Patents by Inventor Yan Qi

Yan Qi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9503921
    Abstract: Embodiments of the present invention relate to a method for determining a scrambling code conflict and an apparatus for determining a scrambling code conflict. The method includes: determining a serving cell before a handover of a user equipment fails, and determining a current serving cell of the user equipment; and comparing frequencies and scrambling codes of the current serving cell and a neighboring cell of the serving cell before the handover fails, and determining, according to a result of the comparing, that a scrambling code conflict exists between the current serving cell and the neighboring cell of the serving cell before the handover fails. A probability of a handover failure of a user equipment is reduced, so as to ensure that a service of the user equipment runs normally.
    Type: Grant
    Filed: June 18, 2015
    Date of Patent: November 22, 2016
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Xi Luo, Yan Qi, Huan Zhang, Ping Song
  • Publication number: 20160260314
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.
    Type: Application
    Filed: March 7, 2016
    Publication date: September 8, 2016
    Applicant: MivaLife Mobile Technology, Inc.
    Inventors: Keqin Gu, Yan Qi, Kuochun Lee, Shicong Wang
  • Patent number: 9424260
    Abstract: Techniques for data assignment from an external distributed file system (DFS) to a database management system (DBMS) are provided. Data blocks from the DFS are represented as first nodes and access module processors of the DBMS are represented as second nodes. A graph is produced with the first and second nodes. Assignments are made for the first nodes to the second nodes based on evaluation of the graph to integrate the DFS with the DBMS.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: August 23, 2016
    Assignee: Teradata US, Inc.
    Inventors: Yan Qi, Yu Xu, Olli Pekka Kostamaa, Jian Wen
  • Patent number: 9372676
    Abstract: Apparatus and methods are provided for controlling the loading status of DLLs. Specifically, a streaming program compiler is provided. The compiler includes operation modules for calling DLLs during streaming program execution; association table generating units for generating association tables according to user-defined rules, where the association table includes entries indicating (i) stream branches of the streaming program and (ii) an operation module corresponding to the stream branches; and a trigger generating unit for generating a trigger based on user-defined rules, where the trigger generating unit (i) determines which conditions for loading and unloading DLLs fit the streaming program, (ii) matches these conditions to a particular stream branch to identify a matched stream branch, and (iii) sends out triggering signals indicating the matched stream branch. This invention also provides a corresponding method and controller.
    Type: Grant
    Filed: November 8, 2013
    Date of Patent: June 21, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rui Hou, Zhi Yu Liu, Huayong Wang, Yan Qi Wang
  • Publication number: 20160132576
    Abstract: Techniques and mechanisms described herein facilitate the management of data centers. According to various embodiments, a first query dispatcher at a first data center may be disabled. The first data center may include a first data cluster and a first database. The first query dispatcher may be configured to dispatch queries to access data in the first data cluster and in a second data cluster at a second data center. The second data cluster may replicate data stored in the first data cluster. Metadata stored in the first database may be replicated to a second database in the second data center. The metadata may describe a state of the first data cluster. A second query dispatcher may be enabled at the second data center. The second query dispatcher may be configured to dispatch queries to access data in the second data cluster.
    Type: Application
    Filed: November 7, 2014
    Publication date: May 12, 2016
    Applicant: Turn Inc.
    Inventors: Yan Qi, Mingxi Wu
  • Patent number: 9286259
    Abstract: The present invention provides a method and an apparatus for lowering I/O power of a computer system and a computer system. According to an aspect of the present invention, there is provided a method for lowering I/O power of a computer system, comprising: buffering a plurality of ways of data to be sent to a bus; encoding each of the plurality of ways of data buffered from n bits to n+m bits based on an encoding rule, wherein n and m are both an integer larger than or equal to 1, the encoding rule is used to lower code switching frequency; and sending the plurality of ways of data encoded to the bus.
    Type: Grant
    Filed: October 10, 2008
    Date of Patent: March 15, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yu Li, Wen Bo Shen, Yan Qi Wang, Yudong Yang
  • Patent number: 9280890
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.
    Type: Grant
    Filed: March 28, 2014
    Date of Patent: March 8, 2016
    Assignee: MivaLife Mobile Technology, Inc.
    Inventors: Keqin Gu, Yan Qi, Kuochun Lee, Shicong Wang
  • Publication number: 20150373538
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client.
    Type: Application
    Filed: August 31, 2015
    Publication date: December 24, 2015
    Inventors: Longgang Huang, Keqin Gu, Tsungyen Chen, Yan Qi
  • Publication number: 20150289151
    Abstract: Embodiments of the present invention relate to a method for determining a scrambling code conflict and an apparatus for determining a scrambling code conflict. The method includes: determining a serving cell before a handover of a user equipment fails, and determining a current serving cell of the user equipment; and comparing frequencies and scrambling codes of the current serving cell and a neighboring cell of the serving cell before the handover fails, and determining, according to a result of the comparing, that a scrambling code conflict exists between the current serving cell and the neighboring cell of the serving cell before the handover fails. A probability of a handover failure of a user equipment is reduced, so as to ensure that a service of the user equipment runs normally.
    Type: Application
    Filed: June 18, 2015
    Publication date: October 8, 2015
    Inventors: Xi Luo, Yan Qi, Huan Zhang, Ping Song
  • Publication number: 20150279198
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 1, 2015
    Applicant: Oplink Communications, Inc.
    Inventors: Keqin Gu, Yan Qi, Kuochun Lee, Shicong Wang
  • Publication number: 20150281138
    Abstract: The present application discloses a method of generating an automatic reply (auto-reply) message. A server receives a text message directed to a content provider, and obtains content information of a webpage associated with the content provider. The content information of the webpage includes predetermined tags and information concerning content items of the webpage. The server then composes an auto-reply message according to a specific keyword of the text message, and specifically, information of at least one content item is extracted according to an auto-reply rule. The auto-reply rule is included in an auto-reply rule database that further includes a plurality of keywords and the content items of the webpage semantically correlated with the keywords based on the set of predetermined tags. The server then returns the auto-reply message including the information of the at least one content item corresponding to the specific keyword for display on the client device.
    Type: Application
    Filed: May 13, 2015
    Publication date: October 1, 2015
    Inventors: Xun Niu, Yanan Zhao, Jihua Huang, Haiyang Wang, Yuhao Chen, Yan Qi, Jiyan Huang, Zhaohong Ma, Guodong Zhang, Jing Xu
  • Patent number: 9125049
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 1, 2015
    Assignee: Oplink Communications, Inc.
    Inventors: Longgang Huang, Keqin Gu, Tsungyen Chen, Yan Qi
  • Publication number: 20150244653
    Abstract: This application discloses a method implemented on a client system for creating an automatic reply (auto-reply) message. The client system obtains content information of a webpage including information concerning a plurality of content items. A graphical user interface is displayed and includes a preview of the webpage including the plurality of content items of the webpage. Then, the auto-reply message is composed in accordance with a user selection of a specific content item of the webpage in the webpage preview, and at least includes corresponding information of the selected content item. The auto-reply message is further associated with one or more predefined keywords according to one or more auto-reply rules, and sent with these predefined keywords to a server system. The server system is configured to return the auto-reply message automatically to a subscriber device in response to a user inquiry including at least one of the predefined keywords.
    Type: Application
    Filed: May 13, 2015
    Publication date: August 27, 2015
    Inventors: Xun NIU, Yanan ZHAO, Jihua HUANG, Haiyang WANG, Yuhao CHEN, Yan QI, Jiyan HUANG, Zhaohong MA, Guodong ZHANG, Jing XU
  • Publication number: 20150077250
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing communications. One of the systems includes a plurality of security systems, each security system including a secure network coupling a plurality of security devices; a plurality of user devices authorized to send and receive communications associated with a respective security system of the plurality of security systems; and a service provider system configured to manage communications for each of the plurality of security systems with respective user devices, wherein, the service provider system or the user devices are configured to communicate with a push service to send push notifications.
    Type: Application
    Filed: September 18, 2013
    Publication date: March 19, 2015
    Inventors: Kuochun Lee, Yan Qi, Qiang Xie
  • Patent number: 8903803
    Abstract: Current data records having a start and end time are transformed into a 2D space having a first dimension for each data record's start time and a second dimension for each data record's end time. Historical queries specifying data ranges are obtained. A response was previously sent for each historical query and specifying a sub-portion of data records that overlap with such historical query's specified data range. Partitioning schemes for the current data records in the 2D space are generated. An optimum partitioning scheme having a lowest cost is selected based on costs of executing the historical queries with respect to each of the partitioning schemes. The optimum partitioning scheme is applied on the current data records, including newly received data records, in the 2D space so that any subsequently received queries are applied against the current data records as partitioned by the optimum partitioning scheme in the 2D space.
    Type: Grant
    Filed: June 18, 2014
    Date of Patent: December 2, 2014
    Assignee: Turn Inc.
    Inventors: Ahmed Moustafa Hussein Aly, Hazem Elmeleegy, Yan Qi
  • Publication number: 20140279074
    Abstract: A data management apparatus for digital advertising includes a data integration processor for collecting and storing data from providers, resolving heterogeneity of the data at schema and data levels, and performing validity checks of the data; an analytics processor for receiving validated data from the data integration processor and providing to users custom, nesting-aware, SQL-like query language and a library of data mining methods, machine learning models, and analytical user profiles (AUP); and an activation processor for encapsulating complex computations performed in real-time, segment evaluation, and online user classification using runtime user profiles (RUP).
    Type: Application
    Filed: June 21, 2013
    Publication date: September 18, 2014
    Inventors: Songting CHEN, Ali DASDAN, Hazem ELMELEEGY, Santanu KOLAY, Yinan LI, Yan QI, Peter WILMOT, Mingxi WU
  • Publication number: 20140281990
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for controlling security systems. One of the methods includes receiving, at a mobile device, an input to present camera video content; presenting, in a user interface, a first array of video content, wherein the respective video content is associated with a first security system location; receiving a user input to present a second array of video content, wherein the respective video content is associated with a second security system location, and wherein the user input comprises a touch input; and presenting, in the user interface, the second array of video content.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Oplink Communications, Inc.
    Inventors: Keqin Gu, Yan Qi, Tsungyen Chen
  • Publication number: 20140281478
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for configuring secure wireless networks. One of the methods includes receiving, at a security system management device, protocol and key information for establishing a connection as a client device to the wireless IP device, wherein the protocol and key information is received in response to a user transmitting an identifier for the IP device to a service provider system; establishing communication with the wireless IP device, wherein the wireless IP device is acting as an access point device; exchanging keys with the wireless IP device; rebooting the security system management device to become an access point for the secure wireless network; and establishing communication with the wireless IP device, wherein the wireless IP device has become a wireless client.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Oplink Communications, Inc.
    Inventors: Longgang Huang, Keqin Gu, Tsungyen Chen, Yan Qi
  • Publication number: 20140222871
    Abstract: Techniques for data assignment from an external distributed file system (DFS) to a database management system (DBMS) are provided. Data blocks from the DFS are represented as first nodes and access module processors of the DBMS are represented as second nodes. A graph is produced with the first and second nodes. Assignments are made for the first nodes to the second nodes based on evaluation of the graph to integrate the DFS with the DBMS.
    Type: Application
    Filed: March 18, 2014
    Publication date: August 7, 2014
    Applicant: Teradata US, Inc.
    Inventors: Yan Qi, Yu Xu, Olli Pekka Kostamaa, Jian Wen
  • Patent number: 8799590
    Abstract: A system enabling Transactional Memory with overflow prediction mechanism, comprising: prediction unit for predicting the mode for the next execution of a transaction based on the final status of the previous execution of the transaction; execution unit for executing the transaction in the execution mode predicted by the prediction unit, wherein the execution mode comprises overflow mode and non-overflow made. According to this invention, before a transaction is executed, it is predicted whether or not the transaction will overflow, and therefore, the execution of the transaction which is necessary to determine whether or not an overflow will occur is saved.
    Type: Grant
    Filed: May 8, 2009
    Date of Patent: August 5, 2014
    Assignee: International Business Machines Corporation
    Inventors: Hua Yong Wang, Charles Brian Hall, Yan Qi Wang, Zhi Yong Liang, Xiao Wei Shen