Patents by Inventor Ning Shang

Ning Shang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11369584
    Abstract: A method of treatment or prevention of fibrosis of human tissue or organ. The method includes administering a patient in need thereof a compound of formula (I).
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: June 28, 2022
    Assignee: ZHENGZHOU UNIVERSITY
    Inventors: Guifu Dai, Haiwei Xu, Zhenzhen Guan, Yake Wang, Di Wu, Pengpeng Shen, Ning Shang, Fengjuan Wu, Jin Zhao, Xiaopei Zhang
  • Patent number: 11307936
    Abstract: The present disclosure discloses a method, a system, and a solid-state drive for data processing. The method includes detecting the user operations on a first storage area which is visible to an operating system in a solid-state drive; if the user operation is a reading or writing operation, keeping the data of the first storage area and the data of a mirrored data storage area of a second storage area to be synchronization; if the user operation is a deleting operation or a TRIM operation, keeping the data of the first storage area and the data of the mirrored data storage area of the second storage area to be synchronization, and backing up the deleted data from the first storage area to a deleted data storage area of the second storage area. The second storage area is set to be invisible to the operating system in the solid-state disk.
    Type: Grant
    Filed: April 17, 2020
    Date of Patent: April 19, 2022
    Assignee: SHENZHEN DAPU MICROELECTRONICS CO., LTD.
    Inventors: Ning Shang, Xiang Chen
  • Patent number: 11279695
    Abstract: A compound represented by formula I or II.
    Type: Grant
    Filed: September 2, 2020
    Date of Patent: March 22, 2022
    Assignee: ZHENGZHOU UNIVERSITY
    Inventors: Guifu Dai, Di Wu, Haiwei Xu, Jiazhen Zhu, Zibo Fu, Zhenzhen Guan, Xiaopei Zhang, Ning Shang, Shuqiu Zhang, Guangming Yan
  • Patent number: 11199981
    Abstract: A method and system for binding and verifying between a storage device and hosts are provided. The method includes: sharing system parameters in advance with the hosts by the storage device, where the hosts are to be bound to the storage device; using a programmable read-only memory as the storage device, dividing the programmable read-only memory into m regions, completing the binding between each region and one corresponding host to be bound using the pre-shared system parameters, where m is a positive integer; verifying an identity of a bound host in accordance with the pre-shared system parameters through a zero-knowledge proof method by the storage device; if the verification is successful, starting the storage device and serving the bound host; if the verification is unsuccessful, terminating the starting of the storage device and refusing to serve the bound host.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: December 14, 2021
    Assignee: SHENZHEN DAPU MICROELECTRONICS CO., LTD.
    Inventors: Ning Shang, Yafei Yang
  • Publication number: 20210117110
    Abstract: A data processing method and a storage device, which are used for improving the security of data stored in the storage device. The method includes that the storage device acquires a data processing instruction sent from a host. The data processing instruction is used to operate data stored in the storage device. The method also includes that the storage device determines that the data processing instruction complies with a preset data destruction rule. The method further includes that in response to the determination, the storage device executes a preset processing strategy to protect data stored in the storage device.
    Type: Application
    Filed: December 3, 2020
    Publication date: April 22, 2021
    Applicant: SHENZHEN DAPU MICROELECTRONICS CO., LTD.
    Inventors: Jiankun Li, Ning Shang
  • Publication number: 20210047307
    Abstract: A compound represented by formula I or II.
    Type: Application
    Filed: September 2, 2020
    Publication date: February 18, 2021
    Inventors: Guifu DAI, Di WU, Haiwei XU, Jiazhen ZHU, Zibo FU, Zhenzhen GUAN, Xiaopei ZHANG, Ning SHANG, Shuqiu ZHANG, Guangming YAN
  • Publication number: 20200241970
    Abstract: The present disclosure discloses a method, a system, and a solid-state drive for data processing. The method includes detecting the user operations on a first storage area which is visible to an operating system in a solid-state drive; if the user operation is a reading or writing operation, keeping the data of the first storage area and the data of a mirrored data storage area of a second storage area to be synchronization; if the user operation is a deleting operation or a TRIM operation, keeping the data of the first storage area and the data of the mirrored data storage area of the second storage area to be synchronization, and backing up the deleted data from the first storage area to a deleted data storage area of the second storage area. The second storage area is set to be invisible to the operating system in the solid-state disk.
    Type: Application
    Filed: April 17, 2020
    Publication date: July 30, 2020
    Applicant: SHENZHEN DAPU MICROELECTRONICS CO., LTD.
    Inventors: Ning Shang, Xiang Chen
  • Publication number: 20200065014
    Abstract: Disclosed is a method and system for binding and verifying between a storage device and hosts. The method for verifying a storage device and a host comprises: sharing system parameters in advance with the host by the storage device, wherein the host is to be bound to the storage device; using programmable read-only memory as the storage device, dividing the programmable read-only memory into m regions, completing the binding between each region and one corresponding host to be bound by using the pre-shared system parameters, wherein m is positive integer; verifying the identity of the bound host in accordance with the pre-shared system parameters through zero-knowledge proof method by the storage device; if the verification is successful, starting the storage device and serving the bound host; if the verification is unsuccessful, terminating the starting of the storage device and refusing to serve the bound host.
    Type: Application
    Filed: October 31, 2019
    Publication date: February 27, 2020
    Applicant: SHENZHEN DAPU MICROELECTRONICS CO., LTD.
    Inventors: Ning Shang, Yafei Yang
  • Publication number: 20200030280
    Abstract: A method of treatment or prevention of fibrosis of human tissue or organ. The method includes administering a patient in need thereof a compound of formula (I).
    Type: Application
    Filed: September 30, 2019
    Publication date: January 30, 2020
    Inventors: Guifu DAI, Haiwei XU, Zhenzhen GUAN, Yake WANG, Di WU, Pengpeng SHEN, Ning SHANG, Fengjuan WU, Jin ZHAO, Xiaopei ZHANG
  • Patent number: 9584528
    Abstract: A database for location or geographic based services is secured by requiring location based requests to include a unique identifier that identifies the location as well as an authorization identifier associated with the location. The authorization identifier is information that is obtained by being physically present at the location, such as information from access points that are at the location or a position fix when present at the location. The authorization identifier may be non-unique but relatively time-invariant, making such information easily crowdsourced, but difficult to obtain unless physically present at the location. For example, the authorization identifier may be an SSID or a Beacon Frame, or a hash thereof from one or more devices at the location or a position fix.
    Type: Grant
    Filed: September 6, 2012
    Date of Patent: February 28, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Ashok Bhatia, Ning Shang, Yafei Yang
  • Patent number: 9414193
    Abstract: Systems, apparatus and methods for communicating and using a geofence while maintaining privacy are presented. A geofence is based on at least one RF fingerprint. The RF fingerprints include absolute information that is transformed into a one-way matrix (A) by application of a one-way function. The absolute information may identify a transmitter (e.g., by location, address or the like). An equation 0=Ax (where 0 is a zero vector, A is the one-way matrix and x is a signature vector) is solved to reveal one possible solution for the signature vector (x). This signature vector (x) is communicated rather than the RF fingerprints themselves, thus obscuring the absolute information and maintaining privacy.
    Type: Grant
    Filed: October 17, 2013
    Date of Patent: August 9, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Xintian Li, Ning Shang, Marc Anthony Ische
  • Patent number: 8948782
    Abstract: Systems and methods of determining proximity of a mobile device to a target location are described herein. A method as described herein includes identifying a signal sent by the mobile device and received by respective ones of a set of receivers including at least a first receiver and a second receiver, wherein the first receiver and second receiver are positioned collinearly to the target location; determining a first signal-quality metric observed at the first receiver and a second signal-quality metric observed at the second receiver with respect to the signal; computing a ratio associated with distances from the mobile device to the first receiver and the second receiver, respectively, based on the first signal-quality metric and the second signal-quality metric; and determining whether the mobile device is within a proximity region defined in relation to the target location based on the ratio.
    Type: Grant
    Filed: December 21, 2012
    Date of Patent: February 3, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Ning Shang, Yafei Yang
  • Publication number: 20150031323
    Abstract: Disclosed is an apparatus and method to implement a queuing process by a position enabled mobile device to prioritize the legitimacy of initiation messages. The method may include: transmitting an emergency call; receiving at least one initiation message; and assigning the received initiation message to one of a plurality of priority queues, wherein the assignment to the priority queue is based upon at least one of an identifier of an emergency location platform or a whitelist.
    Type: Application
    Filed: July 23, 2013
    Publication date: January 29, 2015
    Applicant: QUALCOMM Incorporated
    Inventors: Philip Michael HAWKES, Andreas Klaus WACHTER, Ning SHANG
  • Publication number: 20150023502
    Abstract: Systems, apparatus and methods for communicating and using a geofence while maintaining privacy are presented. A geofence is based on at least one RF fingerprint. The RF fingerprints include absolute information that is transformed into a one-way matrix (A) by application of a one-way function. The absolute information may identify a transmitter (e.g., by location, address or the like). An equation 0=Ax (where 0 is a zero vector, A is the one-way matrix and x is a signature vector) is solved to reveal one possible solution for the signature vector (x). This signature vector (x) is communicated rather than the RF fingerprints themselves, thus obscuring the absolute information and maintaining privacy.
    Type: Application
    Filed: October 17, 2013
    Publication date: January 22, 2015
    Applicant: QUALCOMM Incorporated
    Inventors: Xintian LI, Ning SHANG, Marc Anthony ISCHE
  • Patent number: 8769301
    Abstract: Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve equation and a curve pairing function. A public product activation code and a private product activation code are generated based upon the public parameters and the secret master key. The public parameters and the public product activation code are stored with the product. Further, the private product activation code is associated with the product. The product is authenticated if the private product activation code entered to a client device satisfies a mathematical formula implemented with the public parameters and the public product activation code.
    Type: Grant
    Filed: July 28, 2011
    Date of Patent: July 1, 2014
    Assignee: QUALCOMM Incorporated
    Inventor: Ning Shang
  • Publication number: 20140179338
    Abstract: Systems and methods of determining proximity of a mobile device to a target location are described herein. A method as described herein includes identifying a signal sent by the mobile device and received by respective ones of a set of receivers including at least a first receiver and a second receiver, wherein the first receiver and second receiver are positioned collinearly to the target location; determining a first signal-quality metric observed at the first receiver and a second signal-quality metric observed at the second receiver with respect to the signal; computing a ratio associated with distances from the mobile device to the first receiver and the second receiver, respectively, based on the first signal-quality metric and the second signal-quality metric; and determining whether the mobile device is within a proximity region defined in relation to the target location based on the ratio.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Ning Shang, Yafei Yang
  • Publication number: 20140133656
    Abstract: Methods, systems and devices enable synchronizing obscured identification information between a wireless identity transmitter and a central server to support one-way communication of the obscured identification information to the central server. The wireless identity transmitter may be a compact device configured to broadcast messages, such as through Bluetooth® advertisements, including an obscured identifier for receipt and relay to the central server by proximate proximity broadcast receivers via sighting messages that may also include location information. The central server may decode received identification codes to identify the wireless identity transmitter. The wireless identity transmitter may create message data by concatenating identifying information with an incrementing nonce, encrypting the concatenated information, and truncating the encrypted information.
    Type: Application
    Filed: February 21, 2013
    Publication date: May 15, 2014
    Applicant: QUALCOMM INCORPORATED
    Inventors: Charles S. Wurster, Ning Shang, Panagiotis Thomas, Stephen A. Sprigg, Matthew Hohlfeld, Ivan Hugh Mclean
  • Publication number: 20140068778
    Abstract: A database for location or geographic based services is secured by requiring location based requests to include a unique identifier that identifies the location as well as an authorization identifier associated with the location. The authorization identifier is information that is obtained by being physically present at the location, such as information from access points that are at the location or a position fix when present at the location. The authorization identifier may be non-unique but relatively time-invariant, making such information easily crowdsourced, but difficult to obtain unless physically present at the location. For example, the authorization identifier may be an SSID or a Beacon Frame, or a hash thereof from one or more devices at the location or a position fix.
    Type: Application
    Filed: September 6, 2012
    Publication date: March 6, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Ashok Bhatia, Ning Shang, Yafei Yang
  • Patent number: 8520841
    Abstract: An exemplary method includes defining a CM field, representing coefficients of a Frobenius element of a hyperelliptic curve over a prime field as non-linear polynomials that are functions of an integer x and selecting a value for x whereby the product of the Frobenius element and its complex conjugate is a prime number. Such a method may further include determining the order of the Jacobian of the hyperelliptic curve, for example, where the order is an almost prime number. Various other methods, devices, systems, etc., are also disclosed, which may be optionally used for cryptography.
    Type: Grant
    Filed: May 22, 2008
    Date of Patent: August 27, 2013
    Assignee: Microsoft Corporation
    Inventors: Kristin E. Lauter, Ning Shang
  • Publication number: 20130031373
    Abstract: Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve equation and a curve pairing function. A public product activation code and a private product activation code are generated based upon the public parameters and the secret master key. The public parameters and the public product activation code are stored with the product. Further, the private product activation code is associated with the product. The product is authenticated if the private product activation code entered to a client device satisfies a mathematical formula implemented with the public parameters and the public product activation code.
    Type: Application
    Filed: July 28, 2011
    Publication date: January 31, 2013
    Applicant: QUALCOMM Incorporated
    Inventor: Ning Shang