Patents by Inventor Robert Jung
Robert Jung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12294959Abstract: Apparatuses, methods, and systems are disclosed for uplink power control. One method includes: receiving a message that configures a set of resources that each includes a downlink resource or an uplink sounding resource and is associated with an uplink transmission beam pattern; receiving scheduling information for an uplink transmission that is associated with a resource of the set of resources; determining an uplink transmission beam pattern associated with the resource; determining a configured maximum output power for the uplink transmission beam pattern that is based on an antenna array property associated with the uplink transmission beam pattern; determining a transmit power for the uplink transmission based on the configured maximum output power; and performing the uplink transmission using the uplink transmission beam pattern based on the transmit power.Type: GrantFiled: May 20, 2024Date of Patent: May 6, 2025Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Ebrahim MolavianJazi, Vijay Nangia, Hyejung Jung, Colin D. Frank, Robert T. Love, Ravi Kuchibhotla, Hossein Bagheri
-
Patent number: 12289776Abstract: At least one common PUCCH resource set configuration can be received (1310) for a 2-step random access procedure. At least one common PUCCH resource set can be determined (1320) based on the at least one common PUCCH resource set configuration. A PRACH and a corresponding MsgA PUSCH can be transmitted (1330). A MsgB PDSCH can be received (1340) in response to the transmitted PRACH and MsgA PUSCH. The received MsgB PDSCH can be decoded (1350). A successRAR intended to the UE can be identified (1360) from the decoded MsgB PDSCH. A common PUCCH resource set of the at least one common PUCCH resource set and a PUCCH resource of the common PUCCH resource set can be determined (1370) based on the successRAR. At least HARQ-ACK feedback information for the MsgB PDSCH can be transmitted (1380) on the PUCCH resource.Type: GrantFiled: October 5, 2020Date of Patent: April 29, 2025Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Hyejung Jung, Joachim Löhr, Vijay Nangia, Prateek Basu Mallick, Ravi Kuchibhotla, Alexander Johann Maria Golitschek Edler von Elbwart, Robert T. Love
-
Publication number: 20250124130Abstract: Techniques for identifying malware based on system API function pointers are disclosed. In some embodiments, a system/process/computer program product for identifying malware based on system API function pointers includes monitoring changes in memory during execution of a malware sample in a computing environment; detecting a dynamic evasion behavior using an Application Programming Interface (API) vector comprising a plurality of system API function pointers identified in the memory during execution of the malware sample in the computing environment; and generating a signature based on the API vector for automatically detecting the malware during execution in the memory, wherein the malware sample was determined to be malicious.Type: ApplicationFiled: December 23, 2024Publication date: April 17, 2025Inventors: Robert Jung, Daniel Raygoza, Michael S. Hughes, Esmid Idrizovic
-
Patent number: 12273826Abstract: Apparatuses, methods, and systems are disclosed for uplink power control. One method includes: operating a network entity with multiple antenna arrays; determining a first closed-loop power control process for a first set of uplink beam patterns based on a first antenna array of the multiple antenna arrays, wherein at least one receive beam pattern of the first antenna array is used to receive a first uplink transmission using at least one uplink beam pattern; determining a second closed-loop power control process for a second set of uplink beam patterns based on a second antenna array of the multiple antenna arrays, wherein the second antenna array is different from the first antenna array; and indicating to the device in a configuration message the first closed-loop power control process and the second closed-loop power control process.Type: GrantFiled: September 27, 2021Date of Patent: April 8, 2025Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Ebrahim MolavianJazi, Vijay Nangia, Hyejung Jung, Colin D. Frank, Robert T. Love, Ravi Kuchibhotla, Hossein Bagheri
-
Patent number: 12267165Abstract: Systems, methods, and instrumentalities are disclosed for interleaving coded bits. A wireless transmit/receive unit (WTRU) may generate a plurality of polar encoded bits using polar encoding. The WTRU may divide the plurality of polar encoded bits into sub-blocks of equal size in a sequential manner. The WTRU may apply sub-block wise interleaving to the sub-blocks using an interleaver pattern. The sub-blocks associated with a subset of the sub-blocks may be interleaved, and sub-blocks associated with another subset of the sub-blocks may not be interleaved. The sub-block wise interleaving may include applying interleaving across the sub-blocks without interleaving bits associated with each of the sub-blocks. The WTRU may concatenate bits from each of the interleaved sub-blocks to generate interleaved bits, and store the interleaved bits associated with the interleaved sub-blocks in a circular buffer. The WTRU may select a plurality of bits for transmission from the interleaved bits.Type: GrantFiled: April 25, 2024Date of Patent: April 1, 2025Assignee: InterDigital Patent Holdings, Inc.Inventors: Chunxuan Ye, Fengjun Xi, Sungkwon Hong, Kyle Jung-Lin Pan, Robert L. Olesen
-
Patent number: 12250734Abstract: A command can be received (910) from a network entity. The command can initiate a random access procedure and can include information of a type of random access procedure. The type of random access procedure can be selected from a 2-step random access procedure and a 4-step random access procedure. A MsgA transmission can be transmitted (920) in response to receiving the command when the type of random access procedure is the 2-step random access procedure.Type: GrantFiled: October 5, 2020Date of Patent: March 11, 2025Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Hyejung Jung, Joachim Löhr, Vijay Nangia, Prateek Basu Mallick, Ravi Kuchibhotla, Alexander Johann Maria Golitschek Edler von Elbwart, Robert T. Love
-
Patent number: 12245295Abstract: First transmission power can be determined (1110) for a first PRACH preamble in a 2-step random access procedure based on a first set of power control parameters. The first PRACH preamble can be transmitted (1120) in the 2-step random access procedure based on the first transmission power. A determination can be made (1130) to switch from the 2-step random access procedure to a 4-step random access procedure. Second transmission power can be determined (1140) based on the first set of power control parameters and a second set of power control parameters for a subsequent second PRACH preamble transmission for the 4-step random access procedure. The subsequent second PRACH preamble can be transmitted (1150) in the 4-step random access procedure based on the second transmission power.Type: GrantFiled: October 5, 2020Date of Patent: March 4, 2025Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Hyejung Jung, Joachim Löhr, Vijay Nangia, Prateek Basu Mallick, Ravi Kuchibhotla, Alexander Johann Maria Golitschek Edler von Elbwart, Robert T. Love
-
Patent number: 12235621Abstract: A method for aligning a workpiece in a working space of a machine tool having a numerical control system uses a probe. 3D models of the working space, probe, and workpiece are virtually displayed. The workpiece is positioned in the working space and the virtual workpiece is positioned in the virtual working space so that there is an initial coincidence between positions thereof. The probe is manually positioned relative to the workpiece, wherein a planned probing point and probing direction are selected based on a minimum distance of the virtual probe from the virtual workpiece, and are displayed. Enabling of the probing is based on quality of the planned probing point, and, when enabled, a probing operation is triggered, and coordinates of a probing point are determined. The position of the workpiece is recalculated using these coordinates, and the position of the virtual workpiece is updated.Type: GrantFiled: September 14, 2022Date of Patent: February 25, 2025Assignee: DR. JOHANNES HEIDENHAIN GMBHInventors: Robert Zimmermann, Gero Guenther, Bernhard Hajduk, Martin Gaisser, Stefan Huber, Sebastian Jung
-
Patent number: 12232064Abstract: Apparatuses, methods, and systems are disclosed for synchronization signal block selection. One method includes receiving multiple synchronization signal blocks on a first wideband carrier. Each synchronization signal block includes at least one synchronization signal and a physical broadcast channel. The method includes detecting at least one synchronization signal block of the synchronization signal blocks, determining at least one synchronization signal frequency associated with the at least one detected synchronization signal block, and selecting a first synchronization signal block of the at least one detected synchronization signal block and a first synchronization signal frequency of the at least one synchronization signal frequency. The first synchronization signal block is associated with the first synchronization signal frequency.Type: GrantFiled: July 18, 2023Date of Patent: February 18, 2025Assignee: Lenovo (Singapore) Pte. Ltd., New Tech ParkInventors: Hyejung Jung, Vijay Nangia, Robert T. Love, Ravi Kuchibhotla
-
Patent number: 12223044Abstract: Techniques for identifying malware based on system API function pointers are disclosed. In some embodiments, a system/process/computer program product for identifying malware based on system API function pointers includes monitoring changes in memory during execution of a malware sample in a computing environment; detecting a dynamic evasion behavior using an Application Programming Interface (API) vector comprising a plurality of system API function pointers identified in the memory during execution of the malware sample in the computing environment; and generating a signature based on the API vector for automatically detecting the malware during execution in the memory, wherein the malware sample was determined to be malicious.Type: GrantFiled: July 12, 2021Date of Patent: February 11, 2025Assignee: Palo Alto Networks, Inc.Inventors: Robert Jung, Daniel Raygoza, Michael S. Hughes, Esmid Idrizovic
-
Publication number: 20250039880Abstract: Methods and systems for transmitting uplink control information and feedback are disclosed for carrier aggregation systems. A user equipment device may be configured to transmit uplink control information and other feedback for several downlink component carriers using one or more uplink component carriers. The user equipment device may be configured to transmit such data using a physical uplink control channel rather than a physical uplink shared channel. The user equipment device may be configured to determine the uplink control information and feedback data that is to be transmitted, the physical uplink control channel resources to be used to transmit the uplink control information and feedback data, and how the uplink control information and feedback data may be transmitted over the physical uplink control channel.Type: ApplicationFiled: October 7, 2024Publication date: January 30, 2025Applicant: InterDigital Patent Holdings, Inc.Inventors: Shahrokh Nayeb Nazar, Kyle Jung-Lin Pan, Robert L. Olesen, Ghyslain Pelletier, Marian Rudolf, Paul Marinier, Charles A. Dennean, Stephen G. Dick, Allan Y. Tsai, Christopher R. Cave, Chang-Soo Koo
-
Publication number: 20250038829Abstract: A WTRU may include a memory and a processor. The processor may be configured to receive beam grouping information from a gNB or transmission and reception point (TRP). The beam grouping information may indicate a group of beams that the WTRU may report using group-based reporting. The group-based reporting may be a reduced level of reporting compared to a beam-based reporting. The group-based report may include measurement information for a representative beam. The representative beam may be one of the beams in the group or represents an average of the beams in the group. Alternatively, the representative beam may be a beam that has a maximum measurement value compared to other beams in the group. The group-based report may include a reference signal received power (RSRP) for the representative beam and a differential RSRP for each additional beamin the beam group.Type: ApplicationFiled: October 16, 2024Publication date: January 30, 2025Inventors: Kyle Jung-Lin Pan, Fengjun Xi, Afshin Haghighat, Oghenekome Oteri, Chunxuan Ye, Frank La Sita, Robert L. Olesen, Moon-Il Lee
-
Patent number: 12207208Abstract: Apparatuses, methods, and systems are transmitting and/or receiving a synchronization signal block. One method includes receiving a synchronization signal block. The method includes detecting a primary synchronization signal and a broadcast channel of the synchronization signal block. Receiving the synchronization signal block includes receiving at least one synchronization signal block of multiple synchronization signal blocks within a time window and the broadcast channel includes multiple sub-bands.Type: GrantFiled: March 18, 2021Date of Patent: January 21, 2025Assignee: Motorola Mobility LLCInventors: Hyejung Jung, Vijay Nangia, Ravi Kuchibhotla, Ravikiran Nory, Ziad Ahmad, Robert Love
-
Patent number: 12153676Abstract: The present application discloses a method, system, and computer system for detecting malicious files. The method includes receiving a sample that comprises a .NET file, obtaining imported API function names based at least in part on a .NET header of the .NET file, determining a hash of a list of unmanaged imported API function names, and determining whether the sample is malware based at least in part on the hash of the list of unmanaged imported API function names.Type: GrantFiled: December 21, 2021Date of Patent: November 26, 2024Assignee: Palo Alto Networks, Inc.Inventors: Yaron Samuel, Dominik Reichel, Robert Jung, Lauren Che
-
Publication number: 20240386092Abstract: Techniques for early exit dynamic analysis of a virtual machine are disclosed. In some embodiments, a system/process/computer program product for early exit dynamic analysis of a virtual machine includes initiating a dynamic analysis of a malware sample by executing the malware sample in a virtual computing environment; monitoring activities of the malware sample during execution of the malware sample in the virtual computing environment; and determining when to exit the dynamic analysis before a predetermined period of time.Type: ApplicationFiled: July 29, 2024Publication date: November 21, 2024Inventors: Esmid Idrizovic, Daniel Raygoza, Robert Jung, Michael S. Hughes
-
Publication number: 20240320338Abstract: The present application discloses a method, system, and computer system for detecting malicious files. The method includes (a) receiving a sample for malware analysis, (b) applying a machine learning model to obtain a classification for the sample based at least in part on (i) memory artifact data associated with the sample, and (ii) at least one of dynamic execution log data for the sample and static file structures associated with the sample, and (c) determining whether the sample is malicious based at least in part on the classification.Type: ApplicationFiled: April 23, 2024Publication date: September 26, 2024Inventors: Sujit Rokka Chhetri, Akshata Krishnamoorthy Rao, Daniel Raygoza, Esmid Idrizovic, William Redington Hewlett II, Robert Jung
-
Patent number: 12086235Abstract: Techniques for early exit dynamic analysis of a virtual machine are disclosed. In some embodiments, a system/process/computer program product for early exit dynamic analysis of a virtual machine includes initiating a dynamic analysis of a malware sample by executing the malware sample in a virtual computing environment; monitoring activities of the malware sample during execution of the malware sample in the virtual computing environment; and determining when to exit the dynamic analysis before a predetermined period of time.Type: GrantFiled: June 30, 2021Date of Patent: September 10, 2024Assignee: Palo Alto Networks, Inc.Inventors: Esmid Idrizovic, Daniel Raygoza, Robert Jung, Michael S. Hughes
-
Publication number: 20240176869Abstract: Techniques for dependency emulation for executable samples are disclosed. In some embodiments, a system/process/computer program product for dependency emulation for executable samples includes receiving a sample for emulation for malware detection; determining that one or more libraries are missing from the sample for execution of the sample in an emulation environment; generating one or more stub libraries to facilitate the execution of the sample in the emulation environment; and executing the sample in the emulation environment.Type: ApplicationFiled: November 30, 2022Publication date: May 30, 2024Inventors: Esmid Idrizovic, Robert Jung, Daniel Raygoza, Michael S. Hughes
-
Patent number: 11819967Abstract: A guide device for a machine tool including a base body having at least one contact surface, a guide rail having at least one bearing surface and a guide axis, and a plurality of exchangeable support plates for positioning the guide rail on the base body.Type: GrantFiled: December 13, 2019Date of Patent: November 21, 2023Assignee: DECKEL MAHO Pfronten GmbHInventor: Robert Jung
-
Publication number: 20230344838Abstract: The present application discloses a method, system, and computer system for detecting malicious .NET files. The method includes receiving a sample that comprises a .NET file, obtaining information pertaining to common language runtime (CLR) metadata and streams associated with the .NET file, and determining whether the sample is malware based at least in part on (i) a classifier, and (ii) the information pertaining to the CLR metadata and streams.Type: ApplicationFiled: April 26, 2022Publication date: October 26, 2023Inventors: Akshata Krishnamoorthy Rao, Yaron Samuel, Dominik Reichel, Robert Jung