Patents by Inventor Zhigang Luo

Zhigang Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11964937
    Abstract: A (methyl)acrolein oxidation catalyst and a preparation method therefor-in which the catalyst has a composition represented by the following formula: x(Mo12PaCsbVcDeOf)+tC/yZ in which Mo12PaCSbVcDeOf is a heteropolyacid salt main catalyst; C is a nano carbon fiber additive, and Z is a carrier thermal conduction diluent; Mo, P, Cs, V, and O represent the elements of molybdenum, phosphorus, cesium, vanadium, and oxygen, respectively; D represents at least one element selected from the group consisting of copper, iron, magnesium, manganese, antimony, zinc, tungsten, silicon, nickel, and palladium; a, b, c, e, and f represent the atomic ratio of each element, a=0.1-3, b=0.01-3, c=0.01-5, e=0.01-2, and f being the atomic ratio of oxygen required to satisfy the valence of each of the described components; x and y represent the weights of the main catalyst and the carrier thermal conduction diluent Z, and y/x=11.1-50%; and t represents the weight of the nano carbon fiber, and t/x=3-10%.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: April 23, 2024
    Assignee: Shanghai Huayi New Material Co., Ltd.
    Inventors: Xin Wen, Ge Luo, Xinlei Jin, Tonghao Wu, Yan Zhuang, Zhigang Qian, Xiaodong Chu
  • Patent number: 11936183
    Abstract: An energy Internet system, an energy routing conversion device, and an energy control method, relating to a field of energy information. An alternating-current (AC) side energy routing conversion device of the energy Internet system includes a plurality of first route ports, and a direct-current (DC) side energy routing conversion device includes a plurality of second route ports, where each second route port is connected to a corresponding first route port by means of a corresponding DC busbar. A plurality of energy devices are connected to a DC busbar by means of corresponding first AC/DC converters or first DC converters. The AC side energy routing conversion device and the DC side energy routing conversion device collect energy information of the energy devices and adjust energy of the energy devices on a basis of energy balance constraint conditions.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: March 19, 2024
    Assignee: GREE ELECTRIC APPLIANCES, INC. OF ZHUHAI
    Inventors: Mingzhu Dong, Zhigang Zhao, Meng Huang, Xuefen Zhang, Shugong Nan, Shiyong Jiang, Meng Li, Wenqiang Tang, Peng Ren, Wu Wen, Lingjun Wang, Xiao Luo, Wenhao Wu, Jianjun Huang, Weijin Li, Yunhong Zeng, Bei Chen
  • Patent number: 11888700
    Abstract: A method for isolation in the CN domain of a network slice includes receiving a slice isolation policy and establishing a CN NSS isolation policy based on the slice isolation policy. When the CN NSS isolation policy includes a network resource isolation policy, the network resource isolation policy is mapped to a network resource allocation policy, a part of which relating to physical resources is sent to a network function management function (NFMF) and a part relating to virtual resources is sent to a network function virtualization management and orchestration function. When the NSS isolation policy includes an application level isolation policy, the application level isolation policy is mapped to an application level policy which is sent to the NFMF.
    Type: Grant
    Filed: August 3, 2020
    Date of Patent: January 30, 2024
    Assignee: Nokia Solutions and Networks Oy
    Inventors: Zhiyuan Hu, Jing Ping, Zhigang Luo, Wen Wei
  • Patent number: 11877147
    Abstract: Embodiments of the disclosure provide a method, device and computer readable medium for protecting MAC addresses. According to embodiments of the present disclosure, the terminal device may obtain a set of virtual MAC addressed from a network device and may connect with a further network device (for example, Wi-Fi AP or Bluetooth devices) using the virtual MAC addresses. In this way, tracking the terminal device with MAC address is prevented so that user privacy protection could be enhanced.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: January 16, 2024
    Assignee: Nokia Technologies Oy
    Inventors: Zhiyuan Hu, Wen Wei, Mingyu Zhao, Yueming Yin, Zhigang Luo
  • Publication number: 20230381348
    Abstract: The present disclosure relates to the technical field of chelating agents, in particular to a bifunctional macrocyclic chelate, a conjugate, a metal complex, and use thereof. The bifunctional macrocyclic chelate is a compound of following Formula I or an isomer thereof, wherein R1, R3, R5, and R7 are each independently selected from alkyls or long-chain polymer groups, R2, R4, R6, and R8 are each independently selected from functional groups, Ra, Rb, Rc, and Rd are each independently selected from any one of H, substituted or unsubstituted alkyls, halogens, substituted or unsubstituted cyano groups, substituted or unsubstituted ester groups, substituted or unsubstituted alkoxys, substituted or unsubstituted amines, and substituted or unsubstituted aryls, ring The bifunctional macrocyclic chelate can complex most nuclides, and expand use of the bifunctional macrocyclic chelate, and the metal complex chelating different nuclides can realize integration of diagnosis and treatment.
    Type: Application
    Filed: July 31, 2023
    Publication date: November 30, 2023
    Applicant: Jyams Pet Research & Development Limited
    Inventors: Jianfeng Xu, Zheng Wang, Wenbin Fan, Fei Cai, Huanhuan Yin, Zhigang Luo
  • Publication number: 20230362057
    Abstract: An example method may include receiving slice isolation policy for a network slice subnet (NSS) in a transport network (TN) domain, mapping the slice isolation policy to network resource isolation policy and traffic isolation policy, and mapping the network resource isolation policy and the traffic isolation policy to network resource allocation policy and data traffic forward policy, respectively. The network resource allocation policy and the data traffic forward policy may be applied in creation of the TN NSS.
    Type: Application
    Filed: July 15, 2020
    Publication date: November 9, 2023
    Applicant: Nokia Solutions and Networks Oy
    Inventors: Zhiyuan HU, Jing PING, Iris ADAM, Duan CHEN, Zhigang LUO
  • Publication number: 20230283525
    Abstract: A method for isolation in the CN domain of a network slice includes receiving a slice isolation policy and establishing a CN NSS isolation policy based on the slice isolation policy. When the CN NSS isolation policy includes a network resource isolation policy, the network resource isolation policy is mapped to a network resource allocation policy, a part of which relating to physical resources is sent to a network function management function (NFMF) and a part relating to virtual resources is sent to a network function virtualization management and orchestration function. When the NSS isolation policy includes an application level isolation policy, the application level isolation policy is mapped to an application level policy which is sent to the NFMF.
    Type: Application
    Filed: August 3, 2020
    Publication date: September 7, 2023
    Applicant: Nokia Solution and Networks Oy
    Inventors: Zhiyuan HU, Jing PING, Zhigang LUO, Wen WEI
  • Publication number: 20230179638
    Abstract: Methods and apparatus are disclosed for preventing network attacks in a network slice. A method may comprise: obtaining security requirements of a network slice instance; determining respective security policy to be applied to each of a plurality of constituent network slice subnet instances of the network slice instance based on the security requirements of the network slice instance; and causing each of the plurality of constituent network slice subnet instances to be provided with one ore more security function instances configured according to respective determined security policy. The method can be performed in a network slice layer.
    Type: Application
    Filed: May 6, 2020
    Publication date: June 8, 2023
    Inventors: Zhiyuan HU, Jing PING, Iris ADAM, Zhigang LUO
  • Patent number: 11616718
    Abstract: Example embodiments of the present disclosure relate to enablement of a service function chain based on a software defined network. In some embodiments, there is provided a method implemented at a service function chain controller. The method comprises creating a service function chain for a packet, the service function chain comprising a set of ordered service functions that are to process the packet; and configuring respective forwarding rules associated with the service function chain directly or indirectly to a plurality of network nodes in a software defined network, the respective forwarding rules indicating how the plurality of network nodes forward the packet to the set of ordered service functions in the service function chain. In this way, it is possible to enable the service function chain in the software defined network.
    Type: Grant
    Filed: July 11, 2018
    Date of Patent: March 28, 2023
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Zhiyuan Hu, Duan Chen, Zhigang Luo
  • Patent number: 11520930
    Abstract: A set of raw data relating to activity of one or more users in accordance with a communication network is obtained. The communication network is managed by a network operator. The obtained set of raw data is processed in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data. The first set of data is exposed to a third party, while the second set of data and the third set of data are isolated from the third party.
    Type: Grant
    Filed: September 26, 2014
    Date of Patent: December 6, 2022
    Assignee: Alcatel Lucent
    Inventors: Zhiyuan Hu, Wen Wei, Xueqiang Yan, Zhigang Luo
  • Publication number: 20220321330
    Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media of data security for network slice management. The method comprises transmitting at least one entry associated with attributes of data generated by the first device to a second device; in response to a request for accessing the data received from a third device, determining whether the third device has an authority for accessing the data based on the request; and in response to a determination that the third device has the authority for accessing the data, causing the third device to check the integrity of the data based on the attributes of the data obtained from the second device. In this way, the service consumer may detect the data tampering.
    Type: Application
    Filed: August 13, 2019
    Publication date: October 6, 2022
    Inventors: Zhiyuan HU, Yueming YIN, Zhigang LUO
  • Patent number: 11408859
    Abstract: An ultrasonic probe coupling assembly (1) and an ultrasonic probe mechanism are disclosed. The ultrasonic probe coupling assembly (1) includes a probe sleeve (11) and a solid-state coupling member (12). The probe sleeve (11) is sleeved on an ultrasonic probe (2). The solid-state coupling member (12) is fixed in the probe sleeve (11). One side of the solid-state coupling member (12) is located in the probe sleeve (11) for fitting to the ultrasonic probe (2), and the other side is protruded from the probe sleeve (11) to be in contact with the skin. The ultrasonic probe mechanism includes the ultrasonic probe coupling assembly (1) and the ultrasonic probe (2).
    Type: Grant
    Filed: May 15, 2019
    Date of Patent: August 9, 2022
    Assignee: SHENZHEN LEPUYUAN MEDICAL TECHNOLOGY CO., LTD.
    Inventors: Caifeng Wang, Zhigang Luo, Junying Ma
  • Patent number: 11349881
    Abstract: A first security service function chain is generated that identifies at least a first service function path comprising an identified set of security service functions, with at least one of the identified set of security service functions comprising a virtualized network function in a software defined networking (SDN) network architecture. The first security service function chain is utilized to create classification policies associating packets of a given packet type with the first security service function chain, and the first service function path is utilized to create forwarding policies specifying handling of packets of the given packet type by respective ones of the identified set of security service functions. The classification policies are provided to one or more nodes in a communication network comprising the SDN network architecture, and the forwarding policies are provided to one or more of the identified set of security service functions in the communication network.
    Type: Grant
    Filed: August 5, 2016
    Date of Patent: May 31, 2022
    Assignee: ALCATEL LUCENT
    Inventors: Zhiyuan Hu, Xueqiang Yan, Zhigang Luo
  • Patent number: 11330017
    Abstract: Embodiments of the present disclosure relate to a method and a device for providing a security service. For example, the method comprises: in response to receiving, at a first controller, a first request to create a first service chain for an application in a network, obtaining configuration information associated with the security service from the first request; generating, based on the configuration information, a second request to create a sequence of security functions associated with the first service chain; sending the second request to a second controller so as to create the sequence of security functions in the network; and in response to receiving from the second controller an acknowledgement for the sequence of security functions, creating the first service chain based on the sequence of security functions. Embodiments of the device are capable of implementing the above method.
    Type: Grant
    Filed: February 6, 2018
    Date of Patent: May 10, 2022
    Assignee: Alcatel Lucent
    Inventors: Zhiyuan Hu, Lina Wang, Zhigang Luo
  • Publication number: 20220060514
    Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media for data sharing. In example embodiments, a method for data sharing is provided. The method comprises, in response to receiving a first request to share data of a user from a data sharing agent, creating a data sharing smart contract for the user. The method further comprises publishing the data sharing smart contract to one or more data consumers. The method further comprises, in response to receiving a second request to access the data from a data consumer, generating, by executing the data sharing smart contract, an indication that the data consumer is authorized to access the data. In addition, the method further comprises sending the indication to the data consumer. In this way, end users are enabled to manage and share their personal data by themselves.
    Type: Application
    Filed: December 29, 2018
    Publication date: February 24, 2022
    Inventors: Zhiyuan Hu, Duan Chen, Yueming Yin, Zhigang Luo
  • Patent number: 11258701
    Abstract: Embodiments of the present disclosure relate to method and device for interworking between service function chain (i.e., service chain) domains In some embodiments, there is provided a communication method comprising: receiving, at a first logic node of a first service chain in a first domain, a first packet associated with a second service chain in a second domain; converting the first packet into a second packet comprising first interworking information between the first service chain and the second service chain, the first interworking information comprising a flag indicating that the second packet is an interworking packet, an address of the first logic node, a first flow identifier of the second packet, a first service path identifier of the second packet and metadata associated with the second service chain; transmitting the second packet to a second logic node in the second domain; and receiving from the second logic node a response to the metadata.
    Type: Grant
    Filed: February 1, 2019
    Date of Patent: February 22, 2022
    Assignee: Nokia Solutions and Networks Oy
    Inventors: Zhiyuan Hu, Mingyu Zhao, Lina Wang, Zhigang Luo
  • Patent number: 11240660
    Abstract: A security service function chain is created including a set of security service functions. The security service function chain is created in response to instantiation of a given network partition (e.g., network slice) in a communication network (5G or similar network). The communication network supports instantiation of a plurality of network partitions for providing a respective plurality of network services. The security service function chain is utilized to perform at least one security service (e.g., authentication) for an entity (e.g., a subscriber or a device) accessing or seeking access to a network service (e.g., one of eMBB, massive IoT, and mission-critical IoT) corresponding to the given network partition.
    Type: Grant
    Filed: September 18, 2016
    Date of Patent: February 1, 2022
    Assignee: ALCATEL LUCENT
    Inventors: Zhiyuan Hu, Zhigang Luo, Xueqiang Yan
  • Patent number: 11184319
    Abstract: A method, a device, an apparatus and a computer-readable storage medium for MAC address conflict detection. The method includes: in response to detecting a wireless local area network, transmitting, at a first device, a dummy MAC address of the first device to a second device in the wireless local area network, the dummy MAC address being different from a real MAC address of the first device; transmitting an address conflict detection request for the dummy MAC address to the second device; and in response to an address conflict detection response from the second device indicating that there is no conflict for the dummy MAC address, establishing a connection with the wireless local area network. The method may effectively protect privacy information for a user of a terminal device, while avoiding a MAC address conflict, such that the user can communicate in a secure network environment.
    Type: Grant
    Filed: June 4, 2020
    Date of Patent: November 23, 2021
    Assignee: Nokia Solutions and Networks Oy
    Inventors: Zhiyuan Hu, Duan Chen, Yueming Yin, Zhigang Luo
  • Publication number: 20210273883
    Abstract: Example embodiments of the present disclosure relate to enablement of a service function chain based on a software defined network. In some embodiments, there is provided a method implemented at a service function chain controller. The method comprises creating a service function chain for a packet, the service function chain comprising a set of ordered service functions that are to process the packet; and configuring respective forwarding rules associated with the service function chain directly or indirectly to a plurality of network nodes in a software defined network, the respective forwarding rules indicating how the plurality of network nodes forward the packet to the set of ordered service functions in the service function chain. In this way, it is possible to enable the service function chain in the software defined network.
    Type: Application
    Filed: July 11, 2018
    Publication date: September 2, 2021
    Inventors: Zhiyuan HU, Duan CHEN, Zhigang LUO
  • Publication number: 20210266735
    Abstract: Embodiments of the disclosure provide a method, device and computer readable medium for protecting MAC addresses. According to embodiments of the present disclosure, the terminal device may obtain a set of virtual MAC addressed from a network device and may connect with a further network device (for example, Wi-Fi AP or Bluetooth devices) using the virtual MAC addresses. In this way, tracking the terminal device with MAC address is prevented so that user privacy protection could be enhanced.
    Type: Application
    Filed: June 29, 2018
    Publication date: August 26, 2021
    Inventors: Zhiyuan HU, Wen WEI, Mingyu ZHAO, Yueming YIN, Zhigang LUO