Patents by Inventor Yue Tian

Yue Tian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100096711
    Abstract: An MEMS microphone package includes a substrate, a cover, a plurality of conductive members, and an insulative adhesive. The cover is mounted to the substrate. The conductive members are disposed between the substrate and the cover. Each of the conductive members can be a golden wire, a conductive bump, or a conductive metal. Upper ends of the conductive members are connected with the cover and the lower ends of the conductive members are connected with the substrate to enable a conductive loop. The insulative adhesive encapsulates the conductive members. In this way, the substrate, the conductive members, and the cover jointly construct a shielding against EMI.
    Type: Application
    Filed: November 24, 2008
    Publication date: April 22, 2010
    Applicant: LINGSEN PRECISION INDUSTRIES, LTD.
    Inventor: Jyong-Yue TIAN
  • Publication number: 20070134661
    Abstract: This invention relates generally to the field of nucleic acid analysis. In particular, the invention provides a method for typing a target gene, using, inter alia, a chip comprising a support suitable for use in nucleic acid hybridization having immobilized thereon an oligonucleotide probe complementary to said target nucleotide sequence and at least one of the following oligonucleotide control probes: a positive control probe, a negative control probe, a hybridization control probe and an immobilization control probe. Oligonucleotide probes or probes arrays for typing a HLA target gene are also provided.
    Type: Application
    Filed: July 18, 2003
    Publication date: June 14, 2007
    Inventors: Huafang Gao, Xuemei Ma, Chi Zhang, Qian Chen, Dong Wang, Yizhe Zhang, Yue Tian, Rui Zhang, Gengxin Lan, Yuxiang Zhou, Jing Cheng
  • Publication number: 20060117178
    Abstract: An access right to a protected folder 31 is acquired, and when writing designated data contained in the protected folder 31 into a clipboard 22 provided within a main storage device 20, the data is encrypted by using an encryption key associated with the protected folder 31 and the encrypted data is written into the clipboard 22, while when pasting the encrypted data held in the clipboard 22 into a file stored within an auxiliary storage device 30, the encrypted data is decrypted and the decrypted data is pasted into the file. In this way, while retaining the convenience offered by the clipboard, it becomes possible to prevent the protected data from being taken outside the computer system via the clipboard.
    Type: Application
    Filed: February 14, 2005
    Publication date: June 1, 2006
    Applicant: FUJITSU LIMITED
    Inventors: Yuji Miyamoto, Mikito Hikita, Sijun Zhou, Yue Tian
  • Publication number: 20060074855
    Abstract: An apparatus for obtaining a write log when a file in a computer is written to a recording medium, includes an event detecting means for detecting an event of a file access, a reading means for reading file information by detecting that the file access is a read access to the file in the time from an open access to a close access when the event detecting means detects an event and a log obtaining means for outputting the file information read by the reading means to a memory area as a log when the file access is determined as a close access when the event detecting means detects an event. The apparatus for obtaining a write log prevents information in the computer from being written freely and directly to an external recording medium, not via an OS but via an original driver such as writing software, whereby information leakage can be managed.
    Type: Application
    Filed: December 22, 2004
    Publication date: April 6, 2006
    Applicant: Fujitsu Limited
    Inventors: Yuji Miyamoto, Mikito Hikita, Sijun Zhou, Yue Tian
  • Publication number: 20060070052
    Abstract: A management method for a computer system for simply and more reliably preventing an unauthorized use of an application has been disclosed. The management method of a computer system, which comprises hardware, an O/S, a DLL storing a plurality of DLL files, and a plurality of application programs that use the DLL files, prevents an unauthorized use of an application, the use of which is prohibited for some users. A set of prohibited DLL files required for identifying a prohibited application is determined, the set of the prohibited DLL files is stored in correlation with use conditions, use conditions are detected when the activation of an application program is requested, set of the DLL files to be used by the application program is detected, whether the detected set of the DLL files includes the set of the prohibited DLL files in correlation with the detected use conditions, and the application program is terminated when the set of the prohibited DLL files is judged to be included.
    Type: Application
    Filed: December 21, 2004
    Publication date: March 30, 2006
    Applicant: FUJITSU LIMITED
    Inventors: Yuji Miyamoto, Mikito Hikita, Sijun Zhou, Yue Tian
  • Publication number: 20050216466
    Abstract: Based on user permission information read from a write-protected portable medium, it is determined whether an application is permitted to use a resource. If the application is permitted to use the resource, the write protection of the portable medium is released, usage log information is written into the medium.
    Type: Application
    Filed: July 21, 2004
    Publication date: September 29, 2005
    Applicant: Fujitsu Limited
    Inventors: Yuji Miyamoto, Yusuke Yamanaka, Yue Tian, Takaoki Sasaki, Mikito Hikita
  • Publication number: 20050086447
    Abstract: A program to block information leaks via access control with a simple process. When a user logs in, a security apparatus retrieves access right information for this user from an access right information file and creates a use restriction table for the user. The use restriction table indicates use restrictions on each resource. The apparatus watches and acquires an access request for a resource from an operating system before operating the resource. When acquiring an access request, the apparatus extracts use restriction information on the resource specified by the access request from the use restriction table and restricts the use of the resource according to the use restriction information.
    Type: Application
    Filed: March 5, 2004
    Publication date: April 21, 2005
    Applicant: Fujitsu Limited
    Inventors: Yuji Miyamoto, Yusuke Yamanaka, Yue Tian, Takaoki Sasaki