Patents by Inventor LIBIN SUN

LIBIN SUN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160370578
    Abstract: A system that comprises a receiver port to receive lens system design specifications; and a processor to: select a lens system type that includes one or more preliminary lenses, the selecting based, at least in part, on the lens system design specifications; from a lens database, select one or more catalog lenses to add to or replace the one or more preliminary lenses of the lens system type to construct a lens system; vary distances between or among the one or more catalog lenses and/or the one or more preliminary lenses of the lens system; and as the distances vary, determine optical behavior of the lens system.
    Type: Application
    Filed: June 22, 2015
    Publication date: December 22, 2016
    Inventors: Brian K. Guenter, Neel S. Joshi, Libin Sun
  • Publication number: 20160196884
    Abstract: A reactor lateral reflection layer telescoped control rod capable of separately achieving cold shutdown includes an inner rod, an outer rod and a guide cylinder assembly which are vertically and coaxially arranged, wherein the outer rod and the guide cylinder assembly are hollow cylindrical bodies; the top end of the inner rod can move up and down inside the outer rod and the other end of the inner rod moves up and down, along with the top end, inside a control rod passage which is positioned below the guide cylinder assembly and is coaxial with the guide cylinder assembly; and the top end of the outer rod can move up and down in the guide cylinder assembly and the other end of the outer rod moves up and down, along with the top end, inside the control rod passage.
    Type: Application
    Filed: September 3, 2014
    Publication date: July 7, 2016
    Inventors: Zuoyi ZHANG, Xingzhong DIAO, Zhengming ZHANG, Libin SUN, He YAN
  • Publication number: 20160019632
    Abstract: A method for processing transaction information for a commodity object is provided. The method includes receiving a request for purchasing a commodity object and generating, based on the request, a transaction order. The transaction order may include transaction amount information, information about a first user selling the commodity object, and information about a second user purchasing the commodity object. The method may further include setting an amount of fund in a fund account of the second user to a frozen state, and after a preset time period, transferring the amount of fund to a fund account of the first user. After the amount of fund is set to the frozen state and before the amount of fund is transferred to the fund account of the first user, an income produced by the amount of fund may be calculated and transferred to the fund account of the second user.
    Type: Application
    Filed: June 19, 2015
    Publication date: January 21, 2016
    Inventors: Xichun LIU, Baoyou CHENG, Xiangfei HUANG, Wei ZHANG, Zhenjie WANG, Haiquan ZHANG, Junlin ZHU, Heng LI, Shisheng LIU, Zengguang LIU, Libin SUN, Zhen YANG, Yong WU, Liwen XIE, Hongwei ZHAO, Zhebin TAO
  • Patent number: 8897588
    Abstract: An image de-blurring system obtains a blurred input image and generates, based on the blurred input image, a blur kernel. The blur kernel is an indication of how the image capture device was moved and/or how the subject captured in the image moved during image capture, resulting in blur. Based on the blur kernel and the blurred input image, a de-blurred image is generated. The blur kernel is generated based on sharp versions of the blurred input image predicted using a data-driven approach based on a collection of prior edges.
    Type: Grant
    Filed: November 20, 2012
    Date of Patent: November 25, 2014
    Assignee: Adobe Systems Incorporated
    Inventors: Jue Wang, Sunghyun Cho, Libin Sun
  • Publication number: 20140140633
    Abstract: An image de-blurring system obtains a blurred input image and generates, based on the blurred input image, a blur kernel. The blur kernel is an indication of how the image capture device was moved and/or how the subject captured in the image moved during image capture, resulting in blur. Based on the blur kernel and the blurred input image, a de-blurred image is generated. The blur kernel is generated based on sharp versions of the blurred input image predicted using a data-driven approach based on a collection of prior edges.
    Type: Application
    Filed: November 20, 2012
    Publication date: May 22, 2014
    Applicant: Adobe Systems Incorporated
    Inventors: Jue Wang, Sunghyun Cho, Libin Sun
  • Patent number: 8516103
    Abstract: Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: August 20, 2013
    Assignee: Linkage Technology Group Co., Ltd.
    Inventors: Xiaojun Wang, Wei Jiang, Dong Wu, Libin Sun, Haidong Pang, Zhiqiang Lu
  • Publication number: 20110289418
    Abstract: Construction of virtual environment, isolate the end user to interact directly with the core data sources, deploy the network listener engine in a virtual environment, using listening and interception technology, a variety of fine-grained authorization aggregates attribute information data to achieve the control of the end user to access core data sources. The present invention implements centralized control of remote maintenance authority, to Encapsulated client application packaged in a virtualized environment, control user access to core data sources, cut off end-users access to core data sources directly. Unify the interface of the maintenance path by virtual environment, standardized login path of maintenance personnel and maintenance tools.
    Type: Application
    Filed: May 16, 2011
    Publication date: November 24, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: XIAOJUN WANG, WEI JIANG, DONG WU, LIBIN SUN, HAIDONG PANG, ZHIQIANG LU
  • Publication number: 20110238851
    Abstract: SOAP client protocol encapsulation Based on TCP , based on the short TCP connection, SOAP client protocol encapsulation method, the client package for SOAP protocol, that is Web Services Description Language WSDL file into xml file, put to the client application's configuration file which, variable part of the SOAP protocol allows all the code from the configuration file object after conversion, and then generated after the body of SOAP protocol: 1) client load WSDL converted xml file; 2) the client application to read out the configuration file, the xml with the application to transfer data into a SOAP message body; 3) in the generated SOAP message body together with SOAP message header, turned into a complete SOAP request; 4) We will be based on TCP short connection to the complete SOAP request sent to the web services server, then receive and process about the content of web services to return, to complete a full SOAP interface calls; All the web Services client: a client using the same source, and adopt a
    Type: Application
    Filed: March 26, 2011
    Publication date: September 29, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: CHUNFEI ZHANG, Haihua Song, Bendong Wei, Fuhai Gao, Libin Sun, Haidong Pang, Zhiqiang Lu
  • Publication number: 20110137958
    Abstract: Implementation method of DATACOM Data command platform, taking the characteristic of data business into account, DATACOM system working on the data command platform, which is both data processor and data general converter, completes both command protocol conversion and command contents conversion, after the conversion of the opening command of data business from BOSS to the opening command of network element (NE) data, business opening, including single business and a batch of business, NE scheduling and load balancing are all achievable. Meanwhile, troubles are compatible; comprising following steps: 1) Data Source Configuration; 2) Configuration of Data Source Differences; 3) Data Command Configuration; 4) NE Data Configuration; 5) Configuration of Generating Data Command; this method stores the command in a configuration table, splitting the command content into records of the table.
    Type: Application
    Filed: December 7, 2010
    Publication date: June 9, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: GUOMIN HANG, Shan Chen, Bin Liang, Hua Li, Libin Sun, Fan Zhang
  • Publication number: 20110113014
    Abstract: A methodology of applying storage and logistics center model to achieve business data exchange between systems, is based on the storage logistics center model, establishes data storage management center, which receives and saves the data in each business system and sends data extraction request to the corresponding data; Conducts a detailed checking and verification action in the sending and receiving process of aforementioned data storage management center. Comparing with the existing technology and according to the empirical test, the data delivery stem that is based on fragmented data transportation of the logistics center model (the most typical system in the concurrent technology) shows that: performance is increased by 10%, resource consumption is reduced by 30%, system failure rate has dropped 20%, and each process can be controlled.
    Type: Application
    Filed: November 9, 2010
    Publication date: May 12, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: JIUSONG SHAO, ZHENHUA JI, CHENGGONG GU, LIBIN SUN, CHUNLEI GAO, YUANYUAN DAI, ZHIPENG YUE, LIANG DING, HAITAO SHI
  • Publication number: 20110085649
    Abstract: Fluctuation monitoring method based on the mid-layer data comprising a monitoring component of the customized instance, mid-layer telephone traffic statistics, a component of self learning telephone traffic and a drawing component of multidimensional traffic monitor. 1) Modeling of telephone traffic status is based on social science empirical model, and uses telephone traffic per day as an analysis granularity, which is composed of three dimensions—time, region and business. 2) the mid-layer of the telephone traffic statistics is calculated based on a monitoring target in regular time. 3) the self learning component of telephone traffic studies and forecasts based on monitoring data. 4) the drawing component of multidimensional traffic monitor will extract data from in the mid-layer of traffic data statistics.
    Type: Application
    Filed: October 11, 2010
    Publication date: April 14, 2011
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: JIUSONG SHAO, ZHENHUA JI, LIBIN SUN, JIANQIANG DENG, JINGLEI LANG, DAWEI SHI, YUFENG ZHAO, ZHE HUANG, SHUNCHENG XU
  • Publication number: 20100179954
    Abstract: For the massive data of physical memory on the computer system, data indexing can be created base on the two-dimensional hash indexing algorithm, using specific mapping relationship conversion between the index keyword and index sequence address under hash algorithm, which realize the fast addressing while introducing two-dimensional hash list to solve the ‘confliction’ problem of mapping relations in hash queue, which caused by the same keyword index or hash algorithm.
    Type: Application
    Filed: December 22, 2009
    Publication date: July 15, 2010
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: MIN CHEN, LIBIN SUN, BIN LIANG, GUOXIANG LIU, JIARONG ZHANG
  • Publication number: 20100179957
    Abstract: The polling method of switch status based on Timer-triggered Scheduler of Stored Procedures is to create interface tables related with switch status in the database including switch object table, switch type table, alarms information table which are used to store meta-information and switch status values. Then, create stored procedure of acquiring relevant switch status for each kind of switch needed for polling of switch status, and data will be filtered out and switch status will be judged via the related stored procedures, and write the status values into relevant switch status interface table; finally create regularly-executed tasks to regularly schedule each stored procedure required to poll switch status. The whole process is composed of three parts: i.e., create relevant switch status interface table; create stored procedure of acquiring switch status and setting status value; regularly-executed tasks.
    Type: Application
    Filed: December 22, 2009
    Publication date: July 15, 2010
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: JUNHUA ZHOU, HAIHUA SONG, LIBIN SUN, XIWEI HUANG, GUOXIANG LIU
  • Publication number: 20100179967
    Abstract: As for the data transfer method based on MAP, adopts a MAP data structure during the data transferring process and configures it using SOID (Standard of Interface Department) syntax after encapsulation; the definition of MAP data structure; one system consists of many matching and individual source ends and target ends, one source end just accesses to its matching target end, and vice versa, all member methods of source and target end adopt MAP structure to transfer data, logic implementation steps are shown as below: data processing of database is the most basic and most featured part of BRS system which adopts SOID syntax, if a table is not simply imported into another Oracle database, it should be treated by another process, that is, generate a derived class directly, and then rewrite “Key process”; data transfer method based on MAP bring excellent compatibility. It nearly supports all kinds of existing platforms, protocols, businesses and manufacturers.
    Type: Application
    Filed: December 22, 2009
    Publication date: July 15, 2010
    Applicant: LINKAGE TECHNOLOGY GROUP CO., LTD.
    Inventors: CHUNFEI ZHANG, HAIHUA SONG, LIBIN SUN, ZHIQIANG LU, BENDONG WEI, FUHAI GAO