Patents by Inventor Zheling Yang
Zheling Yang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240122200Abstract: Provided is a functional edible oil (FEO), a preparation method therefor and use thereof. The FEO is prepared by ternary transesterification of medium-chain triglycerides (MCTs), oils rich in linoleic acid, and oils rich in linolenic acid. The fatty acid composition and distribution of the FEO were determined and optimized via comparative analysis of indexes such as melting point, and effect of improving glucose and lipid metabolism as determined by animal tests. The FEO has a mass ratio of 2.3 to 4.0 for medium chain fatty acids (MCFAs) in MCTs to long chain fatty acids (LCFAs) in the oils rich in linoleic acid, and oils rich in linolenic acid and a mass ratio of 0.5 to 1.0 for linoleic acid to linolenic acid in the LCFAs, by mass of fatty acids. The FEO is added to food products at ?18.00%.Type: ApplicationFiled: October 14, 2021Publication date: April 18, 2024Inventors: Zheling ZENG, Guibing ZENG, Zhen OUYANG, Bo YANG, Ping YU, Jiaheng XIA, Maomao MA, Dongman WAN, Miao LUO, Cheng ZENG, Xuefang WEN
-
Publication number: 20240081360Abstract: Disclosed is a base oil for functional food oils and fats, a preparation method therefor and the use thereof. The base oil for functional food oils and fats is formed through ternary transesterification on medium-chain triglycerides, high-melting-point fat and oils rich in linolenic acid. The base oil for functional food oils and fats has a wide melting range, can significantly improve the glucose and lipid metabolism disorder, balance the essential and functional fatty acids in the body, and quickly replenish energy. Animal experiments were conducted and the fatty acid composition and distribution of the base oil were optimized and determined through comparative analysis based on evaluation indicators such as the improved effect in glucose and lipid metabolism and melting point.Type: ApplicationFiled: December 31, 2021Publication date: March 14, 2024Applicant: Nanchang UniversityInventors: Zheling Zeng, Guibing Zeng, Zhen Ouyang, Bo Yang, Ping Yu, Jiaheng Xia, Maomao Ma, Dongman Wan, Miao Luo, Cheng Zeng, Xuefang Wen
-
Patent number: 10708193Abstract: A device may comprise security processing units (SPUs) including a SPU to receive a session request. The SPU may identify global counter information and update counter information. The global counter information may include a global counter identifier and a global counter value. The update counter information may include an update counter identifier and an update counter value. The SPU may identify a global limit associated with the global counter, may determine that the global limit has not been met, and may cause the session to be created. The SPU may create a modified global counter value. The SPU may create a modified update counter value. The SPU may determine that a local update message is required based on the modified update counter value, and may provide the local update message to another SPU. The local update message may include the global counter identifier and the modified global counter value.Type: GrantFiled: July 20, 2018Date of Patent: July 7, 2020Assignee: Juniper Networks, Inc.Inventors: Xiao Ping Zhu, Huaxiang Yin, Zheling Yang, Chao Chen
-
Patent number: 10171436Abstract: A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious source, and creates, based on the packet, an entry in a data structure associated with the SPU. The entry includes information associated with the packet. The SPU provides an install message to a next SPU in the logical ring. The install message instructs the next SPU to create the entry in another data structure, and forward the install message to another SPU. The SPU receives the install message from a last SPU, and sets a state of the entry to active in the data structure based on receiving the install message from the last SPU. The SPU performs a particular action on another packet, associated with the malicious source, based on the setting the state of the entry to active.Type: GrantFiled: June 12, 2017Date of Patent: January 1, 2019Assignee: Juniper Networks, Inc.Inventors: Chao Chen, Xiao Ping Zhu, Huaxiang Yin, Zheling Yang
-
Publication number: 20180331934Abstract: A device may comprise security processing units (SPUs) including a SPU to receive a session request. The SPU may identify global counter information and update counter information. The global counter information may include a global counter identifier and a global counter value. The update counter information may include an update counter identifier and an update counter value. The SPU may identify a global limit associated with the global counter, may determine that the global limit has not been met, and may cause the session to be created. The SPU may create a modified global counter value. The SPU may create a modified update counter value. The SPU may determine that a local update message is required based on the modified update counter value, and may provide the local update message to another SPU. The local update message may include the global counter identifier and the modified global counter value.Type: ApplicationFiled: July 20, 2018Publication date: November 15, 2018Inventors: Xiao Ping ZHU, Huaxiang YIN, Zheling YANG, Chao CHEN
-
Patent number: 10033616Abstract: A device may comprise security processing units (SPUs) including a SPU to receive a session request. The SPU may identify global counter information and update counter information. The global counter information may include a global counter identifier and a global counter value. The update counter information may include an update counter identifier and an update counter value. The SPU may identify a global limit associated with the global counter, may determine that the global limit has not been met, and may cause the session to be created. The SPU may create a modified global counter value. The SPU may create a modified update counter value. The SPU may determine that a local update message is required based on the modified update counter value, and may provide the local update message to another SPU. The local update message may include the global counter identifier and the modified global counter value.Type: GrantFiled: March 27, 2014Date of Patent: July 24, 2018Assignee: Juniper Networks, Inc.Inventors: Xiao Ping Zhu, Huaxiang Yin, Zheling Yang, Chao Chen
-
Publication number: 20170346796Abstract: A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious source, and creates, based on the packet, an entry in a data structure associated with the SPU. The entry includes information associated with the packet. The SPU provides an install message to a next SPU in the logical ring. The install message instructs the next SPU to create the entry in another data structure, and forward the install message to another SPU. The SPU receives the install message from a last SPU, and sets a state of the entry to active in the data structure based on receiving the install message from the last SPU. The SPU performs a particular action on another packet, associated with the malicious source, based on the setting the state of the entry to active.Type: ApplicationFiled: June 12, 2017Publication date: November 30, 2017Inventors: Chao CHEN, Xiao Ping ZHU, Huaxiang YIN, Zheling YANG
-
Patent number: 9680804Abstract: A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious source, and creates, based on the packet, an entry in a data structure associated with the SPU. The entry includes information associated with the packet. The SPU provides an install message to a next SPU in the logical ring. The install message instructs the next SPU to create the entry in another data structure, and forward the install message to another SPU. The SPU receives the install message from a last SPU, and sets a state of the entry to active in the data structure based on receiving the install message from the last SPU. The SPU performs a particular action on another packet, associated with the malicious source, based on the setting the state of the entry to active.Type: GrantFiled: May 22, 2015Date of Patent: June 13, 2017Assignee: Juniper Networks, Inc.Inventors: Chao Chen, Xiao Ping Zhu, Huaxiang Yin, Zheling Yang
-
Publication number: 20150256523Abstract: A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious source, and creates, based on the packet, an entry in a data structure associated with the SPU. The entry includes information associated with the packet. The SPU provides an install message to a next SPU in the logical ring. The install message instructs the next SPU to create the entry in another data structure, and forward the install message to another SPU. The SPU receives the install message from a last SPU, and sets a state of the entry to active in the data structure based on receiving the install message from the last SPU. The SPU performs a particular action on another packet, associated with the malicious source, based on the setting the state of the entry to active.Type: ApplicationFiled: May 22, 2015Publication date: September 10, 2015Inventors: Chao CHEN, Xiao Ping Zhu, Huaxiang Yin, Zheling Yang
-
Patent number: 9043911Abstract: A device includes a security process unit (SPU) associated with a logical ring of SPUs. The SPU receives a packet with an address associated with a malicious source, and creates, based on the packet, an entry in a data structure associated with the SPU. The entry includes information associated with the packet. The SPU provides an install message to a next SPU in the logical ring. The install message instructs the next SPU to create the entry in another data structure, and forward the install message to another SPU. The SPU receives the install message from a last SPU, and sets a state of the entry to active in the data structure based on receiving the install message from the last SPU. The SPU performs a particular action on another packet, associated with the malicious source, based on the setting the state of the entry to active.Type: GrantFiled: January 3, 2014Date of Patent: May 26, 2015Assignee: Juniper Networks, Inc.Inventors: Chao Chen, Xiao Ping Zhu, Huaxiang Yin, Zheling Yang