Patents by Inventor Yang Cao

Yang Cao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180132145
    Abstract: Systems and methods for performing handover coordination between base stations are disclosed. In a first embodiment, a method is disclosed, comprising: receiving, at a base station, a first serving cell signal measurement and a first neighbor cell signal measurement from a particular user equipment (UE); sending an adjustment message, from the base station to the UE, containing a cell-specific offset of the serving cell and a cell-specific offset of the neighbor cell in a reporting threshold based on at least one handover adjustment factor received from a coordinating node; receiving, at the base station and subsequent to adjusting the cell-specific offsets, a second serving cell signal measurement and a second neighbor cell signal measurement; and deciding whether to trigger a handover event based on the first and the second serving cell signal measurement and the first and the second neighbor cell signal measurement and the cell-specific offsets.
    Type: Application
    Filed: November 10, 2017
    Publication date: May 10, 2018
    Inventors: Yang Cao, Zeev Lubenski, Kaitki Agarwal, Prashanth Rao, Rahul Atri
  • Publication number: 20180093992
    Abstract: A process for preparing a compound of structural Formula Ia: comprising Boc deprotection with TFA of: ?and reductive amination of:
    Type: Application
    Filed: December 5, 2017
    Publication date: April 5, 2018
    Inventors: John Y. L. Chung, Feng Peng, Yonggang Chen, Amude Mahmoud Kassim, Cheng-yi Chen, Mathew Maust, Mark McLaughlin, Michael J. Zacuto, Qinghao Chen, Lushi Tan, Zhiguo Jake Song, Yang Cao, Feng Xu
  • Patent number: 9923705
    Abstract: Systems and methods relating to full duplex mesh networks are disclosed. In one embodiment, a mesh network comprising a plurality of transceiver nodes using a single frequency band may be disclosed, each transceiver node comprising: a first transceiver for transmitting and receiving to and from a backhaul node on the single frequency band; and a second transceiver for transmitting and receiving to and from an access node on the single frequency band, each transceiver of each transceiver node performing self-interference cancellation to send and receive full duplex data on the single frequency band at substantially the same time, thereby enabling the creation of a mesh network with at least one transceiver node having both access and backhaul using only the single frequency band.
    Type: Grant
    Filed: October 6, 2015
    Date of Patent: March 20, 2018
    Assignee: Parallel Wireless, Inc.
    Inventors: Rajesh Kumar Mishra, Steven Paul Papa, Yang Cao
  • Publication number: 20180063753
    Abstract: The use of wireless backhaul poses special challenges for in-vehicle base stations. Users that are connected to an in-vehicle base station expect continuous service, even as the in-vehicle base station passes in and out of different wireless backhaul coverage zones, such as when a train passes from a train station with good coverage to a tunnel with poor coverage. The base station thus needs seamless backhaul handover. A system that enables an in-vehicle base station to receive continuous service across different backhaul coverage zones is needed. To solve this problem, a system enabling handover is described. The system involves double-tunneling mobile device data packets in an ESP-UDP IPsec tunnel encapsulated in a GTP-U tunnel. Traffic is transmitted from a mobile device to a specially configured base station that encapsulates mobile device data packets and sends them to the network via wireless backhaul using an LTE UE modem connection.
    Type: Application
    Filed: August 24, 2017
    Publication date: March 1, 2018
    Inventors: Yang Cao, Jitender Arora
  • Publication number: 20180041934
    Abstract: A method for localizing a voice call is disclosed, comprising: receiving an originating leg setup message for an originating leg bearer from the first base station for a first user equipment (UE); creating a first call correlation identifier and storing the first call correlation identifier in association with the first UE; extracting a second call correlation identifier from a terminating leg setup message for a terminating leg bearer received from the core network; determining a real time protocol (RTP) localization status for the originating leg bearer and the terminating leg bearer based on matching the second call correlation identifier of the terminating leg against the stored first call correlation identifier of the originating leg; and sending transport layer assignment messages to the first base station to redirect RTP packets from the first UE to the second UE via the terminating leg bearer without the RTP packets transiting the core network.
    Type: Application
    Filed: September 22, 2017
    Publication date: February 8, 2018
    Inventors: Kaitki Agarwal, Jitender Arora, Rajesh Kumar Mishra, Babu Rajagopal, Praveen Kumar, Yang Cao
  • Publication number: 20180020337
    Abstract: Systems and methods are disclosed for permitting higher transmit power at a mobile device. In one embodiment, a method is disclosed, comprising: receiving, at a base station, an emergency request from a mobile device; sending, from the base station to a neighboring base station, a high power reservation message to reserve one or more radio resource blocks at the neighboring base station for non-use; and sending, from the base station to the mobile device, a resource allocation including the one or more radio resource blocks and a power control message requesting high transmit power.
    Type: Application
    Filed: September 26, 2017
    Publication date: January 18, 2018
    Inventors: Steven Paul Papa, Rajesh Kumar Mishra, Yang Cao
  • Patent number: 9862725
    Abstract: A process for preparing a compound of structural Formula Ia: comprising Boc deprotection with TFA of, reductive amination of:
    Type: Grant
    Filed: July 16, 2015
    Date of Patent: January 9, 2018
    Assignee: Merck Sharp & Dohme Corp.
    Inventors: John Y. L. Chung, Feng Peng, Yonggang Chen, Amude Mahmoud Kassim, Cheng-yi Chen, Mathew Maust, Mark McLaughlin, Michael J. Zacuto, Qinghao Chen, Lushi Tan, Zhiguo Jake Song, Yang Cao, Feng Xu
  • Publication number: 20180006954
    Abstract: A system is disclosed for providing configurable flow management, comprising: a first base station coupled to a user device and with an established control connection with the user device; and a coordinating node coupled to the first base station and coupled to a core network, thereby providing a gateway for the first base station and the user device to the core network, the core network further comprising a policy and charging rules function (PCRF) node with a database of policy rules, wherein the coordinating node is configured to retrieve policy rules from the PCRF node, to enable enforcement of retrieved policy rules on flows from the user device passing through the coordinating node, and to transmit policy rules to the first base station for enforcement at the first base station.
    Type: Application
    Filed: June 30, 2017
    Publication date: January 4, 2018
    Inventors: Jitender Arora, Yang Cao, Zeev Lubenski
  • Publication number: 20170359436
    Abstract: A method for replacing, refreshing, and managing content in a communication network is provided. The method defines an object policy mechanism that applies media replacement policy rules to defined classes of stored content objects. The object policy mechanism may classify stored content objects into object groups or policy targets. The object policy mechanism may also define metric thresholds and event triggers as policy conditions. The object policy mechanism may further apply replacement policy algorithms or defined policy actions against a class of stored content objects. The media replacement policy rules are enforced at edge content storage repositories in the communication network. A computing device for carrying out the method, and a method for creating, reading, updating, and deleting policy elements and managing policy engine operations, are also provided.
    Type: Application
    Filed: August 28, 2017
    Publication date: December 14, 2017
    Inventors: Yang CAO, Michael NICOLAZZO, William M. TURNER, Talbot HACK, Moshe SUBERRI
  • Publication number: 20170347307
    Abstract: A method for utilizing quality of service information in a network with tunneled backhaul is disclosed, comprising: establishing a backhaul bearer at a base station with a first core network, the backhaul bearer established by a backhaul user equipment (UE) at the base station, the backhaul bearer having a single priority parameter, the backhaul bearer terminating at a first packet data network gateway in the first core network; establishing an encrypted internet protocol (IP) tunnel between the base station and a coordinating gateway in communication with the first core network and a second core network; facilitating, for at least one UE attached at the base station, establishment of a plurality of UE data bearers encapsulated in the secure IP tunnel, each with their own QCI; and transmitting prioritized data of the plurality of UE data bearers via the backhaul bearer and the coordinating gateway to the second core network.
    Type: Application
    Filed: May 26, 2017
    Publication date: November 30, 2017
    Inventors: Pratik Vinod Mehta, Yang Cao, Sumit Garg, Kaitki Agarwal, Rajesh Kumar Mishra
  • Publication number: 20170314950
    Abstract: The disclosure is directed to improving driving experience by determining and providing a personalized estimated time of arrival (ETA). For example, using at least one computing device, driving data associated with a user may be collected and stored in memory. The at least one computing device may also be used to receive ETA-related data including one or more real time ETA estimations, perform analysis on one or more of the driving data and the ETA-related data so as to determine a set of personalized parameters of a mapping function that correspond to a training set. The at least one computing device may also be used to determine the personalized ETA based at least in part on the determined set of personalized parameters and provided to the user.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Jilei TIAN, Kasthuri Rengan NALLAPPA SOUNDARARAJAN, Yang CAO, Xiaogang YANG, Alvin CHIN, Clint WOKER
  • Publication number: 20170308620
    Abstract: A processor executes instructions stored in non-transitory memory storage to receive a pattern query for a graph and determine a set of access constraints corresponding to the pattern query. A determination is made whether the pattern query is effectively bounded under the set of access constraints. A query plan is formed to retrieve a subgraph of the graph when the pattern query is effectively bounded under the set of access constraints. The answer to the pattern query is obtained by accessing the at least one subgraph in response to the query plan.
    Type: Application
    Filed: April 21, 2016
    Publication date: October 26, 2017
    Applicant: Futurewei Technologies, Inc.
    Inventors: Yang Cao, Wenfei Fan, Jinpeng Huai
  • Publication number: 20170277789
    Abstract: A method for filtering out nodes associated with hierarchical data structures is provided. The method may include generating node controllers on the hierarchical data structures. The method may include determining whether user actions are received on a first node controller, a second node controller, and a third node controller associated with the generated plurality of node controllers. The method may include filtering node levels associated with hierarchical data structures, and presenting the hierarchical data structures without the filtered out node levels. The method may include filtering out sibling nodes associated with the hierarchical data structures, and presenting the hierarchical data structures without the filtered out sibling nodes. The may further include reverse-collapsing first node levels and filtering out second node levels based on the reverse-collapsed first node levels, and presenting the hierarchical data structures without the filtered out second node levels.
    Type: Application
    Filed: March 22, 2016
    Publication date: September 28, 2017
    Inventors: Yang Cao, He Jiang Jia, Xiao Zhen Zhu
  • Publication number: 20170277750
    Abstract: A processor executes instructions stored in non-transitory memory to determine whether a query to big data is bounded evaluable, or may be rewritten to access a bounded amount of data or information in a dataset. A query plan may retrieve the information by using indices in access constraints of the query. The cost associated with obtaining the information by using the query plan may be dependent on the query and access constraints and not the size of the dataset. A query plan to obtain the information may be formed for different types or classes of queries, such as conjunctive queries (CQ), unions of conjunctive queries (UCQ) and positive existential FO (first order) conjunctive queries (?FO+). When a query is not bounded evaluable, a determination is made whether an approximation to the information may be retrieved. An approximation may be obtained by using upper and lower envelopes or specialized queries.
    Type: Application
    Filed: March 28, 2016
    Publication date: September 28, 2017
    Applicant: Futurewei Technologies, Inc.
    Inventors: Wenfei Fan, Yang Cao, Floris Geerts, Ting Deng, Ping Lu
  • Publication number: 20170277797
    Abstract: A method for filtering out nodes associated with hierarchical data structures is provided. The method may include generating node controllers on the hierarchical data structures. The method may include determining whether user actions are received on a first node controller, a second node controller, and a third node controller associated with the generated plurality of node controllers. The method may include filtering node levels associated with hierarchical data structures, and presenting the hierarchical data structures without the filtered out node levels. The method may include filtering out sibling nodes associated with the hierarchical data structures, and presenting the hierarchical data structures without the filtered out sibling nodes. The may further include reverse-collapsing first node levels and filtering out second node levels based on the reverse-collapsed first node levels, and presenting the hierarchical data structures without the filtered out second node levels.
    Type: Application
    Filed: June 27, 2016
    Publication date: September 28, 2017
    Inventors: Yang Cao, He Jiang Jia, Xiao Zhen Zhu
  • Patent number: 9775017
    Abstract: Systems and methods are disclosed for permitting higher transmit power at a mobile device. In one embodiment, a method is disclosed, comprising: receiving, at a base station, an emergency request from a mobile device; sending, from the base station to a neighboring base station, a high power reservation message to reserve one or more radio resource blocks at the neighboring base station for non-use; and sending, from the base station to the mobile device, a resource allocation including the one or more radio resource blocks and a power control message requesting high transmit power.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: September 26, 2017
    Assignee: Parallel Wireless, Inc.
    Inventors: Steven Paul Papa, Rajesh Kumar Mishra, Yang Cao
  • Publication number: 20170272330
    Abstract: A method for topology hiding is disclosed, comprising: receiving, at a gateway, the gateway positioned between a core network and a radio access network, a configuration information request from a base station; analyzing, at the gateway, a topology of the radio access network, the radio access network including the base station; grouping, at the gateway, the base station into a first group based on the topology; sending, from the gateway to the base station, a grouping message to indicate that the base station be placed in the first group; and terminating connections from the core network to one or more base stations in the first group at the gateway as a back-to-back proxy, thereby hiding the topology of the radio access network from the core network.
    Type: Application
    Filed: March 27, 2017
    Publication date: September 21, 2017
    Inventors: Yang Cao, Zeev Lubenski, Kaitki Agarwal, Prashanth Rao, Rahul Atri
  • Publication number: 20170273134
    Abstract: Systems and methods are disclosed for a 3G gateway. In one embodiment, a system is disclosed, comprising a gateway situated between a 3G radio access network (RAN) and a core network, the gateway providing resource management for a nodeB, and providing routing and node management for another base station, wherein the base station may be configured to provide, as a virtual RNC, radio resource control, power control, ciphering, and multiplexing of multiple users onto a transmission path for a first mobile device attached to the nodeB; the gateway may be configured to relay traffic for a second mobile device attached to the base station; and the gateway may be configured to relay traffic to the core network from both the nodeB and the base station via an IuCS interface and an IuPS interface.
    Type: Application
    Filed: March 20, 2017
    Publication date: September 21, 2017
    Inventors: Yang Cao, Zeev Lubenski, Kaitki Agarwal, Prashanth Rao, Rahul Atri
  • Patent number: 9769277
    Abstract: A method for replacing, refreshing, and managing content in a communication network is provided. The method defines an object policy mechanism that applies media replacement policy rules to defined classes of stored content objects. The object policy mechanism may classify stored content objects into object groups or policy targets. The object policy mechanism may also define metric thresholds and event triggers as policy conditions. The object policy mechanism may further apply replacement policy algorithms or defined policy actions against a class of stored content objects. The media replacement policy rules are enforced at edge content storage repositories in the communication network. A computing device for carrying out the method, and a method for creating, reading, updating, and deleting policy elements and managing policy engine operations, are also provided.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: September 19, 2017
    Assignee: Citrix Systems, Inc.
    Inventors: Yang Cao, Michael Nicolazzo, William M. Turner, Talbot Hack, Moshe Suberri
  • Publication number: 20170238551
    Abstract: The present invention relates to herbal compositions and method for preparing thereof. The herbal composition is derived from pulverizing at least two herbal materials selected from a group of herbal materials consisting of Panax ginseng, Glycyrrhiza uralensis, Agrimonia pilosa, Gynostemma pentaphyllum, asparagus, and mushroom. The pulverized herbal materials are combined to obtain a mixed herbal powder which is then extracted with a solvent to obtain a concentrated herbal extract, wherein the concentrated herbal extract is dried to obtain a dry powder of the herbal compositions.
    Type: Application
    Filed: January 16, 2017
    Publication date: August 24, 2017
    Applicant: Yunnan Panlong Yunhai Pharmaceutical Co. Ltd
    Inventors: Yang Cao, Li Hua Zeng