Patents by Inventor Qiuxiang Dong

Qiuxiang Dong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230298226
    Abstract: The disclosed computer-implemented methods may include detecting malicious usage based on a user's behavior in connection with a wearable computing device. Similarly, another method may detect a bystander within range of a sensor, in which the device may determine if capturing information associated with a bystander is authorized. Another method may also include performing a segmentation of the media content and detecting a privacy portion of the media content. Furthermore, a method may include identifying a set of image frames and designating an optimal frame for storing. Additionally, a method may include a visibility-based subscription for video streams to determine a subset of the registered participant tiles to be subscribed to and displayed via the display device. Lastly, a system may include a processor that detects the difference of mutual capacitance between a first and second wire. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: March 10, 2023
    Publication date: September 21, 2023
    Inventors: Sanjiban Kundu, Sung Ho Hong, Cheng-Sheng Hsu, Yaohui Ye, Kiril Georgiev, Qiuxiang Dong, Junwu Luo, David Walsh, Adam Ahne, Andrew Doxon, Ergys Ristani, Taylor Douglas Niehues, Yan Xu, Erin Casey Whitworth, Prince Gupta, Karthik Jaiwant Bhandarkar, Shenwei Liu
  • Patent number: 11310041
    Abstract: A method for a data owner to enforce attribute-based and discretionary access control over a cloud-based data store by specifying an access policy, creating a plurality of users with attributes that satisfy the access policy, and revoking one or more of the plurality of users by embedding their respective identities as revoked into a ciphertext, whereby only those of the plurality of users whose attributes satisfy the access policy and that are not revoked can decrypt the ciphertext.
    Type: Grant
    Filed: December 27, 2019
    Date of Patent: April 19, 2022
    Assignee: Arizona Board of Regents on Behalf of Arizona State University
    Inventors: Dijiang Huang, Jim Luo, Myong Hoon Kang, Qiuxiang Dong
  • Patent number: 10984052
    Abstract: A method and system for searching encrypted data using wildcard keywords. The method includes: obtaining, by a first computing device, a keyword for data to be encrypted, where the keyword has a fixed length; generating a sequence of primes; determining corresponding one prime from the sequence of primes for each character of the keyword; and defining a product of the corresponding primes of the characters of the keyword as index of the encrypted data, where the index can be searched using a wildcard search keyword.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: April 20, 2021
    Assignees: Beijing Jingdong Shangke Information Technology Co., Ltd., JD.com American Technologies Corporation
    Inventors: Qiuxiang Dong, Yueh-Hsun Lin, Wei Gao, Jimmy Su
  • Publication number: 20200322142
    Abstract: A method for a data owner to enforce attribute-based and discretionary access control over a cloud-based data store by specifying an access policy, creating a plurality of users with attributes that satisfy the access policy, and revoking one or more of the plurality of users by embedding their respective identities as revoked into a ciphertext, whereby only those of the plurality of users whose attributes satisfy the access policy and that are not revoked can decrypt the ciphertext.
    Type: Application
    Filed: December 27, 2019
    Publication date: October 8, 2020
    Inventors: Dijiang Huang, Jim Luo, Myong Hoon Kang, Qiuxiang Dong
  • Publication number: 20200159779
    Abstract: A method and system for searching encrypted data using wildcard keywords. The method includes: obtaining, by a first computing device, a keyword for data to be encrypted, where the keyword has a fixed length; generating a sequence of primes; determining corresponding one prime from the sequence of primes for each character of the keyword; and defining a product of the corresponding primes of the characters of the keyword as index of the encrypted data, where the index can be searched using a wildcard search keyword.
    Type: Application
    Filed: November 19, 2018
    Publication date: May 21, 2020
    Inventors: Qiuxiang Dong, Yueh-Hsun Lin, Wei Gao, Jimmy Su