Patents by Inventor Xiaoming Zhou

Xiaoming Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12215002
    Abstract: Equipment for self-positioning handling of aluminum profiles for rail vehicle, including a handling and lifting mechanism, a steel beam fixed on and being driven to lift by the mechanism, 2-DOF spatial mechanisms fixed on the steel beam and mechanical clamping jaws fixed on a clamping jaw connecting seat; the 2-DOF spatial mechanisms includes a cylinder supporting seat, four connecting members on an outer ring of the cylinder supporting seat hinged respectively to four first connecting rods; wherein, two of the first rods are hinged to first ends of two ball joint connecting rods of which second ends are hinged to the clamping jaw connecting seat; the other two first rods are hinged to first ends of two second connecting rods of which second ends are hinged to the clamping jaw connecting seat; a piston rod of a cylinder center of the cylinder supporting seat driving the clamping jaw connecting seat.
    Type: Grant
    Filed: June 1, 2022
    Date of Patent: February 4, 2025
    Assignees: QINGDAO UNIVERSITY OF TECHNOLOGY, QINGDAO HUANGHAI UNIVERSITY, GUOHUA (QINGDAO) INTELLIGENT PRECISION DRIVE CONTROL TECHNOLOGY RESEARCH INSTITUTE CO., LTD., QINGDAO JIMO QINGLI INTELLIGENT MANFACTURING INDUCTRY RESEARCH INSTITUTE
    Inventors: Xiaoming Wang, Changhe Li, Zhuang Shi, Bo Liu, Zongming Zhou, Yun Chen, Xiaowei Zhang, Zafar Said, Wenfeng Ding, Yanbin Zhang
  • Publication number: 20250038976
    Abstract: A lattice-based proxy signature method, apparatus and device, a lattice-based proxy signature verification method, apparatus and device, and a storage medium. Polynomials are randomly selected in rings to calculate public and private keys of nodes, and the magnitudes of proxy public and private keys are the same as the magnitudes of public and private keys of an original signer. Therefore, compared with existing proxy signature schemes, the present application has smaller lengths of public and private keys and higher storage efficiency. Proxy signature information generated in the present application shows a signature of the original signer and also shows a signature of a proxy signer. Once a proxy signature is created, the proxy signature cannot be repudiated by the proxy signer, and has strong non-repudiation and strong unforgeability. The proxy signature method has the advantage of resisting quantum computer attack.
    Type: Application
    Filed: August 18, 2022
    Publication date: January 30, 2025
    Applicants: ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID, GUIZHOU POWER GRID CO., LTD.
    Inventors: Bin QIAN, Houpeng HU, Yong XIAO, Jiaxiang OU, Mi ZHOU, Pengcheng LI, Yi LUO, Yanhong XIAO, Ji WANG, Xin WU, Fusheng LI, Peilin HE, Xiaoming LIN, Zhenghao GAO, Jianlin TANG, Zerui CHEN, Fan ZHANG, Gaoyi LONG, Qiang CHANG, Qin FENG, Yuanhong CEN
  • Patent number: 12202222
    Abstract: A controllable rapid pressure loading technology for a large volume press is provided. A regular octahedra, plugs, diamond pistons, and a standard are included. The regular octahedra is provided with a cavity with openings at two ends of the cavity. The standard is placed in the cavity. The openings at two ends of the cavity are respectively blocked by the conductive plugs. The diamond piston is arranged between the standard and the plug. The diamond pistons arranged between the standard and the plug has high hardness and has the pressure transmission efficiency superior to that of a common ceramic plug, improving compression efficiency in sample cavity. A loading method of pre-charging a pressure to a pressure loading device first and then rapidly releasing to a pressure loading mold is used to match an improved pressure transmission component, which shortens the pressure loading time of the sample cavity.
    Type: Grant
    Filed: August 8, 2024
    Date of Patent: January 21, 2025
    Assignee: Jilin University
    Inventors: Zhaodong Liu, Kuo Hu, Ran Liu, Shucheng Liu, Di Yao, Xiaoming Zhang, Qiang Zhou, Bingbing Liu
  • Publication number: 20240409986
    Abstract: The present invention discloses a nucleic acid detection kit and a detection method based on photo-controlled CRISPR-Cas, wherein the kit comprises silent guide RNA and Cas protein; the silent guide RNA is formed by annealing hybridization of silent nucleotide and guide RNA; the guide RNA, designed according to a target nucleic acid sequence, includes two regions, i.e. a repetitive region and a spacer region; the silent nucleotide is completely complementarily paired with a the of the guide RNA, or is completely paired with a the of the guide RNA; the bases of the silent nucleotide are linked by PC linker; and the Cas protein is Cas12 protein or Cas13 protein. Although this method separates the nucleic acid amplification from the CRISPR-Cas detection in time, it can allow them to be completed in the same closed reaction tube, thereby avoiding the transfer process of uncapped reagent, ensuring that the detection is not affected by aerosol pollution while ensuring high detection sensitivity.
    Type: Application
    Filed: May 6, 2022
    Publication date: December 12, 2024
    Inventors: Xiaoming ZHOU, Menglu HU
  • Patent number: 12058170
    Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.
    Type: Grant
    Filed: February 25, 2022
    Date of Patent: August 6, 2024
    Assignee: Shape Security, Inc.
    Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
  • Publication number: 20240009473
    Abstract: The invention provides method, device, and system to commission medical devices using different wireless communication protocol or from different manufacturers to a network by introducing a pairing device and a guiding device. The commissioning process includes two steps, e.g., a pairing the medical device to the pairing device and a pairing between the pairing device and server of the network. By configuring a pairing device dynamically with the aid of a guiding device, the pairing device can receive broadcast messages from medical devices using different communication protocols and send the same to a remote server having a specific network address. Further, the guiding device is introduced not only to assist in the configuration of the pairing device, but also provide an opportunity to the pairing device to obtain a real-time feedback from the remote server through the guiding device during installation.
    Type: Application
    Filed: October 29, 2021
    Publication date: January 11, 2024
    Inventor: Xiaoming Zhou
  • Publication number: 20230315991
    Abstract: Systems and methods for generating an entity classification model using text classification of raw text information of entities are described. Generating the classification model includes obtaining raw text information associated with a plurality of entities, converting the raw text information for each entity of the plurality of entities into one or more character strings, generating a numerical vector for each entity of the plurality of entities based on the one or more character strings for each entity, and selecting, based on the numerical vectors for each entity of the plurality of entities, one or more entity properties to be used for entity classification. A classification of a first entity coupled to a network is performed based on the one or more selected entity properties.
    Type: Application
    Filed: December 30, 2022
    Publication date: October 5, 2023
    Inventors: Yi Zhang, Xiaoming Zhou, Zhiruo Cao
  • Publication number: 20230273990
    Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.
    Type: Application
    Filed: February 25, 2022
    Publication date: August 31, 2023
    Applicant: Shape Security, Inc.
    Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
  • Publication number: 20230225700
    Abstract: The present disclosure relates to the field of ultrasonic detection, in particular to a craniocerebral ultrasonic standard plane imaging and automatic detection and display method for abnormal regions. The following technical solution is adopted: contour detection is performed on the scanned ultrasound images the skull to construct a skull surface model, and the standard planes in ultrasound images are identified and extracted according to the skull surface model. The symmetry of the standard planes in ultrasound images is used to compare the similarity, so as to obtain the abnormal regions for segmentation and display. The advantages of the present disclosure are as follows: the skull surface model is constructed by detecting the cranial edge, and the coordinate system is established based on this model, thereby the standard planes in ultrasound images can be quickly identified from the scanned ultrasound images.
    Type: Application
    Filed: October 12, 2022
    Publication date: July 20, 2023
    Inventors: Liexiang FAN, Zehang CAI, Bin LI, Zhonghong WU, Yu WANG, Jinhao LIN, Xiaoming ZHOU, Shaohui CHEN, Weiwu CHEN, Jingfeng GUO, Yijie CHEN, Zichun CHEN
  • Patent number: 11297097
    Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.
    Type: Grant
    Filed: December 29, 2019
    Date of Patent: April 5, 2022
    Assignee: SHAPE SECURITY, INC.
    Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
  • Patent number: 11139066
    Abstract: The present disclosure relates to methods and tools for enhancing cognition in an individual. The methods involve presenting to the individual multiple sets of stimuli. Each set of the multiple set contains two or more stimuli and at least one set of the multiple sets contains a target stimulus. The method then receives an input from the individual, and informs the individual as to whether the input is a correct response. The methods encompass iterations of stimuli presentation, receiving of the input, and lastly, generation of feedback to the individual until the individual learns and retains what the target stimulus is.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: October 5, 2021
    Assignee: The Regents of the University of California
    Inventors: Etienne de Villers-Sidani, Xiaoming Zhou, Jyoti Mishra-Ramanathan, Michael Merzenich, Adam Gazzaley
  • Patent number: 10987431
    Abstract: A preparation method of adiposomes, and use thereof. Provided is a method for preparing adiposomes consisting of neutral lipids and a monolayer phospholipid membrane, comprising a1) vortexing phospholipid and neutral lipids in a buffer, centrifuging the resulting mixture, and collecting an upper liquid phase; a2) purifying the upper liquid phase twice or more by uniformly mixing the upper liquid phase with the buffer, layering the mixture, and collecting an upper liquid phase; and a3) uniformly mixing the upper liquid phase obtained in step a2) with the buffer, layering the mixture, and collecting a lower liquid phase in containing adiposomes. For the adiposomes prepared by the method, one or more resident proteins and/or functional proteins can be recruited to obtain artificial lipid droplets, and one or more apolipoproteins can be recruited to obtain artificial lipoproteins; and they all play important roles in preparing drugs and/or drug carriers.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: April 27, 2021
    Assignee: INSTITUTE OF BIOPHYSICS, CHINESE ACADEMY OF SCIENCES
    Inventors: Pingsheng Liu, Yang Wang, Xiaoming Zhou, Xuejing Ma, Chang Zhou
  • Patent number: 10946039
    Abstract: The present invention provides a hemostatic powder. The hemostatic powder is mainly present in the form of a columnar particle, wherein the ratio of axial length to diameter of the columnar particle is less than 5; the hemostatic powder includes a polymer represented by the following structural formula: wherein the R is at least one selected from the group consisting of —NH2, —OCH2CH2OH, —OCH2CH2CH2OH, —OH, —ONa, —OK and —OCa; m, n and p respectively represent number percentages of corresponding repeating units in polymer molecules, and satisfy the following equations: m+n+p=1, p/(m+n+p)=0.05˜0.
    Type: Grant
    Filed: October 25, 2017
    Date of Patent: March 16, 2021
    Assignees: Jiangsu NewValue Medical Products Co., Ltd., Shnaghai Newvalue Medical Products Co., Ltd.
    Inventors: Yingshan Zhou, Rui Jiang, Zuguang Gong, Liqin Xu, Shiming Zhou, Xiaoming Zhou
  • Publication number: 20200365051
    Abstract: The present disclosure relates to methods and tools for enhancing cognition in an individual. The methods involve presenting to the individual multiple sets of stimuli. Each set of the multiple set contains two or more stimuli and at least one set of the multiple sets contains a target stimulus. The method then receives an input from the individual, and informs the individual as to whether the input is a correct response. The methods encompass iterations of stimuli presentation, receiving of the input, and lastly, generation of feedback to the individual until the individual learns and retains what the target stimulus is.
    Type: Application
    Filed: May 29, 2020
    Publication date: November 19, 2020
    Inventors: Etienne de Villers-Sidani, Xiaoming Zhou, Jyoti Mishra-Ramanathan, Michael Merzenich, Adam Gazzaley
  • Publication number: 20200306287
    Abstract: The present invention provides a hemostatic powder. The hemostatic powder is mainly present in the form of a columnar particle, wherein the ratio of axial length to diameter of the columnar particle is less than 5; the hemostatic powder includes a polymer represented by the following structural formula: wherein the R is at least one selected from the group consisting of —NH2, —OCH2CH2OH, —OCH2CH2CH2OH, —OH, —ONa, —OK and —OCa; m, n and p respectively represent number percentages of corresponding repeating units in polymer molecules, and satisfy the following equations: m+n+p=1, p/(m+n+p)=0.05˜0.
    Type: Application
    Filed: October 25, 2017
    Publication date: October 1, 2020
    Inventors: Yingshan ZHOU, Rui JIANG, Zuguang GONG, Liqin XU, Shiming ZHOU, Xiaoming ZHOU
  • Patent number: 10767876
    Abstract: In various embodiments, an air quality-monitoring system (100) may include at least one sensor (106) configured to detect operation of a mechanism (110) within or at a boundary of an indoor environment. The mechanism may be external to an air purifier (102) associated with the indoor environment. The system may include a persistent memory (124) for storing data about the indoor environment observed by the at least one sensor (106).
    Type: Grant
    Filed: December 21, 2015
    Date of Patent: September 8, 2020
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Declan Patrick Kelly, Cornelis Reinder Ronda, Xiaoming Zhou, Amanda Zhao
  • Publication number: 20200177623
    Abstract: Techniques for code modification for detecting abnormal activity are described. Web code is obtained. Modified web code is generated by changing a particular programmatic element to a modified programmatic element throughout the web code. Instrumentation code is generated configured to monitor and report on one or more interactions with versions of the particular programmatic element. The instrumentation code is caused to be provided in association with the modified web code to the first client device in response to the first request from the first client device. Report data generated by the instrumentation code is received. The report data describes abnormal activity at the first client device, the abnormal activity comprising an interaction with a version of the particular programmatic element that does not exist in the modified web code. Based on the report, it is determined that the first client device is likely controlled by malware.
    Type: Application
    Filed: December 29, 2019
    Publication date: June 4, 2020
    Applicant: Shape Security, Inc.
    Inventors: Justin D. Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover
  • Patent number: 10672292
    Abstract: Provided are methods and tools for enhancing cognition in an individual. The methods involve presenting to the individual multiple sets of stimuli. Each set of the multiple set contains two or more stimuli and at least one set of the multiple sets contains a target stimulus. The method then receives an input from the individual, and informs the individual as to whether the input is a correct response. The methods encompass iterations of stimuli presentation, receiving of the input, and lastly, generation of feedback to the individual until the individual learns and retains what the target stimulus is.
    Type: Grant
    Filed: June 22, 2011
    Date of Patent: June 2, 2020
    Assignee: The Regents of the University of California
    Inventors: Etienne de Villers-Sidani, Xiaoming Zhou, Jyoti Mishra-Ramanathan, Adam Gazzaley, Michael Merzenich
  • Patent number: 10652275
    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.
    Type: Grant
    Filed: April 5, 2018
    Date of Patent: May 12, 2020
    Assignee: Shape Security, Inc.
    Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
  • Patent number: 10536479
    Abstract: Techniques for code modification for automation detection are described. Web code is obtained corresponding to content to be served to a first client device in response to a first request from the first client device. Instances of a particular programmatic element in the web code are identified. In response to the first request, modified web code is generated from the web code by consistently changing the particular programmatic element to a modified programmatic element throughout the web code. The modified web code is caused to be provided to the first client device in response to the first request from the first client device. A communication is received from the first client device that is made in response to the modified web code. The communication includes an attempt to interact with the particular programmatic element that exists in the web code but not in the modified web code.
    Type: Grant
    Filed: March 19, 2018
    Date of Patent: January 14, 2020
    Assignee: Shape Security, Inc.
    Inventors: Justin D Call, Xiaoming Zhou, Xiaohan Huang, Subramanian Varadarajan, Roger S. Hoover