Patents by Inventor Su Hu

Su Hu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11966387
    Abstract: Method, computer program product, and computer system are provided. Traffic is collected against a NoSQL database by an activity collector. A database transaction log is periodically extracted and analyzed. The collected traffic and the analyzed database transaction log are input to building a knowledge base of database access patterns. Current traffic is captured and used to compute an activity threshold. Traffic is directed to a workload processor based on the activity threshold. Traffic is directed to an intensive insert/update/delete (IUD) processor in response to the activity threshold exceeding a configured threshold. A plurality of temporary shards is generated along with an adaptive key and adaptive index in the plurality of temporary shards. The intensive IUD processor traffic is re-directed to the plurality of temporary shards while the activity threshold exceeds the configured threshold.
    Type: Grant
    Filed: September 20, 2022
    Date of Patent: April 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Jun Su, Guang Han Sui, Di Li Hu
  • Publication number: 20240128143
    Abstract: Provided are a package structure and a method of forming the same. The method includes: forming an interconnect structure on a substrate; performing a laser grooving process to form a first opening in the interconnect structure and form a debris layer on a sidewall of the first opening in a same step; forming a protective layer to fill in the first opening and cover the debris layer and the interconnect structure; patterning the protective layer to form a second opening, wherein the second opening is spaced from the debris layer by the protective layer; performing a planarization process on the protective layer to expose a topmost contact pad of the interconnect structure; and performing a mechanical dicing process through the second opening to form a third opening in the substrate and cut the substrate into a plurality of semiconductor dies.
    Type: Application
    Filed: February 1, 2023
    Publication date: April 18, 2024
    Applicant: Taiwan Semiconductor Manufacturing Company, Ltd.
    Inventors: Chia-Han Hsieh, Yu-Jin Hu, Hua-Wei Tseng, An-Jhih Su, Der-Chyang Yeh
  • Publication number: 20240095234
    Abstract: Method, computer program product, and computer system are provided. Traffic is collected against a NoSQL database by an activity collector. A database transaction log is periodically extracted and analyzed. The collected traffic and the analyzed database transaction log are input to building a knowledge base of database access patterns. Current traffic is captured and used to compute an activity threshold. Traffic is directed to a workload processor based on the activity threshold. Traffic is directed to an intensive insert/update/delete (IUD) processor in response to the activity threshold exceeding a configured threshold. A plurality of temporary shards is generated along with an adaptive key and adaptive index in the plurality of temporary shards. The intensive IUD processor traffic is re-directed to the plurality of temporary shards while the activity threshold exceeds the configured threshold.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Inventors: Peng Hui Jiang, Jun Su, Guang Han Sui, Di Li Hu
  • Publication number: 20240092725
    Abstract: The present invention provides a compound, and method of inhibiting the activity of a Fatty Acid Binding Protein (FABP) comprising contacting the FABP with a compound, said compound having the structure: Formula
    Type: Application
    Filed: July 3, 2023
    Publication date: March 21, 2024
    Applicant: The Research Foundation for the State University of New York
    Inventors: Iwao Ojima, Dale Deutsch, Martin Kaczocha, Kongzhen Hu, Simon Tong, Matthew Elmes, Su Yan
  • Publication number: 20230188334
    Abstract: This application discloses quantum key distribution methods and devices, and storage media. In an implementation, an ith node generates, based on a determined first quantum key corresponding to the ith node on a target routing path and a determined second quantum key corresponding to the ith node on the target routing path, a third quantum key corresponding to the ith node on the target routing path, and sends the third quantum key corresponding to the ith node on the target routing path to a destination node on the target routing path, or encrypts a received first ciphertext by using the third quantum key corresponding to the ith node on the target routing path, and sends an obtained second ciphertext corresponding to the ith node to an (i+1)th node on the target routing path.
    Type: Application
    Filed: February 8, 2023
    Publication date: June 15, 2023
    Inventors: Zhengyu LI, Changzheng SU, Su HU, Yang ZOU
  • Patent number: 11595196
    Abstract: This application provide quantum key distribution methods, devices, and storage media. In an implementation, a method comprises: determining, based on a first mapping, a first quantum key of N first quantum keys corresponding to an ith node on a target routing path; determining, based on a second mapping, a second quantum key of N second quantum keys corresponding to the ith node; and generating, by the ith node based on the first quantum key corresponding to the ith node and the second quantum key corresponding to the ith node, a third quantum key corresponding to the ith node on the target routing path.
    Type: Grant
    Filed: October 13, 2020
    Date of Patent: February 28, 2023
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Zhengyu Li, Changzheng Su, Su Hu, Yang Zou
  • Publication number: 20210044432
    Abstract: This application provide quantum key distribution methods, devices, and storage media. In an implementation, a method comprises: determining, based on a first mapping, a first quantum key of N first quantum keys corresponding to an ith node on a target routing path; determining, based on a second mapping, a second quantum key of N second quantum keys corresponding to the ith node; and generating, by the ith node based on the first quantum key corresponding to the ith node and the second quantum key corresponding to the ith node, a third quantum key corresponding to the ith node on the target routing path.
    Type: Application
    Filed: October 13, 2020
    Publication date: February 11, 2021
    Inventors: Zhengyu LI, Changzheng SU, Su HU, Yang ZOU
  • Publication number: 20190260581
    Abstract: Embodiments of this application relate to the field of communications technologies. The embodiments of this application are applicable to a centralized management and control network. A centralized controller obtains Z service requests, globally determines, based on an identifier of a source service node and an identifier of a destination service node that are corresponding to each of the Z service requests, a quantum key consumption parameter, and topology information of key nodes in the centralized management and control network, globally optimal key relay instructions corresponding to G service requests, and further delivers the key relay instructions corresponding to the G service requests to key nodes corresponding to the key relay instructions, so that the key nodes perform quantum key relay based on the key relay instructions, to generate a shared quantum key between the source key node and the destination key node.
    Type: Application
    Filed: May 3, 2019
    Publication date: August 22, 2019
    Inventors: Changzheng Su, Liangliang Lu, Su Hu, Xianlong Luo