Clemens F. Vasters - Kirkland WA, US David A. Wortendyke - Seattle WA, US Qian Wang - Seattle WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 15/16
US Classification:
709231
Abstract:
The present invention extends to methods, systems, and computer program products for using HyperText Transfer Protocol communication as a transport for bi-directional data streams. Embodiments of the invention facilitate passing otherwise blocked TCP communication through a firewall. Embodiments of the invention can be used to pass legitimate TCP communication through a firewall even though a firewall is configured to block the legitimate TCP communication.
David E. Langworthy - Medina WA, US Qian Wang - Seattle WA, US Andrew John Layman - Bellevue WA, US Charles Edgar Passmore - Seattle WA, US Hervey Oliver Wilson - Bellevue WA, US Caleb Geoffrey Baker - Seattle WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 9/32
US Classification:
726 4
Abstract:
The subject disclosure relates to authorization based on a determination of permissions that can be granted for an action(s) to be performed on a resource. The determination of the permission is based on a set of rules that represent a theory including a notion of trust that has been divided into different sized tables. The tables are utilized to evaluate two or more input claims and to facilitate a determination of whether access to at least one system resource is to be granted. The evaluation can include matching the two or more input claims to rows in the table, wherein access is allowed if a match is found.
Avinash Kalgi - Kirkland WA, US Matthew Ward-Steinman - Seattle WA, US Qian Wang - Mercer Island WA, US
International Classification:
H04L 29/06
US Classification:
726 3
Abstract:
Methods and systems for verifying whether a user requesting an online account is likely a human or an automated program are described. A request for an online account may be received from a mobile device. A human challenge-response test adapted for displaying on a mobile device is displayed on the mobile device. Upon viewing the human challenge-response test, the user enters the user's solution to the human challenge-response test on the mobile device. A response hash value is created based on the user's solution. The response hash value is sent to an account request server for verification.
Targeting Minivectors To Specific Tissue Using Shape
- Houston TX, US - Austin TX, US Qian WANG - Austin TX, US B. Montgomery PETTITT - Austin TX, US
International Classification:
C12N 15/70
Abstract:
Minivectors having defined, non-transient shapes as determined by sequence are provided, along with uses in the targeting delivery of such minivectors to target tissues for preferential gene delivery. Method of designing and making shaped minivectors are also provided.
Systems And Methods For Merchant Mobile Acceptance
Avinash Kalgi - Kirkland WA, US Qian Wang - Mercer Island WA, US
International Classification:
G06Q 20/38 G06Q 20/20 G06Q 20/32
Abstract:
Systems and methods are provided for merchant mobile acceptance of user device data. For example, a method comprises receiving encrypted user device data and reader metadata from a merchant mobile device, determining a device reader API and device reader encryption scheme using the device reader metadata, parsing the encrypted user device data using the device reader API to determine encrypted personal information, and decrypting the encrypted personal information using the reader encryption scheme.
Method To Mitigate Transients Based Attacks On Key Agreement Schemes Over Controller Area Network
- Stuttgart, DE Qian Wang - Greenbelt MD, US Tanvir Arafin - College Park MD, US Jorge Guajardo Merchan - Pittsburgh PA, US
International Classification:
H04B 1/40 H04L 12/40 H04L 29/06 H04L 9/08
Abstract:
A method for operating at least one node connected to a shared communication medium reduces or eliminates the ability of an adversary node to identify the at least one node based on transient signal characteristics of a signal that the at least one node generates when transmitting a bit through the shared communication medium. The method includes adjusting, with a controller in a first node, an impedance of a variable impedance circuit in the first node to a first impedance level that the controller determines randomly, the variable impedance circuit in the first node being connected to an output of a transceiver in the first node and to a shared communication medium, and transmitting, with the transceiver, a first data bit through the shared communication medium with the variable impedance circuit producing the first impedance level.
Method To Mitigate Timing Based Attacks On Key Agreement Schemes Over Controller Area Network
- Stuttgart, DE Qian Wang - Greenbelt MD, US Jorge Guajardo Merchan - Pittsburgh PA, US
International Classification:
H04L 29/06 H04L 9/08
Abstract:
A method of operating at least one node in a communication network that uses a shared communication medium has been developed to reduce or eliminate timing side-channel attacks performed by an adversary that is connected to the shared communication medium. The method includes generating, with a controller in a first node, a first jitter time offset randomly generated from within a predetermined time range, and transmitting, with a transceiver in the first node, a first data bit through an output of the transceiver that is connected to a shared communication medium, the first data bit being transmitted at a first time corresponding to the first jitter time offset added to a first predetermined transmission time.
Method To Mitigate Voltage Based Attacks On Key Agreement Over Controller Area Network (Can)
- Stuttgart, DE Qian Wang - Greenbelt MD, US Tanvir Arafin - College Park MD, US Jorge Guajardo Merchan - Pittsburgh PA, US
International Classification:
H04L 29/06 H04L 9/08
Abstract:
A method of operating at least one node in a communication network that uses a shared communication medium has been developed. The method includes adjusting, with a controller in a first node, a resistance of a first potentiometer in the first node to a first resistance level that the controller in the first node determines randomly, the first potentiometer in the first node being connected to an output of a transceiver in the first node and to a shared communication medium, and transmitting, with the transceiver in the first node, a first data bit through the output that is connected to the shared communication medium with the first potentiometer producing the first resistance level.
May 2010 to 2000 Vice PresidentUniversity of Maryland
Sep 2008 to 2000 Research AssistantUniversity of Maryland
Jan 2008 to 2000 Teaching AssistantCoalition of Life Science Bethesda, MD Mar 2011 to Mar 2011 Scientific RepresentativeUniversity of Maryland College Park, MD Jan 2009 to Aug 2010 Founder of Maryland Chinese Women's ChorusUniversity of Maryland College Park, MD Jan 2010 to May 2010 Organizer of the Annual MOCB Program Retreat
Education:
University of Maryland College Park, MD 2007 to 2014 Ph.D. in Molecular and Cellular BiologyFudan University 2003 to 2007 BS in Biotechnology
Medical School Shanxi Med Coll, Taiyuan City, Shanxi, China Graduated: 1997
Procedures:
Electrocardiogram (EKG or ECG) Vaccine Administration
Languages:
English
Description:
Dr. Wang graduated from the Shanxi Med Coll, Taiyuan City, Shanxi, China in 1997. She works in Plainsboro, NJ and specializes in Internal Medicine - Geriatrics. Dr. Wang is affiliated with University Medical Center Of Princeton At Plainsboro.
In lab tests by Qian Wang and David Ho and colleagues at Columbia University, antibodies from people who were boosted by vaccines or breakthrough infections were less successful at fending off the BA.4 and BA.5 subtypes of the virus.
Investors may be beginning to reduce their expectations for China's growth, but maindriverof fear isnot its capital markets or economy, it is its policy making, Vanguard's Hong Kong-based senior economist Qian Wang said.
Date: Feb 29, 2016
Category: Business
Source: Google
Early human ancestor did not have the jaws of a nutcracker
Carlson, PhD, from Texas A&M University; Kieran P. McNulty, PhD, from the University of Minnesota; Paul C. Dechow, PhD, Qian Wang, PhD, and Leslie C. Pryor, PhD, from the Baylor College of Dentistry at Texas A&M University; Ian R. Grosse, PhD, from the University of Massachusetts, Amhers
"The biggest risk in China is not really the economy," said Qian Wang, senior Asia economist for Vanguard Investments Hong Kong. "The real risk is, number one; the policy uncertainty, and number two; the currency. China is walking on eggshells."
Date: Jan 08, 2016
Source: Google
This $34 smartphone accessory diagnoses HIV in 15 minutes
One of the team, Qian Wang, a professor at Peking University in China and an adjunct professor at VCU, was having dinner with her husband at a restaurant in Beijing, when she looked up at the walls and saw dozens of pentagon-shaped tiles, reminiscent of the ones that line the streets of Cairo in Egy
"What we've seen could prove very useful, particularly when it comes to external implants in bones," lead author Qian Wang, PhD, of the University of South Carolina in Columbia, said in a press release. "If our results can be further developed ... you might be able to use different kinds of nanoscal