Patents by Inventor Jiantao Zhou
Jiantao Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240135892Abstract: Disclosed are a method for adjusting a signal of a display panel, a time controller integrated circuit, a display panel, and a storage medium. The method includes: converting first data into a first data voltage signal using a first data voltage, in response to a set condition being reached, sending the first data voltage signal to a chip on film integrated circuit, the chip on film integrated circuit identifies the first data voltage signal to obtain a second data; acquiring the second data from the chip on film integrated circuit, determining that the chip on film integrated circuit fails to identify the first data in response to the second data being different from the first data; and adjusting the first data voltage until a second data voltage signal converted from the first data using a second data voltage after adjustment being successfully identified by the chip on film integrated circuit.Type: ApplicationFiled: March 3, 2021Publication date: April 25, 2024Inventors: Yunlu CHEN, Changcheng LIU, Liugang ZHOU, Liu HE, Kun YANG, Jianwei SUN, Jun WANG, Yunyun LIANG, Qing LI, Yu QUAN, Yanting HUANG, Zhengru PAN, Bingbing YAN, Jiantao LIU
-
Patent number: 11952298Abstract: A method for deodorizing sludge with a metal salt and a tannin extract together, deodorized sludge, and use thereof are provided. The present invention provides a sludge deodorization technology that has high treatment efficiency, environmental friendliness, and low investment costs, and satisfies harmless requirements of subsequent resource utilization such as incineration, pyrolysis, or carbonization. Characterized by containing abundant phenolic hydroxyl groups, the tannin extract is used as a multidentate ligand to undergo a complexation reaction with metal ions, which reduces bioavailability of proteins and other macromolecules, and effectively inhibits production of low-volatile sulfides, thereby significantly deodorizing the sludge during standing and combustion.Type: GrantFiled: October 15, 2021Date of Patent: April 9, 2024Assignee: FUZHOU UNIVERSITYInventors: Minghua Liu, Jiantao Lin, Shuyu Jiang, Yuchuan Yang, Yuxin Zhou, Yifan Liu
-
Publication number: 20240083798Abstract: A method for deodorizing sludge with a metal salt and a tannin extract together, deodorized sludge, and use thereof are provided. The present invention provides a sludge deodorization technology that has high treatment efficiency, environmental friendliness, and low investment costs, and satisfies harmless requirements of subsequent resource utilization such as incineration, pyrolysis, or carbonization. Characterized by containing abundant phenolic hydroxyl groups, the tannin extract is used as a multidentate ligand to undergo a complexation reaction with metal ions, which reduces bioavailability of proteins and other macromolecules, and effectively inhibits production of low-volatile sulfides, thereby significantly deodorizing the sludge during standing and combustion.Type: ApplicationFiled: October 15, 2021Publication date: March 14, 2024Applicant: FUZHOU UNIVERSITYInventors: Minghua LIU, Jiantao LIN, Shuyu JIANG, Yuchuan YANG, Yuxin ZHOU, Yifan LIU
-
Patent number: 11923016Abstract: Systems, apparatuses and methods may provide for technology that resumes a program operation with respect to NAND memory during a first tier in response to a suspension counter reaching a first threshold and resumes the program operation with respect to the NAND memory during a second tier in response to the suspension counter reaching a second threshold. The technology may also resume the program operation with respect to the NAND memory during a third tier in response to the suspension counter reaching a third threshold. Additionally, the technology may service one or more read operations with respect to the NAND memory until the suspension counter reaches the first threshold during the first tier, until the suspension counter reaches the second threshold during the second tier, and until the suspension counter reaches the third threshold during the third tier.Type: GrantFiled: September 25, 2020Date of Patent: March 5, 2024Assignee: Intel CorporationInventors: Aliasgar S. Madraswala, Sagar Upadhyay, Jiantao Zhou
-
Publication number: 20220101927Abstract: Systems, apparatuses and methods may provide for technology that resumes a program operation with respect to NAND memory during a first tier in response to a suspension counter reaching a first threshold and resumes the program operation with respect to the NAND memory during a second tier in response to the suspension counter reaching a second threshold. The technology may also resume the program operation with respect to the NAND memory during a third tier in response to the suspension counter reaching a third threshold. Additionally, the technology may service one or more read operations with respect to the NAND memory until the suspension counter reaches the first threshold during the first tier, until the suspension counter reaches the second threshold during the second tier, and until the suspension counter reaches the third threshold during the third tier.Type: ApplicationFiled: September 25, 2020Publication date: March 31, 2022Inventors: Aliasgar S. Madraswala, Sagar Upadhyay, Jiantao Zhou
-
Patent number: 9639912Abstract: A method for reversible image data hiding includes steps of encrypting an original image by an encryption process to generate an encrypted image, embedding a message into the encrypted image by an embedment process to generate an embedded image, and extracting the message and the original image from the embedded image by a decryption and extraction process. The encryption process includes generating a key stream by using a secret encryption key, and generating an encrypted image by XORing the original image with the key stream. The embedment process includes generating an embedded image by embedding the message via XORing the encrypted image with a predetermined public key set.Type: GrantFiled: December 30, 2014Date of Patent: May 2, 2017Assignee: UNIVERSITY OF MACAUInventors: Jiantao Zhou, Weiwei Sun, Li Dong
-
Publication number: 20160189325Abstract: A method for reversible image data hiding comprising: encrypting an original image by an encryption process to generate an encrypted image, embedding a message into the encrypted image by an embedment process to generate an embedded image, and extracting the message and the original image from the embedded image by a decryption and extraction process. The encryption process including: generating a key stream by using a secret encryption key, and generating an encrypted image by XORing the original image with the key stream. The embedment process including: generating an embedded image by embedding the message via XORing the encrypted image with a predetermined public key set.Type: ApplicationFiled: December 30, 2014Publication date: June 30, 2016Inventors: Jiantao ZHOU, Weiwei SUN, Li DONG
-
Patent number: 8457304Abstract: A method for encoding video includes receiving data, and encrypting the data using at least four Huffman trees. A method for encoding video includes receiving data, and encrypting the data such that an internal state of a stream cipher is independent of plaintext and ciphertext. A video encoding system for encoding video in a computing environment includes means for accessing data, and means for encrypting the data such that there are approximately 2106 possibilities.Type: GrantFiled: February 22, 2008Date of Patent: June 4, 2013Assignee: Choy Sai Foundation L.L.C.Inventors: Oscar Chi Lim Au, Jiantao Zhou
-
Method and system for encoding multimedia content based on secure coding schemes using stream cipher
Patent number: 8189776Abstract: Described herein are various embodiments of a coding technique that utilize a stream cipher for switching between first and second coding conventions for encoding a symbol sequence. The first coding convention specifies a first mapping between a symbol and a first codeword and the second coding convention specified a second mapping between the symbol and a second codeword. According to the invention, a key generated by the stream cipher is used to selected one of the first and second coding convention and the mapping of the selected coding convention is then utilized for encoding the symbol.Type: GrantFiled: September 18, 2009Date of Patent: May 29, 2012Assignee: The Hong Kong University of Science and TechnologyInventors: Oscar Chi Lim Au, Jiantao Zhou -
Patent number: 7868788Abstract: Described herein is an efficient encryption method and system having improved security features based on randomness. The method and system utilize a random dictionary insertion and a random dictionary permutation, and a key stream generated by a stream cipher. Security analysis results show that the method and system provides a higher level of security without incurring any coding efficiency loss, compared with a existing encoding methods.Type: GrantFiled: June 17, 2009Date of Patent: January 11, 2011Assignee: The Hong Kong University of Science and TechnologyInventors: Oscar Chi Lim Au, Jiantao Zhou
-
Method and system for encoding multimedia content based on secure coding schemes using stream cipher
Publication number: 20100067688Abstract: Described herein are various embodiments of a coding technique that utilize a stream cipher for switching between first and second coding conventions for encoding a symbol sequence. The first coding convention specifies a first mapping between a symbol and a first codeword and the second coding convention specified a second mapping between the symbol and a second codeword. According to the invention, a key generated by the stream cipher is used to selected one of the first and second coding convention and the mapping of the selected coding convention is then utilized for encoding the symbol.Type: ApplicationFiled: September 18, 2009Publication date: March 18, 2010Applicant: The Hong Kong University of Science and TechnologyInventors: Oscar Chi Lim Au, Jiantao Zhou -
Publication number: 20090309769Abstract: Described herein is an efficient encryption method and system having improved security features based on randomness. The method and system utilize a random dictionary insertion and a random dictionary permutation, and a key stream generated by a stream cipher. Security analysis results show that the method and system provides a higher level of security without incurring any coding efficiency loss, compared with a existing encoding methods.Type: ApplicationFiled: June 17, 2009Publication date: December 17, 2009Applicant: The Hong Kong University of Science and TechnologyInventors: Oscar Chi Lim Au, Jiantao Zhou
-
Publication number: 20090295607Abstract: Systems and methodologies for analyzing error recovery performance of variable length codes utilized for encoding and decoding data are provided herein. Synchronization recovery of a set of variable length codes can be evaluated assuming that an encoded bit stream is transmitted over a binary symmetric channel. Further, mean symbol error rates corresponding to each of the variable length codes in the set can be determined based upon the evaluation of the synchronization recovery. Moreover, a subset of the variable length codes with optimal error recovery can be selected as a function of the mean symbol error rates.Type: ApplicationFiled: June 2, 2008Publication date: December 3, 2009Applicant: THE HONG KONG UNIVERSITY OF SCIENCE AND TECHNOLOGYInventors: Oscar Chi Lim Au, Jiantao Zhou
-
Publication number: 20080273693Abstract: A method for encoding video includes receiving data, and encrypting the data using at least four Huffman trees. A method for encoding video includes receiving data, and encrypting the data such that an internal state of a stream cipher is independent of plaintext and ciphertext. A video encoding system for encoding video in a computing environment includes means for accessing data, and means for encrypting the data such that there are approximately 2106 possibilities.Type: ApplicationFiled: February 22, 2008Publication date: November 6, 2008Applicant: THE HONG KONG UNIVERSITY OF SCIENCE AND TECHNOLOGYInventors: Oscar Chi Lim Au, Jiantao Zhou