Patents by Inventor Lidong Qu

Lidong Qu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160203541
    Abstract: The present invention relates to a method and system for data tagging in the field of computer technologies. In this method, a user terminal acquires tag data, obtains information about services and functions associated with the tag data, then interacts with target servers to exchange service and function information, and fulfills appropriate services and functions to complete the business application. The disclosed data tagging method and system allow user terminal to interact with directly target servers that are associated with relevant services and functions, which allows functions to be realized in distributed target servers, which simplifies the implementations of tag data, reducing the cost to setting servers. The disclosed data tagging methods allow more extensive applications of data tagging, improved user experiences, simplified processes, and lower costs.
    Type: Application
    Filed: July 18, 2014
    Publication date: July 14, 2016
    Inventor: Lidong QU
  • Patent number: 9230067
    Abstract: A method for standardizing computer system action, including: intercepting invoking command; obtaining data structure of the intercepted invoking command after intercepting the invoking command; determining the sponsor of the intercepted invoking command based on the data structure of the obtained and intercepted invoking command, and determining operation method and operation object of the intercepted invoking command; matching the sponsor, the operation method and the operation object of the intercepted invoking command with rules of standardizing computer system action, judging whether to allow executing the intercepted invoking command. The present disclosure determines the sponsor of the intercepted invoking command according to the data structure of the invoking command, and can monitor comprehensively computer system. If only the sponsor is spiteful, the disclosure does not all allow executing the intercepted invoking command, thus detecting lawless operation comprehensively and effectively.
    Type: Grant
    Filed: December 21, 2010
    Date of Patent: January 5, 2016
    Assignee: ANTAIOS (BEIJING) INFORMATION TECHNOLOGY CO., LTD.
    Inventors: Jiaxiang Wang, Lidong Qu
  • Publication number: 20150227959
    Abstract: The present invention relates to a method and system that use data tags to track tasks in applications to provide Object-to-Object (OTO) services. A first application data tag is issued by a data tag server as in an OTO service platform in response to an initiation of a first application by a first initiator. The first data tag specifies at least one first task for fulfilling a first service. The first application data tag is scanned by a first user terminal by a first participant. A first action data tag is issued by the data tag server. A first dynamically variable task data tag is issued by the data tag server to track the first task in the first action. The first dynamically variable task data tag is updated to record the completion of the first task in the first action when the first task is completed.
    Type: Application
    Filed: April 21, 2015
    Publication date: August 13, 2015
    Inventor: Lidong Qu
  • Publication number: 20150081899
    Abstract: The present invention relates to a method and system that use data tags to track tasks in applications to provide Object-to-Object (OTO) services. A first application data tag is issued by a data tag server as in an OTO service platform in response to an initiation of a first application by a first initiator. The first data tag specifies at least one first task for fulfilling a first service. The first application data tag is scanned by a first user terminal by a first participant. A first action data tag is issued by the data tag server. A first dynamically variable task data tag is issued by the data tag server to track the first task in the first action. The first dynamically variable task data tag is updated to record the completion of the first task in the first action when the first task is completed.
    Type: Application
    Filed: November 25, 2014
    Publication date: March 19, 2015
    Inventor: Lidong Qu
  • Publication number: 20150082329
    Abstract: The present invention relates to a method and system for data tagging in the field of computer technologies. In this method, a user terminal acquires tag data, obtains information about services and functions associated with the tag data, then interacts with target servers to exchange service and function information, and fulfills appropriate services and functions to complete the business application. The disclosed data tagging method and system allow user terminal to interact with directly target servers that are associated with relevant services and functions, which allows functions to be realized in distributed target servers, which simplifies the implementations of tag data, reducing the cost to setting servers. The disclosed data tagging methods allow more extensive applications of data tagging, improved user experiences, simplified processes, and lower costs.
    Type: Application
    Filed: August 17, 2014
    Publication date: March 19, 2015
    Inventor: Lidong Qu
  • Publication number: 20130219464
    Abstract: A method for standardizing computer system action, including: intercepting invoking command; obtaining data structure of the intercepted invoking command after intercepting the invoking command; determining the sponsor of the intercepted invoking command based on the data structure of the obtained and intercepted invoking command, and determining operation method and operation object of the intercepted invoking command; matching the sponsor, the operation method and the operation object of the intercepted invoking command with rules of standardizing computer system action, judging whether to allow executing the intercepted invoking command. The present disclosure determines the sponsor of the intercepted invoking command according to the data structure of the invoicing command, and can monitor comprehensively computer system. If only the sponsor is spiteful, the disclosure does not all allow executing the intercepted invoking command, thus detecting lawless operation comprehensively and effectively.
    Type: Application
    Filed: December 21, 2010
    Publication date: August 22, 2013
    Applicant: Beijing Zhongtian Antai Technology Co., Ltd.
    Inventors: Jiaxing Wang, Lidong Qu
  • Publication number: 20130174162
    Abstract: A method for constructing data structures and a method for describing running states of a computer and state transitions thereof are provided. The method for constructing the data structure, which describes the execution processes of computer codes, includes: when the computer is running, constructs the data structure using the code segment wherein lies a calling instruction as a node and using the calling relationship between the code segment initiating the calling instruction and the called code segment, which are both constructed by the calling instruction, as a calling path. The data structure includes every node and the calling path between every calling and called nodes. When a certain calling instruction is executed, it is possible to describe the running state of the computer when the calling instruction is executed with the data structure consisting of all nodes and calling paths before the calling instruction by constructing the above data structure.
    Type: Application
    Filed: September 26, 2010
    Publication date: July 4, 2013
    Applicant: Beijing Zhongtian Antai Technology Co., Ltd.
    Inventors: Jiaxiang Wang, Lidong Qu