Patents by Inventor LIXIN LU

LIXIN LU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250019302
    Abstract: This invention discloses a rare earth energy-saving admixture and its preparation method for cement kilns, involving the field of energy saving and emission reduction technology for cement kilns. The invention, without changing or minimally changing existing hardware equipment, reduces the thermal consumption of the production system and sulfur-nitrogen and sulfur emissions by conducting a thermodynamic diagnosis and calculating the amount of rare earth energy-saving admixture to be added, thereby saving the cost of retrofitting large hardware equipment.
    Type: Application
    Filed: September 30, 2024
    Publication date: January 16, 2025
    Applicants: BAOTOU HONGRUN RARE EARTH TECIINOLOGY CO.,LTD., BEIJING HONGKERUIDA ENGINEERING CO.,LTD.
    Inventors: Jinzheng HE, Jun ZHANG, Lixin LU, Quansen ZHANG
  • Patent number: 11131712
    Abstract: A device for inspecting the rotor windings of a generator includes a sequential logic circuit that generates a full-cycle pulse. A high-voltage full-cycle pulse matching generator couples the full-cycle pulse generated by the sequential logic circuit to form a corresponding transient bidirectional rotating magnetic field pulse. The transient bidirectional rotating magnetic field pulse is transmitted to two ends and a large shaft of the generator rotor winding through an impedance-matched connecting line. The transient bidirectional rotating magnetic field pulse generates a resonance effect with each large coil in the rotor. The pulse signal coupling feedback acquisition circuit couples all waveforms reflected by the generator rotor to form a magnetic field waveform, and the magnetic field waveform is transmitted to a data acquisition system by an operational amplifier. A central processing unit transmits a digital information stream to an upper computer.
    Type: Grant
    Filed: August 17, 2018
    Date of Patent: September 28, 2021
    Assignee: SHANDONG GUTE ELECTRIC CO., LTD.
    Inventors: Yuewu Zhang, Chicheng Liu, Jingrong Chen, Genyin Wu, Xu Han, Lixin Lu, Juncheng Dong, Yuqing Wei, Kunpeng Tian, Fengjun Wang, Jianxi Liu, Yanxu Sun, Zhen Lv, Jianfeng Sun, Pian Zhang
  • Publication number: 20200400746
    Abstract: A device for inspecting the rotor windings of a generator includes a sequential logic circuit that generates a full-cycle pulse. A high-voltage full-cycle pulse matching generator couples the full-cycle pulse generated by the sequential logic circuit to form a corresponding transient bidirectional rotating magnetic field pulse. The transient bidirectional rotating magnetic field pulse is transmitted to two ends and a large shaft of the generator rotor winding through an impedance-matched connecting line. The transient bidirectional rotating magnetic field pulse generates a resonance effect with each large coil in the rotor. The pulse signal coupling feedback acquisition circuit couples all waveforms reflected by the generator rotor to form a magnetic field waveform, and the magnetic field waveform is transmitted to a data acquisition system by an operational amplifier. A central processing unit transmits a digital information stream to an upper computer.
    Type: Application
    Filed: August 17, 2018
    Publication date: December 24, 2020
    Applicant: SHANDONG GUTE ELECTRIC CO., LTD.
    Inventors: Yuewu ZHANG, Chicheng LIU, Jingrong CHEN, Genyin WU, Xu HAN, Lixin LU, Juncheng DONG, Yuqing WEI, Kunpeng TIAN, Fengjun WANG, Jianxi LIU, Yanxu SUN, Zhen LV, Jianfeng SUN, Pian ZHANG
  • Patent number: 10802989
    Abstract: Embodiments of this disclosure are directed to an execution profiling handler configured for intercepting an invocation of memory allocation library and observing memory allocation for an executable application process. The observed memory allocation can be used to update memory allocation meta-data for tracking purposes. The execution profiling handler can also intercept indirect branch calls to prevent heap allocation from converting to execution and intercept exploitation of heap memory to block execution.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: October 13, 2020
    Assignee: McAfee, LLC
    Inventors: Xiaoning Li, Lixin Lu, Ravi Sahita
  • Patent number: 10455811
    Abstract: A compression resistant and long-lasting scented dog toy and its preparation method. The compression resistant and long-lasting scented dog toy comprises a rubber body and cloth fluidized on it. The rubber body is made of following raw materials by weight: natural rubber, zinc oxide, camphene, stearic acid, anti-aging agent, edible gum, starch, microcrystalline wax, white carbon black, naphthenic oil, silicone rubber, butyl rubber, accelerant, antiozonant, medical light calcium carbonate, edible rapeseed oil, flavor enhancer, sour agent, talcum powder and fatty acid softening agent. The invention is made of a rubber body and cloth fluidized on it. Flavoring agents are mixed in the rubber body so as to produce a compression resistant and long-lasting scented body with durable fragrance.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: October 29, 2019
    Inventor: Lixin Lu
  • Patent number: 10366228
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to identify regions of code to be monitored, probe and lock code pages that include the identified regions of code, and remap the code pages as execute only. The code pages can be remapped as execute only in an alternate extended page table view.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: July 30, 2019
    Assignee: McAfee, LLC
    Inventors: Ravi Sahita, Lu Deng, Vedvyas Shanbhogue, Lixin Lu, Alexander Shepsen, Igor Tatourian
  • Publication number: 20190213144
    Abstract: Embodiments of this disclosure are directed to an execution profiling handler configured for intercepting an invocation of memory allocation library and observing memory allocation for an executable application process. The observed memory allocation can be used to update memory allocation meta-data for tracking purposes. The execution profiling handler can also intercept indirect branch calls to prevent heap allocation from converting to execution and intercept exploitation of heap memory to block execution.
    Type: Application
    Filed: March 19, 2019
    Publication date: July 11, 2019
    Applicant: McAfee, LLC
    Inventors: Xiaoning Li, Lixin Lu, Ravi L. Sahita
  • Patent number: 10289570
    Abstract: Embodiments of this disclosure are directed to an execution profiling handler configured for intercepting an invocation of memory allocation library and observing memory allocation for an executable application process. The observed memory allocation can be used to update memory allocation meta-data for tracking purposes. The execution profiling handler can also intercept indirect branch calls to prevent heap allocation from converting to execution and intercept exploitation of heap memory to block execution.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: May 14, 2019
    Assignee: McAfee, LLC
    Inventors: Xiaoning Li, Lixin Lu, Ravi Sahita
  • Patent number: 10210331
    Abstract: Embodiments include identifying, at a logical path node, a first logical path and a second logical path; executing, by a processor implemented at least partially in hardware, a first set of instructions to follow the first logical path; storing, in a memory, a first set of information obtained from following the first logical path; evaluating, by a malware handler module implemented at least partially in hardware, the first set of information for malware; restoring, from the memory, environmental data for the first logical path node; executing, by the processor, a second set of instructions to follow the second logical path; storing, in a memory, a second set of information obtained from following the second logical path; and evaluating, by the malware handler module, the second set of information for malware.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: February 19, 2019
    Assignee: McAfee, LLC
    Inventors: Ravi Sahita, Xiaoning Li, Lixin Lu, Lu Deng, Alexander Shepsen, Xiang Xu, Liangjun Huang, Hua Liu, Kai Huang
  • Publication number: 20190050569
    Abstract: The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing static analysis of the samples, determining latent logic execution path information regarding the samples, classifying the samples, and/or providing intelligent report information regarding the samples.
    Type: Application
    Filed: August 27, 2018
    Publication date: February 14, 2019
    Applicant: McAfee Ireland Holdings Limited
    Inventor: Lixin LU
  • Patent number: 10204224
    Abstract: The present disclosure relates to malware and, more particularly, towards systems and methods of processing information associated with detecting and handling malware. According to certain illustrative implementations, methods of processing malware are disclosed. Moreover, such methods may include one or more of unpacking and/or decrypting malware samples, dynamically analyzing the samples, disassembling and/or reverse engineering the samples, performing static analysis of the samples, determining latent logic execution path information regarding the samples, classifying the samples, and/or providing intelligent report information regarding the samples.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: February 12, 2019
    Assignee: McAfee Ireland Holdings Limited
    Inventor: Lixin Lu
  • Publication number: 20180303067
    Abstract: A compression resistant and long-lasting scented dog toy and its preparation method. The compression resistant and long-lasting scented dog toy comprises a rubber body and cloth fluidized on it. The rubber body is made of following raw materials by weight: natural rubber, zinc oxide, camphene, stearic acid, anti-aging agent, edible gum, starch, microcrystalline wax, white carbon black, naphthenic oil, silicone rubber, butyl rubber, accelerant, antiozonant, medical light calcium carbonate, edible rapeseed oil, flavor enhancer, sour agent, talcum powder and fatty acid softening agent. The invention is made of a rubber body and cloth fluidized on it. Flavouring agents are mixed in the rubber body so as to produce a compression resistant and long-lasting scented body with durable fragrance.
    Type: Application
    Filed: February 7, 2017
    Publication date: October 25, 2018
    Applicant: SHANGHAI JIAYUANHUI TRADING CO. LTD.
    Inventor: Lixin LU
  • Patent number: 10025930
    Abstract: Embodiments of the present disclosure are directed to a self-check application to determine whether an indirect branch execution is permissible for an executable application. The self-check application uses one or more parameters received from an execution profiling module to determine whether the indirect branch execution is permitted by one or more self-check policies.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: July 17, 2018
    Assignee: McAfee, LLC
    Inventors: Xiaoning Li, Lixin Lu, Ravi Sahita
  • Publication number: 20180157829
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to identify regions of code to be monitored, probe and lock code pages that include the identified regions of code, and remap the code pages as execute only. The code pages can be remapped as execute only in an alternate extended page table view.
    Type: Application
    Filed: January 31, 2018
    Publication date: June 7, 2018
    Applicant: McAfee, LLC
    Inventors: Ravi Sahita, Lu Deng, Vedvyas Shanbhogue, Lixin Lu, Alexander Shepsen, Igor Tatourian
  • Publication number: 20180152470
    Abstract: Being targeted by an attacker is unfortunate and being actually attacked is even worse. When this happens, it indicates there must be a weakness or vulnerability existing in a network that the attacker knows about but a user is unaware of or does not pay attention before. The present invention discloses ideas and methods to find out the weakness, that the attacker has discovered and/or aimed at, from all different traces or evidences or signals left by the attacker at different places during reconnaissance or actually attacking cycle. Furthermore, it decomposes the algorithm used in attack's reconnaissance and performance, and uses the decomposed algorithm to fire-drill-test other systems to see if the same or similar weaknesses exist in other places. Finally, it produces actionable instructions for a user to seal and to fix the identified weakness right away for stopping an attack and protecting the network and connected devices and systems.
    Type: Application
    Filed: November 29, 2016
    Publication date: May 31, 2018
    Inventor: Lixin LU
  • Patent number: 9961102
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to receive a function call for a function, determine a current stack pointer value for the function call, and determine if the current stack pointer value is within a pre-defined range. The electronic device can include a stack pivoting logging module to log a plurality of function calls. The electronic device can also include a stack pivoting detection module to analyze the log of the plurality of function calls to determine, for each of the plurality of function calls, if the current stack pointer value is within a pre-defined range.
    Type: Grant
    Filed: September 24, 2014
    Date of Patent: May 1, 2018
    Assignee: McAfee, LLC
    Inventors: Xiaoning Li, Lixin Lu, Lu Deng
  • Patent number: 9898605
    Abstract: Embodiments are directed to hooking a call for a malware monitoring logic into a JavaScript API engine interpreter. Upon JavaScript being placed into heap memory, the malware monitoring logic can initiate an evaluation or analysis of the heap spray to determine whether the JavaScript includes malware or other malicious agents prior to execution of the JavaScript shell code. Upon execution of the JavaScript within the sandbox, the malware monitoring logic can initiate monitoring of the JavaScript using malware analysis and/or execution profiling techniques. Inferences can be made of the presence of malware based on a start and end time of the JavaScript execution.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: February 20, 2018
    Assignee: McAfee, LLC
    Inventors: Ravi Sahita, Xiaoning Li, Lixin Lu, Lu Deng, Alexander Shepsen, Xiang Xu, Liangjun Huang, Hua Liu, Kai Huang
  • Patent number: 9886577
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to identify regions of code to be monitored, probe and lock code pages that include the identified regions of code, and remap the code pages as execute only to assist with the mitigation of malicious invocation of sensitive code. The code pages can be remapped as execute only in an alternate extended page table view to allow for the detection and mitigation of malicious invocation of sensitive code.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: February 6, 2018
    Assignee: McAfee, LLC
    Inventors: Ravi Sahita, Lu Deng, Vedvyas Shanbhogue, Lixin Lu, Alexander Shepsen, Igor Tatourian
  • Publication number: 20170185778
    Abstract: Embodiments include identifying, at a logical path node, a first logical path and a second logical path; executing, by a processor implemented at least partially in hardware, a first set of instructions to follow the first logical path; storing, in a memory, a first set of information obtained from following the first logical path; evaluating, by a malware handler module implemented at least partially in hardware, the first set of information for malware; restoring, from the memory, environmental data for the first logical path node; executing, by the processor, a second set of instructions to follow the second logical path; storing, in a memory, a second set of information obtained from following the second logical path; and evaluating, by the malware handler module, the second set of information for malware.
    Type: Application
    Filed: December 24, 2015
    Publication date: June 29, 2017
    Applicant: McAfee, Inc.
    Inventors: Ravi Sahita, Xiaoning Li, Lixin Lu, Lu Deng, Alexander Shepsen, Xiang Xu, Liangjun Huang, Hua Liu, Kai Huang
  • Publication number: 20170185777
    Abstract: Embodiments of the present disclosure are directed to a self-check application to determine whether an indirect branch execution is permissible for an executable application. The self-check application uses one or more parameters received from an execution profiling module to determine whether the indirect branch execution is permitted by one or more self-check policies.
    Type: Application
    Filed: December 24, 2015
    Publication date: June 29, 2017
    Applicant: McAfee, Inc.
    Inventors: Xiaoning Li, Lixin Lu, Ravi Sahita