Patents by Inventor Jianyong Chen
Jianyong Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160359856Abstract: A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer, obtaining a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component from the data storage dealer, and transmitting a request for obtaining the user attribute component of the data access requester respectively to the attribute authorizers. The attribute authorizers generate the user attribute components of the data access requester respectively and transmit the user attribute components of the data access requester to the data access requester. The the data access requester restores the encryption key, and decrypts the cipher text of the shared data according to the encryption key for obtaining the shared data requested to be accessed.Type: ApplicationFiled: December 31, 2014Publication date: December 8, 2016Inventors: Bo Wang, Jianyong Chen, Jianping Yu
-
Publication number: 20160272424Abstract: A fork assembly (4) for storage/retrieval machine of high convey efficiency comprises: a rotating table (41); an extension arm (43) provided on the rotating table (41) and capable of conducting stretching motion; a driver unit (42) configured for driving the extension arm (43) to conduct the stretching motion; a control system (100) configured for controlling an operation of the driver unit (42); a position sensor (46) for the breakpoint which is connected to the control system (100) and configured for determining whether the extension arm (43) performs the stretching motion up to the breakpoint (9), and the breakpoint (9) is located between a maximum distance point (10) and a minimum distance point (8) to which the extension arm (43) extends.Type: ApplicationFiled: October 22, 2013Publication date: September 22, 2016Inventors: XIAOHUI HU, JIANYONG CHEN, HAITAO ZHANG, SUNG HWAN YOON, HONG WANG
-
Patent number: 9384782Abstract: The present invention is applicable to the field of multimedia technologies and provides a record file editing method and system, where the method includes: performing fragmentation on an audio file to acquire multiple audio fragments; performing fragment cutting on the multiple acquired audio fragments; storing a fragment time period, a quantity of audio fragments, a fragment cutting time point, and an audio fragment number in a preset record file of the fragment cutting time point; reading each fragment cutting time point from the record file of the fragment cutting time point, performing time mapping on the fragment cutting time point, and storing, in an array, a new fragment cutting time point that is obtained after the mapping; and reading a prestored interaction mapping file between a document and audio, and performing an adjustment on a time point in the interaction mapping file between a document and audio according to the new fragment cutting time point.Type: GrantFiled: April 2, 2014Date of Patent: July 5, 2016Assignee: SHENZHEN UNIVERSITYInventors: Shumin Cai, Zhuolin Yang, Jianyong Chen, Dan Xiao
-
Patent number: 9356967Abstract: A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics.Type: GrantFiled: May 30, 2012Date of Patent: May 31, 2016Assignee: ZTE CorporationInventors: Jianyong Chen, Xiaohua Chen, Zhaoji Lin
-
Publication number: 20150279423Abstract: The present invention is applicable to the field of multimedia technologies and provides a record file editing method and system, where the method includes: performing fragmentation on an audio file to acquire multiple audio fragments; performing fragment cutting on the multiple acquired audio fragments; storing a fragment time period, a quantity of audio fragments, a fragment cutting time point, and an audio fragment number in a preset record file of the fragment cutting time point; reading each fragment cutting time point from the record file of the fragment cutting time point, performing time mapping on the fragment cutting time point, and storing, in an array, a new fragment cutting time point that is obtained after the mapping; and reading a prestored interaction mapping file between a document and audio, and performing an adjustment on a time point in the interaction mapping file between a document and audio according to the new fragment cutting time point.Type: ApplicationFiled: April 2, 2014Publication date: October 1, 2015Applicant: SHENZHEN UNIVERSITYInventors: Shumin Cai, Zhuolin Yang, Jianyong Chen, Dan Xiao
-
Patent number: 8910244Abstract: A method for establishing an identity management trust, and an IDentification Provider (IDP) and a Service Provider (SP) are provided in the present disclosure. The method comprises: after receiving an access from a user, an SP determines whether an IDP to which the user attaches is located in a trust domain of the SP (S102); if the IDP to which the user attaches is not located in the trust domain of the SP, the SP inquires of an IDP in a local trust domain about the IDP to which the user attaches (S104); if the SP receives information of the IDP to which the user attaches, wherein the information is returned by an IDP in the local trust domain, the SP adds the IDP to which the user attaches to a temporary trust list to establish a trust for the IDP to which the user attaches (S106). The present disclosure can establish a trust relationship between an SP and any IDP in case of adding or not adding extra devices, ensuring the user to obtain desired services after logging on for one time.Type: GrantFiled: March 23, 2010Date of Patent: December 9, 2014Assignee: ZTE CorporationInventors: Yijun Zheng, Zhaoji Lin, Jianyong Chen, Zhimeng Teng, Yuan Li
-
Publication number: 20140196113Abstract: A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. A secure on-demand supply system and a traffic type acquisition method are disclosed. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics.Type: ApplicationFiled: May 30, 2012Publication date: July 10, 2014Applicant: ZTE CORPORATIONInventors: Jianyong Chen, Xiaohua Chen, Zhaoji Lin
-
Patent number: 8486981Abstract: Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula: wherein R1 is C1-6 alkyl or C3-6cycloalkyl; or wherein R2 is substituted with one or two halogen(s) or OC1-3alkyl.Type: GrantFiled: February 28, 2012Date of Patent: July 16, 2013Assignees: The Regents of the University of Michigan, University of KansasInventors: Shaomeng Wang, Jianyong Chen, Gregory Collins, Beth Levant, James H. Woods
-
Patent number: 8283368Abstract: Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula (I) wherein X is C?O or SO2, R1 is C1-6 alkyl, R2 is aryl, heteroaryl, aryl, —(CH2)1-3aryl, or —(CH2)1-3heteroaryl, and n is 0 or 1. Methods of using the D3 receptor ligands in the treatment of diseases and conditions wherein modulation of the D3 receptor provides a benefit also are disclosed.Type: GrantFiled: August 27, 2009Date of Patent: October 9, 2012Assignee: The Regents of the University of MichiganInventors: Shaomeng Wang, Jianyong Chen, Gregory Collins, James H. Woods, Beth Levant
-
Publication number: 20120232118Abstract: Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula: wherein R1 is C1-6 alkyl or C3-6cycloalkyl; or wherein R2 is substituted with one or two halogen(s) or OC1-3alkyl.Type: ApplicationFiled: February 28, 2012Publication date: September 13, 2012Applicants: UNIVERSITY OF KANSAS, THE REGENTS OF THE UNIVERSITY OF MICHIGANInventors: Shaomeng Wang, Jianyong Chen, Gregory Collins, Beth Levant, James H. Woods
-
Patent number: 8222288Abstract: The invention relates to small molecules which function as inhibitors of the interaction between p53 and MDM2. The invention also relates to the use of these compounds for inhibiting cell growth, inducing cell death, inducing cell cycle arrest and/or sensitizing cells to additional agent(s).Type: GrantFiled: June 14, 2010Date of Patent: July 17, 2012Assignee: The Regents of the University of MichiganInventors: Shaomeng Wang, Dongguang Qin, Jianyong Chen, Shanghai Yu
-
Publication number: 20120131642Abstract: A method for establishing an identity management trust, and an IDentification Provider (IDP) and a Service Provider (SP) are provided in the present disclosure. The method comprises: after receiving an access from a user, an SP determines whether an IDP to which the user attaches is located in a trust domain of the SP (S102); if the IDP to which the user attaches is not located in the trust domain of the SP, the SP inquires of an IDP in a local trust domain about the IDP to which the user attaches (S104); if the SP receives information of the IDP to which the user attaches, wherein the information is returned by an IDP in the local trust domain, the SP adds the IDP to which the user attaches to a temporary trust list to establish a trust for the IDP to which the user attaches (S106). The present disclosure can establish a trust relationship between an SP and any IDP in case of adding or not adding extra devices, ensuring the user to obtain desired services after logging on for one time.Type: ApplicationFiled: March 23, 2010Publication date: May 24, 2012Applicant: ZTE CORPORATIONInventors: Yijun Zheng, Zhaoji Lin, Jianyong Chen, Zhimeng Teng, Yuan Li
-
Publication number: 20110319362Abstract: Inhibitors of STAT3 are disclosed. Methods of using the STAT3 inhibitors in the treatment of diseases and conditions wherein inhibition of STAT3 provides a benefit, like cancers, also are disclosed.Type: ApplicationFiled: December 7, 2009Publication date: December 29, 2011Inventors: Shaomeng Wang, Jianyong Chen, Cindy Gomez, Longchuan Bai, Zaneta Nikolovska-Coleska, Yu-Jun Zhao
-
Publication number: 20110184033Abstract: Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula (I) wherein X is C?O or SO2, R1 is C1-6 alkyl, R2 is aryl, heteroaryl, aryl, —(CH2)1-3aryl, or —(CH2)1-3heteroaryl, and n is 0 or 1. Methods of using the D3 receptor ligands in the treatment of diseases and conditions wherein modulation of the D3 receptor provides a benefit also are disclosed.Type: ApplicationFiled: August 27, 2009Publication date: July 28, 2011Applicant: THE REGENTS OF THE UNIVERSITY OF MICHIGANInventors: Shaomeng Wang, Jianyong Chen, Gregory Collins, James H. Woods, Beth Levant
-
Patent number: 7910621Abstract: The present invention relates to naturally occurring and chemically synthesized small molecule antagonists of XIAP family proteins. In particular, the present invention provides embelin and other XIAP inhibitors and methods of using these compounds as antagonists of the anti-apoptotic effects of XIAP family member proteins. The present invention also provides methods for treating diseases and pathologies (e.g., neoplastic diseases).Type: GrantFiled: March 22, 2005Date of Patent: March 22, 2011Assignee: The Regents of the University of MichiganInventors: Jianyong Chen, Zaneta Nikolovska-Coleska, Dajun Yang, Shaomeng Wang, Haiying Sun, Liang Xu, Zengjian Hu
-
Publication number: 20100317661Abstract: The invention relates to small molecules which function as inhibitors of the interaction between p53 and MDM2. The invention also relates to the use of these compounds for inhibiting cell growth, inducing cell death, inducing cell cycle arrest and/or sensitizing cells to additional agent(s).Type: ApplicationFiled: June 14, 2010Publication date: December 16, 2010Applicant: The Regents of the University of MichiganInventors: Shaomeng Wang, Dongguang Qin, Jianyong Chen, Shanghai Yu
-
Patent number: 7725724Abstract: The present invention discloses a digital signature scheme based on braid group conjugacy problem and a verifying method thereof, wherein a signatory S selects three braids x?LBm(l), x??Bn(l), a?Bn(l), and considers braid pair (x?,x) as a public key of S, braid a as a private key of S; Signatory S uses hash function h for a message M needing signature to get y=h(M)?Bn(l); generating a braid b?RBn?1?m(l) randomly, then signing M with a and b to obtain Sign(M)=a?1byb?1a; a signature verifying party V obtains the public key of S, calculating the message M by employing hash function h, obtaining the y=h(M); judging whether sign(M) and y, sign(M)x? and xy are conjugate or not, if yes, sign(M) is a legal signature of message M; the present invention reduces the number of braids involved and the number for conjugacy decision without reducing security, thereby improving the operation efficiency of signature.Type: GrantFiled: November 12, 2004Date of Patent: May 25, 2010Assignee: ZTE CorporationInventors: Yong Ding, Jianyong Chen, Zhiwei Peng
-
Patent number: 7674787Abstract: The invention relates to conformationally constrained mimetics of Smac which function as inhibitors of Inhibitor of Apoptosis Proteins. The invention also relates to the use of these mimetics for inducing apoptotic cell death and for sensitizing cells to inducers of apoptosis.Type: GrantFiled: July 11, 2005Date of Patent: March 9, 2010Assignee: The Regents of the University of MichiganInventors: Shaomeng Wang, Haiying Sun, Zaneta Nikolovska-Coleska, Chao-Yie Yang, Liang Xu, Naoyuki G. Saito, Jianyong Chen
-
Patent number: 7557251Abstract: This invention relates to relates to methods for producing gossypol acetic acid co-crystals and (?)-gossypol acetic acid co-crystals. The invention also relates to pharmaceutical compositions comprising gossypol acetic acid co-crystals and (?)-gossypol acetic acid co-crystals and the use of gossypol acetic acid co-crystals and (?)-gossypol acetic acid co-crystals for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.Type: GrantFiled: March 29, 2007Date of Patent: July 7, 2009Assignee: The Regents of the University of MichiganInventors: Shaomeng Wang, Jianyong Chen, John F. W. Keana, Ming Guo
-
Publication number: 20090118377Abstract: The invention relates to the compound apogossypolone and salts and prodrugs thereof. Apogossypolone functions as an inhibitor of Bcl-2 family proteins. The invention also relates to the use of apogossypolone for inhibiting hyperproliferative cell growth, for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.Type: ApplicationFiled: January 12, 2009Publication date: May 7, 2009Applicant: The Regents of the University of MichiganInventors: Shaomeng Wang, Jianyong Chen, Zaneta Nikolovska-Coleska, Dajun Yang