Patents by Inventor Jiang Zhang

Jiang Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8457358
    Abstract: Improvements are provided to effectively assess a user's face and head pose such that a computer or like device can track the user's attention towards a display device(s). Then the region of the display or graphical user interface that the user is turned towards can be automatically selected without requiring the user to provide further inputs. A frontal face detector is applied to detect the user's frontal face and then key facial points such as left/right eye center, left/right mouth corner, nose tip, etc., are detected by component detectors. The system then tracks the user's head by an image tracker and determines yaw, tilt and roll angle and other pose information of the user's head through a coarse to fine process according to key facial points and/or confidence outputs by pose estimator.
    Type: Grant
    Filed: February 16, 2012
    Date of Patent: June 4, 2013
    Assignee: Microsoft Corporation
    Inventors: Yuxiao Hu, Hong-Jiang Zhang, Mingjing Li, Lei Zhang
  • Patent number: 8438621
    Abstract: A method, device and system for securely managing debugging processes within a communication device, such as a set top box or other multimedia processing device. For example, a security processor (SP) within the communication device manages the lifetime (LT) of any access token issued for use in activating debugging privileges within the communication device. The security processor authenticates an issued access token and securely delivers appropriate debug authorization information to the device controller. The security processor uses its secure, internal timer to count down the lifetime and update the remaining lifetime of the issued access token during the processing of each command by the security processor. In addition to securely managing the issuance of the access token and it's remaining lifetime, the updating process reduces any impact on the normal communications within the device. The method overcomes the issue of the communication device not having a secure internal clock.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: May 7, 2013
    Assignee: General Instrument Corporation
    Inventors: Jiang Zhang, Peter Chen, Bill Franks, Alexander Medvinsky
  • Patent number: 8422802
    Abstract: Techniques for construction of a visual codebook are described herein. Feature points may be extracted from large numbers of images. In one example, images providing N feature points may be used to construct a codebook of K words. The centers of each of K clusters of feature points may be initialized. In a looping or iterative manner, an assignment step assigns each feature point to a cluster and an update step locates a center of each cluster. The feature points may be assigned to a cluster based on a lesser of a distance to a center of a previously assigned cluster and a distance to a center derived by operation of an approximate nearest neighbor algorithm having aspects of randomization. The loop terminates when the feature points have sufficiently converged to their respective clusters. Centers of the clusters represent visual words, which may be used to construct the visual codebook.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: April 16, 2013
    Assignee: Microsoft Corporation
    Inventors: Linjun Yang, Darui Li, Xian-Sheng Hua, Hong-Jiang Zhang
  • Publication number: 20130091353
    Abstract: A method and apparatus are for transferring a client device certificate and an associated encrypted client private key to a client device from a secure device. The secure device receives over a secure connection, a secure device certificate, a secure device private key and a plurality of client device certificates. Each client certificate is associated with a bootstrap public key but is not assigned to any particular client device. A plurality of encrypted client private keys is also received. Each of the encrypted client private keys comprises a client private key associated with one of the client device certificates encrypted with the bootstrap public key. The plurality of client device certificates is stored. The encrypted client private keys are stored in double encrypted protected form. A client device certificate and an associated encrypted client private key are transferred to a client device that has successfully registered with the secure device.
    Type: Application
    Filed: August 1, 2012
    Publication date: April 11, 2013
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Jiang Zhang, Alexander Medvinsky, Kwan Chen, Paul Moroney, Petr Peterka
  • Patent number: 8364964
    Abstract: In a method of registering a plurality of client devices with a device registration server for secure data communications, a unique symmetric key is generated for each of the client devices using a cryptographic function on a private key of the device registration server and a respective public key of each of the client devices, and a broadcast message containing the public key of the device registration server is sent to the client devices, in which the client devices are configured to generate a respective unique symmetric key from the public key of the device registration server and its own private key using a cryptographic function, and in which the unique symmetric key generated by each client device matches the respective unique symmetric key generated by the device registration server for the respective client device.
    Type: Grant
    Filed: December 29, 2009
    Date of Patent: January 29, 2013
    Assignee: General Instrument Corporation
    Inventors: Alexander Medvinsky, Paul Moroney, Jiang Zhang
  • Patent number: 8327125
    Abstract: In a method for securing content in a system containing a security processor configured to control access to the content by a main processor, in which main processor being configured to send heartbeats to the security processor, a determination as to whether at least one heartbeat was received within a predicted time interval is made and in response to a determination that at least one heartbeat was not received with the predicted time interval, access to the content by the main processor is ceased.
    Type: Grant
    Filed: December 28, 2009
    Date of Patent: December 4, 2012
    Assignee: General Instrument Corporation
    Inventors: Jiang Zhang, Kun-Pei P. Chen, Alexander Medvinsky
  • Publication number: 20120251007
    Abstract: Techniques for construction of a visual codebook are described herein. Feature points may be extracted from large numbers of images. In one example, images providing N feature points may be used to construct a codebook of K words. The centers of each of K clusters of feature points may be initialized. In a looping or iterative manner, an assignment step assigns each feature point to a cluster and an update step locates a center of each cluster. The feature points may be assigned to a cluster based on a lesser of a distance to a center of a previously assigned cluster and a distance to a center derived by operation of an approximate nearest neighbor algorithm having aspects of randomization. The loop terminates when the feature points have sufficiently converged to their respective clusters. Centers of the clusters represent visual words, which may be used to construct the visual codebook.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 4, 2012
    Applicant: Microsoft Corporation
    Inventors: Linjun Yang, Darui Li, Xian-Sheng Hua, Hong-Jiang Zhang
  • Patent number: 8276521
    Abstract: The invention relates to a gas generator for an airbag module having a gas generator housing, in which a first chamber for receiving a propellant for igniting a main gas set in a second chamber, and an ignition device for the ignition of the propellant are provided. In order to simplify the production of the gas generator, the invention provides that the first chamber for receiving the propellant is limited by a pipe, on the first end of which the ignition device is disposed, and the second end of which reaches the gas generator housing at least approximately. The first and the second chamber are separated from each other such that no parts of the propellant may reach the second chamber via the second end of the pipe before the ignition of the propellant.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: October 2, 2012
    Assignee: Takata AG
    Inventors: Silvio Reichelt, Jiang Zhang, Vladimir Dolzhanskiy, Gerrit Von Breitenbach, Heiko Kratz
  • Publication number: 20120185693
    Abstract: In embodiments of secure progressive download for media content playback, a client device (128) implements a media player (142) and a proxy application (144). The proxy application is implemented to receive media content (136) from a media server (126), and the media player controls playback of media content (148) on the client device. The proxy application receives the media content (136) encrypted and formatted by the media server for playback by the media player, and the proxy application initiates storing segments of the media content (148) as encrypted media content on the client device. The proxy application also requests an encryption key (124) to decrypt the encrypted media content for playback by the media player. The proxy application receives the encryption key from a key server (122) and stores the encryption key on the client device to decrypt the encrypted media content when requested by the media player.
    Type: Application
    Filed: January 5, 2012
    Publication date: July 19, 2012
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Kuang M. Chen, Jiang Zhang
  • Publication number: 20120166799
    Abstract: A domain controller is provided for use with a content source and a media device. The content source can provide encrypted content and rights data corresponding to the encrypted content. The media device can provide a request for the encrypted content and the rights data. The domain controller includes a communication portion, a digital rights management portion and a memory portion. The communication portion can engage in a first bi-directional communication with the content source and can engage in a second bi-directional communication with the media device. The digital rights management portion can receive the rights data. The memory portion can store the encrypted content. The second bi-directional communication includes an authorization and authentication communication between the communication portion and the media device, a secure move message exchange between the communication portion and the media device and a content download from the communication portion to the media device.
    Type: Application
    Filed: December 22, 2010
    Publication date: June 28, 2012
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Rafie Shamsaasef, Jiang Zhang, Petr Peterka
  • Publication number: 20120164862
    Abstract: An electrical connector (100) for mating with a mating connector includes a housing (1) defining a receiving cavity (10), a rear insulator (32), a central pin (7), a front insulator (31) and a contact member (5) received in the receiving cavity. The contact member includes a first through fourth side walls (513a-513d) surrounding an inserting slot (514), a pair of resilient beams (515) respectively bent from the second and the fourth side walls toward the inserting slot for clasping the mating connector. The first side wall includes a first edge portion (511) having a first protrusion (519) and a first cutout (518) in front of the first protrusion, and a second edge portion (512) having a second protrusion (516) engaged with the first cutout and a second cutout (517) behind the second protrusion and engaged with the first protrusion.
    Type: Application
    Filed: December 23, 2011
    Publication date: June 28, 2012
    Applicant: HON HAI PRECISION INDUSTRY CO., LTD.
    Inventors: ZHENG-HUA XU, JIN-JIANG ZHANG
  • Publication number: 20120158686
    Abstract: A computing device configured to determine a subset of the tags associated with at least one image of a plurality of received, tagged images is described herein. The computing device performs the determining based on one or more measures of consistency of visual similarity between ones of the images with semantic similarity between tags of the ones of the images.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Xian-Sheng Hua, Dong Liu, Meng Wang, Hong-Jiang Zhang
  • Publication number: 20120159173
    Abstract: A Service Key Delivery (SKD) system for delivering a service keys to client devices in a communications network. The delivered service keys are operable to be used to decrypt an encrypted key operable to be used to decrypt an encrypted digital content. The SKD system includes a data input interface for receiving a distribution time frame for the keys and a listing of client device identifications. The SKD system also includes a scheduling module to partition at least part of the distribution time frame into a number of time slots in which the number may be based on a variety of factors. The scheduling module assigns the time slots in the partitioned part of the distribution time frame to the client devices based on the identifications in the listing. The SKD system also includes a message generator configured to send key delivery messages to the client devices.
    Type: Application
    Filed: December 21, 2010
    Publication date: June 21, 2012
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Petr Peterka, Kuang M. Chen, Ambikacharan P. Makam, Jiang Zhang
  • Publication number: 20120155647
    Abstract: A client device which utilizes a unit derivation key (UDK), a current unit key, a current unit key index (UKI) and a received UKI. The client device includes a processor to receive the received UKI, compare the received UKI with a current UKI, if the received UKI is not equivalent to the current UKI, utilize the UDK, the current unit key and the received UKI to derive a new unit key. A headend facility (HF) device which utilizes a current unit key and a current unit key index (UKI). A key infrastructure center (KIC) device which utilizes a derivation key.
    Type: Application
    Filed: December 21, 2010
    Publication date: June 21, 2012
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Jiang Zhang, Alexander Medvinsky
  • Publication number: 20120158721
    Abstract: A computing device configured to determine that one or more regions of an image are associated with a tag of the image is described herein. The computing device is further configured to determine one or more attribute tags describing at least one of the content or context of the one or more regions. Upon determining the attribute tags, the computing device associates the attribute tags with the tag to enable image searching based on the tag and attribute tags.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Xian-Sheng Hua, Kuiyuan Yang, Meng Wang, Hong-Jiang Zhang
  • Publication number: 20120139832
    Abstract: Improvements are provided to effectively assess a user's face and head pose such that a computer or like device can track the user's attention towards a display device(s). Then the region of the display or graphical user interface that the user is turned towards can be automatically selected without requiring the user to provide further inputs. A frontal face detector is applied to detect the user's frontal face and then key facial points such as left/right eye center, left/right mouth corner, nose tip, etc., are detected by component detectors. The system then tracks the user's head by an image tracker and determines yaw, tilt and roll angle and other pose information of the user's head through a coarse to fine process according to key facial points and/or confidence outputs by pose estimator.
    Type: Application
    Filed: February 16, 2012
    Publication date: June 7, 2012
    Applicant: Microsoft Corporation
    Inventors: Yuxiao HU, Lei Zhang, Mingjing Li, Hong-Jiang Zhang
  • Patent number: 8189778
    Abstract: A seed for use in a cryptographic operation for an electronic device is determined by estimating the number of entropy data bits needed to satisfy a predetermined security strength of the cryptographic operation. The estimation is based on an entropy strength of a string of entropy data bits. Entropy strength is a measure of randomness. Furthermore, guiding a determination of the seed differently according to the estimated number of entropy data bits may be performed.
    Type: Grant
    Filed: July 7, 2008
    Date of Patent: May 29, 2012
    Assignee: General Instrument Corporation
    Inventor: Jiang Zhang
  • Publication number: 20120131333
    Abstract: A method is provided by which a client device obtains authorized access to content delivered over a content delivery network. The method includes receiving an entitlement management message (EMM). The EMM includes at least one cryptographic key and a device registration server certificate ID (DRSCID) identifying a currently valid device registration server (DRS) public key certificate. The DRSCID obtained from the EMM is compared to a stored DRSCID value. An entitlement control message (ECM), which includes an encrypted traffic key for decrypting content, is received. If the DRSCID obtained from the EMM is determined to match the stored DRSCID, the traffic key is decrypted with the cryptographic key or a key derived from the cryptographic key to thereby access the content.
    Type: Application
    Filed: November 23, 2010
    Publication date: May 24, 2012
    Applicant: General Instrument Corporation
    Inventors: Jiang Zhang, Paul Moroney, Petr Peterka
  • Patent number: 8185049
    Abstract: A device configured to communicate with a second device may register a second device using one of multiple registration modes including a domain-registration mode, a device-registration mode, and a no-registration mode. The domain-registration mode allows the second device to register with the device and at least one other device registered with the device, the device-registration mode allows the second device to register with the device and with no other devices, and the no-registration mode does not allow any device to register with the device. The device receives a selection of one of the multiple registration modes and places the device in the selected registration mode.
    Type: Grant
    Filed: December 29, 2008
    Date of Patent: May 22, 2012
    Assignee: General Instrument Corporation
    Inventors: Jiang Zhang, Petr Peterka
  • Patent number: 8175847
    Abstract: Technologies for generating a boosted tag ranking for a media instance, the boosted tag ranking based on probabilistic relevance estimation computed by a probabilistic relevance estimator and tag correlation refining performed by a tag correlation refiner. Such boosted tag rankings may be used for search result ranking, tag recommendation, and group recommendation.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: May 8, 2012
    Assignee: Microsoft Corporation
    Inventors: Hong-Jiang Zhang, Dong Liu, Meng Wang, Linjun Yang, Xian-Sheng Hua