Patents by Inventor Qiuming Li

Qiuming Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240097350
    Abstract: Disclosed herein are related to systems and methods for wireless communication. In one aspect, a system includes a first wireless interface configured to communicate at a first frequency band and a second frequency band. In one aspect, the system includes a second wireless interface configured to communicate at a third frequency band and a fourth frequency band. In one aspect, the system includes a switch configured to select either communication at the second frequency band or the third frequency band. In one aspect, the system includes a multi-band filter configured to couple i) the first wireless interface, ii) the second wireless interface, and iii) the switch, to a single antenna.
    Type: Application
    Filed: July 15, 2022
    Publication date: March 21, 2024
    Inventors: Qiuming Li, Abhishek Kumar Agrawal, Xiangyu Kong
  • Patent number: 11729897
    Abstract: The disclosed hybrid shielding structure may include a printed circuit board (PCB) that is to be overmolded with at least a portion of molding compound. The PCB may include various electronic components disposed thereon. The hybrid shielding structure may also include conductive trenches and conductive fences that are disposed on the PCB. The conductive trenches and the conductive fences may provide an electromagnetic shield for at least a portion of the electronic components of the PCB. The hybrid shielding structure may further include a conformal shielding and a PCB ground flood and ground layers. Various other systems, electronic devices, apparatuses, and methods of manufacturing are also disclosed.
    Type: Grant
    Filed: June 27, 2022
    Date of Patent: August 15, 2023
    Assignee: Meta Platforms Technologies, LLC
    Inventors: Qiuming Li, Ming Lei, Colden Niles Eldridge, Yeonsoo Ko
  • Publication number: 20230253923
    Abstract: Disclosed herein are related to systems and methods for adaptively configuring various components of a wireless device. In one aspect, the wireless device includes a first low noise amplifier, a second low noise amplifier, and an attenuator coupled between the first low noise amplifier and the second low noise amplifier. In one aspect, the wireless device includes one or more processors configured to determine an input power level at the first low noise amplifier. In one aspect, the one or more processors are configured to determine a group of configurations of the first low noise amplifier, the attenuator, and the second low noise amplifier, according to the determined input power level at the first low noise amplifier. In one aspect, the one or more processors are configured to set the first low noise amplifier, the attenuator, and the second low noise amplifier, according to the determined group of configurations.
    Type: Application
    Filed: June 3, 2022
    Publication date: August 10, 2023
    Inventors: Qiuming LI, Bo ZHANG, Wooram CHOI
  • Publication number: 20230208809
    Abstract: Techniques for outbound/inbound lateral traffic punting based upon process risk are disclosed. In some embodiments, a system/process/computer program product for outbound/inbound lateral traffic punting based upon process risk includes receiving, at a network device on an enterprise network, process identification (ID) information from an endpoint (EP) agent executed on an EP device, in which the process ID information identifies a process that is associated with an outbound or inbound network session on the EP device on the enterprise network, and the EP agent selected the network session for punting to the network device for inspection; monitoring network communications associated with the network session at the network device to identify an application identification (APP ID) for the network session; and performing an action based on a security policy using the process ID information and the APP ID.
    Type: Application
    Filed: February 23, 2023
    Publication date: June 29, 2023
    Inventors: Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
  • Patent number: 11616761
    Abstract: Techniques for outbound/inbound lateral traffic punting based upon process risk are disclosed. In some embodiments, a system/process/computer program product for outbound/inbound lateral traffic punting based upon process risk includes receiving, at a network device on an enterprise network, process identification (ID) information from an endpoint (EP) agent executed on an EP device, in which the process ID information identifies a process that is associated with an outbound or inbound network session on the EP device on the enterprise network, and the EP agent selected the network session for punting to the network device for inspection; monitoring network communications associated with the network session at the network device to identify an application identification (APP ID) for the network session; and performing an action based on a security policy using the process ID information and the APP ID.
    Type: Grant
    Filed: December 23, 2020
    Date of Patent: March 28, 2023
    Assignee: Palo Alto Networks, Inc.
    Inventors: Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
  • Publication number: 20230006986
    Abstract: Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile.
    Type: Application
    Filed: August 31, 2022
    Publication date: January 5, 2023
    Inventors: Ashwath Sreenivasa Murthy, Prabhakar M V B R Mangam, Shriram S. Jandhyala, Qiuming Li, Yongjie Yin
  • Patent number: 11470070
    Abstract: Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile.
    Type: Grant
    Filed: March 9, 2020
    Date of Patent: October 11, 2022
    Assignee: Palo Alto Networks, Inc.
    Inventors: Ashwath Sreenivasa Murthy, Prabhakar M V B R Mangam, Shriram S. Jandhyala, Qiuming Li, Yongjie Yin
  • Publication number: 20210119969
    Abstract: Techniques for outbound/inbound lateral traffic punting based upon process risk are disclosed. In some embodiments, a system/process/computer program product for outbound/inbound lateral traffic punting based upon process risk includes receiving, at a network device on an enterprise network, process identification (ID) information from an endpoint (EP) agent executed on an EP device, in which the process ID information identifies a process that is associated with an outbound or inbound network session on the EP device on the enterprise network, and the EP agent selected the network session for punting to the network device for inspection; monitoring network communications associated with the network session at the network device to identify an application identification (APP ID) for the network session; and performing an action based on a security policy using the process ID information and the APP ID.
    Type: Application
    Filed: December 23, 2020
    Publication date: April 22, 2021
    Inventors: Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
  • Patent number: 10931637
    Abstract: Techniques for outbound/inbound lateral traffic punting based upon process risk are disclosed. In some embodiments, a system/process/computer program product for outbound/inbound lateral traffic punting based upon process risk includes receiving, at a network device on an enterprise network, process identification (ID) information from an endpoint (EP) agent executed on an EP device, in which the process ID information identifies a process that is associated with an outbound or inbound network session on the EP device on the enterprise network, and the EP agent selected the network session for punting to the network device for inspection; monitoring network communications associated with the network session at the network device to identify an application identification (APP ID) for the network session; and performing an action based on a security policy using the process ID information and the APP ID.
    Type: Grant
    Filed: September 15, 2017
    Date of Patent: February 23, 2021
    Assignee: Palo Alto Networks, Inc.
    Inventors: Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
  • Patent number: 10921907
    Abstract: An input device, such as a stylus, can include a main body comprising a main body connector for connecting to a charger to charge a power source of the stylus. A separate functional end module is removable from the main body to expose the main body connector. The functional end module includes a functional component and a module connector that communicates with the main body via the main body connector. Various different functional end modules can be interchangeable to provide a variety of distinct features to the stylus.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: February 16, 2021
    Assignee: Apple Inc.
    Inventors: Qiuming Li, Nicholas M. Mcdonnell, Michael J. Newman, Xiaoyu Cheng, Swapnil S. Jain, Hardik Joshi, Neeraj Gupta, Mohit Narang
  • Patent number: 10855656
    Abstract: Techniques for fine-grained firewall policy enforcement using session APP ID and endpoint process ID correlation are disclosed. In some embodiments, a system/process/computer program product for fine-grained firewall policy enforcement using session APP ID and endpoint process ID correlation includes receiving, at a network device on an enterprise network, process identification (ID) information from an endpoint (EP) agent executed on an EP device, in which the process identification information identifies a process that is initiating a network session from the EP device on the enterprise network; monitoring network communications associated with the network session at the network device to identify an application identification (APP ID) for the network session; and performing an action based on a security policy using the process ID information and the APP ID.
    Type: Grant
    Filed: September 15, 2017
    Date of Patent: December 1, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Robert Earle Ashley, Ho Yu Lam, Robert Tesh, Xuanyu Jin, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
  • Publication number: 20200213289
    Abstract: Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile.
    Type: Application
    Filed: March 9, 2020
    Publication date: July 2, 2020
    Inventors: Ashwath Sreenivasa Murthy, Prabhakar M. V. B. R. Mangam, Shriram S. Jandhyala, Qiuming Li, Yongjie Yin
  • Patent number: 10701049
    Abstract: Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: June 30, 2020
    Assignee: Palo Alto Networks, Inc.
    Inventors: Ashwath Sreenivasa Murthy, Prabhakar M V B R Mangam, Shriram S. Jandhyala, Qiuming Li, Yongjie Yin
  • Publication number: 20190089677
    Abstract: Techniques for fine-grained firewall policy enforcement using session APP ID and endpoint process ID correlation are disclosed. In some embodiments, a system/process/computer program product for fine-grained firewall policy enforcement using session APP ID and endpoint process ID correlation includes receiving, at a network device on an enterprise network, process identification (ID) information from an endpoint (EP) agent executed on an EP device, in which the process identification information identifies a process that is initiating a network session from the EP device on the enterprise network; monitoring network communications associated with the network session at the network device to identify an application identification (APP ID) for the network session; and performing an action based on a security policy using the process ID information and the APP ID.
    Type: Application
    Filed: September 15, 2017
    Publication date: March 21, 2019
    Inventors: Robert Earle Ashley, Ho Yu Lam, Robert Tesh, Xuanyu Jin, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
  • Publication number: 20190089678
    Abstract: Techniques for outbound/inbound lateral traffic punting based upon process risk are disclosed. In some embodiments, a system/process/computer program product for outbound/inbound lateral traffic punting based upon process risk includes receiving, at a network device on an enterprise network, process identification (ID) information from an endpoint (EP) agent executed on an EP device, in which the process ID information identifies a process that is associated with an outbound or inbound network session on the EP device on the enterprise network, and the EP agent selected the network session for punting to the network device for inspection; monitoring network communications associated with the network session at the network device to identify an application identification (APP ID) for the network session; and performing an action based on a security policy using the process ID information and the APP ID.
    Type: Application
    Filed: September 15, 2017
    Publication date: March 21, 2019
    Inventors: Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li, Taylor Ettema
  • Patent number: 10219167
    Abstract: A method for operating a first radio of a number of radios within a radio frequency system may include sending a first command to the first radio of the plurality of radios to initiate an antenna sector level sweep and determining a first set of metrics associated with a first set of signals from other radios of the plurality of radios that correspond to the antenna sector level sweep. The method may also include receiving a second set of metrics associated with the first set of signals from a responder electronic device and identifying a sector of a number of sectors associated with the antenna sector level sweep based on the first set of metrics and the second set of metrics. The method may then involve sending a second command to the first radio to transmit data to the responder device via the identified sector.
    Type: Grant
    Filed: September 21, 2016
    Date of Patent: February 26, 2019
    Assignee: Apple Inc.
    Inventors: Qiuming Li, Nicholas M. McDonnell
  • Patent number: 10187807
    Abstract: Systems, methods, and devices are provided for performing an antenna sector level sweep of a radio in a radio frequency system with co-existence of other radios. The method may involve sending a first command to a portion of a plurality of radios to determine a first set of signal quality metrics associated with the portion of the plurality of radios for one or more sectors of an antenna while the first radio is not active. The method may involve determining a second set of signal quality metrics associated with using the portion of the plurality of radios when the first radio is active via one or more sectors of a sector level sweep. The method also include generating a table that includes the second set of signal quality metrics and storing the table that indicates a portion of the sectors to avoid when the first radio performs a subsequent sweep.
    Type: Grant
    Filed: September 21, 2016
    Date of Patent: January 22, 2019
    Assignee: Apple Inc.
    Inventors: Qiuming Li, Nicholas M. McDonnell
  • Publication number: 20180097789
    Abstract: Techniques for time-based network authentication challenges are disclosed. In some embodiments, a system, process, and/or computer program product for time-based network authentication challenges includes monitoring a session at a firewall to identify a user associated with the session, generating a timestamp for an authentication factor associated with the user after the user successfully authenticates for access to a resource based on an authentication profile, intercepting another request from the user for access to the resource at the firewall, and determining whether the timestamp for the authentication factor is expired based on the authentication profile.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Inventors: Ashwath Sreenivasa Murthy, Prabhakar M V B R Mangam, Shriram S. Jandhyala, Qiuming Li, Yongjie Yin
  • Publication number: 20180084439
    Abstract: Systems, methods, and devices are provided for performing an antenna sector level sweep of a radio in a radio frequency system with co-existence of other radios. The method may involve sending a first command to a portion of a plurality of radios to determine a first set of signal quality metrics associated with the portion of the plurality of radios for one or more sectors of an antenna while the first radio is not active. The method may involve determining a second set of signal quality metrics associated with using the portion of the plurality of radios when the first radio is active via one or more sectors of a sector level sweep. The method also include generating a table that includes the second set of signal quality metrics and storing the table that indicates a portion of the sectors to avoid when the first radio performs a subsequent sweep.
    Type: Application
    Filed: September 21, 2016
    Publication date: March 22, 2018
    Inventors: Qiuming Li, Nicholas M. McDonnell
  • Patent number: D917173
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: April 27, 2021
    Inventor: Qiuming Li