Patents by Inventor Yidong Zhu

Yidong Zhu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240143269
    Abstract: Disclosed are an audio synchronous circuit and an audio synchronous method. The audio synchronous circuit receives at least one beacon packet to generate WiFi time synchronization function (TSF) data, compares the WiFi TSF data with I2S TSF data according to a synchronous control signal to obtain a frequency offset, and compensates a digital audio clock according to the frequency offset. Thus, the audio synchronous circuit can adjust a frequency of the digital audio clock according to the frequency offset to complete synchronization with a transmitter, to avoid unpredictable delays caused by software processing and wireless channel competition, and achieve the purpose of more accurate time synchronization.
    Type: Application
    Filed: June 14, 2023
    Publication date: May 2, 2024
    Inventors: ZhaoMing LI, YiDong HE, TianYi ZHU
  • Patent number: 10586590
    Abstract: A circuit, where a first end of a resistive random access memory (RRAM) included in the circuit includes a first end of the circuit, and a second end of the RRAM is coupled to a first end of a first switch and a first end of a second switch, a second end of the first switch includes a second end of the circuit, and a first control end of the first switch and a second control end of the second switch are configured to make the first switch closed and the second switch open at the same time. Therefore, a working status of the RRAM is flexibly controlled.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: March 10, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yide Zhang, Zhigang Zeng, Yidong Zhu, Mingfu Cao, Junfeng Zhao
  • Patent number: 10053477
    Abstract: Disclosed is a spirocyclic aryl phosphorus oxide or sulfide as an ALK inhibitor, particularly, a compound represented by formula (I) as an ALK inhibitor or pharmaceutically acceptable salt thereof.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: August 21, 2018
    Assignee: QILU PHARMACEUTICAL CO., LTD.
    Inventors: Zhaozhong Ding, Minghui Zhang, Shuhui Chen, Xile Liu, Yidong Zhu, Chuanwen Fan, Baoping Zhao, Long Zhang, Yingying Yang, Qingmei Zheng, Shansong Zheng, Haiwen Wan, Jinqing Hu
  • Publication number: 20180082738
    Abstract: A circuit, where a first end of a resistive random access memory (RRAM) included in the circuit includes a first end of the circuit, and a second end of the RRAM is coupled to a first end of a first switch and a first end of a second switch, a second end of the first switch includes a second end of the circuit, and a first control end of the first switch and a second control end of the second switch are configured to make the first switch closed and the second switch open at the same time. Therefore, a working status of the RRAM is flexibly controlled.
    Type: Application
    Filed: November 27, 2017
    Publication date: March 22, 2018
    Inventors: Yide Zhang, Zhigang Zeng, Yidong Zhu, Mingfu Cao, Junfeng Zhao
  • Publication number: 20170129909
    Abstract: Disclosed is a spirocyclic aryl phosphorus oxide or sulfide as an ALK inhibitor, particularly, a compound represented by formula (I) as an ALK inhibitor or pharmaceutically acceptable salt thereof.
    Type: Application
    Filed: June 29, 2015
    Publication date: May 11, 2017
    Applicant: QUILU PHARMACEUTICAL CO., LTD.
    Inventors: Zhaozhong DING, Minghui ZHANG, Shuhui CHEN, Xile LIU, Yidong ZHU, Chuanwen FAN, Baoping ZHAO, Long ZHANG, Yingying YANG, Qingmei ZHENG, Shansong ZHENG, Haiwen WAN, Jinqing HU
  • Patent number: 9203858
    Abstract: According to one embodiment of the invention, a method for generating an advisory message for an endpoint device includes determining a threat level for the endpoint device by identifying a connection type between the endpoint device and the wireless network. The method also includes determining a second threat level for the endpoint device by identifying a security policy of the endpoint device. The method further includes generating an advisory message for the endpoint device based on the threat levels. The advisory message indicates vulnerability of the endpoint device.
    Type: Grant
    Filed: August 22, 2006
    Date of Patent: December 1, 2015
    Assignee: CA, Inc.
    Inventors: Rohit Shankar, Sumit B. Deshpande, Ravi R. Pore, Srinivas Gudipudi, Abhilash V. Purushothaman, Yidong Zhu, Theodore Short
  • Patent number: 8266681
    Abstract: A method for providing access to one or more resources in a computer network, establishing a connection between a user and the computer network via at least one wireless access point, generating an authentication level for the user associated with accessing the one or more resources, sending a program to the client device, receiving authentication data from the user, and changing the authorization level of the user based upon the authentication data received from the user.
    Type: Grant
    Filed: August 29, 2006
    Date of Patent: September 11, 2012
    Assignee: CA, Inc.
    Inventors: Sumit B. Deshpande, Srinivas Gudipudi, Muralidhar S. Swarangi, Ravi R. Pore, Rohit Shankar, Theodore R. Short, Yidong Zhu
  • Publication number: 20100130740
    Abstract: The invention provides a more handy and environment friendly process for preparing risperidone, which comprises reacting 6-fluoro-3-(4-piperidinyl)-1,2-benzisoxazole hydrochloride with 3-(2-chloroethyl)-2-methyl-6,7,8,9-tetrahydro-4H-pyrido[1,2-a]pyrimidin-4-one in a basic aqueous solution or suspension. The concentration of alkaline metal carbonates in the basic aqueous solution or suspension is ranged from 15% to 40%. The reaction is carried out at a temperature range of 101-140° C. and the reaction is completed within 10 minutes to 2 hours.
    Type: Application
    Filed: July 25, 2008
    Publication date: May 27, 2010
    Inventors: Guiling Zhang, Yidong Zhu, Chuanwen Fan, Minghui Zhang, Jingyi Wang
  • Publication number: 20080060061
    Abstract: A method for providing access to one or more resources in a computer network, establishing a connection between a user and the computer network via at least one wireless access point, generating an authentication level for the user associated with accessing the one or more resources, sending a program to the client device, receiving authentication data from the user, and changing the authorization level of the user based upon the authentication data received from the user.
    Type: Application
    Filed: August 29, 2006
    Publication date: March 6, 2008
    Inventors: Sumit B. Deshpande, Srinivas Gudipudi, Muralidhar S. Swarangi, Ravi R. Pore, Rohit Shankar, Theodore R. Short, Yidong Zhu
  • Publication number: 20070113080
    Abstract: According to one embodiment of the invention, a method for generating an advisory message for an endpoint device includes determining a threat level for the endpoint device by identifying a connection type between the endpoint device and the wireless network. The method also includes determining a second threat level for the endpoint device by identifying a security policy of the endpoint device. The method further includes generating an advisory message for the endpoint device based on the threat levels. The advisory message indicates vulnerability of the endpoint device.
    Type: Application
    Filed: August 22, 2006
    Publication date: May 17, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Rohit Shankar, Sumit Deshpande, Ravi Pore, Srinivas Gudipudi, Abhilash Purushothaman, Yidong Zhu, Theodore Short
  • Publication number: 20070109982
    Abstract: According to one embodiment of the invention, a method for managing ad-hoc connections in a wireless network includes receiving, at an endpoint device, a connection policy from a managing device over the wireless network. The connection policy indicates network security settings for the endpoint device. The method also includes detecting at the endpoint device an ad-hoc connection. The method further includes responding to the ad-hoc connection based on the connection policy.
    Type: Application
    Filed: August 22, 2006
    Publication date: May 17, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Srinivas Gudipudi, Rohit Shankar, Abhilash Purushothaman, Ravi Pore, Sumit Deshpande, Yidong Zhu, Theodore Short, Tuna Djemil