Patents by Inventor HongMei Ge
HongMei Ge has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11566632Abstract: A cooling fan and an electronic device are provided. The cooling fan comprises a plurality of blades disposed in a circumferential direction of a rotating shaft. The plurality of blades includes a first blade and a second blade. A windward surface of the first blade includes a first alignment part and a first offset part. The first alignment part is aligned with a windward surface of the second blade, and the first offset part and the windward surface of the second blade are arranged in a staggered manner.Type: GrantFiled: August 17, 2018Date of Patent: January 31, 2023Assignee: LENOVO (BEIJING) CO., LTD.Inventors: Zizhou Jia, Hongmei Ge
-
Publication number: 20190055958Abstract: A cooling fan and an electronic device are provided. The cooling fan comprises a plurality of blades disposed in a circumferential direction of a rotating shaft. The plurality of blades includes a first blade and a second blade. A windward surface of the first blade includes a first alignment part and a first offset part. The first alignment part is aligned with a windward surface of the second blade, and the first offset part and the windward surface of the second blade are arranged in a staggered manner.Type: ApplicationFiled: August 17, 2018Publication date: February 21, 2019Inventors: Zizhou JIA, Hongmei GE
-
Patent number: 9916136Abstract: Interfaces for a continuation-based runtime. Some embodiments described herein are directed to a framework using continuation based runtime interface that pertain to an infrastructure for enabling the creation of a wide variety of continuation-based programs that perform a wide-array of tasks. The infrastructure provides a foundation for building continuation-based, declarative applications of various scale and complexity.Type: GrantFiled: May 27, 2016Date of Patent: March 13, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Kenneth D. Wolf, Edmund Samuel Victor Pinto, Robert Brian Schmidt, Donald F. Box, Geoffrey M. Kizer, Nathan C. Talbert, Kavita Kamani, Alberto Arias Maestro, David Robert Cliffe, Tirunelveli R. Vishwanath, HongMei Ge, Stephen Jared Maine, Alexander Martin DeJarnatt
-
Publication number: 20160274869Abstract: Interfaces for a continuation-based runtime. Some embodiments described herein are directed to a framework using continuation based runtime interface that pertain to an infrastructure for enabling the creation of a wide variety of continuation-based programs that perform a wide-array of tasks. The infrastructure provides a foundation for building continuation-based, declarative applications of various scale and complexity.Type: ApplicationFiled: May 27, 2016Publication date: September 22, 2016Inventors: Kenneth D. Wolf, Edmund Samuel Victor Pinto, Robert Brian Schmidt, Donald F. Box, Geoffrey M. Kizer, Nathan C. Talbert, Kavita Kamani, Alberto Arias Maestro, David Robert Cliffe, Tirunelveli R. Vishwanath, HongMei Ge, Stephen Jared Maine, Alexander Martin DeJarnatt
-
Patent number: 9354847Abstract: Namespace for continuation-based runtime. Some embodiments described herein are directed to a framework using continuation based runtime namespaces that pertain to an infrastructure for enabling the creation of a wide variety of continuation-based programs that perform a wide-array of tasks. The infrastructure provides a foundation for building continuation-based, declarative applications of various scale and complexity. In some embodiments, the associated application programming interfaces (APIs) are factored into a hierarchy of namespaces in a manner that balances utility, usability, extensibility, and versionability.Type: GrantFiled: December 29, 2008Date of Patent: May 31, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Kenneth D. Wolf, Edmund Samuel Victor Pinto, Robert Brian Schmidt, Donald F. Box, Geoffrey M. Kizer, Nathan C. Talbert, Kavita Kamani, Alberto Arias Maestro, David Robert Cliffe, Tirunelveli R. Vishwanath, HongMei Ge, Stephen Jared Maine, Alexander Martin DeJarnatt
-
Patent number: 8918452Abstract: Embodiments allow developers to use HTTP message abstractions inline within their Web API methods to directly access and manipulate HTTP request and response messages. A hosting layer is provided for in-process, in-memory and network-based services. Message handlers and operational handlers may be combined to create a message channel for asynchronous manipulations of the HTTP requests and response. A formatter may be used on the server or client for consuming HTTP and providing desired media types.Type: GrantFiled: September 28, 2011Date of Patent: December 23, 2014Assignee: Microsoft CorporationInventors: Henrik Frystyk Nielsen, Glenn Block, Randall Tombaugh, Ronald A. Cain, HongMei Ge, Alexander Corradini
-
Publication number: 20130080505Abstract: Embodiments allow developers to use HTTP message abstractions inline within their Web API methods to directly access and manipulate HTTP request and response messages. A hosting layer is provided for in-process, in-memory and network-based services. Message handlers and operational handlers may be combined to create a message channel for asynchronous manipulations of the HTTP requests and response. A formatter may be used on the server or client for consuming HTTP and providing desired media types.Type: ApplicationFiled: September 28, 2011Publication date: March 28, 2013Applicant: MICROSOFT CORPORATIONInventors: Henrik Frystyk Nielsen, Glenn Block, Randall Tombaugh, Ronald A. Cain, HongMei Ge, Alexander Corradini
-
Publication number: 20100169862Abstract: Namespace for continuation-based runtime. Some embodiments described herein are directed to a framework using continuation based runtime namespaces that pertain to an infrastructure for enabling the creation of a wide variety of continuation-based programs that perform a wide-array of tasks. The infrastructure provides a foundation for building continuation-based, declarative applications of various scale and complexity. In some embodiments, the associated application programming interfaces (APIs) are factored into a hierarchy of namespaces in a manner that balances utility, usability, extensibility, and versionability.Type: ApplicationFiled: December 29, 2008Publication date: July 1, 2010Applicant: Microsoft CorporationInventors: Kenneth D. Wolf, Edmund Samuel Victor Pinto, Robert Brian Schmidt, Donald F. Box, Geoffrey M. Kizer, Nathan C. Talbert, Kavita Kamani, Alberto Arias Maestro, David Robert Cliffe, Tirunelveli R. Vishwanath, HongMei Ge, Stephen Jared Maine, Alexander Martin DeJarnatt
-
Patent number: 7657932Abstract: A message handling computing system that provides security across even transport-independent communication mechanisms, and which allows for convenient extension of security to different security token types, and may provide end-to-end security across different transport protocols. The message handling computing system includes a message handling component configured to send and receive network messages having security tokens. The message handling component interfaces with an expandable and contractible set of security token managers through a standardized application program interface. Each security manager is capable of providing security services for messages that correspond to security tokens of a particular type. A security token plug-in component registers new security token managers with the message handling component.Type: GrantFiled: July 14, 2004Date of Patent: February 2, 2010Assignee: Microsoft CorporationInventors: Keith W. Ballinger, HongMei Ge, Hervey O. Wilson, Vick B. Mukherjee
-
Patent number: 7533264Abstract: A sending computer system generates a message and creates one or more security tokens to encrypt portions of the message. The computer system includes in the message a markup language identifier for the one or more security tokens used for encryption, and includes identification of the value type used to create the tokens. The computer system then serializes at least the portion of the message that identifies the one or more security tokens, without serializing other portions of the message that aid relaying of the message to a receiving computer system. A receiving computer system deserializes at least the portion of the message that identifies the one or more security tokens, and then uses deserialized token data to decrypt encrypted portions of the message. Each created security token can be made with customized data and fields, and can be made with a customized value type.Type: GrantFiled: August 20, 2003Date of Patent: May 12, 2009Assignee: Microsoft CorporationInventors: Keith Ballinger, HongMei Ge, Hervey Oliver Wilson, Vick Bhaskar Mukherjee
-
Patent number: 7533265Abstract: The present invention provides for maintaining security context during a communication session between applications, without having to have executable code in either application for obtaining or generating a security context token (SCT) used to secure the communication. On a service side, a configuration file is provided that can be configured to indicate that automatic issuance of a SCT is enabled, thereby allowing a Web service engine to generate the SCT upon request. On the client side, when a message is sent from the client application to the service application, a policy engine accesses a policy that includes assertions indicating that a SCT is required for messages destined for the Web service application. As such, the policy engine requests and receives the SCT, which it uses to secure the message.Type: GrantFiled: July 14, 2004Date of Patent: May 12, 2009Assignee: Microsoft CorporationInventors: Keith W. Ballinger, HongMei Ge, Hervey O. Wilson, Vick B. Mukherjee
-
Patent number: 7434252Abstract: A mechanism for performing role-based authorization of the one or more services using security tokens associated with received service request messages. This role-based authentication is performed regardless of the type of security token associated with the received service request messages. Upon receiving a service request message over the network for a particular service offered by the service providing computing system, the service providing computing system accesses a security token associated with the received service request message. Then, the computing system identifies one or more roles that include the identity associated with the security token, and correlates the roles with the security token. These correlated roles are then used to authorize the requested service. This mechanism is performed regardless of the type of the security token.Type: GrantFiled: July 14, 2004Date of Patent: October 7, 2008Assignee: Microsoft CorporationInventors: Keith W. Ballinger, HongMei Ge, Hervey O. Wilson, Vick B. Mukherjee
-
Publication number: 20060015728Abstract: The present invention provides for maintaining security context during a communication session between applications, without having to have executable code in either application for obtaining or generating a security context token (SCT) used to secure the communication. On a service side, a configuration file is provided that can be configured to indicate that automatic issuance of a SCT is enabled, thereby allowing a Web service engine to generate the SCT upon request. On the client side, when a message is sent from the client application to the service application, a policy engine accesses a policy that includes assertions indicating that a SCT is required for messages destined for the Web service application. As such, the policy engine requests and receives the SCT, which it uses to secure the message.Type: ApplicationFiled: July 14, 2004Publication date: January 19, 2006Inventors: Keith Ballinger, HongMei Ge, Hervey Wilson, Vick Mukherjee
-
Publication number: 20060015933Abstract: A mechanism for performing role-based authorization of the one or more services using security tokens associated with received service request messages. This role-based authentication is performed regardless of the type of security token associated with the received service request messages. Upon receiving a service request message over the network for a particular service offered by the service providing computing system, the service providing computing system accesses a security token associated with the received service request message. Then, the computing system identifies one or more roles that include the identity associated with the security token, and correlates the roles with the security token. These correlated roles are then used to authorize the requested service. This mechanism is performed regardless of the type of the security token.Type: ApplicationFiled: July 14, 2004Publication date: January 19, 2006Inventors: Keith Ballinger, HongMei Ge, Hervey Wilson, Vick Mukherjee
-
Publication number: 20060015932Abstract: A message handling computing system that provides security across even transport-independent communication mechanisms, and which allows for convenient extension of security to different security token types, and may provide end-to-end security across different transport protocols. The message handling computing system includes a message handling component configured to send and receive network messages having security tokens. The message handling component interfaces with an expandable and contractible set of security token managers through a standardized application program interface. Each security manager is capable of providing security services for messages that correspond to security tokens of a particular type. A security token plug-in component registers new security token managers with the message handling component.Type: ApplicationFiled: July 14, 2004Publication date: January 19, 2006Inventors: Keith Ballinger, HongMei Ge, Hervey Wilson, Vick Mukherjee
-
Publication number: 20050053050Abstract: A sending computer system relays a message or a processing request through one or more configurable routers prior to the message or request reaching an ultimate destination. A client at the sending computer system can indicate a routing preference for the message or request, and a module can supplement or override the routing preference by adding or deleting a router from a router list contained within the message or request. This change can be done based on router data, as well as based on content within the message. One or more intermediate routers along the routing path can perform a similar function as the module. The ultimate destination, or receiving computer system, verifies that it is the appropriate recipient of the message or request, and then accepts the data associated with the message or request. This has application to many types of messaging systems, including simple object access protocols.Type: ApplicationFiled: August 20, 2003Publication date: March 10, 2005Inventors: Keith Ballinger, HongMei Ge, Hervey Wilson, Vick Mukherjee
-
Publication number: 20050044398Abstract: A sending computer system generates a message and creates one or more security tokens to encrypt portions of the message. The computer system includes in the message a markup language identifier for the one or more security tokens used for encryption, and includes identification of the value type used to create the tokens. The computer system then serializes at least the portion of the message that identifies the one or more security tokens, without serializing other portions of the message that aid relaying of the message to a receiving computer system. A receiving computer system deserializes at least the portion of the message that identifies the one or more security tokens, and then uses deserialized token data to decrypt encrypted portions of the message. Each created security token can be made with customized data and fields, and can be made with a customized value type.Type: ApplicationFiled: August 20, 2003Publication date: February 24, 2005Inventors: Keith Ballinger, HongMei Ge, Hervey Wilson, Vick Mukherjee
-
Publication number: 20040205216Abstract: A messaging transport writer is provided that efficiently packages a massage and multiple message attachment streams into a single transport stream, based on a specified encapsulation format. For example, a packaging writer is provided that takes the message and multiple attachments and streams them directly into the single transport stream, without first coping them into a buffer prior to encapsulation. The encapsulation information is streamed into the transport stream on the fly, i.e., as the message and attachment streams are also being written to the transport stream.Type: ApplicationFiled: March 19, 2003Publication date: October 14, 2004Inventors: Keith W. Ballinger, Chadwin J. Mumford, Hervey O. Wilson, HongMei Ge, Yann Erik Christensen