Kuang
Daibin Kuang, Lausanne CH
Patent application number | Description | Published |
---|---|---|
20100229950 | Ionic Liquid Electrolyte - The present invention relates to electrolytes comprising tetracyanoborate and an organic cation as components of electrolytes in electrochemical and/or optoelectronic devices, in particular solar cells. This ionic liquid has low viscosity and can be used as electrolyte in the absence of a solvent. Importantly, the ionic liquid remains stable in solar cells even after prolonged thermal stress at 80° C. for 1000 hours. Photovoltaic conversion efficiency remained stable and keeping more than 90% of the initial value. | 09-16-2010 |
Heap Hoe Kuang, Singapore SG
Patent application number | Description | Published |
---|---|---|
20120068353 | Semiconductor Device and Method of Forming Dam Material With Openings Around Semiconductor Die for Mold Underfill Using Dispenser and Vacuum Assist - A semiconductor wafer contains a plurality of semiconductor die separated by saw streets. A dam material is formed over the saw streets around each of the semiconductor die. A plurality of openings is formed in the dam material. The openings in the dam material can be formed on each side or corners of the first semiconductor die. The semiconductor wafer is singulated through the dam material to separate the semiconductor die. The semiconductor die is mounted to a substrate. A mold underfill is deposited through a first opening in the dam material. A vacuum is drawn on a second opening in the dam material to cause the underfill material to cover an area between the first semiconductor die and substrate without voids. The number of second openings can be greater than the number of first openings. The first opening can be larger than the second opening. | 03-22-2012 |
Ningke Kuang, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20130045477 | DIRECT NUCLEIC ACID ANALYSIS - Methods and apparatus are described for nucleic acid analysis of swab samples without the need for purification. | 02-21-2013 |
Quan Kuang, Berlin DE
Patent application number | Description | Published |
---|---|---|
20150365865 | METHOD AND SYSTEM FOR IMPROVEMENT OF HANDOVER QUALITY IN MOBILE RADIO SYSTEMS - A handover method includes the steps: (1a) detecting, at a serving node, signal quality of a signal transmitted from the serving node to a user equipment (UE) being worse than a predefined threshold; (1b) identifying, at the serving node, node(s) transmitting to the UE the strongest signals interfering with signals being transmitted to the UE; (1c) sending, by the serving node, a request for starting an inter-cell interference coordination scheme; (1d) rescheduling, by the node(s) identified in step (1b), users currently being served by the node(s); (1e) informing, by the node(s) identified in step (1b), the serving node of the UE which resources have, been reserved in step (1d); (1f) scheduling, by the serving node, the UE to the resources reserved in step (1d); (1g) starting, by the serving node, handover of the UE from the serving node to a target node; and (1h) completing the handover of the UE. | 12-17-2015 |
Randy Kuang, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20150128234 | SYSTEM AND METHOD FOR GENERATING PASSWORDS USING KEY INPUTS AND CONTEXTUAL INPUTS - A method and system for automatically generating a new password from user selected characters via key press which are different from the user selected characters. Each key of a keypad can be entered within one or more contexts, manually selected by the user or automatically selected by the described system, such that the same key press within one context provides a unique code different than the same key press within another context. The code corresponding to the proper combination of a key press, the contexts of the selected key press, and the sequence of entry must match the previously stored code set by the user. Context selection is not based on any of the possible key presses selectable on the keypad. Therefore if the password characters are discovered without the context for each character, then it becomes difficult to access the content. The newly generated password can be the same length as the originally entered password, or can be longer or shorter in length than the originally entered password. | 05-07-2015 |
Randy Kuang, Kanata CA
Patent application number | Description | Published |
---|---|---|
20100199086 | NETWORK TRANSACTION VERIFICATION AND AUTHENTICATION - A two-level authentication system is described supporting two-factor authentication that offers efficient protection for secure on-line web transactions. It includes a global unique identity (UID) provided either by an institute-issued/personal trusted device, or based on client computing platform hardware attributes, and generated using institution authorized private software, institution-authorized authentication proxy software, and an institution-generated credential code which is pre-stored in the token and only accessible by the institute-authorized authentication proxy software. The institution-authorized authentication proxy software uses the user's PIN and the trusted device's UID as input and verifies the user and device identities through institution-generated credential code which was pre-stored in the trusted device. Authentication is performed in two levels: the first authenticates the user and the trusted device locally; and the second authenticates the user remotely at the institution-owned authentication server. Various embodiments add extra levels of security, including one-time-password management. | 08-05-2010 |
20100239092 | METHODS AND SYSTEMS FOR COMMUNICATING OVER A QUANTUM CHANNEL - Alice generates a sequence of key bits forming an initial cryptographic key. Alice then uses the sequence of key bits and a sequence of cipher bits to control respective control parameters of a quantum encoding process applied to a sequence of quantum pulses, where the sequence of cipher bits used is known to Bob. Alice then releases the encoded pulses towards Bob over a quantum channel. Bob uses the previously agreed-upon sequence of cipher bits to control a control parameter, such as the quantum basis, of a quantum detection process applied to the pulses received from Alice, thus producing a detection outcome for each received pulse. Bob then derives a final cryptographic key from the detection outcomes. Because the cipher bits used to select the quantum bases used by both Alice and Bob are known by both parties, the method allows the final cryptographic key to be distributed with full basis alignment compared to 50% for BB84, thus allowing efficient quantum key distribution over multiple hops. | 09-23-2010 |
20110154459 | METHOD AND SYSTEM FOR SECURING ELECTRONIC TRANSACTIONS - A method for secure electronic transaction over a computer network, comprising: at a trusted relationship profile server computer: storing a unique identity of a trusted computing unit; generating a confirmation message regarding the unique identity of the trusted computing unit in response to a request from the trusted computing unit; at a security proxy server computer: storing real credentials and local credentials of a customer in a secure vault; receiving the confirmation message and permitting a login process to be performed with the security proxy server using the local credentials, provided the confirmation message is valid; and replacing the local credentials submitted in the login process with the real credentials. A corresponding system for secure electronic transactions is also provided. | 06-23-2011 |
20120207116 | WIMAX R6 MANAGEMENT PROTOCOL - Within an access services network (ASN) operable for providing wireless access services to an access terminal and including a base station communicatively coupled to an ASN gateway, a new management protocol is provided for managing the R | 08-16-2012 |
20130195056 | Service Flow With Robust Header Compression (ROHC) In A WiMAX Wirless Network - A robust header compression (ROHC) controller provides for service flow processing of a ROHC channel in a WiMAX wireless communication system. The ROHC controller controls the negotiations of the MS ROHC capabilities during its registration and the negotiations of the ROHC channel parameters during ROHC enabled service flow setup; the MS ROHC capabilities including ROHC compression and decompression capabilities and ROHC channel and feedback strategies; the channel parameter negotiation covers the ROHC profile set and feedback channel information in addition to the 16e/12D standard. The ROHC controller receives a service flow request for a ROHC enabled service flow, wherein the request includes a QoS profile. | 08-01-2013 |
20130275754 | SYSTEM AND METHOD FOR SECURE REMOTE ACCESS - System, method, and apparatus for providing access to remote computing services are described. The method includes authenticating a user and a client device; establishing a connection to a server computer including: a server program executing on the server computer detecting the connection; the server program creating a blocking process on the server computer to block access of the user to a service on the connection, authorizing, using a client program executing on the client device and the server program, the user to use the service on the server computer including: terminating the blocking process, the user using the service; and the user closing the connection to the server computer. Embodiments of the present invention provide secure remote access to computing services. | 10-17-2013 |
20130276082 | METHOD AND SYSTEM FOR SECURING ELECTRONIC TRANSACTIONS - A method for secure electronic transaction over a computer network, comprising: at a trusted relationship profile server computer: storing a unique identity of a trusted computing unit; generating a confirmation message regarding the unique identity of the trusted computing unit in response to a request from the trusted computing unit; at a security proxy server computer: storing real credentials and local credentials of a customer in a secure vault; receiving the confirmation message and permitting a login process to be performed with the security proxy server using the local credentials, provided the confirmation message is valid; and replacing the local credentials submitted in the login process with the real credentials. A corresponding system for secure electronic transactions is also provided. | 10-17-2013 |
20140153430 | Wimax R6 Management Protocol - Within an access services network (ASN) operable for providing wireless access services to an access terminal and including a base station communicatively coupled to an ASN gateway, a new management protocol is provided for managing the R6 communications. The protocol includes a common set of message types that may be used for data plane, control plane, and individual peer applications communicating over the control plane. In one embodiment, a keepalive procedure or process is used to manage the R6 interface between the ASN gateway and the base station by sending keepalive messages through an established data path tunnel and maintaining one or more keepalive timers. | 06-05-2014 |
20140237555 | SYSTEM AND METHOD FOR SECURE REMOTE ACCESS - System, method, and apparatus for providing access to remote computing services are described. The method includes authenticating a user and a client device; establishing a connection to a server computer including: a server program executing on the server computer detecting the connection; the server program creating a blocking process on the server computer to block access of the user to a service on the connection, authorizing, using a client program executing on the client device and the server program, the user to use the service on the server computer including: terminating the blocking process, the user using the service; and the user closing the connection to the server computer. Embodiments of the present invention provide secure remote access to computing services. | 08-21-2014 |
20140304780 | SYSTEM AND METHOD FOR SECURE REMOTE ACCESS TO A SERVICE ON A SERVER COMPUTER - System and method for providing access to remote computing services in an application server are described, where the authentication and authorization processes are separated, excluding service access privileges from the authenticating process and transferring the privileges to the authorization process. A client device and a user are authenticated, and upon successful authentication, the authorization process is performed, including establishing an authorization connection between the client device and the server computer; at the server computer, detecting and verifying the authorization connection; and upon successful verification, allowing access of the client device to the service on the server computer. In one embodiment, upon detecting the authorization connection, a blocking process is created to block access to the service; and, upon successful verification of the authorization connection, the blocking process on the server computer is terminated, prior to the allowing the access of the client device to the service on the server computer. | 10-09-2014 |
20150326559 | METHOD AND SYSTEM FOR AUTHORIZING SECURE ELECTRONIC TRANSACTIONS USING A SECURITY DEVICE - Methods and systems for authenticating a security device for providing a secure access and transaction authorization to a remote network location are provided. The security device is authenticated by installing private security software on the security device. A Two-Channel authorization method includes a transaction notification/authorization channel and a transaction channel. A Three-Channel authorization method includes a transaction notification channel, a transaction authorization channel, and the transaction channel. Embodiments of the present invention provide increased security and privacy. A corresponding system for authenticating a security device and preforming secure private transactions is also provided. | 11-12-2015 |
20150326565 | METHOD AND SYSTEM FOR AUTHORIZING SECURE ELECTRONIC TRANSACTIONS USING A SECURITY DEVICE HAVING A QUICK RESPONSE CODE SCANNER - Methods and systems for authenticating a security device for providing a secure access and transaction authorization to a remote network location are provided. The security device is authenticated by installing private security software on the security device. In order to authorize a transaction, a transaction authorization is performed using the security device by display a QR (Quick Response) code from an authorization server on a user terminal and scanning the QR code into the security device. After scanning the QR code, an OTA (One-Time-Authorization) code is sent from the security device to the authorization server for verifying the transaction. Embodiments of the present invention provide increased security and privacy. A corresponding system for authenticating a security device and preforming secure and private transactions is also provided. | 11-12-2015 |
20150382243 | Service Flow With Robust Header Compression (ROHC) In A WiMAX Wireless Network - A robust header compression (ROHC) controller provides for service flow processing of a ROHC channel in a WiMAX wireless communication system. The ROHC controller controls the negotiations of the MS ROHC capabilities during its registration and the negotiations of the ROHC channel parameters during ROHC enabled service flow setup; the MS ROHC capabilities including ROHC compression and decompression capabilities and ROHC channel and feedback strategies; the channel parameter negotiation covers the ROHC profile set and feedback channel information in addition to the 16e/12D standard. The ROHC controller receives a service flow request for a ROHC enabled service flow, wherein the request includes a QoS profile. | 12-31-2015 |
Shao-Long Kuang, Shantin HK
Patent application number | Description | Published |
---|---|---|
20130053866 | SURGICAL ROBOT WITH HYBRID PASSIVE/ACTIVE CONTROL - A surgical robot with seven degrees of freedom, including various types of joints, offers a hybrid active-passive control for operation both manually and by programmed navigation. One of the degrees of freedom allows the robot to be moved efficiently around the axis of a patient's body to provide ample workspace for surgical procedures in an operating room. | 02-28-2013 |
Shihuan Kuang, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20090074730 | NOVEL STEM CELLS, NUCLEOTIDE SEQUENCES AND PROTEINS THEREFROM - The present invention provides novel stem cells, nucleotide sequences and proteins therefrom. More specifically, the present invention provides Pax7+/Myf5− stem cells and methods for identifying and isolating them. Also provided is a MEGF10 nucleotide sequence and protein. | 03-19-2009 |
20120213751 | NOVEL STEM CELLS, NUCLEOTIDE SEQUENCES AND PROTEINS THEREFROM - The present invention provides novel stem cells, nucleotide sequences and proteins therefrom. More specifically, the present invention provides Pax7+/Myf5− stem cells and methods for identifying and isolating them. Also provided is a MEGF10 nucleotide sequence and protein. | 08-23-2012 |
20150125427 | NOVEL STEM CELLS, NUCLEOTIDE SEQUENCES AND PROTEINS THEREFROM - The present invention provides novel stem cells, nucleotide sequences and proteins therefrom. More specifically, the present invention provides Pax7+/Myf5− stem cells and methods for identifying and isolating them. Also provided is a MEGF10 nucleotide sequence and protein. | 05-07-2015 |
Sze-Chiang Kevin Kuang, Singapore SG
Patent application number | Description | Published |
---|---|---|
20080219617 | Plastic Optical Sensor - An optical fiber sensor comprising a housing having a cavity defined therein; at least two plastic optical fibers disposed such that cleaved ends of the respective fibers are located opposite each other within the cavity; a light source coupled to one of the fibers; and a detector coupled to the other fiber. | 09-11-2008 |
Wenqi Kuang, Zhuhai City CN
Patent application number | Description | Published |
---|---|---|
20160084516 | Control Method for Air Deflectors of Air Conditioner - Disclosed is a control method for air deflectors of an air conditioner. The air deflectors are arranged at an air outlet of the air conditioner to adjust directions of discharged air. The control method comprises: during the air conditioner is operating in a refrigeration mode, judging whether a motion instruction for swinging air is input or not; when the motion instruction for swinging air is not input, acquiring a set air volume level, set temperature T1 and indoor ambient temperature T2; according to the set air volume level, the set temperature T1 and the indoor ambient temperature T2, judging the amount of a refrigeration demand of a user; and according to the amount of the refrigeration demand of the user, controlling an air guide angle of the air deflectors. | 03-24-2016 |
Wenxing Kuang, Gloucester CA
Patent application number | Description | Published |
---|---|---|
20140024651 | UNIVERSAL SURFACE DECONTAMINATION FORMULATION - Provided are decontamination compositions that include an ammonium compound, a ferric/ferrocyanide compound, a polyaminocarboxylic acid compound and a polycarboxylic compound. Depending on the mode of application, the compositions can be used as foams, liquids, gels, strippable coatings, mists, or in other forms. Also provided are kits that include such components in whole or in part along with an optional dispersing device for use of the decontamination composition. | 01-23-2014 |
Xiankun Kuang, Shenzhen CN
Patent application number | Description | Published |
---|---|---|
20160120056 | Board Assembly, Communications System, Ejector Lever, and Ejector Lever Unlocking Method - An ejector lever includes a lever body and an unlocking mechanism, where the unlocking mechanism includes an unlocking hook and a safety latch, the unlocking hook is rotatably connected to the lever body using a first rotating shaft, and the safety latch is rotatably connected to the lever body using a second rotating shaft. The unlocking hook is provided with a first end and a second end, the first end is opposite to the second end across the first rotating shaft, the first end is provided with a hook, the second end is provided with a first abutting part, the safety latch is provided with a second abutting part, and the first abutting part is in contact with the second abutting part; and the second abutting part is configured to apply first force on the first abutting part when the safety latch rotates around the second rotating shaft. | 04-28-2016 |
Xiaofei Kuang, Hong Kong HK
Patent application number | Description | Published |
---|---|---|
20090140808 | GAIN CONTROL CIRCUIT - A gain control circuit including a resistor with a first terminal and a second terminal; an operational amplifier with an inverting terminal thereof electrically coupled to said first terminal of said resistor; a non-inverting terminal thereof; and an output terminal thereof; an amplifier circuit for transforming the voltage change of said operational amplifier output into a substantially exponential current change; wherein the output of said amplifier circuit is electrically coupled to said inverting terminal of said operational amplifier. The above described gain control circuit is able to perform wide bandwidth input signal buffering with linearity under low voltage and low power conditions. The circuit also offers low output impedances without the need of additional buffers and hence minimizing circuit size and manufacturing costs. | 06-04-2009 |
Yanping Kuang, Shanghai CN
Patent application number | Description | Published |
---|---|---|
20160057992 | BIOLOGICAL SAMPLE VITRIFICATION CARRIER AND USAGE THEREOF - The present invention provides a biological sample vitrification carrier and a method for freezing a biological sample rapidly, simply, conveniently, closely and sterilely. Specifically, the carrier comprises a main body and a sealing cap. A near end of the main body and an inner bottom surface of the sealing cap are mutually sealed to form a sealed frozen sample placing region. The frozen sample placing region is provided with a frozen sample placing platform, the main body is provided with a frozen liquid circulating channel, and the sealing cap is provided with a guide hole corresponding to the frozen liquid circulating channel, so that, when the biological sample is frozen, frozen liquid circulating in the channel contacts with an outer surface of the frozen sample placing region and cools the biological sample in the frozen sample placing region. The biological sample vitrification carrier and the method in the present invention have the advantages of safety, nontoxicity and high vitrification and rewarming operation efficiency and have wide application prospects in the field of biological sample freezing. | 03-03-2016 |
Yubin Kuang, Lund SE
Patent application number | Description | Published |
---|---|---|
20140218353 | IMAGE GROUP PROCESSING AND VISUALIZATION - Techniques are provided for efficiently generating 3D information from a set of digital images. Techniques are also provided for displaying groups (or clusters) of digital images using 3D information associated with the digital images. In one technique, a group of digital images are displayed as a stack of thumbnail images where the thumbnail images are aligned on a display with respect to each other based on common features identified in the digital images, camera position, and/or camera pose. In another technique, a group of digital images are organized on a display in either a 3D layout or a 2D layout based on 3D information associated with each digital image in the group. In another technique, a transition effect is generated based on projections of two digital images onto a common scene plane and blending (or cross fading) one of the 3D projections with the other of the 3D projections. | 08-07-2014 |
Zhihe Kuang, Melbourne AU
Patent application number | Description | Published |
---|---|---|
20120308570 | METHODS FOR TREATING DISEASES - The present invention relates to methods of modulating the level of inducible nitric oxide synthase (iNOS) in a cell which comprises administering to the cell a compound which modulates binding of SPRY domain-containing SOCS box protein (SSB) to iNOS, and/or a compound which modulates SSB activity in the cell. Further provided are methods of treating or preventing disease in a subject by modulating the level of iNOS in a cell, as well as compounds which modulate binding of SSB to iNOS and compounds which modulate SSB activity. | 12-06-2012 |