Patents by Inventor Patrick Xu
Patrick Xu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240413974Abstract: Dynamically calculating an optimal operational efficiency configuration of a plurality of digital currency mining systems based on trending information related to the digital currency and extrinsic factors affecting the plurality of digital currency mining. The plurality of digital currency mining systems are sent configuration settings to achieve the optimal operational efficiency configuration.Type: ApplicationFiled: June 7, 2024Publication date: December 12, 2024Inventors: Saptadeep PAL, Patrick XU, David CARLSON, Nicholas CABI, Aditya BATRA, Raju RAKHA, Barun KAR, Rajiv KHEMANI, Robert ASHLEY, Matthew TOMEI, Sridhar CHIRRAVURI
-
Publication number: 20240411900Abstract: A local buffer is integrated with a witness generator and a proof generator on a cryptographic processor and is separate from host memory accessed by a host processor operating with the cryptographic processor in a proving computing system. The witness generator: receives, from software program running on the host processor, compiled code of a zero-knowledge-proof (ZKP) program and specific input to the ZKP program; executes the ZKP program by way of executing the compiled code; records specific output generated from the ZKP program with the specific input, intermediate variable values, and the specific input, as a specific witness of executing the ZKP program; stores the specific witness in the local buffer. The proof generator: receives, from the software program running on the host processor, a proving key; accesses the specific witness in the local buffer; generates a specific zero-knowledge proof for executing the ZKP program with the specific input.Type: ApplicationFiled: June 8, 2023Publication date: December 12, 2024Inventors: Patrick XU, Minglei WANG, Sidong LI, De VU, Saptadeep PAL, Lei CHANG
-
Patent number: 12113896Abstract: A local buffer is integrated with a witness generator and a proof generator on a cryptographic processor and is separate from host memory accessed by a host processor operating with the cryptographic processor in a proving computing system. The witness generator: receives, from software program running on the host processor, compiled code of a zero-knowledge-proof (ZKP) program and specific input to the ZKP program; executes the ZKP program by way of executing the compiled code; records specific output generated from the ZKP program with the specific input, intermediate variable values, and the specific input, as a specific witness of executing the ZKP program; stores the specific witness in the local buffer. The proof generator: receives, from the software program running on the host processor, a proving key; accesses the specific witness in the local buffer; generates a specific zero-knowledge proof for executing the ZKP program with the specific input.Type: GrantFiled: November 30, 2023Date of Patent: October 8, 2024Assignee: Auradine, Inc.Inventors: Patrick Xu, Minglei Wang, Sidong Li, De Vu, Saptadeep Pal, Lei Chang
-
Patent number: 12101407Abstract: An asset management method is provided. The asset management method includes establishing a network connection between a cryptomining asset and an asset management server. The asset management method includes generating a digital token, wherein the digital token includes an identifier assigned to the cryptomining asset by a cryptomining asset provider. The asset management method includes transmitting, to the asset management server and via the network connection, the digital token. The asset management method includes receiving, from the asset management server, a message corresponding to the identifier, wherein the message includes a configuration of a cryptomining task. The asset management method includes loading the configuration in the cryptomining asset. Another asset management method and a cryptomining asset are also provided.Type: GrantFiled: November 14, 2023Date of Patent: September 24, 2024Assignee: Auradine, Inc.Inventors: Patrick Xu, Liang Li, Aditya Batra, Sridhar Chirravuri, Lei Chang, Robert Ashley
-
Patent number: 12081624Abstract: Systems, methods, and apparatus, including programs encoded on computer storage media, for cryptomining asset management. In one aspect, a method performed by an asset management server for a computer network is provided. The method includes: receiving, from a computer, a request to establish a network connection in the computer network; transmitting, to the computer, a response to the request that establishes the network connection with the computer; receiving, from the computer via the network connection, a unique identifier of the computer in the computer network; determining, based on the unique identifier of the computer, whether the computer is an asset associated with the asset management server; and upon determining that the computer is an asset: transmitting, to the computer via the network connection, a set of configurations for the computer, where the set of configurations includes a software configuration that configures the computer to perform a mining operation.Type: GrantFiled: November 22, 2023Date of Patent: September 3, 2024Assignee: Auradine, Inc.Inventors: Patrick Xu, Liang Li, Aditya Batra, Sridhar Chirravuri
-
Patent number: 11882216Abstract: A local buffer is integrated with a witness generator and a proof generator on a cryptographic processor and is separate from host memory accessed by a host processor operating with the cryptographic processor in a proving computing system. The witness generator: receives, from software program running on the host processor, compiled code of a zero-knowledge-proof (ZKP) program and specific input to the ZKP program; executes the ZKP program by way of executing the compiled code; records specific output generated from the ZKP program with the specific input, intermediate variable values, and the specific input, as a specific witness of executing the ZKP program; stores the specific witness in the local buffer. The proof generator: receives, from the software program running on the host processor, a proving key; accesses the specific witness in the local buffer; generates a specific zero-knowledge proof for executing the ZKP program with the specific input.Type: GrantFiled: June 26, 2023Date of Patent: January 23, 2024Assignee: Auradine, Inc.Inventors: Patrick Xu, Minglei Wang, Sidong Li, De Vu, Saptadeep Pal, Lei Chang
-
Publication number: 20240007431Abstract: Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment. In one implementation, a method of operating a first service instance in a cloud computing environment includes obtaining a communication from a computing asset, wherein the communication comprises a first destination address. The method further provides replacing the first destination address with a second destination address in the communication, wherein the second destination address comprises a shared address for failover from a second service instance. After replacing the address, the method determines whether the communication is permitted based on the second destination address, and if permitted, processes the communication in accordance with a service executing on the service instance.Type: ApplicationFiled: September 12, 2023Publication date: January 4, 2024Inventors: Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
-
Patent number: 11770359Abstract: Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment. In one implementation, a method of operating a first service instance in a cloud computing environment includes obtaining a communication from a computing asset, wherein the communication comprises a first destination address. The method further provides replacing the first destination address with a second destination address in the communication, wherein the second destination address comprises a shared address for failover from a second service instance. After replacing the address, the method determines whether the communication is permitted based on the second destination address, and if permitted, processes the communication in accordance with a service executing on the service instance.Type: GrantFiled: February 15, 2022Date of Patent: September 26, 2023Assignee: Palo Alto Networks, Inc.Inventors: Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
-
Patent number: 11456131Abstract: A switch assembly comprises a button, a pivoting element, a first positioning element, and a second positioning element. The button has a first, second, and third states. The pivoting element extends from a height direction of the button, and has first and second contact parts arranged in the height direction. Surfaces of the first and second contact parts have different contours. The first positioning element and the second positioning element respectively correspond to the first contact part and the second contact part, and are movable relative to each other. A function of the first positioning element and a first positioning section of the first contact part is configuring the first state, and functions of the second positioning element and a second positioning section and a third positioning section of the second contact part are respectively configuring the second state and the third state.Type: GrantFiled: October 16, 2019Date of Patent: September 27, 2022Assignee: Ford Global Technologies, LLCInventors: Derek Kang, Patrick Xu, Daniel Weckstein, Dai Yang, Shannon Carloni
-
Publication number: 20220174036Abstract: Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment. In one implementation, a method of operating a first service instance in a cloud computing environment includes obtaining a communication from a computing asset, wherein the communication comprises a first destination address. The method further provides replacing the first destination address with a second destination address in the communication, wherein the second destination address comprises a shared address for failover from a second service instance. After replacing the address, the method determines whether the communication is permitted based on the second destination address, and if permitted, processes the communication in accordance with a service executing on the service instance.Type: ApplicationFiled: February 15, 2022Publication date: June 2, 2022Inventors: Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
-
Patent number: 11271900Abstract: Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment. In one implementation, a method of operating a first service instance in a cloud computing environment includes obtaining a communication from a computing asset, wherein the communication comprises a first destination address. The method further provides replacing the first destination address with a second destination address in the communication, wherein the second destination address comprises a shared address for failover from a second service instance. After replacing the address, the method determines whether the communication is permitted based on the second destination address, and if permitted, processes the communication in accordance with a service executing on the service instance.Type: GrantFiled: April 14, 2020Date of Patent: March 8, 2022Assignee: Palo Alto Networks, Inc.Inventors: Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
-
Publication number: 20200244620Abstract: Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment. In one implementation, a method of operating a first service instance in a cloud computing environment includes obtaining a communication from a computing asset, wherein the communication comprises a first destination address. The method further provides replacing the first destination address with a second destination address in the communication, wherein the second destination address comprises a shared address for failover from a second service instance. After replacing the address, the method determines whether the communication is permitted based on the second destination address, and if permitted, processes the communication in accordance with a service executing on the service instance.Type: ApplicationFiled: April 14, 2020Publication date: July 30, 2020Inventors: Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
-
Publication number: 20200168413Abstract: A switch assembly comprises a button, a pivoting element, a first positioning element, and a second positioning element. The button has a first, second, and third states. The pivoting element extends from a height direction of the button, and has first and second contact parts arranged in the height direction. Surfaces of the first and second contact parts have different contours. The first positioning element and the second positioning element respectively correspond to the first contact part and the second contact part, and are movable relative to each other. A function of the first positioning element and a first positioning section of the first contact part is configuring the first state, and functions of the second positioning element and a second positioning section and a third positioning section of the second contact part are respectively configuring the second state and the third state.Type: ApplicationFiled: October 16, 2019Publication date: May 28, 2020Applicant: Ford Global Technologies, LLCInventors: Derek Kang, Patrick Xu, Daniel Weckstein, Dai Yang, Shannon Carloni
-
Patent number: 10630638Abstract: Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment. In one implementation, a method of operating a first service instance in a cloud computing environment includes obtaining a communication from a computing asset, wherein the communication comprises a first destination address. The method further provides replacing the first destination address with a second destination address in the communication, wherein the second destination address comprises a shared address for failover from a second service instance. After replacing the address, the method determines whether the communication is permitted based on the second destination address, and if permitted, processes the communication in accordance with a service executing on the service instance.Type: GrantFiled: March 9, 2018Date of Patent: April 21, 2020Assignee: Palo Alto Networks, Inc.Inventors: Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
-
Publication number: 20200114241Abstract: The present disclosure relates to system and method for real-time tracking and displaying of an athlete's motions. The disclosure includes of a system for tracking the movement of key parts of the human body, then transmitting data acquired to create a visual of the movement of the body within a viewing device. The system includes a plurality of sensor devices attached to various parts of the athlete's body that are configured to collect sensor data about movements of an athlete's body, a controller configured to process the sensor data received from the plurality of sensor devices to generate one or more views of the movements of the athlete's body, and a display module configured to display the one or more views of the movements of the athlete's body.Type: ApplicationFiled: October 8, 2019Publication date: April 16, 2020Inventor: Patrick XU
-
Publication number: 20190281014Abstract: Described herein are systems, methods, and software to enhance failover operations in a cloud computing environment. In one implementation, a method of operating a first service instance in a cloud computing environment includes obtaining a communication from a computing asset, wherein the communication comprises a first destination address. The method further provides replacing the first destination address with a second destination address in the communication, wherein the second destination address comprises a shared address for failover from a second service instance. After replacing the address, the method determines whether the communication is permitted based on the second destination address, and if permitted, processes the communication in accordance with a service executing on the service instance.Type: ApplicationFiled: March 9, 2018Publication date: September 12, 2019Inventors: Shu Lin, Patrick Xu, Eswar Rao Sadaram, Hao Long
-
Patent number: 9520758Abstract: An energy harvester system (EHS) for converting a multiple degree of freedom (MDF) pendulum motion into a rotational motion is provided. The EHS includes a pendulum, a pointing element, and motion control slots (MCSs) enclosed in an external housing. Ambient motion from the external housing generates a MDF pendulum motion in the pendulum. The pointing element is slidably positioned on a rod of the pendulum. The MCSs receive a connector that connects the pointing element to the rod of the pendulum and allow the connector to traverse the MCSs, thereby controlling slidable movement of the pointing element along with the pendulum. When the pendulum moves to first ends of the MCSs, the pointing element slides on the rod to allow a pointer of the pointing element to contact and rotate a gear, thereby converting the MDF pendulum motion into a rotational motion of the gear, which drives an electric generator.Type: GrantFiled: May 26, 2016Date of Patent: December 13, 2016Inventors: Patrick Xu, Run De Zhu, Yu Qing Liu, Ethan Hu, Bocheng Cai
-
Patent number: 8972721Abstract: A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more separate manufacturers, operates a remote module that communicates over forward and backward channels with a local module at the manufacturer. Encrypted data transmissions are sent by producer to the manufacturer and are decrypted to obtain sensitive data used in the devices. As data transmissions are decrypted, credits from a credit pool are depleted and can be replenished by the producer through credit instructions. As distribution images are decrypted, usage records are created and eventually concatenated, and sent as usage reports back to the producer, to enable the producer to monitor and meter production at the manufacturer.Type: GrantFiled: April 12, 2013Date of Patent: March 3, 2015Assignee: Certicom Corp.Inventors: Brian Neill, Ashok Vadekar, Patrick Xu
-
Publication number: 20130238899Abstract: A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more separate manufacturers, operates a remote module that communicates over forward and backward channels with a local module at the manufacturer. Encrypted data transmissions are sent by producer to the manufacturer and are decrypted to obtain sensitive data used in the devices. As data transmissions are decrypted, credits from a credit pool are depleted and can be replenished by the producer through credit instructions. As distribution images are decrypted, usage records are created and eventually concatenated, and sent as usage reports back to the producer, to enable the producer to monitor and meter production at the manufacturer.Type: ApplicationFiled: April 12, 2013Publication date: September 12, 2013Applicant: CERTICOM CORP.Inventors: Brian NEILL, Ashok VADEKAR, Patrick XU
-
Patent number: 8423765Abstract: A system and method for remote device registration, to monitor and meter the injection of keying or other confidential information onto a device, is provided. A producer who utilizes one or more separate manufacturers, operates a remote module that communicates over forward and backward channels with a local module at the manufacturer. Encrypted data transmissions are sent by producer to the manufacturer and are decrypted to obtain sensitive data used in the devices. As data transmissions are decrypted, credits from a credit pool are depleted and can be replenished by the producer through credit instructions. As distribution images are decrypted, usage records are created and eventually concatenated, and sent as usage reports back to the producer, to enable the producer to monitor and meter production at the manufacturer.Type: GrantFiled: April 27, 2010Date of Patent: April 16, 2013Assignee: Certicom Corp.Inventors: Brian Neill, Ashok Vadekar, Patrick Xu