Patents by Inventor Jin Lin

Jin Lin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240069943
    Abstract: Data-at-rest protection for virtual machines includes operating a data protection component within a first privilege context of a guest partition, and operating a guest operating system (OS) within a second privilege context of the guest partition. The data protection component participates in data input/output operations of the guest OS. Based on a data output operation of the guest OS, the data protection component applies a first data protection operation to first data associated with the data output operation; and initiates storage of a first result of the first data protection operation to a data storage device. Based a data input operation of the guest OS, the data protection component applies a second data protection operation to second data associated with the data input operation; and, based on applying the second data protection operation to the second data, communicates an outcome of the data input operation to the guest OS.
    Type: Application
    Filed: August 29, 2022
    Publication date: February 29, 2024
    Inventors: Jin LIN, David Alan HEPKIN, Michael Bishop EBERSOL, Matthew David KURJANOWICZ, Taylor Alan HOPE
  • Publication number: 20240050398
    Abstract: A method against snake envenomation includes administering to a subject in need thereof a pharmaceutical composition containing a flavonoid compound. The flavonoid compound is selected from the group consisting of isorhamnetin, quercetin, and a combination thereof.
    Type: Application
    Filed: August 9, 2023
    Publication date: February 15, 2024
    Inventors: Wen-Guey WU, Li-Kin HUANG, I-Jin LIN
  • Publication number: 20240045442
    Abstract: A method for controlling a plurality of mobile robots is to be implemented by a server that communicates with the plurality of mobile robots and a communication device. The server stores a predetermined working route related to a target area. The method includes steps of: receiving a working instruction from the communication device, the working instruction including area information related to the target area and an input quantity of mobile robots; in response to receipt of the working instruction, dividing the predetermined working route into a plurality of sub-routes, wherein a quantity of the sub-routes equals the input quantity of mobile robots; and sending the sub-routes respectively to a plurality of selected robots that are selected from among the plurality of mobile robots to make the selected robots cooperatively implement a task on the target area by moving along the sub-routes, respectively.
    Type: Application
    Filed: July 31, 2023
    Publication date: February 8, 2024
    Applicant: URSrobot AI Inc.
    Inventors: Chien-Tung CHEN, Chung-Hou WU, Chao-Cheng CHEN, Wen-Wei CHIANG, Yi-Jin LIN
  • Publication number: 20240045443
    Abstract: A method for controlling a plurality of autonomous robots for performing environment maintenance operations includes: generating a setup command that indicates a selected location, a plurality of selected robots, an available time slot, and a distribution mode signal that indicates whether the selected robots are to be controlled based on the available time slot or an inputted priority section; and generating a plurality of sub-routes based on different parameters, depending on the distribution mode signal. The sub-routes are generated to be connected into an unbroken trail. Then, the sub-routes are transmitted to the selected robots, respectively, so as to control each of the selected robots to move along the respective one of the sub-routes.
    Type: Application
    Filed: July 31, 2023
    Publication date: February 8, 2024
    Applicant: URSrobot AI Inc.
    Inventors: Chien-Tung Chen, Chung-Hou Wu, Chao-Cheng Chen, Wen-Wei Chiang, Yi-Jin Lin
  • Patent number: 11861364
    Abstract: Performing shadow stack functionality for a thread in an audit mode includes initiating execution of a thread at the processor. Execution of the thread includes initiating execution of executable code of an application binary as part of the thread and enabling shadow stack functionality for the thread in an audit mode. Based at least on the execution of the thread in the audit mode, at least a portion of the shadow stack is enabled to be a circular stack. In response to determining that usage of the shadow stack has reached the defined threshold, one or more currently used entries of the shadow stack are overwritten, preventing the shadow stack from overflowing.
    Type: Grant
    Filed: June 19, 2021
    Date of Patent: January 2, 2024
    Inventors: Jin Lin, Mehmet Iyigun, Jason Lin, Matthew John Woolman
  • Publication number: 20230401081
    Abstract: Isolating resources of a virtual machine (VM) guest from a host operating system. A computer system receives an acceptance request from a guest partition corresponding to an isolated VM. The acceptance request identifies a guest memory page that is mapped into a guest physical address space of the guest partition, and a memory page visibility class. The computer system determines whether a physical memory page that is mapped to the guest memory page meets the memory page visibility class. The computer system sets a page acceptance indication for the guest memory page from an unaccepted state to an accepted state based on the physical memory page meeting the memory page visibility class.
    Type: Application
    Filed: June 10, 2022
    Publication date: December 14, 2023
    Inventors: Jin LIN, David Alan HEPKIN, Michael Bishop EBERSOL, Stephanie Sumyi LUCK, Jonathan Edward LANGE, Bruce J. SHERWIN, JR., Kevin Michael BROAS, Wen Jia LIU, Xin David ZHANG, Alexander Daniel GREST
  • Publication number: 20230359219
    Abstract: A robot system is used to trace and record boundaries of multiple sites, and data of the recorded boundaries are transmitted to a server for storage therein. The server computes moving paths for the sites based on the data of the recorded boundaries. Upon receipt of a setting signal from a mobile device that indicates a selected robot and a target site, the server transmits a maintenance instruction that includes the boundary and the moving path for the target site to the selected robot, so that the selected robot performs maintenances on the target site based on the maintenance instruction.
    Type: Application
    Filed: April 28, 2023
    Publication date: November 9, 2023
    Inventors: Chien-Tung CHEN, Chung-Hou WU, Chao-Cheng CHEN, Wen-Wei CHIANG, Yi-Jin LIN
  • Publication number: 20230333139
    Abstract: A testing device is disclosed. The testing device includes a socket configured to support a DUT and a first detection module disposed at a first side of the socket and configured to detect a location relationship between the DUT and the socket.
    Type: Application
    Filed: April 15, 2022
    Publication date: October 19, 2023
    Applicants: Advanced Semiconductor Engineering, Inc., ASE TEST, INC.
    Inventors: Jia Jin LIN, Chia Hsiang WANG, Shih Pin CHUNG, Wei Shuo CHU, You Lin LEE, Pin Heng KUO, Cheng Chia TU
  • Publication number: 20230334144
    Abstract: The techniques disclosed herein enable a system to configure a confidential virtual resource unit by provisioning a security component to a tenant's virtual resource unit. The system creates multiple different virtual trust layers within the confidential virtual resource unit. This creation effectively defines security boundaries between the virtual trust layers. The virtual trust layers are associated with different privileges, such that a higher privileged virtual trust layer is provided with more privileges compared to a lower privileged virtual trust layer. In one example, a lower privileged virtual trust layer may include basic virtual resource components (e.g., drivers, applications, processes, functions, workloads executing within a guest operating system) and a higher privileged virtual trust layer is the location to which a virtual security component is provisioned by the system.
    Type: Application
    Filed: May 27, 2022
    Publication date: October 19, 2023
    Inventors: Jin LIN, Michael Bishop EBERSOL, David Kimler ALTOBELLI, Jingbo WU, Qiang WANG
  • Publication number: 20230302617
    Abstract: A fastener tool includes a motor, a drive mechanism connected to the motor and adapted to drive a piston, and a cylinder filled with compressed gas. The piston is accommodated in the cylinder and suitable for a reciprocating motion within the cylinder. The drive mechanism includes a blade fixed to the piston, and a gear coupled to the motor. The gear contains a plurality of teeth adapted to engage with a plurality of lugs on the blade such that a rotation of the gear is transformed to a linear movement of the blade. The drive mechanism further includes a disengagement module which within a period of a rotation cycle of the gear, is configured to prevent one of the plurality of teeth from unintentionally engaging with a misaligned one of the lugs.
    Type: Application
    Filed: June 2, 2023
    Publication date: September 28, 2023
    Inventors: Ying Xiang TAN, Hai Ling LIN, Xi HE, Jin Lin ZHOU
  • Patent number: 11754472
    Abstract: A process diagnosis system includes a digital twin calculation unit, a process diagnosis calculation unit, and a remote calculation analysis unit. The digital twin calculation unit obtains a vibration-related parameter and a cutting-related parameter of a processing device, and performs a simulation calculation for the vibration-related parameter, the cutting-related parameter and a three-dimensional model corresponding to the processing device to generate a three-dimensional calculation result. The process diagnosis calculation unit receives a three-dimensional calculation result and displays the three-dimensional calculation result. The remote calculation analysis unit receives the three-dimensional calculation result, and performs a simulation analysis for the three-dimensional calculation result to generate an analysis result.
    Type: Grant
    Filed: December 27, 2021
    Date of Patent: September 12, 2023
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Yi-Jin Lin, Shuo-Peng Liang, Chien-Chih Liao, Tzuo-Liang Luo, Wan-Kun Chang, Jen-Ji Wang
  • Publication number: 20230280752
    Abstract: A method for preventing a robot from colliding with another robot that is provided with an identifying image includes steps of: controlling the robot to move along a predetermined path; stopping the robot when it is determined that a first image captured by the robot while the robot is moving contains the identifying image; and controlling the robot to resume moving along the predetermined path when it is determined that a second image captured by the robot while the robot is not moving does not contain the identifying image.
    Type: Application
    Filed: February 28, 2023
    Publication date: September 7, 2023
    Inventors: Chien-Tung CHEN, Chung-Hou WU, Chao-Cheng CHEN, Yi-Jin LIN, Dien-Lin TSAI
  • Patent number: 11709931
    Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.
    Type: Grant
    Filed: June 6, 2022
    Date of Patent: July 25, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jason Lin, Jin Lin, Gregory John Colombo, Niraj Majmudar, Mehmet Iyigun, Shayne Daniel Hiet-Block, Kenneth Dean Johnson
  • Patent number: 11667018
    Abstract: A fastener tool includes a motor, a drive mechanism connected to the motor and adapted to drive a piston, and a cylinder filled with high-pressure gas. The piston is accommodated in the cylinder and suitable for a reciprocating motion within the cylinder. The drive mechanism includes a blade fixed to the piston and a gear coupled to the motor. The gear contains a plurality of teeth adapted to engage with a plurality of lugs on the blade such that a rotation of the gear is transformed to a linear movement of the blade. The drive mechanism further includes a disengagement module which, within a period of a rotation cycle of the gear, is configured to prevent one of the plurality of teeth from unintentionally engaging with a misaligned one of the lugs.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: June 6, 2023
    Inventors: Ying Xiang Tan, Hai Ling Lin, Xi He, Jin Lin Zhou
  • Publication number: 20230168155
    Abstract: A process diagnosis system includes a digital twin calculation unit, a process diagnosis calculation unit, and a remote calculation analysis unit. The digital twin calculation unit obtains a vibration-related parameter and a cutting-related parameter of a processing device, and performs a simulation calculation for the vibration-related parameter, the cutting-related parameter and a three-dimensional model corresponding to the processing device to generate a three-dimensional calculation result. The process diagnosis calculation unit receives a three-dimensional calculation result and displays the three-dimensional calculation result. The remote calculation analysis unit receives the three-dimensional calculation result, and performs a simulation analysis for the three-dimensional calculation result to generate an analysis result.
    Type: Application
    Filed: December 27, 2021
    Publication date: June 1, 2023
    Inventors: Yi-Jin LIN, Shuo-Peng LIANG, Chien-Chih LIAO, Tzuo-Liang LUO, Wan-Kun CHANG, Jen-Ji WANG
  • Publication number: 20230088081
    Abstract: Handling a memory fault based on detecting whether a memory pointer was invalidated by a pointer authentication (PA) failure. After an access to a memory pointer causes a memory fault, detecting that the memory pointer was invalidated by a PA failure includes creating a new memory pointer by replacing reserved bits of the memory pointer with a default value, and determining that the new memory pointer corresponds to a memory address that falls within executable memory. This determination includes determining that the memory address is within an executable memory page, determining that a call instruction is stored at a prior memory address that immediately precedes the memory address, and/or determining that the memory address corresponds to a code section of an executable file. The PA failure is handled based on logging the PA failure, terminating the application program, and/or resuming execution at an instruction stored at the memory address.
    Type: Application
    Filed: September 17, 2021
    Publication date: March 23, 2023
    Inventors: Jin LIN, Jason LIN, Matthew John WOOLMAN, Mehmet IYIGUN
  • Publication number: 20230069004
    Abstract: An electric vehicle charging station management method using a blockchain is provided, including the following steps: obtaining a maximum charging and a discharging electric power of each electric vehicle in each to-be-planned pane; obtaining a charging and discharging electric power of each electric vehicle in each to-be-planned pane according to electric vehicle information corresponding to the electric vehicle, at least one purchase price, at least one winning bid price, and at least one maximum charging and discharging electric power; determining whether at least one overloaded pane is provided according to a total consumed electric power of a charging station in each time pane; and adjusting the purchase price of each overloaded pane when it is determined that at least one overloaded pane is provided and re-planning the charging and discharging electric power of the electric vehicle in each to-be-planned pane until it is determined that no overloaded pane is provided.
    Type: Application
    Filed: August 2, 2022
    Publication date: March 2, 2023
    Applicants: Guochuang Innovation Center of Mobile Energy (Jiangsu) Co.,Ltd., Wanbang Star Charge Technology Ltd., Wanbang Digital Energy Co., Ltd.
    Inventors: Hong-Tzer Yang, Yu-Jin Lin, Danwei Shao
  • Patent number: 11500981
    Abstract: Enforcing shadow stack violations for dynamic code. A thread is executed at a processor, which includes generating a portion of dynamic code for execution by the thread, identifying a range of memory addresses where the portion of dynamic code is loaded in memory, and initiating execution of the portion of dynamic code. Based at least on execution of the thread, an exception triggered by a mismatch between a first return address popped from a call stack corresponding to the thread and a second return address popped from a shadow stack corresponding to the thread is processed. Processing the exception includes (i) determining whether the second return address popped from the shadow stack is within the identified range of addresses, and (ii) based on having determined that the second return address is within the range of addresses, initiating a shadow stack enforcement action.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: November 15, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jin Lin, Jason Lin, Niraj Majmudar, Mehmet Iyigun
  • Publication number: 20220342983
    Abstract: Enforcing shadow stack violations at module granularity, rather than at thread or process granularity. An exception is processed during execution of a thread based on code of an application binary, which is enabled for shadow stack enforcement, that calls an external module. The exception results from a mismatch between a return address popped from the thread's call stack and a return address popped from the thread's shadow stack. Processing the exception includes determining that the exception resulted from execution of an instruction in the external module, and determining whether or not the external module is enabled for shadow stack enforcement. Based at least on these determinations, execution of the thread is terminated when the external module is enabled for shadow stack enforcement, or the thread is permitted to continue executing when the external module is not enabled for shadow stack enforcement.
    Type: Application
    Filed: June 6, 2022
    Publication date: October 27, 2022
    Inventors: Jason LIN, Jin LIN, Gregory John COLOMBO, Niraj MAJMUDAR, Mehmet IYIGUN, Shayne Daniel HIET-BLOCK, Kenneth Dean JOHNSON
  • Patent number: D974859
    Type: Grant
    Filed: March 25, 2021
    Date of Patent: January 10, 2023
    Inventor: Jin Lin