Patents by Inventor Jingbin ZHANG

Jingbin ZHANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220378910
    Abstract: The present disclosure provides methods for inducing neoepitope-specific CD8+ T cells in an individual or for inducing trafficking of neoepitope-specific CD8+ T cells to a tumor in an individual using an RNA vaccine or using an RNA vaccine in combination with a PD-1 axis binding antagonist. Also provided herein are PD-1 axis binding antagonists and RNA vaccines that include one or more polynucleotides encoding one or more neoepitopes resulting from cancer-specific somatic mutations present in a tumor specimen obtained from the individual for use in methods of inducing neoepitope-specific CD8+ T cells in an individual or for inducing trafficking of neoepitope-specific CD8+ T cells to a tumor in an individual.
    Type: Application
    Filed: June 30, 2022
    Publication date: December 1, 2022
    Applicants: Genentech, Inc., BioNTech SE, Hoffmann-La Roche Inc.
    Inventors: Lars MUELLER, Rachel Lubong SABADO, Mahesh YADAV, Jingbin ZHANG, Ugur SAHIN
  • Patent number: 11212363
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a dossier interface and distributing the dossier are disclosed. In one aspect, a method includes the actions of receiving data identifying one or more documents to include in a dossier. The actions further include receiving a request to share the dossier with a first user. The actions further include providing a link to the dossier. The actions further include receiving a request to modify the dossier. The actions further include storing data that indicates the modification and maintaining the data identifying the one or more documents that represent the dossier. The actions further include receiving, from the first user, a request to share the dossier with a second user. The actions further include providing, to the second user, a link that identifies the dossier and the data that indicates the modification.
    Type: Grant
    Filed: February 8, 2017
    Date of Patent: December 28, 2021
    Assignee: MicroStrategy Incorporated
    Inventors: Erin Kate Carlson, Luis A. Dector, Yi Du, Joel Lebrun, Aaditya Navrekar, Michael J. Saylor, Ellen Wang, Xiaoyin Yang, Jingbin Zhang, Priya Samuel
  • Publication number: 20210271538
    Abstract: A method (and system) includes retrieving a dataset from a database, creating a report including a representation of the dataset, the representation of the dataset including a data attribute and a data metric, displaying the report on a graphical user interface and providing a configurable selector adapted to adjust the attribute or the metric. The selector is configurable to target one or multiple representations of data on the report. The selector is configurable to add or replace attributes or metrics to the representation of the dataset.
    Type: Application
    Filed: February 27, 2020
    Publication date: September 2, 2021
    Inventors: Yali GUO, Xiaodi ZHONG, Jingbin ZHANG, Jeffrey COURCELLE, Alejandro Olvera VELASCO
  • Publication number: 20200007644
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing a dossier interface and distributing the dossier are disclosed. In one aspect, a method includes the actions of receiving data identifying one or more documents to include in a dossier. The actions further include receiving a request to share the dossier with a first user. The actions further include providing a link to the dossier. The actions further include receiving a request to modify the dossier. The actions further include storing data that indicates the modification and maintaining the data identifying the one or more documents that represent the dossier. The actions further include receiving, from the first user, a request to share the dossier with a second user. The actions further include providing, to the second user, a link that identifies the dossier and the data that indicates the modification.
    Type: Application
    Filed: February 8, 2017
    Publication date: January 2, 2020
    Inventors: Erin Kate Carlson, Luis A. Dector, Yi Du, Joel Lebrun, Aaditya Navrekar, Michael J. Saylor, Ellen Wang, Xiaoyin Yang, Jingbin Zhang
  • Patent number: 9203614
    Abstract: The present invention relates to a method, an apparatus, and a system for protecting cloud data security. A key management center encrypts original data M sent by a first terminal using a key K, and uploads encrypted data C1 to a cloud server. When the key management center receives a request from a second terminal for the data M, it generates encrypted data C2, which is generated by first encrypting C1 with a key Kb of the second terminal and then decrypted by the key K that was used to encrypt the original data M to generate C1. The key management center then sends the encrypted data C2 to the second terminal. The second terminal decrypts the encrypted data C2 using its own key Kb to obtain the original data M.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: December 1, 2015
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Jingbin Zhang, Chengdong He
  • Publication number: 20140126723
    Abstract: The present invention relates to a method, an apparatus, and a system for protecting cloud data security. A key management center encrypts original data M sent by a first terminal using a key K, and uploads encrypted data C1 to a cloud server. When the key management center receives a request from a second terminal for the data M, it generates encrypted data C2, which is generated by first encrypting C1 with a key Kb of the second terminal and then decrypted by the key K that was used to encrypt the original data M to generate C1. The key management center then sends the encrypted data C2 to the second terminal. The second terminal decrypts the encrypted data C2 using its own key Kb to obtain the original data M.
    Type: Application
    Filed: December 27, 2013
    Publication date: May 8, 2014
    Applicant: HUAWEI TECHNOLOGIES CO.,LTD.
    Inventors: Jingbin ZHANG, Chengdong HE