events in a plurality of groups of events. The received events are processed in accordance with the event parsing logic in the one or more parsing trees. The received events are also processed in accordance with stored program instructions that are independent of the parsing logic for the plurality of groups of events. Event information for the received events is stored. The stored event information includes information determined in accordance with the event parsing logic in at least one or more parsing trees.
    Type: Grant
    Filed: March 11, 2010
    Date of Patent: April 3, 2012
    Assignee: Accelops, Inc.
    Inventors: Partha Bhattacharya, Sheng Chen, Hongbo Zhu
  • Publication number: 20110072490
    Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode. Results of operations associated with security components may be transferred to other processors communicatively coupled to the security processor.
    Type: Application
    Filed: November 30, 2010
    Publication date: March 24, 2011
    Applicant: BROADCOM CORPORATION
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
  • Publication number: 20100332652
    Abstract: In a method and system for aggregating event information, events are received at a first plurality of nodes in a distributed system. For the events received at each node aggregated attribute information is determined in accordance with two or more rules and stored in distinct first tables, each table storing aggregated attribute information for a respective rule of the two or more rules. At each node of the first plurality of nodes, the two or more distinct first tables are transmitted to a respective node of a second set of nodes in the distributed system. At each node of the second set of nodes, two or more distinct second tables are generated by merging the aggregated attribute information in the tables transmitted to the node. Each rule of the two or more rules is evaluating using the aggregated attribute information obtained from a corresponding table of the second tables.
    Type: Application
    Filed: June 24, 2010
    Publication date: December 30, 2010
    Inventors: Partha Bhattacharya, Sheng Chen, Hongbo Zhu
  • Patent number: 7844996
    Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode.
    Type: Grant
    Filed: May 23, 2005
    Date of Patent: November 30, 2010
    Assignee: Broadcom Corporation
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
  • Publication number: 20100235368
    Abstract: In a method and system for collecting event information, XML documents specifying event parsing logic for respective groups of related events are loaded. Representations for the parsing logic contained in the plurality of XML documents are stored in one or more parsing trees. Events are received, including events in a plurality of groups of events. The received events are processed in accordance with the event parsing logic in the one or more parsing trees. The received events are also processed in accordance with stored program instructions that are independent of the parsing logic for the plurality of groups of events. Event information for the received events is stored. The stored event information includes information determined in accordance with the event parsing logic in at least one or more parsing trees.
    Type: Application
    Filed: March 11, 2010
    Publication date: September 16, 2010
    Inventors: Partha Bhattacharya, Sheng Chen, Hongbo Zhu
  • Patent number: 7788216
    Abstract: Method and system for retrieving advertisement information. Information characterizing a user's past search behavior is utilized in creating index data that associate individual users to advertisements. When a search request from a user is received, the index data are utilized to identify one or more advertisements with respect to the received user's search request. Such identified advertisements match the user's past search behavior.
    Type: Grant
    Filed: July 12, 2007
    Date of Patent: August 31, 2010
    Assignee: Baidu.com, Inc.
    Inventors: Yanhong Li, Hongbo Zhu, Jianguo Liu, Dan Guo, Limin Zhou, Zhan Wang, ZiZheng Liu, Jie Yuan, Chuang Wang, Wenkai Yang
  • Publication number: 20080172422
    Abstract: Method and system for retrieving advertisement information. Information characterizing a user's past search behavior is utilized in creating index data that associate individual users to advertisements. When a search request from a user is received, the index data are utilized to identify one or more advertisements with respect to the received user's search request. Such identified advertisements match the user's past search behavior.
    Type: Application
    Filed: July 12, 2007
    Publication date: July 17, 2008
    Inventors: Yanhong Li, Hongbo Zhu, JianGuo Liu, Dan Guo, Limin Zhou, Zhan Wang, ZiZheng Liu, Jie Yuan, Chuang Wang, Wenkai Yang
  • Publication number: 20060265734
    Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode.
    Type: Application
    Filed: May 23, 2005
    Publication date: November 23, 2006
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye