Patents by Inventor Xin Hu

Xin Hu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10202367
    Abstract: Disclosed are compounds of formula (I), formula (II), and formula (III): wherein Ar, R1, A, and X are as defined in the specification. These compounds are antiviral agents and are contemplated for use in the treatment of viral infections, for example, hepatitis C. These compounds are also contemplated for use in treating or preventing cancers.
    Type: Grant
    Filed: June 12, 2015
    Date of Patent: February 12, 2019
    Assignees: The United States of America, as represented by the Secretary, Department of Health and Human Services, University of Kansas
    Inventors: Tsanyang Liang, Zongyi Hu, Juan Jose Marugan, Noel Terrence Southall, Shanshan He, Xin Hu, Jingbo Xiao, Marc Ferrer, Wei Zheng, Kevin J. Frankowski, Frank J. Schoenen, Kelin Li
  • Publication number: 20190022083
    Abstract: The present invention relates to the field of virology. More specifically, the present invention provides methods and CN compositions useful for prevention and treatment of human cytomegalovirus (CMV). In one embodiment, a pharmaceutical composition comprises (a) emetine or a derivative thereof; (b) a human cytomegalovirus (HCMV) drug; and (c) a pharmaceutically acceptable carrier. In certain embodiments, the pharmaceutical composition further comprises an adjuvant. In a specific embodiment, the HCMV drug is ganciclovir. In such embodiments, emetine is present at about 1/10 to about 1/100 the normal dosage for amebiasis.
    Type: Application
    Filed: January 4, 2017
    Publication date: January 24, 2019
    Inventors: Ravit Boger, Marc Ferrer, Juan Marugan, Andres Dulcey Garcia, Noel Terrence Southall, Xin Hu
  • Patent number: 10171893
    Abstract: An adaptive algorithm based battery-powered long distance wireless temperature and humidity sensor module. The sensor module uses an adaptive algorithm to transmit data on an event basis and/or a reduced basis to extend battery life to more than 10 years. It also uses a low power wireless transmitter which has frequency of sub-1 GHz and an effective transfer distance of up to 250 meters, a low power temperature and humidity sensor, and a long lasting lithium battery which has shelf life of 20 years.
    Type: Grant
    Filed: December 16, 2016
    Date of Patent: January 1, 2019
    Assignee: Archimedes Controls Corp.
    Inventors: Liangcai Tan, Wenli Yu, Xin Hu
  • Patent number: 10122663
    Abstract: In various example embodiments, a system and method for generating a proxy email address for routing messages are presented. An email directed to a user with a proxy email address assigned by the system and with no registered email address is received at a proxy email address. Whether or not the email contains an action message identifier is ascertained. Based on the email containing an action message identifier, a forward email is identified. Text content from the forward email is extracted. A short message based on the extracted text content is generated. At least one communication channel to send the short message is selected based on an engagement level associated with the at least one communication channel. The short message may be caused to be presented at a mobile device associated with the user via the selected communication channel.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: November 6, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Xin Hu, Raghu Ram Hiremagalur Venkatesh
  • Publication number: 20180302361
    Abstract: In various example embodiments, a system and method for generating a proxy email address for routing messages are presented. An email directed to a user with a proxy email address assigned by the system and with no registered email address is received at a proxy email address. Whether or not the email contains an action message identifier is ascertained. Based on the email containing an action message identifier, a forward email is identified. Text content from the forward email is extracted. A short message based on the extracted text content is generated. At least one communication channel to send the short message is selected based on an engagement level associated with the at least one communication channel. The short message may be caused to be presented at a mobile device associated with the user via the selected communication channel.
    Type: Application
    Filed: June 20, 2018
    Publication date: October 18, 2018
    Inventors: Xin Hu, Raghu Ram Hiremagalur Venkatesh
  • Publication number: 20180285797
    Abstract: A method (and system) of scoring asset risk including modeling an interdependence of risks of a plurality of entities within a network by modeling the network as a graph connecting different entities, the different entities are selected from a group of a user, a device, a credential, a high-value asset, and an external server, the graph being defined as a set of vertices comprising the user, the device, the credential, the high-value asset, and the external server and a set of edges represented by an N-by-N adjacency matrix with each pair of the entities sharing a relationship and applying a Belief Propagation (BP) algorithm for solving the inference problem over the graph by inferring the risk from the entities own properties and surrounding entities with the shared relationship in the adjacency matrix, the Belief Propagation algorithm obtains risk information related to each entity of the plurality of entities.
    Type: Application
    Filed: June 6, 2018
    Publication date: October 4, 2018
    Applicant: International Business Machines Corporation
    Inventors: XIN HU, Reiner D. Sailer, Douglas Lee Schales, Marc Philippe Stoecklin, Ting Wang
  • Publication number: 20180273488
    Abstract: Provided is a compound of formula (I) [Formula (I) should be inserted here], in which Ar1, R1, U, V, W, X, and p are as described herein. Also provided are methods of using a compound of formula (I), including a method of treating cancer, a method of treating a patient with cancer cells resistant to an anti-cancer agent, and a method of inhibiting lactate dehydrogenase A (LDHA) and/or lactate dehydrogenase B (LDHB) activity in a cell.
    Type: Application
    Filed: December 29, 2015
    Publication date: September 27, 2018
    Inventors: David J. Maloney, Alex Gregory Waterson, Ganesh Rai Bantukallu, Kyle Ryan Brimacombe, Plamen Christov, Chi V. Dang, Victor Darley-Usmar, Xin Hu, Ajit Jadhav, Somnath Jana, Kwangho Kim, Jennifer L. Kouznetsova, William J. Moore, Bryan T. Mott, Leonard M. Neckers, Anton Simeonov, Gary Allen Sulikowski, Daniel Jason Urban, Shyh Ming Yang
  • Publication number: 20180253644
    Abstract: Described are methods and systems for identifying an electrical load device electrically coupled to a smart plug device. In some embodiments, a server receives, from the smart plug device, a plurality of power properties associated with the electrical load device. The server inputs the plurality of power properties into a plurality of nodes of an artificial neural network (ANN) graph to generate a predicted device ID. The server queries a database for a device ID that is within a threshold of the predicted device ID. Based on querying the database to determine that the device ID exists, the server identifies the electrical load device as a device associated with the device ID.
    Type: Application
    Filed: March 1, 2017
    Publication date: September 6, 2018
    Applicant: BRITE THINGS, INC.
    Inventors: Liangcai TAN, Xin HU, Michael WILSON
  • Patent number: 10044737
    Abstract: A method for detecting beaconing behavior includes preprocessing network records to identify candidate source and destination pairs for detecting beaconing behavior, where each source and destination pair is associated with a specific time interval in a plurality of time intervals forming a time range, the time interval and time range having been predefined. The activity time interval information is converted from the time domain into the frequency domain. Candidate frequencies are determined from the source and destination pairs, as likely candidate frequencies/periodicities of beaconing activities.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: August 7, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Xin Hu, Jiyong Jang, Douglas Schales, Marc Stoecklin, Ting Wang
  • Patent number: 10040898
    Abstract: It relates to the field of synthetic macromolecular chemistry, and discloses a method for one-step synthesis of thiol-functionalized polyester polyols by organic catalysis. This method uses lactone monomer as reaction raw material, thiol-alcohol as initiator, and diphenyl phosphate as organic catalyst to catalyze and synthesize the thiol-functionalized polyester polyols. The present invention provides a method which is simple, inexpensive, easily controllable and environmentally friendly to prepare thiol-functionalized polyester polyols with the easily available and controllable catalyst. The method can selectively catalyze the ring opening polymerization of lactone to prepare thiol-functionalized polyester polyols using the organic catalyst.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: August 7, 2018
    Assignee: NANJING TECH UNIVERSITY
    Inventors: Kai Guo, Yihuan Liu, Ning Zhu, Xin Hu, Zheng Fang, Weiyang Feng, Weijun Huang
  • Patent number: 9922287
    Abstract: The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: March 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Mihai Christodorescu, Xin Hu, Douglas L. Schales, Reiner Sailer, Marc PH. Stoecklin, Ting Wang, Andrew M. White
  • Publication number: 20180060745
    Abstract: The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information.
    Type: Application
    Filed: October 23, 2017
    Publication date: March 1, 2018
    Inventors: Mihai CHRISTODORESCU, Xin HU, Douglas L. SCHALES, Reiner SAILER, Marc PH. STOECKLIN, Ting WANG, Andrew M. WHITE
  • Patent number: 9854057
    Abstract: Embodiments include a network data collection and response system for enhancing security in an enterprise network providing a user-supplied computing device with access to the network. A network data collection and response system tracks network activity of the device and maintains a device inventory recording the device type and configuration information for the device along with a resource utilization profile for the device. The network data collection and response system detects high-risk or unauthorized network activity involving the device through passive monitoring without utilization of a data monitoring agent installed on the device and implements a response action to mitigate the high-risk or unauthorized network.
    Type: Grant
    Filed: May 6, 2014
    Date of Patent: December 26, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Suresh N. Chari, Pau-Chen Cheng, Xin Hu, Lawrence Koved, Josyula R. Rao, Reiner Sailer, Douglas L. Schales, Kapil K. Singh, Marc P. Stoecklin
  • Publication number: 20170366341
    Abstract: An encoder including a computer readable storage medium storing program instructions, and a processor executing the program instructions, the processor configured to generate a k-bit key, where k is a positive integer, estimate an upper bound of a number of eavesdropped links, encode each bit of the k-bit key using a random matrix of a selected rank, and transmit the encoded k-bit key through a network that performs linear operations on packets.
    Type: Application
    Filed: June 17, 2016
    Publication date: December 21, 2017
    Inventors: Xin HU, Wentao Huang, Jiyong Jang, Theodoros Salonidis, Marc Ph. Stoecklin, Ting Wang
  • Patent number: 9843753
    Abstract: An imaging system includes an image sensor and a row-period compensator. The image sensor includes an array of photosensitive pixels and electrical circuitry for controlling the array of photosensitive pixels and for reading accumulated electrical charge therefrom. The electrical circuitry is at least partially powered from a positive power rail and a negative power rail. The row-period compensator is for compensating for a change in current drawn by the electrical circuitry during at least part of a row-period of the image sensor, and the row-period compensator is electrically coupled between the positive and negative power rails. A method for compensating for a change in current drawn by electrical circuitry of an image sensor includes controlling a magnitude of compensation current drawn by a row-period compensator, to compensate for a change in current drawn by the electrical circuitry of the image sensor.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: December 12, 2017
    Assignee: OmniVision Technologies, Inc.
    Inventors: Tianjia Sun, Chun-Ming Tang, Jingyi Liu, Xin Hu
  • Patent number: 9832217
    Abstract: A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system kernels on the plurality of target computer systems. Sequences of systems calls and call parameters of the monitored applications are correlated among different target computer systems to deduce malicious activities. Remedial action(s) are performed in response to malicious activities being deduced as being malicious by the correlating. Another method includes determining that network activity at a specific time is deemed to be suspicious. Using IP addresses involved in the suspicious network activity, computer system(s) are determined that are sources of the suspicious network activity. Based on the specific time and the determined computer system(s), application(s) are determined that are executing on the determined computer system(s) that are causing the suspicious network activity.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: November 28, 2017
    Assignee: International Business Machines Corporation
    Inventors: Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios Pendarakis, Josyula Rao, Reiner Sailer, Douglas Lee Schales, Marc Stoecklin
  • Publication number: 20170331841
    Abstract: Unknown and reference signatures are accessed. The unknown and reference signatures indicate patterns that correspond to known threats to resources (such as computer systems and/or computer networks) in a computer environment and comprise a multitude of descriptive elements having information describing different aspects of a corresponding signature. A set of similarity measures is created of the unknown and reference signatures from different perspectives, each perspective corresponding to a descriptive element. The set of similarity measures are integrated to generate an overall similarity metric. The overall similarity metric is used to find appropriate categories in the reference signatures into which the unknown signatures should be placed. The unknown signatures are placed into the appropriate categories to create a mapping from the unknown signatures to the reference signatures.
    Type: Application
    Filed: May 11, 2016
    Publication date: November 16, 2017
    Inventors: Xin HU, Jiyong Jang, Douglas Lee Schales, Marc Philippe Stoecklin, Ting Wang
  • Patent number: 9817905
    Abstract: Techniques for presenting a personalized member profile page to a viewer are described. A highlight module can receive a request to view a profile page of a member in a social network. The highlight module can access viewer data of a viewer associated with the request, and access member data of the member. Additionally, the highlight module can determine a plurality of member attributes relevant to the viewer based on the viewer data, the plurality of member attributes being derived from the member data. Furthermore, the highlight module can calculate an overall score for a member attribute in the plurality of member attributes based on the viewer data and the member data. Subsequently, a profile generation module can cause a presentation, on a display of a device, of the member attribute on the profile page, when the overall score of the member attribute is higher than a predetermined threshold value.
    Type: Grant
    Filed: March 31, 2015
    Date of Patent: November 14, 2017
    Assignee: LinkedIn Corporation
    Inventors: Nipun Dave, Sachit Kamat, Nikita Igorevych Lytkin, Vibha Rathi, Jibran Kutik, Mathieu Bastian, Matthieu F. Monsch, Xin Hu
  • Publication number: 20170317986
    Abstract: A decoder deployed in one or more terminals, includes a computer readable storage medium storing program instructions, and a processor executing the program instructions, the processor configured to receiving a noisy message and a noisy hash from the network, searching for a pair of matching candidates for the hash and message from two row spaces of noisy message vectors using a shared secret with an encoder, and outputting, by the decoder, a decoded message if the searching is successful.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Inventors: Xin HU, Wentao Huang, Jiyong Jang, Theodoros Salonidis, Marc Ph Stoecklin, Ting Wang
  • Publication number: 20170317819
    Abstract: An encoder including a computer readable storage medium storing program instructions, and a processor executing the program instructions, the processor configured to generating a message by aggregating a plurality of incoming packets, constructing an encoded message using the message and a random matrix, constructing of a hash using a shared secret, and transmitting the encoded message and the hash to a destination, through a network that performs network coding operations.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Inventors: Xin HU, Wentao Huang, Jiyong Jang, Theodoros Salonidis, Marc Ph. Stoecklin, Ting Wang