Patents by Inventor Xiang Xu

Xiang Xu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12284691
    Abstract: Embodiments of the present disclosure relate to for inter-CU topology adaptation. A first device establishes a communication interface between the first device and a second device. The first device receives from the second device a handover complete message indicating that a handover of the second device from a third device to the first device is completed. The first device transmits to the second device a command indicating the second device to activate cells configured by the first device.
    Type: Grant
    Filed: August 16, 2019
    Date of Patent: April 22, 2025
    Assignee: Nokia Technologies Oy
    Inventors: Henri Markus Koskinen, Xiang Xu, Samuli Turtinen, Esa Malkamäki, Matti Laitila, Thomas Höhne
  • Publication number: 20250056401
    Abstract: The present disclosure relates to selecting a NTN device. In particular, a NTN device transmits information related to a set of NTN devices to a terminal device. The terminal device selects a NTN device from the set of NTN devices based on the information. The terminal device transmits data to the selected NTN device. In this way, it can avoid long latency.
    Type: Application
    Filed: July 12, 2024
    Publication date: February 13, 2025
    Inventors: Xiang XU, Feifei LOU, Mads LAURIDSEN, Ping YUAN
  • Patent number: 12192877
    Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media of a proactive switch of vehicle-to-everything communication from a device-to-device connection to a connection routed by one or more network devices. In example embodiments, a first terminal device receives, from a second terminal device via a device-to-device connection, an indication of a decision to switch the device-to-device connection to a connection routed by at least one network device for communication with the second terminal device. Based on the received indication from the second terminal device, the first terminal device then determines proactive switching from the device-to-device connection to the routed connection to be performed. The first terminal device then sends a request to a first network device of the at least one network device to set up the routed connection, the request indicating a cause for the determined proactive switching.
    Type: Grant
    Filed: July 4, 2019
    Date of Patent: January 7, 2025
    Assignee: Nokia Technologies Oy
    Inventors: Lianghai Ji, Jakob Lindbjerg Buthler, Vinh Van Phan, Ling Yu, Hajo Bakker, Rudraksh Shrivastava, Bernhard Wegmann, Xiang Xu
  • Publication number: 20240349161
    Abstract: Example embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media for enhancement on the IAB network. The method comprises: receiving, at a first network device and from a first central device for controlling the first network device, a first message comprising configuration information about at least one of duplication and de-duplication for a packet at backhaul adaptation protocol, BAP, layer; and communicating, based on the configuration information, the packet with a group of second network devices and the first central device in an integrated access and backhaul, IAB, network. By duplicating uplink and downlink data associated with terminal devices in the IAB network at BAP level, the reliability and resiliency of backhaul links can be improved.
    Type: Application
    Filed: August 17, 2021
    Publication date: October 17, 2024
    Inventors: Esa Mikael MALKAMÄKI, Matti Einari LAITILA, Xiang XU, Esa Markus METSÄLÄ
  • Patent number: 12097559
    Abstract: The present disclosure relates to an eccentric extreme high-speed-rate laser hybrid manufacturing method for a rotary engineering component. By positioning an extreme high-speed-rate laser direct energy deposition machining head at a predetermined eccentric distance, the damage caused by reflected light to the machining head is effectively reduced, to prolong a service life of the machining head. Also a conventional form of a molten pool in extreme high-speed-rate laser direct energy deposition can be changed, namely from a “falling” form caused by a high-speed movement and a gravity to a “climbing” form. Thus, in extreme high-speed-rate laser direct energy deposition machining, the molten pool has a longer time to fully contact a surface of the rotary engineering component to form desirable bonding performance.
    Type: Grant
    Filed: February 25, 2022
    Date of Patent: September 24, 2024
    Assignee: Jiangsu University
    Inventors: Jinzhong Lu, Xiang Xu, Kaiyu Luo, Jialong Du, Xingyu Bu
  • Publication number: 20240314546
    Abstract: There is provided an apparatus, said apparatus including circuitry for, at a distributed unit of a relay node, determining that an internet protocol, IP, address of the distributed unit of the relay node used for communicating with a centralised unit of a donor node over a first communication path including a first donor distributed unit is to be reused after a change from the first communication path to a second communication path including a second donor distributed unit and providing an indication to the control plane of the centralised unit of the donor node that the IP address is to be reused.
    Type: Application
    Filed: January 14, 2021
    Publication date: September 19, 2024
    Inventors: Xiang Xu, llkka Antero KESKITALO, Matti Einari LAITILA, JENS GEBERT
  • Publication number: 20240289605
    Abstract: Aspects of the disclosure are directed to proxy task design tools that automatically find proxy tasks, such as optimal proxy tasks, for neural architecture searches. The proxy task design tools can include one or more tools to search for an optimal proxy task having the lowest neural architecture search cost while meeting a minimum correlation requirement threshold after being provided with a proxy task search space definition. The proxy task design tools can further include one or more tools to select candidate models for computing correlation scores of proxy tasks as well as one or more tools to measure variance of a model. The proxy task design tools can minimize time and effort involved in designing the proxy task.
    Type: Application
    Filed: February 23, 2023
    Publication date: August 29, 2024
    Inventors: Lav Rai, Xiang Xu, Yen-Min Hsu, Bo Wu, Daiyi Peng
  • Patent number: 12054436
    Abstract: A ceramic aerogel includes a porous framework including interconnected double-paned wall structures of a ceramic material, wherein each double-paned wall structure includes a pair of walls spaced apart by a gap.
    Type: Grant
    Filed: January 23, 2020
    Date of Patent: August 6, 2024
    Assignee: The Regents of the University of California
    Inventors: Xiangfeng Duan, Yu Huang, Xiang Xu
  • Publication number: 20240259386
    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may implement multi-tenancy role based access control (RBAC). In accordance with the multi-tenancy based RBAC, tenant organizations of a DMS may be assigned permissions (i.e., privileges) for a given data management cluster and/or computing objects within a data management cluster. Customized user roles (RBAC roles) may also be created for a given tenant. For example, a role may be defined based on a corresponding set of permissions (e.g., permissions associated with computing objects, data management clusters, or data sources associated with the tenant). A user within a tenant may be assigned a user role, which may be a customized role, and the effective permissions for the user may be based on which permissions of the user's assigned role are also within the scope of the tenant's permissions.
    Type: Application
    Filed: March 21, 2023
    Publication date: August 1, 2024
    Inventors: Hao Wu, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Zhebin Zhang, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
  • Publication number: 20240259389
    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may receive a federated login request from a user associated with one or more tenants of the DMS. The DMS may direct the federated login request to a centralized management service. The DMS may receive a security assertion markup language (SAML) assertion that indicates an identity of the user, a set of object-level permissions assigned to the user, and an identifier of a first tenant associated with the user. The DMS may identify one or more computing objects in a cluster of storage nodes that correspond to the first tenant based on the identifier from the SAML assertion. The DMS may determine that the user is authorized to perform a set of actions on the one or more computing objects based on the set of object-level permissions indicated by the SAML assertion.
    Type: Application
    Filed: March 21, 2023
    Publication date: August 1, 2024
    Inventors: Hao Wu, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Zhebin Zhang, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan, Alex Medovar
  • Publication number: 20240256575
    Abstract: Methods, systems, and devices for data management are described. A multi-tenancy data management system (DMS) may include multiple computing objects organized as a hierarchy of computing objects. The DMS may receive a request for report data associated with a first set of computing objects of the DMS. The DMS may identify context information for a log-in session associated with the request. The context information may include a tenant identifier (ID) for a tenant associated with the request. The DMS may apply a filter to the first set of computing objects. The filter may be based on a second set of computing objects to which the tenant has access within the hierarchy of computing objects. The DMS may output the report data for at least one computing object of the first set based on the at least one computing object being included in the second set of computing objects.
    Type: Application
    Filed: January 27, 2023
    Publication date: August 1, 2024
    Inventors: Zhebin Zhang, Hao Wu, Kevin Mu, Xiang Xu
  • Publication number: 20240256518
    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may provide backup services for multiple tenants. The DMS may receive a request to provide a first user of the DMS with audit information associated with an entity of the DMS. The DMS may identify context information for a log-in session associated with the request. The context information may include an identifier (ID) of a tenant associated with the request. The DMS may identify, based on the ID of the tenant, authorization information associated with the tenant. The authorization information may indicate that the tenant has access to a set of entities within a hierarchy associated with the DMS. The DMS may determine whether to output the requested audit information to the first user based on a hierarchical relationship, within the hierarchy, between the tenant and the entity.
    Type: Application
    Filed: January 27, 2023
    Publication date: August 1, 2024
    Inventors: Zhebin Zhang, Hao Wu, Kevin Mu, Xiang Xu, Jordon Marcell Barkley
  • Publication number: 20240256400
    Abstract: Methods, systems, and devices for data management are described. A data management system may configure backup and recovery resources for tenant of the data management system. The data management system may receive an indication to create a set of subtenants within the resources configured for the tenant. The data management system may assign a first subset of resources configured for the tenant, and the first subset may be different from a second subset configured for a second subtenant. The data management system may activate a first backup procedure for the first subtenant. The first backup procedure may be configured to backup a first data source associated with the first subtenant of the tenant using the first subset of the set of backup and recovery resources, and the first backup procedure may be separate from a second backup procedure for a second data source associated with the second subtenant.
    Type: Application
    Filed: March 21, 2023
    Publication date: August 1, 2024
    Inventors: Hao Wu, Alex Medovar, Xiaoqing Tao, Jinshuo Zhang, Seungyeop Han, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
  • Publication number: 20240259388
    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may implement multi-tenancy role based access control (RBAC). A DMS that provides backup and recovery to multiple tenants may assign a data management cluster to a tenant organization, or specific resources from a data management cluster to a tenant, allowing multiple tenants to share a single data management cluster. The assignment of resources of the data management cluster respects the hierarchical relationship among computing objects, for example, assigning a top-level resource to a tenant implicitly assigns the descendent resources that descend from that top-level resource to the tenant.
    Type: Application
    Filed: March 21, 2023
    Publication date: August 1, 2024
    Inventors: Hao Wu, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Zhebin Zhang, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
  • Publication number: 20240259379
    Abstract: Methods, systems, and devices for data management are described. A data management system may receive an indication to create a set of subtenants of a tenant. A first set of user profiles are associated with the tenant and a second set of user profiles are associated with a parent tenant of the tenant. The system may assign a first subset of the first set of user profiles to a first subtenant and assign a second subset to a second subtenant. The first subset and the second subset exclude user profiles from the second set of user profiles that are non-overlapping with the first set of user profiles. The system may update metadata corresponding to the first set of user profiles and the second set of user profiles such that the first subset has access to the first subtenant for and the second subset has access to the second subtenant.
    Type: Application
    Filed: March 29, 2023
    Publication date: August 1, 2024
    Inventors: Hao Wu, Alex Medovar, Xiaoqing Tao, Jinshuo Zhang, Seungyeop Han, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
  • Publication number: 20240256358
    Abstract: Methods, systems, and devices for data management are described. A data management system (DMS) may receive a request to assign a first computing object in a first object hierarchy of the DMS to a first tenant of the DMS. The DMS may check the first object hierarchy to identify other computing objects having a hierarchical relationship with the first computing object. The other objects may be above or below the first computing object within the first object hierarchy. The DMS may determine whether at least one of the other computing objects in the first object hierarchy is assigned to a second tenant of the DMS. The DMS may output, in response to the request, an indication that the first computing object is unavailable for assignment to the first tenant if at least one of the other computing objects in the first object hierarchy is assigned to the second tenant.
    Type: Application
    Filed: March 21, 2023
    Publication date: August 1, 2024
    Inventors: Hao Wu, Sai Tanay Desaraju, Kevin Mu, Xiang Xu, Lokesh Jagasia, Zhebin Zhang, Shrihari Kalkar, Anam Bhatia, Michael Wronski, Arvind Swaminathan
  • Patent number: 12047829
    Abstract: Embodiments of the disclosure provide a method, device and computer readable medium for centralized unit switch. According to embodiments of the present disclosure, the DU transmits identity information of a target CU/DU to the source CU for the CU switch. The target CU does not need to initiate context setup procedure to set up context for the terminal device. Thus, the switch is implemented with minimized signaling and interruption in the data connection and the switched is completed faster by avoiding the unnecessary F1 AP context setup.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: July 23, 2024
    Assignee: Nokia Solutions and Networks Oy
    Inventors: Xiang Xu, Ilkka Antero Keskitalo, Esa Mikael Malkamäki
  • Patent number: 12041494
    Abstract: Example embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media of signaling reduction at handover of an IAB node. The method including sending, from a first device to a second device, a request message for a handover from the first device to the second device for a third device, the request message including a first cell configuration of the third device associated with the first device; receiving, from the second device, a response message acknowledging to the request, the response message including a resource configuration for a connection between the third device and the second device and a second cell configuration of the third device associated with the second device and sending the resource configuration to the third device. In this way, the signal overhead for the handover of an IAB node may be reduced significantly.
    Type: Grant
    Filed: October 12, 2019
    Date of Patent: July 16, 2024
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Henri Markus Koskinen, Xiang Xu
  • Patent number: 12039027
    Abstract: A system for evaluating a biometric authorization system is described. The biometric authorization system is configured to apply a facial recognition model to image data to make an authorization determination based on detection of synthesized image data and based on matching a reference image to the image data. The system is also configured to execute one or more synthetic image data attack protocols to evaluate the biometric authorization system. The system also generates, according to one or more synthetic image data generation techniques, an evaluation set of image data comprising synthesized representations of a target and sends one or more authorization requests using the evaluation set of image data to the biometric authorization system. The system generates an evaluation of the biometric authorization system for synthetic image data attack analysis based on respective responses to the one or more authorization requests received from the biometric authorization system.
    Type: Grant
    Filed: March 30, 2022
    Date of Patent: July 16, 2024
    Assignee: Amazon Technologies, Inc.
    Inventors: Xiang Xu, Hao Zhou, Jonathan Wu, Joseph P Tighe
  • Publication number: 20240230756
    Abstract: In certain aspects, a pattern generation system includes a memory and a processor coupled to the memory. The memory is configured to store a lookup table set. The lookup table set includes a mapping relationship between source patterns and a set of test channels, and is indexed based on a pin function index. The processor is configured to generate the source patterns, execute a pin-mapping operation based on an instruction to obtain a set of source selection signals for the set of test channels based on the pin function index and the lookup table set, and select and output a source signal from the source patterns for each test channel based on a corresponding source selection signal for the respective test channel.
    Type: Application
    Filed: March 25, 2024
    Publication date: July 11, 2024
    Inventors: Feng Ru, Xiang Xu, Yangyang Zhang, Mengda Wang