Patents by Inventor Ruiqiang Zhuang

Ruiqiang Zhuang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9313214
    Abstract: A method (100) and an apparatus (e.g., a network node (210)) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
    Type: Grant
    Filed: August 6, 2004
    Date of Patent: April 12, 2016
    Assignee: GOOGLE TECHNOLOGY HOLDINGS LLC
    Inventors: Ji Xiao, Jyh-Han Lin, Ronald R. Smith, Ruiqiang Zhuang
  • Publication number: 20070050678
    Abstract: A method (200) and a system (100) for repairing a flaw in software (120). A failure during execution of the software can be automatically identified, and a state of the software execution at a point of the software failure can be frozen. A failure handling application (130) can be automatically executed, without disrupting the frozen state of the software execution. Incident data that correlates to the frozen state of the software can be generated. For example, at least one state indicator available in the frozen state can be collected into an incident report (140). The incident report can be sent to a flaw database (145). A software patch (150) selected based on the incident data can be automatically received, for instance from the flaw database. The software can be automatically updated with the software patch. Execution of the software can be automatically reinitialized in response to the software update.
    Type: Application
    Filed: August 25, 2005
    Publication date: March 1, 2007
    Inventors: Charles Estes, Josue Pena, Ruiqiang Zhuang
  • Publication number: 20060141985
    Abstract: A system, device, and method, for managing application interface access permissions for an application (302) in an electronic device, such as a wireless device (104), is disclosed. The method includes associating a security policy with an application (302). The method further includes creating a history log (324) associated with the application (302). The history log (324) includes time information associated with permission information indicating permission for an application to access at least one application interface in the electronic device (104). The method further includes dynamically adjusting the security policy for the application (302) when a security control signal associated with the application (302) is detected.
    Type: Application
    Filed: December 23, 2004
    Publication date: June 29, 2006
    Applicant: MOTOROLA, INC.
    Inventors: Biren Patel, Jyh-Han Lin, Ronald Smith, Ruiqiang Zhuang
  • Publication number: 20060136212
    Abstract: In a device (100), a method (200) is provided for improving text-to-speech performance.
    Type: Application
    Filed: December 22, 2004
    Publication date: June 22, 2006
    Applicant: Motorola, Inc.
    Inventors: Ruiqiang Zhuang, Jyh-Han Lin
  • Publication number: 20060031941
    Abstract: A method (100) and an apparatus (210) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
    Type: Application
    Filed: August 6, 2004
    Publication date: February 9, 2006
    Applicant: Motorola, Inc.
    Inventors: Ji Xiao, Jyh-Han Lin, Ronald Smith, Ruiqiang Zhuang
  • Publication number: 20050177696
    Abstract: A communication system includes a base transmitter (110) for transmitting a signal over the air indicating a reallocation of a non-removable memory within a portable communication device (200), a non-removable memory (212) within the communication device preconfigured with a first amount of space allocated for random access memory and a second amount of space allocated for a heap, and a processor (208) coupled to the non-removable memory. The processor can be programmed to receive the signal over the air to re-allocate at least the first amount of space and the second amount of space in accordance with the signal.
    Type: Application
    Filed: February 5, 2004
    Publication date: August 11, 2005
    Inventors: Ronald Smith, Josue Pena, Ruiqiang Zhuang, Jose Korneluk, Dale Crosby
  • Publication number: 20040248586
    Abstract: A device (300) used to provide notifications based upon the location of the device (300). One or more location markers (500), which each have an associated region, are stored in the device (300). A notification, such as a visual and/or audible message, is provided by the device (300) upon entry into a region that is associated with one of the stored location markers (500). The notification can be particularized to the individual regions. The device can be assigned to a group and a set of location markers are delivered to all devices in that group so that each device of the group provides the same notification when the device enters a region associated with that set of location markers. The device can also be configured to provide the notification after the device has traversed a sequence of regions.
    Type: Application
    Filed: June 9, 2003
    Publication date: December 9, 2004
    Applicant: MOTOROLA, INC.
    Inventors: Biren R. Patel, Jyh-Han Lin, Ruiqiang Zhuang
  • Publication number: 20040123270
    Abstract: A shared library architecture (iJDL) for sharing libraries among applications. The iJDLs can be added, removed, updated or directly retrieved from the network, and are fully configurable to maximize the usage of limited flash memory space. The iJDL model conforms to the standard sandbox security model defined by the MIDP 1.0 specification. A Java Application Manager (JAM) also may be provided to alert the user of any update to shared libraries available on the network. For security, iJDL can be authenticated such that only authorized vendors are allowed to use it.
    Type: Application
    Filed: December 23, 2002
    Publication date: June 24, 2004
    Applicant: Motorola, Inc.
    Inventors: Ruiqiang Zhuang, Jyh-Han Lin, Biren Patel