Patents by Inventor Zhigang Luo
Zhigang Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11964937Abstract: A (methyl)acrolein oxidation catalyst and a preparation method therefor-in which the catalyst has a composition represented by the following formula: x(Mo12PaCsbVcDeOf)+tC/yZ in which Mo12PaCSbVcDeOf is a heteropolyacid salt main catalyst; C is a nano carbon fiber additive, and Z is a carrier thermal conduction diluent; Mo, P, Cs, V, and O represent the elements of molybdenum, phosphorus, cesium, vanadium, and oxygen, respectively; D represents at least one element selected from the group consisting of copper, iron, magnesium, manganese, antimony, zinc, tungsten, silicon, nickel, and palladium; a, b, c, e, and f represent the atomic ratio of each element, a=0.1-3, b=0.01-3, c=0.01-5, e=0.01-2, and f being the atomic ratio of oxygen required to satisfy the valence of each of the described components; x and y represent the weights of the main catalyst and the carrier thermal conduction diluent Z, and y/x=11.1-50%; and t represents the weight of the nano carbon fiber, and t/x=3-10%.Type: GrantFiled: January 17, 2019Date of Patent: April 23, 2024Assignee: Shanghai Huayi New Material Co., Ltd.Inventors: Xin Wen, Ge Luo, Xinlei Jin, Tonghao Wu, Yan Zhuang, Zhigang Qian, Xiaodong Chu
-
Patent number: 11936183Abstract: An energy Internet system, an energy routing conversion device, and an energy control method, relating to a field of energy information. An alternating-current (AC) side energy routing conversion device of the energy Internet system includes a plurality of first route ports, and a direct-current (DC) side energy routing conversion device includes a plurality of second route ports, where each second route port is connected to a corresponding first route port by means of a corresponding DC busbar. A plurality of energy devices are connected to a DC busbar by means of corresponding first AC/DC converters or first DC converters. The AC side energy routing conversion device and the DC side energy routing conversion device collect energy information of the energy devices and adjust energy of the energy devices on a basis of energy balance constraint conditions.Type: GrantFiled: December 13, 2018Date of Patent: March 19, 2024Assignee: GREE ELECTRIC APPLIANCES, INC. OF ZHUHAIInventors: Mingzhu Dong, Zhigang Zhao, Meng Huang, Xuefen Zhang, Shugong Nan, Shiyong Jiang, Meng Li, Wenqiang Tang, Peng Ren, Wu Wen, Lingjun Wang, Xiao Luo, Wenhao Wu, Jianjun Huang, Weijin Li, Yunhong Zeng, Bei Chen
-
Patent number: 11888700Abstract: A method for isolation in the CN domain of a network slice includes receiving a slice isolation policy and establishing a CN NSS isolation policy based on the slice isolation policy. When the CN NSS isolation policy includes a network resource isolation policy, the network resource isolation policy is mapped to a network resource allocation policy, a part of which relating to physical resources is sent to a network function management function (NFMF) and a part relating to virtual resources is sent to a network function virtualization management and orchestration function. When the NSS isolation policy includes an application level isolation policy, the application level isolation policy is mapped to an application level policy which is sent to the NFMF.Type: GrantFiled: August 3, 2020Date of Patent: January 30, 2024Assignee: Nokia Solutions and Networks OyInventors: Zhiyuan Hu, Jing Ping, Zhigang Luo, Wen Wei
-
Patent number: 11877147Abstract: Embodiments of the disclosure provide a method, device and computer readable medium for protecting MAC addresses. According to embodiments of the present disclosure, the terminal device may obtain a set of virtual MAC addressed from a network device and may connect with a further network device (for example, Wi-Fi AP or Bluetooth devices) using the virtual MAC addresses. In this way, tracking the terminal device with MAC address is prevented so that user privacy protection could be enhanced.Type: GrantFiled: June 29, 2018Date of Patent: January 16, 2024Assignee: Nokia Technologies OyInventors: Zhiyuan Hu, Wen Wei, Mingyu Zhao, Yueming Yin, Zhigang Luo
-
Publication number: 20230381348Abstract: The present disclosure relates to the technical field of chelating agents, in particular to a bifunctional macrocyclic chelate, a conjugate, a metal complex, and use thereof. The bifunctional macrocyclic chelate is a compound of following Formula I or an isomer thereof, wherein R1, R3, R5, and R7 are each independently selected from alkyls or long-chain polymer groups, R2, R4, R6, and R8 are each independently selected from functional groups, Ra, Rb, Rc, and Rd are each independently selected from any one of H, substituted or unsubstituted alkyls, halogens, substituted or unsubstituted cyano groups, substituted or unsubstituted ester groups, substituted or unsubstituted alkoxys, substituted or unsubstituted amines, and substituted or unsubstituted aryls, ring The bifunctional macrocyclic chelate can complex most nuclides, and expand use of the bifunctional macrocyclic chelate, and the metal complex chelating different nuclides can realize integration of diagnosis and treatment.Type: ApplicationFiled: July 31, 2023Publication date: November 30, 2023Applicant: Jyams Pet Research & Development LimitedInventors: Jianfeng Xu, Zheng Wang, Wenbin Fan, Fei Cai, Huanhuan Yin, Zhigang Luo
-
Publication number: 20230362057Abstract: An example method may include receiving slice isolation policy for a network slice subnet (NSS) in a transport network (TN) domain, mapping the slice isolation policy to network resource isolation policy and traffic isolation policy, and mapping the network resource isolation policy and the traffic isolation policy to network resource allocation policy and data traffic forward policy, respectively. The network resource allocation policy and the data traffic forward policy may be applied in creation of the TN NSS.Type: ApplicationFiled: July 15, 2020Publication date: November 9, 2023Applicant: Nokia Solutions and Networks OyInventors: Zhiyuan HU, Jing PING, Iris ADAM, Duan CHEN, Zhigang LUO
-
Publication number: 20230283525Abstract: A method for isolation in the CN domain of a network slice includes receiving a slice isolation policy and establishing a CN NSS isolation policy based on the slice isolation policy. When the CN NSS isolation policy includes a network resource isolation policy, the network resource isolation policy is mapped to a network resource allocation policy, a part of which relating to physical resources is sent to a network function management function (NFMF) and a part relating to virtual resources is sent to a network function virtualization management and orchestration function. When the NSS isolation policy includes an application level isolation policy, the application level isolation policy is mapped to an application level policy which is sent to the NFMF.Type: ApplicationFiled: August 3, 2020Publication date: September 7, 2023Applicant: Nokia Solution and Networks OyInventors: Zhiyuan HU, Jing PING, Zhigang LUO, Wen WEI
-
Publication number: 20230179638Abstract: Methods and apparatus are disclosed for preventing network attacks in a network slice. A method may comprise: obtaining security requirements of a network slice instance; determining respective security policy to be applied to each of a plurality of constituent network slice subnet instances of the network slice instance based on the security requirements of the network slice instance; and causing each of the plurality of constituent network slice subnet instances to be provided with one ore more security function instances configured according to respective determined security policy. The method can be performed in a network slice layer.Type: ApplicationFiled: May 6, 2020Publication date: June 8, 2023Inventors: Zhiyuan HU, Jing PING, Iris ADAM, Zhigang LUO
-
Patent number: 11616718Abstract: Example embodiments of the present disclosure relate to enablement of a service function chain based on a software defined network. In some embodiments, there is provided a method implemented at a service function chain controller. The method comprises creating a service function chain for a packet, the service function chain comprising a set of ordered service functions that are to process the packet; and configuring respective forwarding rules associated with the service function chain directly or indirectly to a plurality of network nodes in a software defined network, the respective forwarding rules indicating how the plurality of network nodes forward the packet to the set of ordered service functions in the service function chain. In this way, it is possible to enable the service function chain in the software defined network.Type: GrantFiled: July 11, 2018Date of Patent: March 28, 2023Assignee: NOKIA TECHNOLOGIES OYInventors: Zhiyuan Hu, Duan Chen, Zhigang Luo
-
Patent number: 11520930Abstract: A set of raw data relating to activity of one or more users in accordance with a communication network is obtained. The communication network is managed by a network operator. The obtained set of raw data is processed in accordance with at least one data isolation policy maintained by the network operator to generate a first set of data comprising at least a portion of the set of raw data with sensitive data associated with the one or more users removed; a second set of data comprising the sensitive data removed from the set of raw data; and a third set of data comprising a mapping between portions of the set of raw data and the first set of data. The first set of data is exposed to a third party, while the second set of data and the third set of data are isolated from the third party.Type: GrantFiled: September 26, 2014Date of Patent: December 6, 2022Assignee: Alcatel LucentInventors: Zhiyuan Hu, Wen Wei, Xueqiang Yan, Zhigang Luo
-
Publication number: 20220321330Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media of data security for network slice management. The method comprises transmitting at least one entry associated with attributes of data generated by the first device to a second device; in response to a request for accessing the data received from a third device, determining whether the third device has an authority for accessing the data based on the request; and in response to a determination that the third device has the authority for accessing the data, causing the third device to check the integrity of the data based on the attributes of the data obtained from the second device. In this way, the service consumer may detect the data tampering.Type: ApplicationFiled: August 13, 2019Publication date: October 6, 2022Inventors: Zhiyuan HU, Yueming YIN, Zhigang LUO
-
Patent number: 11408859Abstract: An ultrasonic probe coupling assembly (1) and an ultrasonic probe mechanism are disclosed. The ultrasonic probe coupling assembly (1) includes a probe sleeve (11) and a solid-state coupling member (12). The probe sleeve (11) is sleeved on an ultrasonic probe (2). The solid-state coupling member (12) is fixed in the probe sleeve (11). One side of the solid-state coupling member (12) is located in the probe sleeve (11) for fitting to the ultrasonic probe (2), and the other side is protruded from the probe sleeve (11) to be in contact with the skin. The ultrasonic probe mechanism includes the ultrasonic probe coupling assembly (1) and the ultrasonic probe (2).Type: GrantFiled: May 15, 2019Date of Patent: August 9, 2022Assignee: SHENZHEN LEPUYUAN MEDICAL TECHNOLOGY CO., LTD.Inventors: Caifeng Wang, Zhigang Luo, Junying Ma
-
Patent number: 11349881Abstract: A first security service function chain is generated that identifies at least a first service function path comprising an identified set of security service functions, with at least one of the identified set of security service functions comprising a virtualized network function in a software defined networking (SDN) network architecture. The first security service function chain is utilized to create classification policies associating packets of a given packet type with the first security service function chain, and the first service function path is utilized to create forwarding policies specifying handling of packets of the given packet type by respective ones of the identified set of security service functions. The classification policies are provided to one or more nodes in a communication network comprising the SDN network architecture, and the forwarding policies are provided to one or more of the identified set of security service functions in the communication network.Type: GrantFiled: August 5, 2016Date of Patent: May 31, 2022Assignee: ALCATEL LUCENTInventors: Zhiyuan Hu, Xueqiang Yan, Zhigang Luo
-
Patent number: 11330017Abstract: Embodiments of the present disclosure relate to a method and a device for providing a security service. For example, the method comprises: in response to receiving, at a first controller, a first request to create a first service chain for an application in a network, obtaining configuration information associated with the security service from the first request; generating, based on the configuration information, a second request to create a sequence of security functions associated with the first service chain; sending the second request to a second controller so as to create the sequence of security functions in the network; and in response to receiving from the second controller an acknowledgement for the sequence of security functions, creating the first service chain based on the sequence of security functions. Embodiments of the device are capable of implementing the above method.Type: GrantFiled: February 6, 2018Date of Patent: May 10, 2022Assignee: Alcatel LucentInventors: Zhiyuan Hu, Lina Wang, Zhigang Luo
-
Publication number: 20220060514Abstract: Embodiments of the present disclosure relate to devices, methods, apparatuses and computer readable storage media for data sharing. In example embodiments, a method for data sharing is provided. The method comprises, in response to receiving a first request to share data of a user from a data sharing agent, creating a data sharing smart contract for the user. The method further comprises publishing the data sharing smart contract to one or more data consumers. The method further comprises, in response to receiving a second request to access the data from a data consumer, generating, by executing the data sharing smart contract, an indication that the data consumer is authorized to access the data. In addition, the method further comprises sending the indication to the data consumer. In this way, end users are enabled to manage and share their personal data by themselves.Type: ApplicationFiled: December 29, 2018Publication date: February 24, 2022Inventors: Zhiyuan Hu, Duan Chen, Yueming Yin, Zhigang Luo
-
Patent number: 11258701Abstract: Embodiments of the present disclosure relate to method and device for interworking between service function chain (i.e., service chain) domains In some embodiments, there is provided a communication method comprising: receiving, at a first logic node of a first service chain in a first domain, a first packet associated with a second service chain in a second domain; converting the first packet into a second packet comprising first interworking information between the first service chain and the second service chain, the first interworking information comprising a flag indicating that the second packet is an interworking packet, an address of the first logic node, a first flow identifier of the second packet, a first service path identifier of the second packet and metadata associated with the second service chain; transmitting the second packet to a second logic node in the second domain; and receiving from the second logic node a response to the metadata.Type: GrantFiled: February 1, 2019Date of Patent: February 22, 2022Assignee: Nokia Solutions and Networks OyInventors: Zhiyuan Hu, Mingyu Zhao, Lina Wang, Zhigang Luo
-
Patent number: 11240660Abstract: A security service function chain is created including a set of security service functions. The security service function chain is created in response to instantiation of a given network partition (e.g., network slice) in a communication network (5G or similar network). The communication network supports instantiation of a plurality of network partitions for providing a respective plurality of network services. The security service function chain is utilized to perform at least one security service (e.g., authentication) for an entity (e.g., a subscriber or a device) accessing or seeking access to a network service (e.g., one of eMBB, massive IoT, and mission-critical IoT) corresponding to the given network partition.Type: GrantFiled: September 18, 2016Date of Patent: February 1, 2022Assignee: ALCATEL LUCENTInventors: Zhiyuan Hu, Zhigang Luo, Xueqiang Yan
-
Patent number: 11184319Abstract: A method, a device, an apparatus and a computer-readable storage medium for MAC address conflict detection. The method includes: in response to detecting a wireless local area network, transmitting, at a first device, a dummy MAC address of the first device to a second device in the wireless local area network, the dummy MAC address being different from a real MAC address of the first device; transmitting an address conflict detection request for the dummy MAC address to the second device; and in response to an address conflict detection response from the second device indicating that there is no conflict for the dummy MAC address, establishing a connection with the wireless local area network. The method may effectively protect privacy information for a user of a terminal device, while avoiding a MAC address conflict, such that the user can communicate in a secure network environment.Type: GrantFiled: June 4, 2020Date of Patent: November 23, 2021Assignee: Nokia Solutions and Networks OyInventors: Zhiyuan Hu, Duan Chen, Yueming Yin, Zhigang Luo
-
Publication number: 20210273883Abstract: Example embodiments of the present disclosure relate to enablement of a service function chain based on a software defined network. In some embodiments, there is provided a method implemented at a service function chain controller. The method comprises creating a service function chain for a packet, the service function chain comprising a set of ordered service functions that are to process the packet; and configuring respective forwarding rules associated with the service function chain directly or indirectly to a plurality of network nodes in a software defined network, the respective forwarding rules indicating how the plurality of network nodes forward the packet to the set of ordered service functions in the service function chain. In this way, it is possible to enable the service function chain in the software defined network.Type: ApplicationFiled: July 11, 2018Publication date: September 2, 2021Inventors: Zhiyuan HU, Duan CHEN, Zhigang LUO
-
Publication number: 20210266735Abstract: Embodiments of the disclosure provide a method, device and computer readable medium for protecting MAC addresses. According to embodiments of the present disclosure, the terminal device may obtain a set of virtual MAC addressed from a network device and may connect with a further network device (for example, Wi-Fi AP or Bluetooth devices) using the virtual MAC addresses. In this way, tracking the terminal device with MAC address is prevented so that user privacy protection could be enhanced.Type: ApplicationFiled: June 29, 2018Publication date: August 26, 2021Inventors: Zhiyuan HU, Wen WEI, Mingyu ZHAO, Yueming YIN, Zhigang LUO