Patents by Inventor Nanfang Hu

Nanfang Hu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180341686
    Abstract: A method and system for performing searching based on a top-to-bottom feature space analysis may be disclosed. Such a method may include training a mapping model, calculating a signature and centroid of a data block, and generating a list of search results corresponding to data blocks based on the similarity or distance of the centroids of each of said data blocks to the query vector. Data may be subject to data cleaning, which may include, for example, noise removal and transformation to a unifying format, in order to ensure that a centroid is accurately generated. Search results may be based on a predetermined topic or subtopic, or may be based on a keyword or similarity query from the user, as may be desired.
    Type: Application
    Filed: May 26, 2017
    Publication date: November 29, 2018
    Inventor: Nanfang HU
  • Patent number: 8543798
    Abstract: A system may include a printed circuit board, a first component located on the printed circuit board, the first component having a first unique identifier and a processor located on the printed circuit board, the processor including a one time programming section. The processor may acquire the first unique identifier from the first component and store the first unique identifier in the one time programming section during the first time initialization. Upon subsequent initializations, the processor may acquire the first unique identifier from the first component and compare the first unique identifier to the stored first unique identifier. The processor may allow the subsequent initializations to proceed if the first unique identifier matches the stored first unique. The processor may disallow the subsequent initializations from proceeding if the first unique identifier does not match the stored first unique identifier.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: September 24, 2013
    Assignee: Broadcom Corporation
    Inventors: Nanfang Hu, Xuezhang Dong, Yan Wang
  • Publication number: 20120306530
    Abstract: A system may include a printed circuit board, a first component located on the printed circuit board, the first component having a first unique identifier and a processor located on the printed circuit board, the processor including a one time programming section. The processor may acquire the first unique identifier from the first component and store the first unique identifier in the one time programming section during the first time initialization. Upon subsequent initializations, the processor may acquire the first unique identifier from the first component and compare the first unique identifier to the stored first unique identifier. The processor may allow the subsequent initializations to proceed if the first unique identifier matches the stored first unique. The processor may disallow the subsequent initializations from proceeding if the first unique identifier does not match the stored first unique identifier.
    Type: Application
    Filed: August 14, 2012
    Publication date: December 6, 2012
    Applicant: BROADCOM CORPORATION
    Inventors: Nanfang Hu, Xuezhang Dong, Yan Wang
  • Patent number: 8266415
    Abstract: A system may include a printed circuit board, a first component located on the printed circuit board, the first component having a first unique identifier and a processor located on the printed circuit board, the processor including a one time programming section. The processor may acquire the first unique identifier from the first component and store the first unique identifier in the one time programming section during the first time initialization. Upon subsequent initializations, the processor may acquire the first unique identifier from the first component and compare the first unique identifier to the stored first unique identifier. The processor may allow the subsequent initializations to proceed if the first unique identifier matches the stored first unique. The processor may disallow the subsequent initializations from proceeding if the first unique identifier does not match the stored first unique identifier.
    Type: Grant
    Filed: February 26, 2008
    Date of Patent: September 11, 2012
    Assignee: Broadcom Corporation
    Inventors: Nanfang Hu, Xuezhang Dong, Yan Wang
  • Publication number: 20090212813
    Abstract: A system may include a printed circuit board, a first component located on the printed circuit board, the first component having a first unique identifier and a processor located on the printed circuit board, the processor including a one time programming section. The processor may acquire the first unique identifier from the first component and store the first unique identifier in the one time programming section during the first time initialization. Upon subsequent initializations, the processor may acquire the first unique identifier from the first component and compare the first unique identifier to the stored first unique identifier. The processor may allow the subsequent initializations to proceed if the first unique identifier matches the stored first unique. The processor may disallow the subsequent initializations from proceeding if the first unique identifier does not match the stored first unique identifier.
    Type: Application
    Filed: February 26, 2008
    Publication date: August 27, 2009
    Applicant: BROADCOM CORPORATION
    Inventors: Nanfang Hu, Xuezhang Dong, Yan Wang
  • Publication number: 20090193211
    Abstract: A technique for authenticating software in a computer system is provided that can be used to prevent unauthorized users from accessing or using certain features or resources of the computer system. In accordance with the technique, a relatively small hash table is authenticated at system boot up and then used during run-time to authenticate selected portions of a software image. The technique advantageously permits software to be authenticated in a manner that does not impose significant delays upon the boot-up time associated with the computer system. The technique is applicable to both general-purpose and special-purpose computer systems, including embedded systems.
    Type: Application
    Filed: February 29, 2008
    Publication date: July 30, 2009
    Applicant: BROADCOM CORPORATION
    Inventors: Nanfang Hu, Xuezhang Dong