Patents by Inventor Jiang Zhang
Jiang Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8457358Abstract: Improvements are provided to effectively assess a user's face and head pose such that a computer or like device can track the user's attention towards a display device(s). Then the region of the display or graphical user interface that the user is turned towards can be automatically selected without requiring the user to provide further inputs. A frontal face detector is applied to detect the user's frontal face and then key facial points such as left/right eye center, left/right mouth corner, nose tip, etc., are detected by component detectors. The system then tracks the user's head by an image tracker and determines yaw, tilt and roll angle and other pose information of the user's head through a coarse to fine process according to key facial points and/or confidence outputs by pose estimator.Type: GrantFiled: February 16, 2012Date of Patent: June 4, 2013Assignee: Microsoft CorporationInventors: Yuxiao Hu, Hong-Jiang Zhang, Mingjing Li, Lei Zhang
-
Patent number: 8438621Abstract: A method, device and system for securely managing debugging processes within a communication device, such as a set top box or other multimedia processing device. For example, a security processor (SP) within the communication device manages the lifetime (LT) of any access token issued for use in activating debugging privileges within the communication device. The security processor authenticates an issued access token and securely delivers appropriate debug authorization information to the device controller. The security processor uses its secure, internal timer to count down the lifetime and update the remaining lifetime of the issued access token during the processing of each command by the security processor. In addition to securely managing the issuance of the access token and it's remaining lifetime, the updating process reduces any impact on the normal communications within the device. The method overcomes the issue of the communication device not having a secure internal clock.Type: GrantFiled: December 21, 2007Date of Patent: May 7, 2013Assignee: General Instrument CorporationInventors: Jiang Zhang, Peter Chen, Bill Franks, Alexander Medvinsky
-
Patent number: 8422802Abstract: Techniques for construction of a visual codebook are described herein. Feature points may be extracted from large numbers of images. In one example, images providing N feature points may be used to construct a codebook of K words. The centers of each of K clusters of feature points may be initialized. In a looping or iterative manner, an assignment step assigns each feature point to a cluster and an update step locates a center of each cluster. The feature points may be assigned to a cluster based on a lesser of a distance to a center of a previously assigned cluster and a distance to a center derived by operation of an approximate nearest neighbor algorithm having aspects of randomization. The loop terminates when the feature points have sufficiently converged to their respective clusters. Centers of the clusters represent visual words, which may be used to construct the visual codebook.Type: GrantFiled: March 31, 2011Date of Patent: April 16, 2013Assignee: Microsoft CorporationInventors: Linjun Yang, Darui Li, Xian-Sheng Hua, Hong-Jiang Zhang
-
Publication number: 20130091353Abstract: A method and apparatus are for transferring a client device certificate and an associated encrypted client private key to a client device from a secure device. The secure device receives over a secure connection, a secure device certificate, a secure device private key and a plurality of client device certificates. Each client certificate is associated with a bootstrap public key but is not assigned to any particular client device. A plurality of encrypted client private keys is also received. Each of the encrypted client private keys comprises a client private key associated with one of the client device certificates encrypted with the bootstrap public key. The plurality of client device certificates is stored. The encrypted client private keys are stored in double encrypted protected form. A client device certificate and an associated encrypted client private key are transferred to a client device that has successfully registered with the secure device.Type: ApplicationFiled: August 1, 2012Publication date: April 11, 2013Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Jiang Zhang, Alexander Medvinsky, Kwan Chen, Paul Moroney, Petr Peterka
-
Patent number: 8364964Abstract: In a method of registering a plurality of client devices with a device registration server for secure data communications, a unique symmetric key is generated for each of the client devices using a cryptographic function on a private key of the device registration server and a respective public key of each of the client devices, and a broadcast message containing the public key of the device registration server is sent to the client devices, in which the client devices are configured to generate a respective unique symmetric key from the public key of the device registration server and its own private key using a cryptographic function, and in which the unique symmetric key generated by each client device matches the respective unique symmetric key generated by the device registration server for the respective client device.Type: GrantFiled: December 29, 2009Date of Patent: January 29, 2013Assignee: General Instrument CorporationInventors: Alexander Medvinsky, Paul Moroney, Jiang Zhang
-
Patent number: 8327125Abstract: In a method for securing content in a system containing a security processor configured to control access to the content by a main processor, in which main processor being configured to send heartbeats to the security processor, a determination as to whether at least one heartbeat was received within a predicted time interval is made and in response to a determination that at least one heartbeat was not received with the predicted time interval, access to the content by the main processor is ceased.Type: GrantFiled: December 28, 2009Date of Patent: December 4, 2012Assignee: General Instrument CorporationInventors: Jiang Zhang, Kun-Pei P. Chen, Alexander Medvinsky
-
Publication number: 20120251007Abstract: Techniques for construction of a visual codebook are described herein. Feature points may be extracted from large numbers of images. In one example, images providing N feature points may be used to construct a codebook of K words. The centers of each of K clusters of feature points may be initialized. In a looping or iterative manner, an assignment step assigns each feature point to a cluster and an update step locates a center of each cluster. The feature points may be assigned to a cluster based on a lesser of a distance to a center of a previously assigned cluster and a distance to a center derived by operation of an approximate nearest neighbor algorithm having aspects of randomization. The loop terminates when the feature points have sufficiently converged to their respective clusters. Centers of the clusters represent visual words, which may be used to construct the visual codebook.Type: ApplicationFiled: March 31, 2011Publication date: October 4, 2012Applicant: Microsoft CorporationInventors: Linjun Yang, Darui Li, Xian-Sheng Hua, Hong-Jiang Zhang
-
Patent number: 8276521Abstract: The invention relates to a gas generator for an airbag module having a gas generator housing, in which a first chamber for receiving a propellant for igniting a main gas set in a second chamber, and an ignition device for the ignition of the propellant are provided. In order to simplify the production of the gas generator, the invention provides that the first chamber for receiving the propellant is limited by a pipe, on the first end of which the ignition device is disposed, and the second end of which reaches the gas generator housing at least approximately. The first and the second chamber are separated from each other such that no parts of the propellant may reach the second chamber via the second end of the pipe before the ignition of the propellant.Type: GrantFiled: March 25, 2010Date of Patent: October 2, 2012Assignee: Takata AGInventors: Silvio Reichelt, Jiang Zhang, Vladimir Dolzhanskiy, Gerrit Von Breitenbach, Heiko Kratz
-
Publication number: 20120185693Abstract: In embodiments of secure progressive download for media content playback, a client device (128) implements a media player (142) and a proxy application (144). The proxy application is implemented to receive media content (136) from a media server (126), and the media player controls playback of media content (148) on the client device. The proxy application receives the media content (136) encrypted and formatted by the media server for playback by the media player, and the proxy application initiates storing segments of the media content (148) as encrypted media content on the client device. The proxy application also requests an encryption key (124) to decrypt the encrypted media content for playback by the media player. The proxy application receives the encryption key from a key server (122) and stores the encryption key on the client device to decrypt the encrypted media content when requested by the media player.Type: ApplicationFiled: January 5, 2012Publication date: July 19, 2012Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Kuang M. Chen, Jiang Zhang
-
Publication number: 20120166799Abstract: A domain controller is provided for use with a content source and a media device. The content source can provide encrypted content and rights data corresponding to the encrypted content. The media device can provide a request for the encrypted content and the rights data. The domain controller includes a communication portion, a digital rights management portion and a memory portion. The communication portion can engage in a first bi-directional communication with the content source and can engage in a second bi-directional communication with the media device. The digital rights management portion can receive the rights data. The memory portion can store the encrypted content. The second bi-directional communication includes an authorization and authentication communication between the communication portion and the media device, a secure move message exchange between the communication portion and the media device and a content download from the communication portion to the media device.Type: ApplicationFiled: December 22, 2010Publication date: June 28, 2012Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Rafie Shamsaasef, Jiang Zhang, Petr Peterka
-
Publication number: 20120164862Abstract: An electrical connector (100) for mating with a mating connector includes a housing (1) defining a receiving cavity (10), a rear insulator (32), a central pin (7), a front insulator (31) and a contact member (5) received in the receiving cavity. The contact member includes a first through fourth side walls (513a-513d) surrounding an inserting slot (514), a pair of resilient beams (515) respectively bent from the second and the fourth side walls toward the inserting slot for clasping the mating connector. The first side wall includes a first edge portion (511) having a first protrusion (519) and a first cutout (518) in front of the first protrusion, and a second edge portion (512) having a second protrusion (516) engaged with the first cutout and a second cutout (517) behind the second protrusion and engaged with the first protrusion.Type: ApplicationFiled: December 23, 2011Publication date: June 28, 2012Applicant: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: ZHENG-HUA XU, JIN-JIANG ZHANG
-
Publication number: 20120158686Abstract: A computing device configured to determine a subset of the tags associated with at least one image of a plurality of received, tagged images is described herein. The computing device performs the determining based on one or more measures of consistency of visual similarity between ones of the images with semantic similarity between tags of the ones of the images.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: MICROSOFT CORPORATIONInventors: Xian-Sheng Hua, Dong Liu, Meng Wang, Hong-Jiang Zhang
-
Publication number: 20120159173Abstract: A Service Key Delivery (SKD) system for delivering a service keys to client devices in a communications network. The delivered service keys are operable to be used to decrypt an encrypted key operable to be used to decrypt an encrypted digital content. The SKD system includes a data input interface for receiving a distribution time frame for the keys and a listing of client device identifications. The SKD system also includes a scheduling module to partition at least part of the distribution time frame into a number of time slots in which the number may be based on a variety of factors. The scheduling module assigns the time slots in the partitioned part of the distribution time frame to the client devices based on the identifications in the listing. The SKD system also includes a message generator configured to send key delivery messages to the client devices.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Petr Peterka, Kuang M. Chen, Ambikacharan P. Makam, Jiang Zhang
-
Publication number: 20120155647Abstract: A client device which utilizes a unit derivation key (UDK), a current unit key, a current unit key index (UKI) and a received UKI. The client device includes a processor to receive the received UKI, compare the received UKI with a current UKI, if the received UKI is not equivalent to the current UKI, utilize the UDK, the current unit key and the received UKI to derive a new unit key. A headend facility (HF) device which utilizes a current unit key and a current unit key index (UKI). A key infrastructure center (KIC) device which utilizes a derivation key.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Jiang Zhang, Alexander Medvinsky
-
Publication number: 20120158721Abstract: A computing device configured to determine that one or more regions of an image are associated with a tag of the image is described herein. The computing device is further configured to determine one or more attribute tags describing at least one of the content or context of the one or more regions. Upon determining the attribute tags, the computing device associates the attribute tags with the tag to enable image searching based on the tag and attribute tags.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: MICROSOFT CORPORATIONInventors: Xian-Sheng Hua, Kuiyuan Yang, Meng Wang, Hong-Jiang Zhang
-
Publication number: 20120139832Abstract: Improvements are provided to effectively assess a user's face and head pose such that a computer or like device can track the user's attention towards a display device(s). Then the region of the display or graphical user interface that the user is turned towards can be automatically selected without requiring the user to provide further inputs. A frontal face detector is applied to detect the user's frontal face and then key facial points such as left/right eye center, left/right mouth corner, nose tip, etc., are detected by component detectors. The system then tracks the user's head by an image tracker and determines yaw, tilt and roll angle and other pose information of the user's head through a coarse to fine process according to key facial points and/or confidence outputs by pose estimator.Type: ApplicationFiled: February 16, 2012Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Yuxiao HU, Lei Zhang, Mingjing Li, Hong-Jiang Zhang
-
Patent number: 8189778Abstract: A seed for use in a cryptographic operation for an electronic device is determined by estimating the number of entropy data bits needed to satisfy a predetermined security strength of the cryptographic operation. The estimation is based on an entropy strength of a string of entropy data bits. Entropy strength is a measure of randomness. Furthermore, guiding a determination of the seed differently according to the estimated number of entropy data bits may be performed.Type: GrantFiled: July 7, 2008Date of Patent: May 29, 2012Assignee: General Instrument CorporationInventor: Jiang Zhang
-
Publication number: 20120131333Abstract: A method is provided by which a client device obtains authorized access to content delivered over a content delivery network. The method includes receiving an entitlement management message (EMM). The EMM includes at least one cryptographic key and a device registration server certificate ID (DRSCID) identifying a currently valid device registration server (DRS) public key certificate. The DRSCID obtained from the EMM is compared to a stored DRSCID value. An entitlement control message (ECM), which includes an encrypted traffic key for decrypting content, is received. If the DRSCID obtained from the EMM is determined to match the stored DRSCID, the traffic key is decrypted with the cryptographic key or a key derived from the cryptographic key to thereby access the content.Type: ApplicationFiled: November 23, 2010Publication date: May 24, 2012Applicant: General Instrument CorporationInventors: Jiang Zhang, Paul Moroney, Petr Peterka
-
Patent number: 8185049Abstract: A device configured to communicate with a second device may register a second device using one of multiple registration modes including a domain-registration mode, a device-registration mode, and a no-registration mode. The domain-registration mode allows the second device to register with the device and at least one other device registered with the device, the device-registration mode allows the second device to register with the device and with no other devices, and the no-registration mode does not allow any device to register with the device. The device receives a selection of one of the multiple registration modes and places the device in the selected registration mode.Type: GrantFiled: December 29, 2008Date of Patent: May 22, 2012Assignee: General Instrument CorporationInventors: Jiang Zhang, Petr Peterka
-
Patent number: 8175847Abstract: Technologies for generating a boosted tag ranking for a media instance, the boosted tag ranking based on probabilistic relevance estimation computed by a probabilistic relevance estimator and tag correlation refining performed by a tag correlation refiner. Such boosted tag rankings may be used for search result ranking, tag recommendation, and group recommendation.Type: GrantFiled: March 31, 2009Date of Patent: May 8, 2012Assignee: Microsoft CorporationInventors: Hong-Jiang Zhang, Dong Liu, Meng Wang, Linjun Yang, Xian-Sheng Hua