Patents by Inventor Nan Zhang

Nan Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180091535
    Abstract: An enterprise threat detection (ETD) forensic workspace is established according to a particular timeframe and permitting defining a selection of data types from available log data for an evaluation of events associated with one or more entities. A chart is defined illustrating a graphical distribution of a particular data type in the forensic workspace. A snapshot associated with the chart is generated, the snapshot saving a copy of all data necessary to re-create the chart into an associated snapshot object. The snapshot is associated with a snapshot page for containing the snapshot and the snapshot page is saved within the ETD forensic workspace.
    Type: Application
    Filed: September 23, 2016
    Publication date: March 29, 2018
    Inventors: Florian Chrosziel, Jona Hassforther, Thomas Kunz, Harish Mehta, Rita Merkel, Kathrin Nos, Wei-Guo Peng, Eugen Pritzkau, Marco Rodeck, Hartwig Seifert, Nan Zhang, Thorsten Menke, Hristina Dinkova, Lin Luo
  • Publication number: 20180059876
    Abstract: A path associated with a set of selected log data is defined. An indication is received on a graphical user interface (GUI) to generate a bubblegram associated with the path, wherein the bubblegram comprises one or more bubbles, each bubble representing a particular dimension associated with the selected path. The one or more bubbles are rendered on the GUI according to a performed ranking of the one or more bubbles. A bubble is selected to generate a filter for the path based on the dimension associated with the bubble. A subsequent bubblegram is rendered based on a narrowed set of the selected log data.
    Type: Application
    Filed: August 24, 2016
    Publication date: March 1, 2018
    Inventors: Wei-Guo Peng, Eugen Pritzkau, Lin Luo, Hartwig Seifert, Marco Rodeck, Thomas Kunz, Harish Mehta, Florian Chrosziel, Rita Merkel, Jona Hassforther, Thorsten Menke, Nan Zhang, Kathrin Nos, Hristina Dinkova
  • Publication number: 20180027010
    Abstract: A computer-implemented method generates a trigger registration for a selected triggering type. The generated trigger registration is stored in a triggering persistency. A received event from an event persistency is analyzed and data associated with the analyzed event is compared with the triggering persistency. Based on the comparison and using a pattern execution framework, an enterprise threat detection (ETD) pattern is processed to perform actions responsive to the received event.
    Type: Application
    Filed: July 21, 2016
    Publication date: January 25, 2018
    Inventors: Eugen Pritzkau, Kathrin Nos, Marco Rodeck, Florian Chrosziel, Jona Hassforther, Rita Merkel, Thorsten Menke, Thomas Kunz, Hartwig Seifert, Harish Mehta, Wei-Guo Peng, Lin Luo, Nan Zhang, Hristina Dinkova
  • Publication number: 20180016700
    Abstract: The disclosure relates to a method for making semimetal compound of Pt. The semimetal compound is a single crystal material of PtTe2. The method comprises: placing pure Pt and pure Te in a reacting chamber as reacting materials; evacuating the reacting chamber to be vacuum less than 10 Pa; heating the reacting chamber to a first temperature from 600 degree Celsius to 800 degree Celsius and keeping for 24 hours to 100 hours; cooling the reacting chamber to a second temperature from 400 degree Celsius to 500 degree Celsius and keeping for 24 hours to 100 hours at a cooling rate from 1 degree Celsius per hour to 10 degree Celsius per hour to obtain a crystal material of PtTe2; and separating the excessive reacting materials from the crystal material of PtTe2.
    Type: Application
    Filed: July 6, 2017
    Publication date: January 18, 2018
    Inventors: KE-NAN ZHANG, MING-ZHE YAN, SHU-YUN ZHOU, YANG WU, SHOU-SHAN FAN
  • Publication number: 20180016707
    Abstract: The disclosure relates to a semimetal compound of Pt and a method for making the same. The semimetal compound is a single crystal material of PtTe2. The method comprises: providing a PtTe2 polycrystalline material; placing the PtTe2 polycrystalline material in a reacting chamber; placing chemical transport medium in the reacting chamber; evacuating the reacting chamber to be vacuum less than 10 Pa; placing the reacting chamber in a temperature gradient, wherein the reacting chamber has a first end in a temperature from 1200 degree Celsius to 1000 degree Celsius and a second end opposite to the first end and in a temperature from 1000 degree Celsius to 900 degree Celsius; and keeping the reacting chamber in the temperature gradient for 10 days to 30 days.
    Type: Application
    Filed: July 6, 2017
    Publication date: January 18, 2018
    Inventors: KE-NAN ZHANG, MING-ZHE YAN, SHU-YUN ZHOU, YANG WU, SHOU-SHAN FAN
  • Publication number: 20170327130
    Abstract: The invention provides an engineering vehicle having a ballast unloading device (100) and a ballast leveling device (200). The engineering vehicle includes a vehicle body (10), and the ballast unloading device (100) and the ballast leveling device (200) arranged on the vehicle body (10). The ballast unloading device (100) includes: a ballast carrying portion (20) provided with ballast unloading openings (21), and the ballast carrying portion (20) being arranged on the vehicle body (10); ballast unloading doors (30) capable of rotating relative to the ballast carrying portion (20), inner unloading passages (31) and outer unloading passages (32) being arranged on the ballast unloading doors (30), the ballast unloading doors (30) further including stop portions (33) located between the inner unloading passages (31) and the outer unloading passages (32).
    Type: Application
    Filed: October 22, 2015
    Publication date: November 16, 2017
    Applicant: CSR YANGZE CO., LTD.
    Inventors: Wei CHEN, Liangcai LIN, Chuqiang TANG, Baolei WANG, Junxiang LIU, Xuefeng YIN, Qingping LEI, Rui CHEN, Feng SHI, Wei SUI, Kun MEI, Nan ZHANG, Yan HE, Luyao HE
  • Publication number: 20170289043
    Abstract: A method is disclosed for performing traffic engineering for a flow traversing a communications network having a plurality of nodes communicatively coupled by a plurality of links, with at least one of the plurality of links being a wireless link. The method includes setting an activation factor for the at least one wireless link in accordance with buffer statuses associated with nodes traversed by the flow; and transmitting the activation factor to a scheduling entity for scheduling activation of the at least one wireless link in accordance with the activation factor.
    Type: Application
    Filed: April 26, 2016
    Publication date: October 5, 2017
    Inventors: Nan Zhang, Wei-Cheng Liao, Mingyi Hong, Hamidreza Farmanbar, Zhi-Quan Luo
  • Patent number: 9778383
    Abstract: A nuclear imaging system includes a detector configured to detect at least one photon event. A timing signal path is electrically coupled to the detector. The timing signal path is configured to generate a timing signal indicative of a timing of the at least one photon event. An energy signal path is also electrically coupled to the detector. The energy signal path is configured to generate an energy signal indicative of an energy of the at least one photon event. A time-domain multiplexer is configured combine the timing signal and the energy signal into a compound signal.
    Type: Grant
    Filed: September 16, 2016
    Date of Patent: October 3, 2017
    Assignees: Siemens Medical Solutions USA, Inc., Siemens Healthcare GmbH
    Inventors: Matthias J. Schmand, Ralph Oppelt, Klaus Huber, Nan Zhang
  • Patent number: 9741655
    Abstract: An integrated circuit common-mode electromagnetic interference filter incorporating electro-static discharge protection comprising two inductive coils is provided. A pair of primary and secondary spiral inductor coils is disposed corresponding to each other. A dielectric layer is used to separate the primary spiral inductor coil from the secondary spiral inductor coil electrically. Resistivity of a high-resistance substrate is more than 100 ?-cm for supporting the primary spiral inductor coil, the secondary spiral inductor coil and the dielectric layer thereon. The proposed filter structure can be formed in integrated circuit (IC) back-end processes and thus be extraordinarily advantageous of effectively eliminating electromagnetic interferences and having electrostatic protection effect at the same time, while having small footprint.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: August 22, 2017
    Assignee: Silergy Semiconductor Technology (Hangzhou) LTD
    Inventors: Albert Z. Wang, Wen-Chin Wu, Shijun Wang, Nan Zhang
  • Publication number: 20170212539
    Abstract: A low dropout linear regulator circuit comprises a voltage reference source module (100), an error amplifier (200), a reference voltage determining module (300), a power transmission device (400) and a feedback module (500); wherein the voltage reference source module (100) provides a reference voltage for the error amplifier (200), the reference voltage determining module (300) controls an enablement of the error amplifier (200) according to whether the voltage reference source module (100) is completely started, the error amplifier (200) controls ON/OFF of the power transmission device (400) according to the reference voltage provided by the voltage reference source module (100) and a feedback voltage provided by the feedback module (500). A chip having the above low dropout linear regulator circuit and a electronic device having the above chip are provided.
    Type: Application
    Filed: August 18, 2015
    Publication date: July 27, 2017
    Inventors: Nan ZHANG, Jing ZHOU
  • Publication number: 20170206209
    Abstract: A junk directory identification method and apparatus. The junk directory identification method comprises: obtaining a directory to be identified; wherein, the directory to be identified is a directory generated after running of an application software; obtaining the file names of the files in the directory to be identified; determining whether the file names of the files in the directory to be identified all conform to temporary file naming rule; if so, determining the directory to be identified as a junk directory. Hence, the present solution uses a method of determining whether the file names of the files in the directory to be identified all conform to the temporary file naming rule to identify whether a directory to be identified is junk file, making full use of the unique naming method when a directory automatically created by a software application caches files, and can therefore effectively identify whether a directory in an application software is a junk directory.
    Type: Application
    Filed: June 24, 2015
    Publication date: July 20, 2017
    Applicant: Beijing Kingsoft Internet Security Software Co., Ltd.
    Inventors: Guoqiang JIAO, Qidong YANG, Xiliang BAI, Xueshi DU, Nan ZHANG, Yong CHEN
  • Publication number: 20170199889
    Abstract: A method and device for identifying junk picture files, which are used for a server side to identify junk picture files in cached network data. The method comprises: obtaining a directory to be detected; determining whether the number of files in the directory is greater than or equal to a first preset value; if so, determining whether file names of the files in the directory contain keywords which represent the cached network data; if the keywords are contained, determining that the files in the directory are the cached network data, and then, determining whether keywords which represent useless picture files exist in the cached network data, so as to find out whether junk picture files exist; if the junk picture files exist, identifying the found picture files as cached junk picture files; and recording a directory path where the cached junk picture files are located. By means of the above solution, the cached network junk picture files can be accurately identified.
    Type: Application
    Filed: June 23, 2015
    Publication date: July 13, 2017
    Applicant: Beijing Kingsoft Internet Security Software Co. Ltd.
    Inventors: Guoqiang Jiao, Qidong Yang, Xiliang Bai, Xueshi Du, Nan Zhang, Yong Chen
  • Publication number: 20170199992
    Abstract: Embodiments of the present application disclose a method and system for identifying whether an application is genuine by means of digital watermarks, which can conveniently determine whether an application is genuine.
    Type: Application
    Filed: June 25, 2015
    Publication date: July 13, 2017
    Inventors: Xin SHU, Nan ZHANG, Yong CHEN
  • Patent number: 9703921
    Abstract: A system, method, and computer program product for determining whether a design for a circuit meets design specifications, to facilitate the provision of a manufacturable description of the circuit. A computer-operated circuit simulation tool reads the design for the circuit and a power specification, and selectively internally creates a network connection and inserts a corresponding connect module in the design, for at least one circuit block having an unsupported signal declared in the power specification. Typically such a circuit block will be an analog block, whether an original analog block or an analog representation of a digital block, and may involve electrical or wreal signal interactions. The simulation tool performs a mixed-signal simulation of the design. Embodiments tangibly output a verification determination from a comparison of the simulated design performance results and the design specifications in order to provide the manufacturable description of the circuit.
    Type: Grant
    Filed: July 8, 2015
    Date of Patent: July 11, 2017
    Assignee: CADENCE DESIGN SYSTEMS, INC.
    Inventors: Qingyu Lin, Nan Zhang
  • Publication number: 20170191182
    Abstract: Crystal pulling systems for growing monocrystalline ingots from a melt of semiconductor or solar-grade material are described. The crystal pulling systems include seed chuck assemblies designed to reduce formation of deposits on components of the crystal pulling systems by reducing and inhibiting the formation of gas flow recirculation cells within the crystal pulling systems.
    Type: Application
    Filed: January 5, 2017
    Publication date: July 6, 2017
    Inventors: Parthiv Daggolu, Benjamin Michael Meyer, William L. Luter, Soubir Basak, Sumeet S. Bhagavat, Nan Zhang, Gaurab Samanta
  • Publication number: 20170180403
    Abstract: A transfer of master data is executed in a backend computing system. The master data includes user data and system data. The transfer of master data includes receiving user data associated with a particular user identifier in the backend computing system, transferring the received user data to an event stream processor, receiving system data associated with a particular log providing computing system in the backend computing system, transferring the received user data to the event stream processor, and executing a transfer of log data associated with logs of computing systems connected to the backend computing system.
    Type: Application
    Filed: December 22, 2015
    Publication date: June 22, 2017
    Inventors: Harish Mehta, Hartwig Seifert, Thomas Kunz, Anne Jacobi, Marco Rodeck, Florian Kraemer, Björn Brencher, Nan Zhang
  • Publication number: 20170153778
    Abstract: Disclosed in the present invention is a method for triggering a widget in an application. The method includes: obtaining the layout information of the first page in the application; extracting the widget capable of being clicked in the first page and the corresponding type of the widget on the basis of the layout information of the first page; and obtaining the corresponding click-trigger mode on the basis of the corresponding type of the widget and triggering the widget capable of being clicked through the corresponding click-trigger mode. The method of the embodiments of the present invention can implement triggering an application behavior orderly and intelligently, so that manual workload is reduced greatly and the efficiency is improved. Moreover the integrity of the application behavior to be triggered can be guaranteed. Further disclosed in the present invention are an apparatus for triggering the widget in the application, a mobile terminal and a storage medium.
    Type: Application
    Filed: June 25, 2015
    Publication date: June 1, 2017
    Applicant: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO., LTD.
    Inventors: Guoqing YUAN, Kangzong ZHANG, Nan ZHANG, Yong CHEN, Ming XU
  • Publication number: 20170147596
    Abstract: A cache folder identification method and device, the method comprising: in the process of running target software, acquiring a plurality of sample values x1, x2, . . . xn of the number of files in the target folder according to a preset rule, the target folder being a folder used in the process of running the target software, n?2; according to a preset algorithm, calculating the statistical value of the plurality of sample values, the statistical value being used to represent the degree of dispersion of the sample values; determining whether the statistical value is greater than a preset first threshold; if so, identifying the target folder as a cache folder. The method has high identification efficiency, and can continuously monitor specific software without missing a cache folder.
    Type: Application
    Filed: June 24, 2015
    Publication date: May 25, 2017
    Applicant: Beijing Kingsoft Internet Security Software Co., Ltd.
    Inventors: Qidong YANG, Guoqiang JIAO, Nan ZHANG, Yong CHEN
  • Patent number: 9658894
    Abstract: Embodiments of the present invention provide a method, computer program product, and computer system for reclaiming resources during virtual machine decommission. The method includes determining a virtual machine (VM) resource utilization and a cluster utilization. If the VM resource utilization is less than a first predetermined threshold and the cluster utilization is greater than a second predetermined threshold, the method then determines whether an active timer exists. If the active timer exists and has expired, then dynamic decommission of the VM is triggered.
    Type: Grant
    Filed: October 15, 2015
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Yong Feng, Heng Ping Xu, Ying Nan Zhang, Yu Zhang
  • Publication number: 20170139813
    Abstract: A method and device for checking influence of deleting a cache file. The method includes: acquiring a program to be checked, and acquiring a click path set and a cache path set corresponding to the program to be checked, in which the click path set includes a plurality of click paths, and the cache path set includes a plurality of cache paths, each click path set corresponds to a cache path; acquiring a cache path to be checked in the cache path set, and deleting a cache file to be checked from the cache path to be checked; according to a click path corresponding to the cache path to be checked, conducting a click simulation on the program to be checked; and according to an operating result of the program to be checked, acquiring the influence of deleting the cache file to be checked.
    Type: Application
    Filed: June 23, 2015
    Publication date: May 18, 2017
    Inventors: Jianming LIN, Kangzong ZHANG, Nan ZHANG, Yong CHEN, Ming XU