Patents by Inventor Jianyong Chen

Jianyong Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160359856
    Abstract: A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer, obtaining a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component from the data storage dealer, and transmitting a request for obtaining the user attribute component of the data access requester respectively to the attribute authorizers. The attribute authorizers generate the user attribute components of the data access requester respectively and transmit the user attribute components of the data access requester to the data access requester. The the data access requester restores the encryption key, and decrypts the cipher text of the shared data according to the encryption key for obtaining the shared data requested to be accessed.
    Type: Application
    Filed: December 31, 2014
    Publication date: December 8, 2016
    Inventors: Bo Wang, Jianyong Chen, Jianping Yu
  • Publication number: 20160272424
    Abstract: A fork assembly (4) for storage/retrieval machine of high convey efficiency comprises: a rotating table (41); an extension arm (43) provided on the rotating table (41) and capable of conducting stretching motion; a driver unit (42) configured for driving the extension arm (43) to conduct the stretching motion; a control system (100) configured for controlling an operation of the driver unit (42); a position sensor (46) for the breakpoint which is connected to the control system (100) and configured for determining whether the extension arm (43) performs the stretching motion up to the breakpoint (9), and the breakpoint (9) is located between a maximum distance point (10) and a minimum distance point (8) to which the extension arm (43) extends.
    Type: Application
    Filed: October 22, 2013
    Publication date: September 22, 2016
    Inventors: XIAOHUI HU, JIANYONG CHEN, HAITAO ZHANG, SUNG HWAN YOON, HONG WANG
  • Patent number: 9384782
    Abstract: The present invention is applicable to the field of multimedia technologies and provides a record file editing method and system, where the method includes: performing fragmentation on an audio file to acquire multiple audio fragments; performing fragment cutting on the multiple acquired audio fragments; storing a fragment time period, a quantity of audio fragments, a fragment cutting time point, and an audio fragment number in a preset record file of the fragment cutting time point; reading each fragment cutting time point from the record file of the fragment cutting time point, performing time mapping on the fragment cutting time point, and storing, in an array, a new fragment cutting time point that is obtained after the mapping; and reading a prestored interaction mapping file between a document and audio, and performing an adjustment on a time point in the interaction mapping file between a document and audio according to the new fragment cutting time point.
    Type: Grant
    Filed: April 2, 2014
    Date of Patent: July 5, 2016
    Assignee: SHENZHEN UNIVERSITY
    Inventors: Shumin Cai, Zhuolin Yang, Jianyong Chen, Dan Xiao
  • Patent number: 9356967
    Abstract: A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics.
    Type: Grant
    Filed: May 30, 2012
    Date of Patent: May 31, 2016
    Assignee: ZTE Corporation
    Inventors: Jianyong Chen, Xiaohua Chen, Zhaoji Lin
  • Publication number: 20150279423
    Abstract: The present invention is applicable to the field of multimedia technologies and provides a record file editing method and system, where the method includes: performing fragmentation on an audio file to acquire multiple audio fragments; performing fragment cutting on the multiple acquired audio fragments; storing a fragment time period, a quantity of audio fragments, a fragment cutting time point, and an audio fragment number in a preset record file of the fragment cutting time point; reading each fragment cutting time point from the record file of the fragment cutting time point, performing time mapping on the fragment cutting time point, and storing, in an array, a new fragment cutting time point that is obtained after the mapping; and reading a prestored interaction mapping file between a document and audio, and performing an adjustment on a time point in the interaction mapping file between a document and audio according to the new fragment cutting time point.
    Type: Application
    Filed: April 2, 2014
    Publication date: October 1, 2015
    Applicant: SHENZHEN UNIVERSITY
    Inventors: Shumin Cai, Zhuolin Yang, Jianyong Chen, Dan Xiao
  • Patent number: 8910244
    Abstract: A method for establishing an identity management trust, and an IDentification Provider (IDP) and a Service Provider (SP) are provided in the present disclosure. The method comprises: after receiving an access from a user, an SP determines whether an IDP to which the user attaches is located in a trust domain of the SP (S102); if the IDP to which the user attaches is not located in the trust domain of the SP, the SP inquires of an IDP in a local trust domain about the IDP to which the user attaches (S104); if the SP receives information of the IDP to which the user attaches, wherein the information is returned by an IDP in the local trust domain, the SP adds the IDP to which the user attaches to a temporary trust list to establish a trust for the IDP to which the user attaches (S106). The present disclosure can establish a trust relationship between an SP and any IDP in case of adding or not adding extra devices, ensuring the user to obtain desired services after logging on for one time.
    Type: Grant
    Filed: March 23, 2010
    Date of Patent: December 9, 2014
    Assignee: ZTE Corporation
    Inventors: Yijun Zheng, Zhaoji Lin, Jianyong Chen, Zhimeng Teng, Yuan Li
  • Publication number: 20140196113
    Abstract: A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. A secure on-demand supply system and a traffic type acquisition method are disclosed. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics.
    Type: Application
    Filed: May 30, 2012
    Publication date: July 10, 2014
    Applicant: ZTE CORPORATION
    Inventors: Jianyong Chen, Xiaohua Chen, Zhaoji Lin
  • Patent number: 8486981
    Abstract: Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula: wherein R1 is C1-6 alkyl or C3-6cycloalkyl; or wherein R2 is substituted with one or two halogen(s) or OC1-3alkyl.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: July 16, 2013
    Assignees: The Regents of the University of Michigan, University of Kansas
    Inventors: Shaomeng Wang, Jianyong Chen, Gregory Collins, Beth Levant, James H. Woods
  • Patent number: 8283368
    Abstract: Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula (I) wherein X is C?O or SO2, R1 is C1-6 alkyl, R2 is aryl, heteroaryl, aryl, —(CH2)1-3aryl, or —(CH2)1-3heteroaryl, and n is 0 or 1. Methods of using the D3 receptor ligands in the treatment of diseases and conditions wherein modulation of the D3 receptor provides a benefit also are disclosed.
    Type: Grant
    Filed: August 27, 2009
    Date of Patent: October 9, 2012
    Assignee: The Regents of the University of Michigan
    Inventors: Shaomeng Wang, Jianyong Chen, Gregory Collins, James H. Woods, Beth Levant
  • Publication number: 20120232118
    Abstract: Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula: wherein R1 is C1-6 alkyl or C3-6cycloalkyl; or wherein R2 is substituted with one or two halogen(s) or OC1-3alkyl.
    Type: Application
    Filed: February 28, 2012
    Publication date: September 13, 2012
    Applicants: UNIVERSITY OF KANSAS, THE REGENTS OF THE UNIVERSITY OF MICHIGAN
    Inventors: Shaomeng Wang, Jianyong Chen, Gregory Collins, Beth Levant, James H. Woods
  • Patent number: 8222288
    Abstract: The invention relates to small molecules which function as inhibitors of the interaction between p53 and MDM2. The invention also relates to the use of these compounds for inhibiting cell growth, inducing cell death, inducing cell cycle arrest and/or sensitizing cells to additional agent(s).
    Type: Grant
    Filed: June 14, 2010
    Date of Patent: July 17, 2012
    Assignee: The Regents of the University of Michigan
    Inventors: Shaomeng Wang, Dongguang Qin, Jianyong Chen, Shanghai Yu
  • Publication number: 20120131642
    Abstract: A method for establishing an identity management trust, and an IDentification Provider (IDP) and a Service Provider (SP) are provided in the present disclosure. The method comprises: after receiving an access from a user, an SP determines whether an IDP to which the user attaches is located in a trust domain of the SP (S102); if the IDP to which the user attaches is not located in the trust domain of the SP, the SP inquires of an IDP in a local trust domain about the IDP to which the user attaches (S104); if the SP receives information of the IDP to which the user attaches, wherein the information is returned by an IDP in the local trust domain, the SP adds the IDP to which the user attaches to a temporary trust list to establish a trust for the IDP to which the user attaches (S106). The present disclosure can establish a trust relationship between an SP and any IDP in case of adding or not adding extra devices, ensuring the user to obtain desired services after logging on for one time.
    Type: Application
    Filed: March 23, 2010
    Publication date: May 24, 2012
    Applicant: ZTE CORPORATION
    Inventors: Yijun Zheng, Zhaoji Lin, Jianyong Chen, Zhimeng Teng, Yuan Li
  • Publication number: 20110319362
    Abstract: Inhibitors of STAT3 are disclosed. Methods of using the STAT3 inhibitors in the treatment of diseases and conditions wherein inhibition of STAT3 provides a benefit, like cancers, also are disclosed.
    Type: Application
    Filed: December 7, 2009
    Publication date: December 29, 2011
    Inventors: Shaomeng Wang, Jianyong Chen, Cindy Gomez, Longchuan Bai, Zaneta Nikolovska-Coleska, Yu-Jun Zhao
  • Publication number: 20110184033
    Abstract: Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula (I) wherein X is C?O or SO2, R1 is C1-6 alkyl, R2 is aryl, heteroaryl, aryl, —(CH2)1-3aryl, or —(CH2)1-3heteroaryl, and n is 0 or 1. Methods of using the D3 receptor ligands in the treatment of diseases and conditions wherein modulation of the D3 receptor provides a benefit also are disclosed.
    Type: Application
    Filed: August 27, 2009
    Publication date: July 28, 2011
    Applicant: THE REGENTS OF THE UNIVERSITY OF MICHIGAN
    Inventors: Shaomeng Wang, Jianyong Chen, Gregory Collins, James H. Woods, Beth Levant
  • Patent number: 7910621
    Abstract: The present invention relates to naturally occurring and chemically synthesized small molecule antagonists of XIAP family proteins. In particular, the present invention provides embelin and other XIAP inhibitors and methods of using these compounds as antagonists of the anti-apoptotic effects of XIAP family member proteins. The present invention also provides methods for treating diseases and pathologies (e.g., neoplastic diseases).
    Type: Grant
    Filed: March 22, 2005
    Date of Patent: March 22, 2011
    Assignee: The Regents of the University of Michigan
    Inventors: Jianyong Chen, Zaneta Nikolovska-Coleska, Dajun Yang, Shaomeng Wang, Haiying Sun, Liang Xu, Zengjian Hu
  • Publication number: 20100317661
    Abstract: The invention relates to small molecules which function as inhibitors of the interaction between p53 and MDM2. The invention also relates to the use of these compounds for inhibiting cell growth, inducing cell death, inducing cell cycle arrest and/or sensitizing cells to additional agent(s).
    Type: Application
    Filed: June 14, 2010
    Publication date: December 16, 2010
    Applicant: The Regents of the University of Michigan
    Inventors: Shaomeng Wang, Dongguang Qin, Jianyong Chen, Shanghai Yu
  • Patent number: 7725724
    Abstract: The present invention discloses a digital signature scheme based on braid group conjugacy problem and a verifying method thereof, wherein a signatory S selects three braids x?LBm(l), x??Bn(l), a?Bn(l), and considers braid pair (x?,x) as a public key of S, braid a as a private key of S; Signatory S uses hash function h for a message M needing signature to get y=h(M)?Bn(l); generating a braid b?RBn?1?m(l) randomly, then signing M with a and b to obtain Sign(M)=a?1byb?1a; a signature verifying party V obtains the public key of S, calculating the message M by employing hash function h, obtaining the y=h(M); judging whether sign(M) and y, sign(M)x? and xy are conjugate or not, if yes, sign(M) is a legal signature of message M; the present invention reduces the number of braids involved and the number for conjugacy decision without reducing security, thereby improving the operation efficiency of signature.
    Type: Grant
    Filed: November 12, 2004
    Date of Patent: May 25, 2010
    Assignee: ZTE Corporation
    Inventors: Yong Ding, Jianyong Chen, Zhiwei Peng
  • Patent number: 7674787
    Abstract: The invention relates to conformationally constrained mimetics of Smac which function as inhibitors of Inhibitor of Apoptosis Proteins. The invention also relates to the use of these mimetics for inducing apoptotic cell death and for sensitizing cells to inducers of apoptosis.
    Type: Grant
    Filed: July 11, 2005
    Date of Patent: March 9, 2010
    Assignee: The Regents of the University of Michigan
    Inventors: Shaomeng Wang, Haiying Sun, Zaneta Nikolovska-Coleska, Chao-Yie Yang, Liang Xu, Naoyuki G. Saito, Jianyong Chen
  • Patent number: 7557251
    Abstract: This invention relates to relates to methods for producing gossypol acetic acid co-crystals and (?)-gossypol acetic acid co-crystals. The invention also relates to pharmaceutical compositions comprising gossypol acetic acid co-crystals and (?)-gossypol acetic acid co-crystals and the use of gossypol acetic acid co-crystals and (?)-gossypol acetic acid co-crystals for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.
    Type: Grant
    Filed: March 29, 2007
    Date of Patent: July 7, 2009
    Assignee: The Regents of the University of Michigan
    Inventors: Shaomeng Wang, Jianyong Chen, John F. W. Keana, Ming Guo
  • Publication number: 20090118377
    Abstract: The invention relates to the compound apogossypolone and salts and prodrugs thereof. Apogossypolone functions as an inhibitor of Bcl-2 family proteins. The invention also relates to the use of apogossypolone for inhibiting hyperproliferative cell growth, for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.
    Type: Application
    Filed: January 12, 2009
    Publication date: May 7, 2009
    Applicant: The Regents of the University of Michigan
    Inventors: Shaomeng Wang, Jianyong Chen, Zaneta Nikolovska-Coleska, Dajun Yang