Patents by Inventor Ning Shang
Ning Shang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11369584Abstract: A method of treatment or prevention of fibrosis of human tissue or organ. The method includes administering a patient in need thereof a compound of formula (I).Type: GrantFiled: September 30, 2019Date of Patent: June 28, 2022Assignee: ZHENGZHOU UNIVERSITYInventors: Guifu Dai, Haiwei Xu, Zhenzhen Guan, Yake Wang, Di Wu, Pengpeng Shen, Ning Shang, Fengjuan Wu, Jin Zhao, Xiaopei Zhang
-
Patent number: 11307936Abstract: The present disclosure discloses a method, a system, and a solid-state drive for data processing. The method includes detecting the user operations on a first storage area which is visible to an operating system in a solid-state drive; if the user operation is a reading or writing operation, keeping the data of the first storage area and the data of a mirrored data storage area of a second storage area to be synchronization; if the user operation is a deleting operation or a TRIM operation, keeping the data of the first storage area and the data of the mirrored data storage area of the second storage area to be synchronization, and backing up the deleted data from the first storage area to a deleted data storage area of the second storage area. The second storage area is set to be invisible to the operating system in the solid-state disk.Type: GrantFiled: April 17, 2020Date of Patent: April 19, 2022Assignee: SHENZHEN DAPU MICROELECTRONICS CO., LTD.Inventors: Ning Shang, Xiang Chen
-
Patent number: 11279695Abstract: A compound represented by formula I or II.Type: GrantFiled: September 2, 2020Date of Patent: March 22, 2022Assignee: ZHENGZHOU UNIVERSITYInventors: Guifu Dai, Di Wu, Haiwei Xu, Jiazhen Zhu, Zibo Fu, Zhenzhen Guan, Xiaopei Zhang, Ning Shang, Shuqiu Zhang, Guangming Yan
-
Patent number: 11199981Abstract: A method and system for binding and verifying between a storage device and hosts are provided. The method includes: sharing system parameters in advance with the hosts by the storage device, where the hosts are to be bound to the storage device; using a programmable read-only memory as the storage device, dividing the programmable read-only memory into m regions, completing the binding between each region and one corresponding host to be bound using the pre-shared system parameters, where m is a positive integer; verifying an identity of a bound host in accordance with the pre-shared system parameters through a zero-knowledge proof method by the storage device; if the verification is successful, starting the storage device and serving the bound host; if the verification is unsuccessful, terminating the starting of the storage device and refusing to serve the bound host.Type: GrantFiled: October 31, 2019Date of Patent: December 14, 2021Assignee: SHENZHEN DAPU MICROELECTRONICS CO., LTD.Inventors: Ning Shang, Yafei Yang
-
Publication number: 20210117110Abstract: A data processing method and a storage device, which are used for improving the security of data stored in the storage device. The method includes that the storage device acquires a data processing instruction sent from a host. The data processing instruction is used to operate data stored in the storage device. The method also includes that the storage device determines that the data processing instruction complies with a preset data destruction rule. The method further includes that in response to the determination, the storage device executes a preset processing strategy to protect data stored in the storage device.Type: ApplicationFiled: December 3, 2020Publication date: April 22, 2021Applicant: SHENZHEN DAPU MICROELECTRONICS CO., LTD.Inventors: Jiankun Li, Ning Shang
-
Publication number: 20210047307Abstract: A compound represented by formula I or II.Type: ApplicationFiled: September 2, 2020Publication date: February 18, 2021Inventors: Guifu DAI, Di WU, Haiwei XU, Jiazhen ZHU, Zibo FU, Zhenzhen GUAN, Xiaopei ZHANG, Ning SHANG, Shuqiu ZHANG, Guangming YAN
-
Publication number: 20200241970Abstract: The present disclosure discloses a method, a system, and a solid-state drive for data processing. The method includes detecting the user operations on a first storage area which is visible to an operating system in a solid-state drive; if the user operation is a reading or writing operation, keeping the data of the first storage area and the data of a mirrored data storage area of a second storage area to be synchronization; if the user operation is a deleting operation or a TRIM operation, keeping the data of the first storage area and the data of the mirrored data storage area of the second storage area to be synchronization, and backing up the deleted data from the first storage area to a deleted data storage area of the second storage area. The second storage area is set to be invisible to the operating system in the solid-state disk.Type: ApplicationFiled: April 17, 2020Publication date: July 30, 2020Applicant: SHENZHEN DAPU MICROELECTRONICS CO., LTD.Inventors: Ning Shang, Xiang Chen
-
Publication number: 20200065014Abstract: Disclosed is a method and system for binding and verifying between a storage device and hosts. The method for verifying a storage device and a host comprises: sharing system parameters in advance with the host by the storage device, wherein the host is to be bound to the storage device; using programmable read-only memory as the storage device, dividing the programmable read-only memory into m regions, completing the binding between each region and one corresponding host to be bound by using the pre-shared system parameters, wherein m is positive integer; verifying the identity of the bound host in accordance with the pre-shared system parameters through zero-knowledge proof method by the storage device; if the verification is successful, starting the storage device and serving the bound host; if the verification is unsuccessful, terminating the starting of the storage device and refusing to serve the bound host.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Applicant: SHENZHEN DAPU MICROELECTRONICS CO., LTD.Inventors: Ning Shang, Yafei Yang
-
Publication number: 20200030280Abstract: A method of treatment or prevention of fibrosis of human tissue or organ. The method includes administering a patient in need thereof a compound of formula (I).Type: ApplicationFiled: September 30, 2019Publication date: January 30, 2020Inventors: Guifu DAI, Haiwei XU, Zhenzhen GUAN, Yake WANG, Di WU, Pengpeng SHEN, Ning SHANG, Fengjuan WU, Jin ZHAO, Xiaopei ZHANG
-
Patent number: 9584528Abstract: A database for location or geographic based services is secured by requiring location based requests to include a unique identifier that identifies the location as well as an authorization identifier associated with the location. The authorization identifier is information that is obtained by being physically present at the location, such as information from access points that are at the location or a position fix when present at the location. The authorization identifier may be non-unique but relatively time-invariant, making such information easily crowdsourced, but difficult to obtain unless physically present at the location. For example, the authorization identifier may be an SSID or a Beacon Frame, or a hash thereof from one or more devices at the location or a position fix.Type: GrantFiled: September 6, 2012Date of Patent: February 28, 2017Assignee: QUALCOMM IncorporatedInventors: Ashok Bhatia, Ning Shang, Yafei Yang
-
Patent number: 9414193Abstract: Systems, apparatus and methods for communicating and using a geofence while maintaining privacy are presented. A geofence is based on at least one RF fingerprint. The RF fingerprints include absolute information that is transformed into a one-way matrix (A) by application of a one-way function. The absolute information may identify a transmitter (e.g., by location, address or the like). An equation 0=Ax (where 0 is a zero vector, A is the one-way matrix and x is a signature vector) is solved to reveal one possible solution for the signature vector (x). This signature vector (x) is communicated rather than the RF fingerprints themselves, thus obscuring the absolute information and maintaining privacy.Type: GrantFiled: October 17, 2013Date of Patent: August 9, 2016Assignee: QUALCOMM IncorporatedInventors: Xintian Li, Ning Shang, Marc Anthony Ische
-
Patent number: 8948782Abstract: Systems and methods of determining proximity of a mobile device to a target location are described herein. A method as described herein includes identifying a signal sent by the mobile device and received by respective ones of a set of receivers including at least a first receiver and a second receiver, wherein the first receiver and second receiver are positioned collinearly to the target location; determining a first signal-quality metric observed at the first receiver and a second signal-quality metric observed at the second receiver with respect to the signal; computing a ratio associated with distances from the mobile device to the first receiver and the second receiver, respectively, based on the first signal-quality metric and the second signal-quality metric; and determining whether the mobile device is within a proximity region defined in relation to the target location based on the ratio.Type: GrantFiled: December 21, 2012Date of Patent: February 3, 2015Assignee: QUALCOMM IncorporatedInventors: Ning Shang, Yafei Yang
-
Publication number: 20150031323Abstract: Disclosed is an apparatus and method to implement a queuing process by a position enabled mobile device to prioritize the legitimacy of initiation messages. The method may include: transmitting an emergency call; receiving at least one initiation message; and assigning the received initiation message to one of a plurality of priority queues, wherein the assignment to the priority queue is based upon at least one of an identifier of an emergency location platform or a whitelist.Type: ApplicationFiled: July 23, 2013Publication date: January 29, 2015Applicant: QUALCOMM IncorporatedInventors: Philip Michael HAWKES, Andreas Klaus WACHTER, Ning SHANG
-
Publication number: 20150023502Abstract: Systems, apparatus and methods for communicating and using a geofence while maintaining privacy are presented. A geofence is based on at least one RF fingerprint. The RF fingerprints include absolute information that is transformed into a one-way matrix (A) by application of a one-way function. The absolute information may identify a transmitter (e.g., by location, address or the like). An equation 0=Ax (where 0 is a zero vector, A is the one-way matrix and x is a signature vector) is solved to reveal one possible solution for the signature vector (x). This signature vector (x) is communicated rather than the RF fingerprints themselves, thus obscuring the absolute information and maintaining privacy.Type: ApplicationFiled: October 17, 2013Publication date: January 22, 2015Applicant: QUALCOMM IncorporatedInventors: Xintian LI, Ning SHANG, Marc Anthony ISCHE
-
Patent number: 8769301Abstract: Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve equation and a curve pairing function. A public product activation code and a private product activation code are generated based upon the public parameters and the secret master key. The public parameters and the public product activation code are stored with the product. Further, the private product activation code is associated with the product. The product is authenticated if the private product activation code entered to a client device satisfies a mathematical formula implemented with the public parameters and the public product activation code.Type: GrantFiled: July 28, 2011Date of Patent: July 1, 2014Assignee: QUALCOMM IncorporatedInventor: Ning Shang
-
Publication number: 20140179338Abstract: Systems and methods of determining proximity of a mobile device to a target location are described herein. A method as described herein includes identifying a signal sent by the mobile device and received by respective ones of a set of receivers including at least a first receiver and a second receiver, wherein the first receiver and second receiver are positioned collinearly to the target location; determining a first signal-quality metric observed at the first receiver and a second signal-quality metric observed at the second receiver with respect to the signal; computing a ratio associated with distances from the mobile device to the first receiver and the second receiver, respectively, based on the first signal-quality metric and the second signal-quality metric; and determining whether the mobile device is within a proximity region defined in relation to the target location based on the ratio.Type: ApplicationFiled: December 21, 2012Publication date: June 26, 2014Applicant: QUALCOMM IncorporatedInventors: Ning Shang, Yafei Yang
-
Publication number: 20140133656Abstract: Methods, systems and devices enable synchronizing obscured identification information between a wireless identity transmitter and a central server to support one-way communication of the obscured identification information to the central server. The wireless identity transmitter may be a compact device configured to broadcast messages, such as through Bluetooth® advertisements, including an obscured identifier for receipt and relay to the central server by proximate proximity broadcast receivers via sighting messages that may also include location information. The central server may decode received identification codes to identify the wireless identity transmitter. The wireless identity transmitter may create message data by concatenating identifying information with an incrementing nonce, encrypting the concatenated information, and truncating the encrypted information.Type: ApplicationFiled: February 21, 2013Publication date: May 15, 2014Applicant: QUALCOMM INCORPORATEDInventors: Charles S. Wurster, Ning Shang, Panagiotis Thomas, Stephen A. Sprigg, Matthew Hohlfeld, Ivan Hugh Mclean
-
Publication number: 20140068778Abstract: A database for location or geographic based services is secured by requiring location based requests to include a unique identifier that identifies the location as well as an authorization identifier associated with the location. The authorization identifier is information that is obtained by being physically present at the location, such as information from access points that are at the location or a position fix when present at the location. The authorization identifier may be non-unique but relatively time-invariant, making such information easily crowdsourced, but difficult to obtain unless physically present at the location. For example, the authorization identifier may be an SSID or a Beacon Frame, or a hash thereof from one or more devices at the location or a position fix.Type: ApplicationFiled: September 6, 2012Publication date: March 6, 2014Applicant: QUALCOMM IncorporatedInventors: Ashok Bhatia, Ning Shang, Yafei Yang
-
Patent number: 8520841Abstract: An exemplary method includes defining a CM field, representing coefficients of a Frobenius element of a hyperelliptic curve over a prime field as non-linear polynomials that are functions of an integer x and selecting a value for x whereby the product of the Frobenius element and its complex conjugate is a prime number. Such a method may further include determining the order of the Jacobian of the hyperelliptic curve, for example, where the order is an almost prime number. Various other methods, devices, systems, etc., are also disclosed, which may be optionally used for cryptography.Type: GrantFiled: May 22, 2008Date of Patent: August 27, 2013Assignee: Microsoft CorporationInventors: Kristin E. Lauter, Ning Shang
-
Publication number: 20130031373Abstract: Disclosed is a method, system, and device to authenticate a product. A plurality of public parameters and a secret master key are selected. The public parameters include a hyperelliptic curve equation and a curve pairing function. A public product activation code and a private product activation code are generated based upon the public parameters and the secret master key. The public parameters and the public product activation code are stored with the product. Further, the private product activation code is associated with the product. The product is authenticated if the private product activation code entered to a client device satisfies a mathematical formula implemented with the public parameters and the public product activation code.Type: ApplicationFiled: July 28, 2011Publication date: January 31, 2013Applicant: QUALCOMM IncorporatedInventor: Ning Shang