Patents by Inventor Lu Xiao
Lu Xiao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9591470Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.Type: GrantFiled: October 30, 2014Date of Patent: March 7, 2017Assignee: QUALCOMM IncorporatedInventors: David Jonathan Julian, Chong Uk Lee, Kamran Moallemi, Avneesh Agrawal, Manuel Eduardo Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
-
Publication number: 20160364573Abstract: Techniques for mitigating the transitive data problem using a secure asset manager are provided. These techniques include generating a secure asset manager compliant application by tagging source code for the application with a data tag to indicate that a data element associated with the source code is a sensitive data element, accessing a policy file comprising transitive rules associated with the sensitive data element, and generating one or more object files for the application from the source code. These techniques also include storing a sensitive data element in a secure memory region managed by a secure asset manager, and managing the sensitive data element according to a policy associated with the sensitive data element by an application from which the sensitive data element originates, the policy defining transitive rules associated with the sensitive data element.Type: ApplicationFiled: June 11, 2015Publication date: December 15, 2016Inventors: Michael J.T. CHAN, Lu XIAO, Rosario CAMMAROTA, Olivier Jean BENOIT, Saurabh SABNIS, Yin Ling LIONG, Manish MOHAN
-
Patent number: 9509707Abstract: A computing device may use machine learning techniques to determine the level, degree, and severity of its vulnerability to side channel attacks. The computing device may intelligently and selectively perform obfuscation operations (e.g., operations to raise the noise floor) to prevent side channel attacks based on the determined level, degree, or severity of its current vulnerability to such attacks. The computing device may also monitor the current level of natural obfuscation produced by the device, determining whether there is sufficient natural obfuscation to prevent a side channel attack during an ongoing critical activity, and perform the obfuscation operation during the ongoing critical activity and in response to determining that there is not sufficient natural obfuscation to adequately protect the computing device against side channel attacks.Type: GrantFiled: June 24, 2014Date of Patent: November 29, 2016Assignee: QUALCOMM IncorporatedInventors: Satyajit Prabhakar Patne, Rajarshi Gupta, Lu Xiao
-
Patent number: 9510383Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.Type: GrantFiled: October 2, 2014Date of Patent: November 29, 2016Assignee: QUALCOMM IncorporatedInventors: Avneesh Agrawal, Chong Uk Lee, Kamran Moallemi, David Jonathan Julian, Manuel Eduardo Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
-
Publication number: 20160295416Abstract: Disclosed is a method for performing a message integrity check. In the method, a processor reads a message from a storage device. The message comprises a plurality of first level sections. The processor determines one or more second level sections from the plurality of first level sections. Each second level section comprises a fixed number of first level sections. A crypto engine calculates a hash value for each second level section to generate a respective calculated hash value, and a hash value for each first level section not included in a second level section to generate a respective calculated hash value. The processor compares each of the respective calculated hash values with a corresponding stored hash value. The processor provides an integrity check indication if each respective calculated hash value is equal to the corresponding stored hash value.Type: ApplicationFiled: April 2, 2015Publication date: October 6, 2016Inventors: Lu Xiao, Suresh Bollapragada
-
Publication number: 20160294802Abstract: Systems and methods for providing accelerated passphrase verification are disclosed. In one embodiment, a method includes receiving a full security string, generating a full security string hash code, storing the full security string hash code in a memory, determining at least one substring based on an entropy value associated with one or more leading characters in the full security string, generating at least one substring hash code and at least one corresponding character count value, such that the corresponding character count value equals a number of characters in the at least one substring, and storing the at least one substring hash code and the at least one corresponding character count value in the memory.Type: ApplicationFiled: March 30, 2015Publication date: October 6, 2016Inventors: Lu XIAO, Satyajit PATNE
-
Publication number: 20160203071Abstract: Errors in software may be detected via the use of design rule spaces and architecture root detection. Design rule spaces may reveal multiple overlapping modular structures of a software system, and reveal structural relations among error-prone files and structural problems contributing to error-proneness. Root detection may extract a few groups of architecturally connected files, which may be connected through problematic architecture relations that propagate errors among these files, and thus influence system error-proneness. The root detector may locate the core architecturally connected file groups that contribute to the error-proneness of a system. The root detection process may, beginning with a set of error-prone files, search and link other files that are architecturally related. The output of the root detection process may be a set of design rule spaces ordered by the number of error-prone contained therein.Type: ApplicationFiled: September 19, 2014Publication date: July 14, 2016Inventors: Yuanfang CAI, Lu XIAO
-
Patent number: 9344438Abstract: A multi-party commitment method is provided whereby a joining node uses contributions provided by contributor nodes in a peer-to-peer overlay network to generate a node identifier. The joining node generates a first contribution and sends a join request to an introducer node (or a plurality of contributor nodes), where the join request seeks to obtain one or more contributions for generating the node identifier within an identifier space of the overlay network. A hash of the first contribution may be included as part of the join request. In response, the joining node may receive a plurality of contributions, wherein the contributions are bound to each other and the first contribution by a prior external multi-node commitment operation. The joining node can then generate its node identifier as a function of the first contribution and the received contributions. Consequently, collusion between nodes and malicious manipulation during ID generation can be frustrated.Type: GrantFiled: December 22, 2008Date of Patent: May 17, 2016Assignee: QUALCOMM IncorporatedInventors: Lu Xiao, Vidya Narayanan, Edward Thomas Lingham Hardie, Ranjith S. Jayaram, Ramachandran Subramanian, Lakshminath Reddy Dondeti
-
Patent number: 9336160Abstract: A block cipher is provided that secures data by encrypting it based on the memory address where it is to be stored. When encrypting data for storage in the memory address, the memory address is encrypted in a first plurality of block cipher rounds. Data round keys are generated using information from the first plurality of block cipher rounds. Data to be stored is combined with the encrypted memory address and encrypted in a second plurality of block cipher rounds using the data round keys. The encrypted data is then stored in the memory location. When decrypting data, the memory address is again encrypted as before while the encrypted stored data is decrypted in a second plurality of the block cipher rounds using the data round keys to obtain a partially decrypted data. The partially decrypted data is combined with the encrypted memory address to obtain fully decrypted data.Type: GrantFiled: October 30, 2008Date of Patent: May 10, 2016Assignee: QUALCOMM IncorporatedInventors: Philip Michael Hawkes, Lu Xiao, Gregory Gordon Rose, Steve Millendorf
-
Publication number: 20150373035Abstract: A computing device may use machine learning techniques to determine the level, degree, and severity of its vulnerability to side channel attacks. The computing device may intelligently and selectively perform obfuscation operations (e.g., operations to raise the noise floor) to prevent side channel attacks based on the determined level, degree, or severity of its current vulnerability to such attacks. The computing device may also monitor the current level of natural obfuscation produced by the device, determining whether there is sufficient natural obfuscation to prevent a side channel attack during an ongoing critical activity, and perform the obfuscation operation during the ongoing critical activity and in response to determining that there is not sufficient natural obfuscation to adequately protect the computing device against side channel attacks.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Satyajit Prabhakar Patne, Rajarshi Gupta, Lu Xiao
-
Publication number: 20150373036Abstract: A computing device may use machine learning techniques to determine whether a side channel attack is underway and perform obfuscation operations (e.g., operations to raise the noise floor) or other similar operations to stop or prevent a detected side channel attack. The computing device may determine that a side channel attack is underway in response to determining that the computing device is in airplane mode, that the battery of the computing device the battery has been replaced with a stable DC power supply, that the touch-screen display of the computing device has been disconnected, that there are continuous calls to a cipher application programming interface (API) using the same cipher key, that there has been tampering with a behavioral analysis engine of the computing device, or any combination thereof.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Satyajit Prabhakar Patne, Rajarshi Gupta, Lu Xiao
-
Patent number: 9215581Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.Type: GrantFiled: March 27, 2007Date of Patent: December 15, 2015Assignee: QUALCOMM IncorportedInventors: David Jonathan Julian, Chong U. Lee, Kamran Moallemi, Avneesh Agrawal, Manuel E. Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
-
Patent number: 9182943Abstract: One feature pertains to a method that reduces the computational delay associated with generating prime numbers. The method includes generating a first random number having a plurality of bits. A first primality test is then executed on the first random number. Then, it is determined whether the first random number generated fails or passes the first primality test. If the first random number fails the primality test then a portion but not all of the plurality of bits of the first random number are replaced with an equal number of randomly generated bits to generate a second random number. Next, a primality test is again executed on the second random number. This process is repeated until a prime number is detected.Type: GrantFiled: March 8, 2013Date of Patent: November 10, 2015Assignee: QUALCOMM IncorporatedInventors: Lu Xiao, Bijan Ansari
-
Patent number: 9104854Abstract: Disclosed is a method for visual verification a Captcha's source. In the method, a Captcha is served to a user. The Captcha includes visual information related to a characteristic of a source of the Captcha and related to a puzzle question of the Captcha. The visual information is for visual verification by the user of the Captcha's source. A response is received from the user based on the served Captcha. A determination is made as to whether the received response is a solution of the puzzle question of the served Captcha.Type: GrantFiled: August 17, 2011Date of Patent: August 11, 2015Assignee: QUALCOMM IncorporatedInventors: Lu Xiao, Alexander Gantman
-
Publication number: 20150163658Abstract: Various operations may be performed based on a distance-related function associated with two or more devices. For example, an association procedure for two or more devices may be based on one or more determined distances. Similarly, presence management may be based on one or more determined distances. A distance-related function may take various form including, for example, a distance between devices, two or more distances between devices, a rate of change in a relative distance between devices, relative acceleration between devices, or some combination of two or more of the these distance-related functions.Type: ApplicationFiled: October 30, 2014Publication date: June 11, 2015Inventors: David Jonathan Julian, Chong Uk Lee, Kamran Moallemi, Avneesh Agrawal, Manuel Eduardo Jaime, Robert Keith Douglas, Lu Xiao, Gregory Gordon Rose
-
Patent number: 9042549Abstract: Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag.Type: GrantFiled: March 30, 2009Date of Patent: May 26, 2015Assignee: Qualcomm IncorporatedInventors: Lu Xiao, Yong Jin Kim, Zhanfeng Jia, David Jonathan Julian
-
Patent number: 9036301Abstract: A slider includes a substrate having a trailing edge, a leading edge opposite the trailing edge, and an air bearing surface connecting the trailing edge with the leading edge; a read/write transducer formed at the trailing edge; and a coat layer attached on the trailing edge and covering on the read/write transducer. The slider further includes a protection layer for shielding the read/write transducer thereby preventing the read/write transducer from damaging during a laser soldering process. The present invention can prevent the read/write transducer from damaging during the laser bonding process and, in turn improve the reading and writing performance of the slider. The invention also discloses an HGA and a disk drive unit.Type: GrantFiled: August 31, 2011Date of Patent: May 19, 2015Assignee: SAE Magnetics (H.K.) Ltd.Inventors: Shen kuang sidney Chou, Chi hung Yuen, Yan bin Wang, Li ping Peng, Lu Xiao
-
Patent number: 9030456Abstract: A liquid crystal display of a charge sharing mode comprises a control device for turning on the gates on the gate line in the black frame insertion timing. Each gate line of the liquid crystal display panel is connected with the control device. In the black insertion timing, the control device outputs to the gate line connected thereto a first control signal for controlling the gates on the gate line to be turned on, and the black frame insertion timing is a time when charge sharing is conducted among data lines from the gates on the gate line are turned off in the current frame until they are turned on in the next frame.Type: GrantFiled: January 9, 2012Date of Patent: May 12, 2015Assignee: Beijing Boe Optoelectronics Technology Co., Ltd.Inventors: Lu Xiao, Zhe Shi
-
Patent number: 9015487Abstract: Disclosed is a method for virtual pairing of a first peer device with a second peer device. In the method, a nonce is generated at the first peer device for use in virtually pairing the first and second peer devices to establish a first-type wireless connection. The nonce is forwarded from the first peer device to the second peer device over an already established second-type wireless connection between the first and second peer devices. At least one new key is generated from the nonce and a shared key for the already established second-type wireless connection. The first peer device is virtually paired with the second peer device using the at least one new key to establish the first-type wireless connection between the first and second peer devices.Type: GrantFiled: March 31, 2009Date of Patent: April 21, 2015Assignee: QUALCOMM IncorporatedInventors: Lu Xiao, Gregory Gordon Rose, David Jonathan Julian
-
Publication number: 20150063565Abstract: One feature pertains to a method for generating a prime number by repeatedly generating a random number seed S having k bits, generating a random number R having n bits based on the seed S, where k is less than n, and determining whether the random number R is prime. The steps are repeated until it is determined that the random number R generated is prime, upon which the random number seed S used to generate the random number R is stored in a memory circuit. Later, the stored random number seed S may be retrieved from the memory circuit, and the prime number is regenerated based on the random number seed S. In one example, the random number R generated is further based on a secret key kS that may be stored in a secure memory circuit.Type: ApplicationFiled: August 30, 2013Publication date: March 5, 2015Applicant: QUALCOMM IncorporatedInventors: Bijan Ansari, Lu Xiao