Patents by Inventor Wang Jin

Wang Jin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240132375
    Abstract: A positive electrode active material for a lithium secondary battery has secondary micro particles having an average particle size (D50) of 1 to 10 ?m formed by agglomeration of primary macro particles having an average particle size (D50) of 0.5 to 3 ?m and a lithium-M oxide coating layer on all or part of a surface, wherein M is at least one selected from the group consisting of boron, cobalt, manganese and magnesium. The secondary macro particles have an average particle size (D50) of 5 to 20 ?m formed by agglomeration of primary micro particles having a smaller average particle size (D50) than the primary macro particles. The primary macro particles and the primary micro particles are represented by LiaNi1?b?c?dCobMncQdO2+?, wherein 1.0?a?1.5, 0<b<0.2, 0<c<0.2, 0?d?0.1, 0<b+c+d?0.2, ?0.1???1.0, and Q is at least one type of metal selected from the group consisting of Al, Mg, V, Ti and Zr.
    Type: Application
    Filed: January 14, 2022
    Publication date: April 25, 2024
    Applicant: LG Energy Solution, Ltd.
    Inventors: Eun-Sol Lho, Joong-Yeop Do, Kang-Joon Park, Gi-Beom Han, Min Kwak, Sang-Min Park, Dae-Jin Lee, Sang-Wook Lee, Wang-Mo Jung
  • Publication number: 20240116853
    Abstract: 2-hydroxy-5-[2-(4-(trifluoromethylphenyl)ethylamino)]benzoic acid crystal forms and a preparation method therefor are proposed. Crystal form I is a monoclinic crystal system, which has a Pc space group and can be obtained by slow cooling, evaporating the solvent at a constant temperature, evaporating the solvent at an increased temperature, or adding an anti-solvent. Crystal form II is a triclinic crystal system, which has a P1 space group and can be obtained by rapid cooling or freeze-drying. According to the method, the process is simple, costs are low, and the yield exceeds 90%; and the crystal forms of the crystal forms I and II have high purity, the crystal shapes thereof are intact, and have excellent fluidity, facilitating preparation, particularly the preparation of a pharmaceutical preparation for preventing and/or treating degenerative diseases of the central nervous system. Furthermore, the two crystal forms have a better apparent solubility than that of raw materials.
    Type: Application
    Filed: December 6, 2021
    Publication date: April 11, 2024
    Inventors: Xinliang XU, Guoqing ZHANG, Chenghan ZHUANG, Lei WANG, Byoung Joo GWAG, Chun San AHN, Jing Yu JIN
  • Patent number: 10740443
    Abstract: Provided is a method and system for code obfuscation of an application. A method configured as a computer may include receiving an application program package that includes an intermediate language (IL) code generated by compiling code for an application including a plurality of classes and a plurality of methods as a dex file over a network, selecting a protection target class or a protection target method from among the plurality of classes and the plurality of methods, encrypting the selected protection target class or the selected protection target method by retrieving and encrypting an IL code corresponding to the selected protection target class or the selected protection target method from the dex file, and adding decryption information for decrypting the encrypted protection target class or the encrypted protection target method to a secure module that is further included in the application program package.
    Type: Grant
    Filed: February 2, 2018
    Date of Patent: August 11, 2020
    Assignee: Line Corporation
    Inventors: SangHun Jeon, Dongpil Seo, Sungbeom Ahn, Kwang-Hee Han, Wang Jin Oh, Seong Yeol Lim
  • Publication number: 20200048452
    Abstract: The invention is a polyoxymethylene film and a preparation method. The polyoxymethylene film comprises: 96 to 98 parts by weight of polyoxymethylene resin, 0.5 to 2 parts by weight of nucleating agent, 0.5 to 1 parts by weight of antioxidant, and 0.5 to 1 parts by weight of formaldehyde absorbent. In view of the high crystallinity and fast crystallization rate of polyoxymethylene, blown film process is used to directly blowing the molten mass extruded through a die of a screw extruder to form a blown film bubble. It is easy to form thin neck and easy to break when stretching, so the method is beneficial to form polyoxymethylene film, and has high processing efficiency, and is suitable for industrialization. Copolymerization unit —CH2—CH2—O— is introduced into the molecular chain of polyoxymethylene and its ratio is increased, thereby effectively reducing the crystallization rate of the materials and making it easier to form a film.
    Type: Application
    Filed: September 8, 2019
    Publication date: February 13, 2020
    Inventors: Yatao WANG, Xiaofeng MA, Jianhua LI, Lili LIU, Xuehua GUO, Hongjuan LI, Wang JIN, Dazhi YANG, Lizheng GUAN
  • Patent number: 10552132
    Abstract: According to various example embodiments, a first binary, i.e., an original binary of an application, and a second binary to be added to the application may be merged in a binary form without having to modify a source code.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: February 4, 2020
    Assignee: Line Corporation
    Inventors: Dong Pil Seo, Seong Yeol Lim, Kwang Hee Han, Sung Beom Ahn, Wang Jin Oh, Sang Hun Jeon
  • Patent number: 10379886
    Abstract: A non-transitory computer-readable medium stores computer-executable instructions that, when executed by a computer, cause the computer to perform operations including generating a changed optimization file by changing an original optimization file, the original optimization file being an optimization file created at a point in time at which an intermediate language file for an application is loaded; storing the changed optimization file; creating and storing verification information for verifying whether the intermediate language file is changed; determining whether the intermediate language file is changed based on the stored verification information in response to reloading of the intermediate language file; and creating a new optimization file by deleting the changed optimization file or recovering the original optimization file based on the changed optimization file and reusing the original optimization file, based on whether the intermediate language file is changed.
    Type: Grant
    Filed: February 16, 2017
    Date of Patent: August 13, 2019
    Assignee: LINE CORPORATION
    Inventors: Sang Min Chung, SangHun Jeon, Myungju Chung, Wang Jin Oh, Sungbeom Ahn, Dongpil Seo, Kwang-Hee Han, Tae Woo Kim, Seong Yeol Lim, Joo Hyeon Ryu
  • Patent number: 10255443
    Abstract: A code protection method may include storing, using a processor of a computer, a package file that includes files for an application on a storage device of the computer; transforming, at the processor, a protection target method and/or function selected from a file that includes an execution code among the files, or converting or deleting a library file among the files; regenerating the package file by adding, to the package file, a first protection module file for restoring the transformed protection target method and/or function or a second protection module file for restoring the library file; and providing the regenerated package file over a network.
    Type: Grant
    Filed: February 10, 2017
    Date of Patent: April 9, 2019
    Assignee: Line Corporation
    Inventors: Sungbeom Ahn, SangHun Jeon, Wang Jin Oh, Myungju Chung, Dongpil Seo, Seong Yeol Lim, Kwang-Hee Han
  • Patent number: 10216941
    Abstract: Provided is a method of distributing an application including transmitting, by a distribution server, a signal for requesting metadata to a user terminal where an application is installed; receiving, by the distribution server, a reply including first metadata from the user terminal; determining, by the distribution server, whether the first metadata is valid based on second metadata corresponding to the application; setting a connection with the user terminal to re-install the application on the user terminal if the distribution server determines that the first metadata is not valid; encrypting, by the distribution server, one or more installation files that install the application with a private key; and transmitting the one or more encrypted installation files via the set connection to the user terminal.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: February 26, 2019
    Assignee: Line Corporation
    Inventors: Dong Pil Seo, Sun Tae Kim, Wang Jin Oh, Yoon Seok Kim, Sang Hun Jeon
  • Patent number: 10205732
    Abstract: A file protection method may include receiving a package that includes files for installing and executing an application, adding a protection file for an operation of a file protection module to the package, and providing the package to which the protection file is added over a network. In response to execution of a control command for a desired file that is controlled by the application through a service code of the application at an electronic device on which the application is installed and executed through the package, a protection command included in the file protection module is called and control of the desired file and integrity verification associated with data stored in the desired file are processed in response to the called protection command.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: February 12, 2019
    Assignee: Line Corporation
    Inventors: Sungbeom Ahn, SangHun Jeon, Myungju Chung, Dongpil Seo, Seong Yeol Lim, Wang Jin Oh, Kwang-Hee Han
  • Patent number: 10116071
    Abstract: An electrical connector includes an insulative housing defining a top surface and a bottom surface opposite to each other and a plurality of electrical contacts received in the insulative housing. Each electrical contact is formed by stamping a metal plate and includes a contacting portion exposed to the top surface, a mounting portion extending out of the bottom surface and an elastic portion disposed between the contacting portion and the mounting portion and in the insulative housing, wherein the elastic portion includes a first elastic portion and a second elastic portion disposed on two opposite sides of the contacting portion.
    Type: Grant
    Filed: January 18, 2017
    Date of Patent: October 30, 2018
    Assignee: FOXCONN INTERCONNECT TECHNOLOGY LIMITED
    Inventors: Xin-Tian Li, Wei Yin, Ji-Wang Jin, Bin Peng, Zhi-Jian Chen
  • Patent number: 10078498
    Abstract: Provided is a method, apparatus, system, and non-transitory computer readable medium for extending at least one function of a package file. A function addition method executed at a computer may include storing a package file for an application; extracting, from the package file, a file in which information about a class most initially called in response to execution of the application is set as configuration information of the application; and setting a class name of a new class to an item to which information about the most initially called class is set in the extracted file.
    Type: Grant
    Filed: February 16, 2017
    Date of Patent: September 18, 2018
    Assignee: Line Corporation
    Inventors: Sang Min Chung, SangHun Jeon, Tae Woo Kim, Joo Hyeon Ryu, Dongpil Seo, Sungbeom Ahn, Wang Jin Oh, Seong Yeol Lim, Myungju Chung, Kwang-Hee Han
  • Publication number: 20180157808
    Abstract: Provided is a method and system for code obfuscation of an application. A method configured as a computer may include receiving an application program package that includes an intermediate language (IL) code generated by compiling code for an application including a plurality of classes and a plurality of methods as a dex file over a network, selecting a protection target class or a protection target method from among the plurality of classes and the plurality of methods, encrypting the selected protection target class or the selected protection target method by retrieving and encrypting an IL code corresponding to the selected protection target class or the selected protection target method from the dex file, and adding decryption information for decrypting the encrypted protection target class or the encrypted protection target method to a secure module that is further included in the application program package.
    Type: Application
    Filed: February 2, 2018
    Publication date: June 7, 2018
    Applicants: LINE Corporation, LINE Plus Corporation
    Inventors: SangHun JEON, Dongpil SEO, Sungbeom AHN, Kwang-Hee HAN, Wang Jin OH, Seong Yeol LIM
  • Publication number: 20180121181
    Abstract: According to various example embodiments, a first binary, i.e., an original binary of an application, and a second binary to be added to the application may be merged in a binary form without having to modify a source code.
    Type: Application
    Filed: December 11, 2017
    Publication date: May 3, 2018
    Applicant: LINE Corporation
    Inventors: Dong Pil Seo, Seong Yeol Lim, Kwang Hee Han, Sung Beom Ahn, Wang Jin Oh, Sang Hun Jeon
  • Publication number: 20170242664
    Abstract: Provided is a method, apparatus, system, and non-transitory computer readable medium for extending at least one function of a package file. A function addition method executed at a computer may include storing a package file for an application; extracting, from the package file, a file in which information about a class most initially called in response to execution of the application is set as configuration information of the application; and setting a class name of a new class to an item to which information about the most initially called class is set in the extracted file.
    Type: Application
    Filed: February 16, 2017
    Publication date: August 24, 2017
    Applicant: LINE Corporation
    Inventors: Sang Min CHUNG, SangHun JEON, Tae Woo KIM, Joo Hyeon RYU, Dongpil SEO, Sungbeom AHN, Wang Jin OH, Seong Yeol LIM, Myungju CHUNG, Kwang-Hee HAN
  • Publication number: 20170242716
    Abstract: A non-transitory computer-readable medium stores computer-executable instructions that, when executed by a computer, cause the computer to perform operations including generating a changed optimization file by changing an original optimization file, the original optimization file being an optimization file created at a point in time at which an intermediate language file for an application is loaded; storing the changed optimization file; creating and storing verification information for verifying whether the intermediate language file is changed; determining whether the intermediate language file is changed based on the stored verification information in response to reloading of the intermediate language file; and creating a new optimization file by deleting the changed optimization file or recovering the original optimization file based on the changed optimization file and reusing the original optimization file, based on whether the intermediate language file is changed.
    Type: Application
    Filed: February 16, 2017
    Publication date: August 24, 2017
    Applicant: LINE Corporation
    Inventors: Sang Min CHUNG, SangHun JEON, Myungju CHUNG, Wang Jin OH, Sungbeom AHN, Dongpil SEO, Kwang-Hee HAN, Tae Woo KIM, Seong Yeol LIM, Joo Hyeon RYU
  • Publication number: 20170235963
    Abstract: A code protection method may include storing, using a processor of a computer, a package file that includes files for an application on a storage device of the computer; transforming, at the processor, a protection target method and/or function selected from a file that includes an execution code among the files, or converting or deleting a library file among the files; regenerating the package file by adding, to the package file, a first protection module file for restoring the transformed protection target method and/or function or a second protection module file for restoring the library file; and providing the regenerated package file over a network.
    Type: Application
    Filed: February 10, 2017
    Publication date: August 17, 2017
    Applicant: LINE Corporation
    Inventors: Sungbeom AHN, SangHun JEON, Wang Jin OH, Myungju CHUNG, Dongpil SEO, Seong Yeol LIM, Kwang-Hee HAN
  • Publication number: 20170237567
    Abstract: A file protection method may include receiving a package that includes files for installing and executing an application, adding a protection file for an operation of a file protection module to the package, and providing the package to which the protection file is added over a network. In response to execution of a control command for a desired file that is controlled by the application through a service code of the application at an electronic device on which the application is installed and executed through the package, a protection command included in the file protection module is called and control of the desired file and integrity verification associated with data stored in the desired file are processed in response to the called protection command.
    Type: Application
    Filed: February 7, 2017
    Publication date: August 17, 2017
    Applicant: LINE Corporation
    Inventors: SUNGBEOM AHN, SangHun JEON, Myungju CHUNG, Dongpil SEO, Seong Yeol LIM, Wang Jin OH, Kwang-Hee HAN
  • Publication number: 20170222348
    Abstract: An electrical connector includes an insulative housing defining a top surface and a bottom surface opposite to each other and a plurality of electrical contacts received in the insulative housing. Each electrical contact is formed by stamping a metal plate and includes a contacting portion exposed to the top surface, a mounting portion extending out of the bottom surface and an elastic portion disposed between the contacting portion and the mounting portion and in the insulative housing, wherein the elastic portion includes a first elastic portion and a second elastic portion disposed on two opposite sides of the contacting portion.
    Type: Application
    Filed: January 18, 2017
    Publication date: August 3, 2017
    Inventors: XIN-TIAN LI, WEI YIN, JI-WANG JIN, BIN PENG, ZHI-JIAN CHEN
  • Publication number: 20170103205
    Abstract: A memory hacking detecting method and a system therefor are provided. The memory hacking detecting method for accurately detecting a level of a hacker (or a cheating user) and action of memory hacking by detecting the memory hacking on a stage-by-stage basis and assigning attributes to each of variables of a program executed on a memory and detecting memory hacking in different ways based on the assigned attributes.
    Type: Application
    Filed: July 5, 2016
    Publication date: April 13, 2017
    Applicant: LINE Corporation
    Inventors: Sungbeom AHN, Kwang-Hee HAN, Seong Yeol LIM, Dongpil SEO, Wang Jin OH, SangHun JEON, Myungju CHUNG
  • Patent number: D1018997
    Type: Grant
    Filed: September 27, 2021
    Date of Patent: March 19, 2024
    Assignee: HONEYWELL INTERNATIONAL INC.
    Inventors: Zheng Gu, Peng Zhou, Wenbo Wang, Xiaojuan Zhu, Ling Lin, Zhao Xia Jin, Tiecheng Qu, Weiming Zhou, Yolanda Wang, Anncy Zhou