Patents by Inventor Yuhang Zhu
Yuhang Zhu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240093443Abstract: Disclosed in the present disclosure is a double-deck multi-span bridge construction method. According to the double-deck bridge construction method of the present disclosure, construction is carried out by using a method of disassembling a support jig frame in a graded and span-separated mode, an upper chord jig frame and a lower chord jig frame can be used in a recycle manner, and construction costs are reduced. In addition, a construction period of building the support jig frame is shortened, and other construction operations can be synchronously carried out on a span in which the jig frame is disassembled, for example, fire retardant coating construction can be carried out on a mounted bridge deck after the jig frame is disassembled, and the construction period of a double-deck multi-span bridge is effectively shortened.Type: ApplicationFiled: September 23, 2021Publication date: March 21, 2024Applicant: CHINA CONSTRUCTION SCIENCE AND INDUSTRY CORPORATION LTD.Inventors: Jinglei REN, Bing SUN, Yonggang GAO, Hongyu SHEN, Shaohui ZHU, Jianguo QI, Cui LIU, Ruihua YAN, Zhiqiang HE, Longfei LI, Sijie YANG, Huaidong ZHANG, Xu CHEN, Wei JIANG, Wenbo LI, Yingwu SUN, Yuhang ZHANG
-
Publication number: 20240086231Abstract: This application provides a task migration system and method. The system includes a first terminal and a second terminal. The second terminal runs a first application. The first terminal opens a recent task interface after receiving a user operation, where the recent task interface includes an identifier of the second terminal; after receiving a user operation performed on the identifier of the second terminal, displays, in the recent task interface, at least one task card corresponding to an application run by the second terminal in the background; and after receiving a user operation performed on a first task card corresponding to the first application, runs the first application, and displays a first user interface of the first application.Type: ApplicationFiled: November 15, 2023Publication date: March 14, 2024Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Kang Chen, Yuhang Song, Hao Huang, Wenjie Huang, Can Jia, Jianhua Zhu, Mingxiang Zhang, Chao Cao, Yanan Zhang, Hongjun Wang, Zhiyan Yang, Chao Xu
-
Publication number: 20240064058Abstract: Embodiments described herein are directed to implementing compliance settings by a computing device for bringing the computing device into compliance with a configuration scenario. For instance, a computing device may receive, from a server, configuration information describing compliance settings for implementing by the computing device to bring the computing device into compliance with a configuration scenario. Moreover, the computing device may identify a state machine indicated by the configuration information that describes a configuration process for implementing the compliance settings and execute the state machine to configure the computing device with the compliance settings.Type: ApplicationFiled: July 19, 2023Publication date: February 22, 2024Applicant: Microsoft Technology Licensing, LLCInventors: Peter J. Kaufman, Richard I. June, Moiz Z. Rassiwala, Daniel S. Dudugjian, Shayak Lahiri, Sean A. Bowles, Yuhang Zhu, Adeep Singh Cheema, Rama Krishna Samudrala, Jitendrakumar G. Koshti, Gaurav Raghu Dhawan
-
Publication number: 20230421616Abstract: Embodiments described herein are directed to managing device compliance for devices that are connected to an enterprise network. For example, a mobile device manager may provide configuration settings to a computing device, which implements the settings in order to be compliant with an enterprise's data and/or security policy. The mobile device manager also maintains a local reference of each device's configuration settings implemented thereby. When the mobile device manager subsequently performs a determination as to whether the computing device is still in compliance, the mobile device manager simply needs to refer to the local reference to determine the computing device's settings instead of explicitly querying the computing device for its settings.Type: ApplicationFiled: May 5, 2023Publication date: December 28, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Shayak Lahiri, Richard I. June, Peter J. Kaufman, Yuhang Zhu
-
Patent number: 11811832Abstract: Embodiments described herein are directed to managing device compliance for devices that are connected to an enterprise network. For example, a mobile device manager may provide configuration settings to a computing device, which implements the settings in order to be compliant with an enterprise's data and/or security policy. The mobile device manager also maintains a local reference of each device's configuration settings implemented thereby. When the mobile device manager subsequently performs a determination as to whether the computing device is still in compliance, the mobile device manager simply needs to refer to the local reference to determine the computing device's settings instead of explicitly querying the computing device for its settings.Type: GrantFiled: June 30, 2021Date of Patent: November 7, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Shayak Lahiri, Richard I. June, Peter J. Kaufman, Yuhang Zhu
-
Patent number: 11750444Abstract: Embodiments described herein are directed to implementing compliance settings by a computing device for bringing the computing device into compliance with a configuration scenario. For instance, a computing device may receive, from a server, configuration information describing compliance settings for implementing by the computing device to bring the computing device into compliance with a configuration scenario. Moreover, the computing device may identify a state machine indicated by the configuration information that describes a configuration process for implementing the compliance settings and execute the state machine to configure the computing device with the compliance settings.Type: GrantFiled: July 23, 2021Date of Patent: September 5, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Peter J. Kaufman, Richard I. June, Moiz Z. Rassiwala, Daniel S. Dudugjian, Shayak Lahiri, Sean A. Bowles, Yuhang Zhu, Adeep Singh Cheema, Rama Krishna Samudrala, Jitendrakumar G. Koshti, Gaurav Raghu Dhawan
-
Patent number: 11184223Abstract: Embodiments described herein are directed to implementing compliance settings by a computing device for bringing the computing device into compliance with a configuration scenario. For instance, a computing device may receive, from a server, configuration information describing compliance settings for implementing by the computing device to bring the computing device into compliance with a configuration scenario. Moreover, the computing device may identify a state machine indicated by the configuration information that describes a configuration process for implementing the compliance settings and execute the state machine to configure the computing device with the compliance settings.Type: GrantFiled: July 31, 2018Date of Patent: November 23, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Peter J. Kaufman, Richard I. June, Moiz Z. Rassiwala, Daniel S. Dudugjian, Shayak Lahiri, Sean A. Bowles, Yuhang Zhu, Adeep Singh Cheema, Rama Krishna Samudrala, Jitendrakumar G. Koshti, Gaurav Raghu Dhawan
-
Publication number: 20210351978Abstract: Embodiments described herein are directed to implementing compliance settings by a computing device for bringing the computing device into compliance with a configuration scenario. For instance, a computing device may receive, from a server, configuration information describing compliance settings for implementing by the computing device to bring the computing device into compliance with a configuration scenario. Moreover, the computing device may identify a state machine indicated by the configuration information that describes a configuration process for implementing the compliance settings and execute the state machine to configure the computing device with the compliance settings.Type: ApplicationFiled: July 23, 2021Publication date: November 11, 2021Inventors: Peter J. Kaufman, Richard I. June, Moiz Z. Rassiwala, Daniel S. Dudugjian, Shayak Lahiri, Sean A. Bowles, Yuhang Zhu, Adeep Singh Cheema, Rama Krishna Samudrala, Jitendrakumar G. Koshti, Gaurav Raghu Dhawan
-
Patent number: 11172456Abstract: A communication system includes a digital data processor that produces a digital data sample and one or more control bits. A serialized transmit interface combines the digital data sample and the control bit(s) into one or more data packets and sends the data packet(s) over a signal line. A serialized receive interface receives the transmitted data packet(s) from the signal line and produces a reconstructed digital data sample and the control bit(s) from the transmitted data packet(s). A control circuit coupled to the serialized receive interface produces a control signal from the control bit(s). The communication system may include a converter circuit, which produces an RF input signal by performing a digital-to-analog conversion of the reconstructed digital data sample, and by upconverting the resulting analog data sample signal to RF. A power amplifier amplifies the RF input signal and modifies operation of a sub-circuit based on the control signal.Type: GrantFiled: November 3, 2020Date of Patent: November 9, 2021Assignee: NXP USA, Inc.Inventors: Nicholas Justin Mountford Spence, Yuhang Zhu, John Vaglica
-
Publication number: 20210329038Abstract: Embodiments described herein are directed to managing device compliance for devices that are connected to an enterprise network. For example, a mobile device manager may provide configuration settings to a computing device, which implements the settings in order to be compliant with an enterprise's data and/or security policy. The mobile device manager also maintains a local reference of each device's configuration settings implemented thereby. When the mobile device manager subsequently performs a determination as to whether the computing device is still in compliance, the mobile device manager simply needs to refer to the local reference to determine the computing device's settings instead of explicitly querying the computing device for its settings.Type: ApplicationFiled: June 30, 2021Publication date: October 21, 2021Inventors: Shayak Lahiri, Richard I. June, Peter J. Kaufman, Yuhang Zhu
-
Patent number: 10803175Abstract: A device boots in a secure manner that allows measurements reflecting which components are loaded during booting to be generated. Measurements of such components, as well as of a device management agent and the security state of the device, are also obtained. The device management agent accesses an attestation service for an enterprise, which is a collection of resources managed by a management service. The device management agent provides the obtained measurements to the attestation service, which evaluates the measurements and based on the evaluation determines whether the device is verified for use in the enterprise. The management service uses this verification to ensure that the device management agent is running in a secure manner, is accurately providing indications of the state of the device to the management service, and is implementing policy received from the management service.Type: GrantFiled: March 6, 2015Date of Patent: October 13, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Janani Vasudevan, Peter David Waxman, Kinshuman Kinshumann, Justin A. Hou, Peter J. Kaufman, Yuhang Zhu, Giridhar Viswanathan, Scott R. Shell
-
Publication number: 20200044916Abstract: Embodiments described herein are directed to implementing compliance settings by a computing device for bringing the computing device into compliance with a configuration scenario. For instance, a computing device may receive, from a server, configuration information describing compliance settings for implementing by the computing device to bring the computing device into compliance with a configuration scenario. Moreover, the computing device may identify a state machine indicated by the configuration information that describes a configuration process for implementing the compliance settings and execute the state machine to configure the computing device with the compliance settings.Type: ApplicationFiled: July 31, 2018Publication date: February 6, 2020Inventors: Peter J. Kaufman, Richard I. June, Moiz Z. Rassiwala, Daniel S. Dudugjian, Shayak Lahiri, Sean A. Bowles, Yuhang Zhu, Adeep Singh Cheema, Rama Krishna Samudrala, Jitendrakumar G. Koshti, Gaurav Raghu Dhawan
-
Patent number: 10554486Abstract: Various technologies described herein pertain to managing multiple enrollments of a computing device into configuration sources. Respective enrollment types for the enrollments into the configuration sources can be detected. Moreover, respective control data for the enrollments into the configuration sources can be set based on the enrollment types. Provisioning elements (e.g., policies, preferences, configuration profiles, and resources) that satisfy the respective control data can be permitted to be applied to the computing device by the configuration sources as part of the enrollments. Further, disparate provisioning elements that fail to satisfy the respective control data can be prevented from being applied to the computing device as part of the enrollments.Type: GrantFiled: September 26, 2014Date of Patent: February 4, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Peter J. Kaufman, Richard Ivan June, Feng Yue, Yuhang Zhu, John Chadwell Spaith, Justin Hou, Vladimir Holostov, Javier Novales, Sean Anderson Bowles, Janani Vasudevan
-
Publication number: 20200028879Abstract: Embodiments described herein are directed to managing device compliance for devices that are connected to an enterprise network. For example, a mobile device manager may provide configuration settings to a computing device, which implements the settings in order to be compliant with an enterprise's data and/or security policy. The mobile device manager also maintains a local reference of each device's configuration settings implemented thereby. When the mobile device manager subsequently performs a determination as to whether the computing device is still in compliance, the mobile device manager simply needs to refer to the local reference to determine the computing device's settings instead of explicitly querying the computing device for its settings.Type: ApplicationFiled: July 17, 2018Publication date: January 23, 2020Inventors: Shayak Lahiri, Richard I. June, Peter J. Kaufman, Yuhang Zhu
-
Patent number: 10437625Abstract: Various technologies described herein pertain to evaluating configuration compliance of a computing device. The computing device operates in a configuration compliance evaluation mode to test a set of configuration requests for a configuration source. Configuration changes to the computing device can be applied in a virtual machine run on the computing device when operating in the configuration compliance evaluation mode. Responsive to each configuration request being received and when the computing device is operating in the configuration compliance evaluation mode, the computing device can store the configuration request in a data store, apply the configuration request in the virtual machine to cause a configuration change in the virtual machine, and store data for verifying enforcement of the configuration change in the data store.Type: GrantFiled: June 16, 2017Date of Patent: October 8, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Peter J. Kaufman, Sean Anderson Bowles, Shayak Lahiri, Tarun Kumar Jain, Prakash Ajay Kumar Suri, Yuhang Zhu, Adrian Francisco Teran Guajardo
-
Publication number: 20180365043Abstract: Various technologies described herein pertain to evaluating configuration compliance of a computing device. The computing device operates in a configuration compliance evaluation mode to test a set of configuration requests for a configuration source. Configuration changes to the computing device can be applied in a virtual machine run on the computing device when operating in the configuration compliance evaluation mode. Responsive to each configuration request being received and when the computing device is operating in the configuration compliance evaluation mode, the computing device can store the configuration request in a data store, apply the configuration request in the virtual machine to cause a configuration change in the virtual machine, and store data for verifying enforcement of the configuration change in the data store.Type: ApplicationFiled: June 16, 2017Publication date: December 20, 2018Inventors: Peter J. KAUFMAN, Sean Anderson BOWLES, Shayak LAHIRI, Tarun Kumar JAIN, Prakash Ajay Kumar SURI, Yuhang ZHU, Adrian Francisco TERAN GUAJARDO
-
Patent number: 9848330Abstract: Various technologies described herein pertain to policy management on a mobile device. The mobile device includes a device policy manager system that includes a unified interface component and a policy handler component. The unified interface component is configured to receive policy configuration requests from multiple policy sources, including at least an internal policy source component executed by the mobile device and a device management server external to the mobile device. The policy configuration requests include at least a first policy configuration request (a first policy value for a policy) from a first policy source and a second policy configuration request (a second policy value for the policy) from a second policy source. The policy handler component is configured to resolve the conflict between the first and second policy values based on a conflict resolution technique to set a current policy value for the policy that controls the mobile device.Type: GrantFiled: February 9, 2015Date of Patent: December 19, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Peter J. Kaufman, Yuhang Zhu, John Chadwell Spaith, Justin Hou, Sonia Prabhu
-
Publication number: 20160259941Abstract: A device boots in a secure manner that allows measurements reflecting which components are loaded during booting to be generated. Measurements of such components, as well as of a device management agent and the security state of the device, are also obtained. The device management agent accesses an attestation service for an enterprise, which is a collection of resources managed by a management service. The device management agent provides the obtained measurements to the attestation service, which evaluates the measurements and based on the evaluation determines whether the device is verified for use in the enterprise. The management service uses this verification to ensure that the device management agent is running in a secure manner, is accurately providing indications of the state of the device to the management service, and is implementing policy received from the management service.Type: ApplicationFiled: March 6, 2015Publication date: September 8, 2016Inventors: Janani Vasudevan, Peter David Waxman, Kinshuman Kinshumann, Justin A. Hou, Peter J. Kaufman, Yuhang Zhu, Giridhar Viswanathan, Scott R. Shell
-
Publication number: 20160094386Abstract: Various technologies described herein pertain to managing multiple enrollments of a computing device into configuration sources. Respective enrollment types for the enrollments into the configuration sources can be detected. Moreover, respective control data for the enrollments into the configuration sources can be set based on the enrollment types. Provisioning elements (e.g., policies, preferences, configuration profiles, and resources) that satisfy the respective control data can be permitted to be applied to the computing device by the configuration sources as part of the enrollments. Further, disparate provisioning elements that fail to satisfy the respective control data can be prevented from being applied to the computing device as part of the enrollments.Type: ApplicationFiled: September 26, 2014Publication date: March 31, 2016Inventors: Peter J. Kaufman, Richard Ivan June, Feng Yue, Yuhang Zhu, John Chadwell Spaith, Justin Hou, Vladimir Holostov, Javier Novales, Sean Anderson Bowles, Janani Vasudevan
-
Publication number: 20150296368Abstract: Various technologies described herein pertain to policy management on a mobile device. The mobile device includes a device policy manager system that includes a unified interface component and a policy handler component. The unified interface component is configured to receive policy configuration requests from multiple policy sources, including at least an internal policy source component executed by the mobile device and a device management server external to the mobile device. The policy configuration requests include at least a first policy configuration request (a first policy value for a policy) from a first policy source and a second policy configuration request (a second policy value for the policy) from a second policy source. The policy handler component is configured to resolve the conflict between the first and second policy values based on a conflict resolution technique to set a current policy value for the policy that controls the mobile device.Type: ApplicationFiled: February 9, 2015Publication date: October 15, 2015Inventors: Peter J. Kaufman, Yuhang Zhu, John Chadwell Spaith, Justin Hou, Sonia Prabhu