Patents by Inventor Jie ZHUANG
Jie ZHUANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220112584Abstract: The present disclosure relates to a micron silver particle-reinforced 316L stainless steel matrix composite, including a 316L stainless steel matrix and silver particles uniformly distributed in the 316L stainless steel matrix. The silver particles have a weight 1% to 5% of the total weight of the composite; and the composite has a density of 7.9 g/cm3 to 8.2 g/cm3 and a relative density of more than 98%. The composite is prepared by the following method: mixing raw materials of a spherical silver powder and a spherical 316L stainless steel powder; subjecting a resulting mixture to mechanical ball milling to obtain a mixed powder; sieving the mixed powder and adding a resulting powder to a powder cylinder of an SLM forming machine; and charging an inert protective gas for printing to obtain the composite.Type: ApplicationFiled: July 23, 2020Publication date: April 14, 2022Inventors: Dongdong GU, Kaijie LIN, Jingfeng QUAN, Yamei FANG, Qing GE, Jie ZHUANG, Yang LIU, Weisong DONG, Pengjiang SHUAI
-
Patent number: 11301622Abstract: Described embodiments provide a method, computer program product, and computer system for receiving, by a computing device, first and second images of an application, the first image indicative of no input data present within input fields of the application, and the second image being received after input data is present within at least one input field of the application. The input data of the second image may be identified based upon, at least in part, a comparison with the first image. The identified input data of the second image may be provided into the input field of the application after restart of the application so as to prevent loss of the input data.Type: GrantFiled: January 31, 2020Date of Patent: April 12, 2022Assignee: CITRIX SYSTEMS, INC.Inventors: Ke Xu, Eamon Yao, Jie Zhuang, Shutian Yao, Junying Gao
-
Publication number: 20210365589Abstract: Techniques are disclosed for protection of sensitive information on a computing device based on a security state of the environment in which the computing device is operating. An example methodology implementing the techniques includes determining that an application having screen share capability is running on a computing device and determining a security state of an environment of the computing device. The method also includes, responsive to a determination that the security state is unsecure, obfuscating sensitive information included in a notification displayed within an application window being displayed by the computing device.Type: ApplicationFiled: June 24, 2020Publication date: November 25, 2021Inventors: Zongpeng Qiao, Jie Zhuang, Xiao Zhang, Dongsheng Xu
-
Publication number: 20210303520Abstract: A tracking engine may respond to a first user requesting to pin a link included in a message received from a second user by storing the link in a database table associated with the first user. Alternatively, if the first user requests to clone the link, the tracking engine may store the link in the database table as well as generate a local copy of a file associated with the link. The tracking engine may generate, based on the database table, a user interface for displaying, at a client associated with the first user, one or more links received by the first user. The tracking engine may update the database table to mark or remove invalid links. As such, the user interface that is generated based on the database table may exclude invalid links or include unselectable user interface elements for the invalid links.Type: ApplicationFiled: April 14, 2020Publication date: September 30, 2021Inventors: Ke Xu, Zongpeng Qiao, Jie Zhuang
-
Publication number: 20210227352Abstract: A computer system and method for providing location-based application access is provided. For example, the computer system includes a processor configured to receive a connection request for access to a distributed workspace, the connection request including location information for a client device. The processor can access metadata for each of a plurality of location-based applications, the metadata including location information for each of the applications defining at least one physical location where each of the applications can be accessed. The processor can compare the location information against the metadata for each of the applications and determine one or more applications that match the location information for the client device. The processor then can organize each of the applications that have associated location information that matches the location information into a listing of available applications and transmit the listing of available applications for display to a user of the client device.Type: ApplicationFiled: April 17, 2020Publication date: July 22, 2021Applicant: Citrix Systems, Inc.Inventors: Xiao Zhang, Ze Chen, Jie Zhuang, Zongpeng Qiao
-
Publication number: 20210209064Abstract: Methods and systems for detecting and addressing file redundancies. A server may be configured to store a plurality of files associated with a plurality of identifiers. The identifiers may be generated using a hash function. The server may receive an indication of a first file. The indication of the first file may correspond to a user uploading the first file to the server, and may comprise a first identifier of the first file. The server may determine, by comparing the first identifier and the plurality of identifiers, that a second file is the same as the first file. Based on the second identifier, a pointer to the second file may be provided to prevent redundant storage of content similar to that of the second file. If an edit associated with a pointer, of a plurality of pointers to a centrally-stored file, is made, a new centrally-stored file may be created.Type: ApplicationFiled: March 23, 2021Publication date: July 8, 2021Inventors: Jie Zhuang, Zongpeng Qiao, Xiao Yuan
-
Publication number: 20210192128Abstract: Described embodiments provide a method, computer program product, and computer system for receiving, by a computing device, first and second images of an application, the first image indicative of no input data present within input fields of the application, and the second image being received after input data is present within at least one input field of the application. The input data of the second image may be identified based upon, at least in part, a comparison with the first image. The identified input data of the second image may be provided into the input field of the application after restart of the application so as to prevent loss of the input data.Type: ApplicationFiled: January 31, 2020Publication date: June 24, 2021Inventors: Ke Xu, Eamon Yao, Jie Zhuang, Shutian Yao, Junying Gao
-
Publication number: 20210182171Abstract: Disclosed is a method involving identifying a first activity a user is to complete using a computing resource; causing a client device operated by the user to output a first notification concerning the first activity, the first notification including at least one first user interface element with which the user can interact to begin the first activity; determining an estimated time for the user to complete the first activity; and causing the client device to output an indication of the estimated time in association with the first notification.Type: ApplicationFiled: January 16, 2020Publication date: June 17, 2021Inventors: Zongpeng Qiao, Bo Chen, Xiao Zhang, Jie Zhuang
-
Patent number: 10997122Abstract: Methods and systems for detecting and addressing file redundancies. A server may be configured to store a plurality of files associated with a plurality of identifiers. The identifiers may be generated using a hash function. The server may receive an indication of a first file. The indication of the first file may correspond to a user uploading the first file to the server, and may comprise a first identifier of the first file. The server may determine, by comparing the first identifier and the plurality of identifiers, that a second file is the same as the first file. Based on the second identifier, a pointer to the second file may be provided to prevent redundant storage of content similar to that of the second file. If an edit associated with a pointer, of a plurality of pointers to a centrally-stored file, is made, a new centrally-stored file may be created.Type: GrantFiled: December 5, 2018Date of Patent: May 4, 2021Assignee: Citrix Systems, Inc.Inventors: Jie Zhuang, Zongpeng Qiao, Xiao Yuan
-
Publication number: 20210103831Abstract: Methods and systems for recommending one or more computing devices for accessing one or more applications are described herein. Resource requirements may be determined for at least one application. Such resource requirements may be, e.g., a display resolution. Computing device attributes may be determined for computing devices capable of executing the application. The resource requirements and/or the computing device attributes may be normalized and/or modified based on machine learning techniques. The machine learning techniques may modify the application resource requirements and/or computing device attributes based on user feedback. Distances between the resource requirements and the computing device attributes may be determined. A recommendation to use a particular preferred computing device may be transmitted based on the distance comparison. The recommendation may be based on the minimum or maximum distance calculated. User feedback regarding the recommendation may be received.Type: ApplicationFiled: December 11, 2019Publication date: April 8, 2021Inventors: Xiaolu Chu, Tie Liu, Jie Zhuang, Zongpeng Qiao
-
Patent number: 10972406Abstract: Disclosed are methods, systems and computer-readable media involving data that associates a computing resource with at least one time slot. Based at least in part on the data and a current time being within the at least one time slot, a device may be caused to display an indication that the computing resource can be accessed using the device. Based at least in part on the data and a current time being outside the at least one time slot, the device may be caused to cease displaying the indication.Type: GrantFiled: September 24, 2019Date of Patent: April 6, 2021Assignee: Citrix Systems, Inc.Inventors: Xiao Zhang, Zongpeng Qiao, Jie Zhuang
-
Publication number: 20210058319Abstract: Methods and systems for path selection involving remote access protocols and/or user behavior are described herein. A request, from a first computing device, for content hosted on a second computing device may be received. Based on network state metrics, remote access protocol metrics, and/or user experience metrics, a path of a plurality of paths between the first computing device and the second computing device may be selected. The path need not be the most direct path between the first computing device and the second computing device, and may comprise remote access to a computing device on an intermediary server. Based on user behavior analysis performed with respect to user input data, a path may be re-selected, and/or the network state metrics, remote access protocol metrics, and/or user experience metrics may be weighted.Type: ApplicationFiled: November 6, 2020Publication date: February 25, 2021Inventors: Xiaolu Chu, Jinren Zhang, Jie Zhuang, Tao Zhan
-
Publication number: 20210058339Abstract: Disclosed are methods, systems and computer-readable media involving data that associates a computing resource with at least one time slot. Based at least in part on the data and a current time being within the at least one time slot, a device may be caused to display an indication that the computing resource can be accessed using the device. Based at least in part on the data and a current time being outside the at least one time slot, the device may be caused to cease displaying the indication.Type: ApplicationFiled: September 24, 2019Publication date: February 25, 2021Inventors: Xiao Zhang, Zongpeng Qiao, Jie Zhuang
-
Patent number: 10904143Abstract: Methods and systems for path selection involving remote access protocols and/or user behavior are described herein. A request, from a first computing device, for content hosted on a second computing device may be received. Based on network state metrics, remote access protocol metrics, and/or user experience metrics, a path of a plurality of paths between the first computing device and the second computing device may be selected. The path need not be the most direct path between the first computing device and the second computing device, and may comprise remote access to a computing device on an intermediary server. Based on user behavior analysis performed with respect to user input data, a path may be re-selected, and/or the network state metrics, remote access protocol metrics, and/or user experience metrics may be weighted.Type: GrantFiled: May 23, 2019Date of Patent: January 26, 2021Assignee: Citrix Systems, Inc.Inventors: Xiaolu Chu, Jinren Zhang, Jie Zhuang, Tao Zhan
-
Publication number: 20200296036Abstract: Methods and systems for path selection involving remote access protocols and/or user behavior are described herein. A request, from a first computing device, for content hosted on a second computing device may be received. Based on network state metrics, remote access protocol metrics, and/or user experience metrics, a path of a plurality of paths between the first computing device and the second computing device may be selected. The path need not be the most direct path between the first computing device and the second computing device, and may comprise remote access to a computing device on an intermediary server. Based on user behavior analysis performed with respect to user input data, a path may be re-selected, and/or the network state metrics, remote access protocol metrics, and/or user experience metrics may be weighted.Type: ApplicationFiled: May 23, 2019Publication date: September 17, 2020Inventors: Xiaolu Chu, Jinren Zhang, Jie Zhuang, Tao Zhan
-
Patent number: 10705205Abstract: The present invention relates to the technical field of synthetic aperture radar, and in particular to a ground-based interference synthetic aperture radar-based atmospheric phase compensation method. The present invention first uses the inverse fast Fourier transform algorithm to rapidly and effectively realize the focusing in the range and cross-range dimension. Then a triple threshold method which combines coherence coefficient, amplitude, and amplitude dispersion index is used to select reliable PS points. Finally, under a full consideration of the spatial correlation of the atmospheric phase, the atmospheric phase is estimated by using a two-dimensional-polynomial model. The present invention can rapidly and accurately estimate and compensate the atmospheric phase, is helpful in improving the accuracy of GB-InSAR real-time measurement, and valuable and universal in practical application.Type: GrantFiled: June 20, 2018Date of Patent: July 7, 2020Assignee: UNIVERSITY OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINAInventors: Qun Wan, Yue Yang, Zhenzhu Zha, Jihao Yin, Lin Zou, Jie Zhuang, Xinyu Chen
-
Publication number: 20200183887Abstract: Methods and systems for detecting and addressing file redundancies. A server may be configured to store a plurality of files associated with a plurality of identifiers. The identifiers may be generated using a hash function. The server may receive an indication of a first file. The indication of the first file may correspond to a user uploading the first file to the server, and may comprise a first identifier of the first file. The server may determine, by comparing the first identifier and the plurality of identifiers, that a second file is the same as the first file. Based on the second identifier, a pointer to the second file may be provided to prevent redundant storage of content similar to that of the second file. If an edit associated with a pointer, of a plurality of pointers to a centrally-stored file, is made, a new centrally-stored file may be created.Type: ApplicationFiled: December 5, 2018Publication date: June 11, 2020Inventors: Jie Zhuang, Zongpeng Qiao, Xiao Yuan
-
Publication number: 20190353779Abstract: The present invention relates to the technical field of synthetic aperture radar, and in particular to a ground-based interference synthetic aperture radar-based atmospheric phase compensation method. The present invention first uses the inverse fast Fourier transform algorithm to rapidly and effectively realize the focusing in the range and cross-range dimension. Then a triple threshold method which combines coherence coefficient, amplitude, and amplitude dispersion index is used to select reliable PS points. Finally, under a full consideration of the spatial correlation of the atmospheric phase, the atmospheric phase is estimated by using a two-dimensional-polynomial model. The present invention can rapidly and accurately estimate and compensate the atmospheric phase, is helpful in improving the accuracy of GB-InSAR real-time measurement, and valuable and universal in practical application.Type: ApplicationFiled: June 20, 2018Publication date: November 21, 2019Applicant: University of Electronic Science and Technology of ChinaInventors: Qun WAN, Yue YANG, Zhenzhu ZHA, Jihao YIN, Lin ZOU, Jie ZHUANG, Xinyu CHEN