Patents by Inventor Xiang Xu
Xiang Xu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12367110Abstract: Methods, systems, and devices for data management are described. A data management system may configure backup and recovery resources for tenant of the data management system. The data management system may receive an indication to create a set of subtenants within the resources configured for the tenant. The data management system may assign a first subset of resources configured for the tenant, and the first subset may be different from a second subset configured for a second subtenant. The data management system may activate a first backup procedure for the first subtenant. The first backup procedure may be configured to backup a first data source associated with the first subtenant of the tenant using the first subset of the set of backup and recovery resources, and the first backup procedure may be separate from a second backup procedure for a second data source associated with the second subtenant.Type: GrantFiled: March 21, 2023Date of Patent: July 22, 2025Assignee: Rubrik, Inc.Inventors: Hao Wu, Alex Medovar, Xiaoqing Tao, Jinshuo Zhang, Seungyeop Han, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
-
Patent number: 12356310Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media for transferring traffic in integrated access and backhaul (IAB) communication. According to embodiments of the present disclosure, a first Central Unit-Control Plane (CU-CP) of a first IAB donor transmits, to a second CU-CP of a second IAB donor, a request to transfer target traffic via a Distributed Unit (DU) of the second IAB donor. The request comprises first information of the target traffic. The first CU-CP receives, from the second CU-CP, second information to be used for configuring the target traffic. This solution can improve the reliability and robustness of the IAB communication.Type: GrantFiled: October 22, 2020Date of Patent: July 8, 2025Assignee: Nokia Solutions and Networks OyInventors: Xiang Xu, Henri Koskinen, Matti Laitila, Esa Malkamäki, Osman Yilmaz, Oliver Blume, Ilkka Keskitalo
-
Patent number: 12317372Abstract: There is disclosed an apparatus comprising means for performing: receiving first radio capability information from a user equipment, the first radio capability information in a format of a first radio access technology; generating second radio capability information of the user equipment based on the first radio capability information, wherein the second radio capability information is generated in a format of a second radio access technology; and sending the first radio capability information and the second radio capability information to a core network node.Type: GrantFiled: February 13, 2020Date of Patent: May 27, 2025Assignee: NOKIA TECHNOLOGIES OYInventors: Xiang Xu, Benoist Sebire, Amaanat Ali, Philippe Godin, Alessio Casati
-
Patent number: 12300035Abstract: Techniques for liveness detection using a motion, face, and context cues. The techniques can be implemented to prevent against successful presentation attacks, video injection attacks, and deepfake attacks. In some examples, the techniques encompass receiving a set of video frames from a personal computing device. A first liveness determination can be made using a motion-based model based on the received video frames. A second liveness determination can be made using a face-based model based on the received video frames. A third liveness determination can be made using a context-based model based on the received video frames. A final liveness determination can be made based on the first, second and third liveness determinations.Type: GrantFiled: March 30, 2022Date of Patent: May 13, 2025Assignee: Amazon Technologies, Inc.Inventors: Xiang Xu, Mingze Xu, Zheng Zhang, Yuanjun Xiong, Wei Xia, Jonathan Wu, Joseph P Tighe
-
Patent number: 12284691Abstract: Embodiments of the present disclosure relate to for inter-CU topology adaptation. A first device establishes a communication interface between the first device and a second device. The first device receives from the second device a handover complete message indicating that a handover of the second device from a third device to the first device is completed. The first device transmits to the second device a command indicating the second device to activate cells configured by the first device.Type: GrantFiled: August 16, 2019Date of Patent: April 22, 2025Assignee: Nokia Technologies OyInventors: Henri Markus Koskinen, Xiang Xu, Samuli Turtinen, Esa Malkamäki, Matti Laitila, Thomas Höhne
-
Publication number: 20250056401Abstract: The present disclosure relates to selecting a NTN device. In particular, a NTN device transmits information related to a set of NTN devices to a terminal device. The terminal device selects a NTN device from the set of NTN devices based on the information. The terminal device transmits data to the selected NTN device. In this way, it can avoid long latency.Type: ApplicationFiled: July 12, 2024Publication date: February 13, 2025Inventors: Xiang XU, Feifei LOU, Mads LAURIDSEN, Ping YUAN
-
Patent number: 12192877Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media of a proactive switch of vehicle-to-everything communication from a device-to-device connection to a connection routed by one or more network devices. In example embodiments, a first terminal device receives, from a second terminal device via a device-to-device connection, an indication of a decision to switch the device-to-device connection to a connection routed by at least one network device for communication with the second terminal device. Based on the received indication from the second terminal device, the first terminal device then determines proactive switching from the device-to-device connection to the routed connection to be performed. The first terminal device then sends a request to a first network device of the at least one network device to set up the routed connection, the request indicating a cause for the determined proactive switching.Type: GrantFiled: July 4, 2019Date of Patent: January 7, 2025Assignee: Nokia Technologies OyInventors: Lianghai Ji, Jakob Lindbjerg Buthler, Vinh Van Phan, Ling Yu, Hajo Bakker, Rudraksh Shrivastava, Bernhard Wegmann, Xiang Xu
-
Publication number: 20240349161Abstract: Example embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media for enhancement on the IAB network. The method comprises: receiving, at a first network device and from a first central device for controlling the first network device, a first message comprising configuration information about at least one of duplication and de-duplication for a packet at backhaul adaptation protocol, BAP, layer; and communicating, based on the configuration information, the packet with a group of second network devices and the first central device in an integrated access and backhaul, IAB, network. By duplicating uplink and downlink data associated with terminal devices in the IAB network at BAP level, the reliability and resiliency of backhaul links can be improved.Type: ApplicationFiled: August 17, 2021Publication date: October 17, 2024Inventors: Esa Mikael MALKAMÄKI, Matti Einari LAITILA, Xiang XU, Esa Markus METSÄLÄ
-
Eccentric extreme high-speed-rate laser hybrid manufacturing method for rotary engineering component
Patent number: 12097559Abstract: The present disclosure relates to an eccentric extreme high-speed-rate laser hybrid manufacturing method for a rotary engineering component. By positioning an extreme high-speed-rate laser direct energy deposition machining head at a predetermined eccentric distance, the damage caused by reflected light to the machining head is effectively reduced, to prolong a service life of the machining head. Also a conventional form of a molten pool in extreme high-speed-rate laser direct energy deposition can be changed, namely from a “falling” form caused by a high-speed movement and a gravity to a “climbing” form. Thus, in extreme high-speed-rate laser direct energy deposition machining, the molten pool has a longer time to fully contact a surface of the rotary engineering component to form desirable bonding performance.Type: GrantFiled: February 25, 2022Date of Patent: September 24, 2024Assignee: Jiangsu UniversityInventors: Jinzhong Lu, Xiang Xu, Kaiyu Luo, Jialong Du, Xingyu Bu -
Publication number: 20240314546Abstract: There is provided an apparatus, said apparatus including circuitry for, at a distributed unit of a relay node, determining that an internet protocol, IP, address of the distributed unit of the relay node used for communicating with a centralised unit of a donor node over a first communication path including a first donor distributed unit is to be reused after a change from the first communication path to a second communication path including a second donor distributed unit and providing an indication to the control plane of the centralised unit of the donor node that the IP address is to be reused.Type: ApplicationFiled: January 14, 2021Publication date: September 19, 2024Inventors: Xiang Xu, llkka Antero KESKITALO, Matti Einari LAITILA, JENS GEBERT
-
Publication number: 20240289605Abstract: Aspects of the disclosure are directed to proxy task design tools that automatically find proxy tasks, such as optimal proxy tasks, for neural architecture searches. The proxy task design tools can include one or more tools to search for an optimal proxy task having the lowest neural architecture search cost while meeting a minimum correlation requirement threshold after being provided with a proxy task search space definition. The proxy task design tools can further include one or more tools to select candidate models for computing correlation scores of proxy tasks as well as one or more tools to measure variance of a model. The proxy task design tools can minimize time and effort involved in designing the proxy task.Type: ApplicationFiled: February 23, 2023Publication date: August 29, 2024Inventors: Lav Rai, Xiang Xu, Yen-Min Hsu, Bo Wu, Daiyi Peng
-
Patent number: 12054436Abstract: A ceramic aerogel includes a porous framework including interconnected double-paned wall structures of a ceramic material, wherein each double-paned wall structure includes a pair of walls spaced apart by a gap.Type: GrantFiled: January 23, 2020Date of Patent: August 6, 2024Assignee: The Regents of the University of CaliforniaInventors: Xiangfeng Duan, Yu Huang, Xiang Xu
-
Publication number: 20240259389Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may receive a federated login request from a user associated with one or more tenants of the DMS. The DMS may direct the federated login request to a centralized management service. The DMS may receive a security assertion markup language (SAML) assertion that indicates an identity of the user, a set of object-level permissions assigned to the user, and an identifier of a first tenant associated with the user. The DMS may identify one or more computing objects in a cluster of storage nodes that correspond to the first tenant based on the identifier from the SAML assertion. The DMS may determine that the user is authorized to perform a set of actions on the one or more computing objects based on the set of object-level permissions indicated by the SAML assertion.Type: ApplicationFiled: March 21, 2023Publication date: August 1, 2024Inventors: Hao Wu, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Zhebin Zhang, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan, Alex Medovar
-
Publication number: 20240259386Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may implement multi-tenancy role based access control (RBAC). In accordance with the multi-tenancy based RBAC, tenant organizations of a DMS may be assigned permissions (i.e., privileges) for a given data management cluster and/or computing objects within a data management cluster. Customized user roles (RBAC roles) may also be created for a given tenant. For example, a role may be defined based on a corresponding set of permissions (e.g., permissions associated with computing objects, data management clusters, or data sources associated with the tenant). A user within a tenant may be assigned a user role, which may be a customized role, and the effective permissions for the user may be based on which permissions of the user's assigned role are also within the scope of the tenant's permissions.Type: ApplicationFiled: March 21, 2023Publication date: August 1, 2024Inventors: Hao Wu, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Zhebin Zhang, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
-
Publication number: 20240256400Abstract: Methods, systems, and devices for data management are described. A data management system may configure backup and recovery resources for tenant of the data management system. The data management system may receive an indication to create a set of subtenants within the resources configured for the tenant. The data management system may assign a first subset of resources configured for the tenant, and the first subset may be different from a second subset configured for a second subtenant. The data management system may activate a first backup procedure for the first subtenant. The first backup procedure may be configured to backup a first data source associated with the first subtenant of the tenant using the first subset of the set of backup and recovery resources, and the first backup procedure may be separate from a second backup procedure for a second data source associated with the second subtenant.Type: ApplicationFiled: March 21, 2023Publication date: August 1, 2024Inventors: Hao Wu, Alex Medovar, Xiaoqing Tao, Jinshuo Zhang, Seungyeop Han, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
-
Publication number: 20240259388Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may implement multi-tenancy role based access control (RBAC). A DMS that provides backup and recovery to multiple tenants may assign a data management cluster to a tenant organization, or specific resources from a data management cluster to a tenant, allowing multiple tenants to share a single data management cluster. The assignment of resources of the data management cluster respects the hierarchical relationship among computing objects, for example, assigning a top-level resource to a tenant implicitly assigns the descendent resources that descend from that top-level resource to the tenant.Type: ApplicationFiled: March 21, 2023Publication date: August 1, 2024Inventors: Hao Wu, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Zhebin Zhang, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
-
Publication number: 20240256358Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may receive a request to assign a first computing object in a first object hierarchy of the DMS to a first tenant of the DMS. The DMS may check the first object hierarchy to identify other computing objects having a hierarchical relationship with the first computing object. The other objects may be above or below the first computing object within the first object hierarchy. The DMS may determine whether at least one of the other computing objects in the first object hierarchy is assigned to a second tenant of the DMS. The DMS may output, in response to the request, an indication that the first computing object is unavailable for assignment to the first tenant if at least one of the other computing objects in the first object hierarchy is assigned to the second tenant.Type: ApplicationFiled: March 21, 2023Publication date: August 1, 2024Inventors: Hao Wu, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Zhebin Zhang, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
-
Publication number: 20240259379Abstract: Methods, systems, and devices for data management are described. A data management system may receive an indication to create a set of subtenants of a tenant. A first set of user profiles are associated with the tenant and a second set of user profiles are associated with a parent tenant of the tenant. The system may assign a first subset of the first set of user profiles to a first subtenant and assign a second subset to a second subtenant. The first subset and the second subset exclude user profiles from the second set of user profiles that are non-overlapping with the first set of user profiles. The system may update metadata corresponding to the first set of user profiles and the second set of user profiles such that the first subset has access to the first subtenant for and the second subset has access to the second subtenant.Type: ApplicationFiled: March 29, 2023Publication date: August 1, 2024Inventors: Hao Wu, Alex Medovar, Xiaoqing Tao, Jinshuo Zhang, Seungyeop Han, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
-
Publication number: 20240256575Abstract: Methods, systems, and devices for data management are described. A multi-tenancy data management system (DMS) may include multiple computing objects organized as a hierarchy of computing objects. The DMS may receive a request for report data associated with a first set of computing objects of the DMS. The DMS may identify context information for a log-in session associated with the request. The context information may include a tenant identifier (ID) for a tenant associated with the request. The DMS may apply a filter to the first set of computing objects. The filter may be based on a second set of computing objects to which the tenant has access within the hierarchy of computing objects. The DMS may output the report data for at least one computing object of the first set based on the at least one computing object being included in the second set of computing objects.Type: ApplicationFiled: January 27, 2023Publication date: August 1, 2024Inventors: Zhebin Zhang, Hao Wu, Kevin Mu, Xiang Xu
-
Publication number: 20240256518Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may provide backup services for multiple tenants. The DMS may receive a request to provide a first user of the DMS with audit information associated with an entity of the DMS. The DMS may identify context information for a log-in session associated with the request. The context information may include an identifier (ID) of a tenant associated with the request. The DMS may identify, based on the ID of the tenant, authorization information associated with the tenant. The authorization information may indicate that the tenant has access to a set of entities within a hierarchy associated with the DMS. The DMS may determine whether to output the requested audit information to the first user based on a hierarchical relationship, within the hierarchy, between the tenant and the entity.Type: ApplicationFiled: January 27, 2023Publication date: August 1, 2024Inventors: Zhebin Zhang, Hao Wu, Kevin Mu, Xiang Xu, Jordon Marcell Barkley