Patents by Inventor Yuhui Hu
Yuhui Hu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11989644Abstract: The disclosure discloses a three-dimensional (3D) convolution operation device and method based on a 3D phase change memory, which includes a 3D phase change memory, an input control module, a setting module, and an output control module. By using the 3D phase change memory to perform 3D convolution operation, the phase change units on the same bit line constitute a convolution kernel. Based on the multilayer stack structure, the upper and lower electrodes of the 3D phase change memory serve as the information input terminal, and they are convolved after passing through the respective phase change unit arrays, and the result of the convolution operation is superposed on the middle electrode in the form of current, thereby obtaining the sum of the convolution calculation results of the input information of the upper and lower electrodes, such that the 3D convolution operation is completed in one step.Type: GrantFiled: May 28, 2020Date of Patent: May 21, 2024Assignee: HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGYInventors: Hao Tong, Qing Hu, Yuhui He, Xiangshui Miao
-
Publication number: 20240133890Abstract: The present disclosure provides the use of BAZ1B_K426hy in the preparation of a product for tumor detection and belongs to the field of biotechnology. The present disclosure further provides a group of immunogenic polypeptides, including polypeptide A and polypeptide B. An anti-BAZ1B_K426hy polyclonal antibody is prepared by conducting mixed immunization on an animal with the immunogenic polypeptide. The polyclonal antibody can specifically recognize an endogenous protein BAZ1B_K426hy by enzyme-linked immunosorbent assay (ELISA)/Dot blot/Western blot, which is used for preparation of detection products for tumors and Williams syndrome.Type: ApplicationFiled: April 13, 2023Publication date: April 25, 2024Applicants: Tangshan People's Hospital, North China University of Science and Technology, Tangshan Maternal And Child Health HospitalInventors: Jingwu LI, Yufeng Li, Shuqing Wang, Jinghua Zhang, Jinghua Wu, Fen Hu, Yuan Yu, Yan Liu, Yuhui Li, Xuan Zheng
-
Patent number: 10812483Abstract: A server, primary client device, and secondary device may be provided. The server may be configured to receive a login request sent by a secondary client device, the login request including a secondary account identifier and an encoded image, the secondary account identifier associated with a secondary account. The server may decode the encoded image to identify a primary account identifier and an expiration time indicator encoded in the encoded image. The server may determine that the secondary account is linked with a primary account. The server may compare the expiration time indicator with the request time to determine that the encoded image has not expired. The server may authorize privileged communication with the secondary client device in response to the secondary account being linked with the primary account and determination that the encoded image has not expired.Type: GrantFiled: March 27, 2018Date of Patent: October 20, 2020Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Yuhui Hu, Huankui Chen, Jingbin Hu, Yuefeng Zeng
-
Patent number: 10097547Abstract: Disclosed are a security verification method, apparatus, and terminal. The method includes: acquiring a first verification code and prompting the first verification code, the content of the first verification code describing scenario information that is simple for a user to understand, and triggering the user to send a second verification code over a user terminal; receiving the second verification code, and acquiring an ID of the user terminal sending the second verification code; and obtaining a security verification result according to two verification results of the second verification code and the corresponding ID. A first verification code describing scenario information that is simple for a user to understand is displayed such that the user understands the scenario information corresponding to the first verification code and unauthorized users are prevented from stealing the verification codes using similar websites.Type: GrantFiled: December 17, 2015Date of Patent: October 9, 2018Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Yuhui Hu, Longpan Zhang, Shan Lu, Zhipeng Zhou
-
Publication number: 20180219864Abstract: A server, primary client device, and secondary device may be provided. The server may be configured to receive a login request sent by a secondary client device, the login request including a secondary account identifier and an encoded image, the secondary account identifier associated with a secondary account. The server may decode the encoded image to identify a primary account identifier and an expiration time indicator encoded in the encoded image. The server may determine that the secondary account is linked with a primary account. The server may compare the expiration time indicator with the request time to determine that the encoded image has not expired. The server may authorize privileged communication with the secondary client device in response to the secondary account being linked with the primary account and determination that the encoded image has not expired.Type: ApplicationFiled: March 27, 2018Publication date: August 2, 2018Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Yuhui HU, Huankui CHEN, Jingbin HU, Yuefeng ZENG
-
System and method for identity authentication based on face recognition, and computer storage medium
Patent number: 9524441Abstract: The present disclosure relates to a method for identity authentication based on face recognition. The method comprises: initiating an interaction authentication request, which includes requested interaction tracks, and sending the interaction authentication request to an authentication client; receiving face interaction information sent by the authentication client; extracting face action tracks from the face interaction information; determining whether the face action tracks are consistent with the requested interaction tracks; if the face action tracks are consistent with the requested interaction tracks, determining that the authentication is passed, otherwise determining that the authentication fails. The above solution could prevent the authentication server from being cheated by face pictures or videos taken previously and could ensure that the face pictures or videos passing the authentication is taken in real time from a real person.Type: GrantFiled: August 1, 2014Date of Patent: December 20, 2016Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Xin Yu, Lei Qin, Yuhui Hu, Yunyun Hao -
Publication number: 20160105436Abstract: Disclosed are a security verification method, apparatus, and terminal. The method includes: acquiring a first verification code and prompting the first verification code, the content of the first verification code describing scenario information that is simple for a user to understand, and triggering the user to send a second verification code over a user terminal; receiving the second verification code, and acquiring an ID of the user terminal sending the second verification code; and obtaining a security verification result according to two verification results of the second verification code and the corresponding ID. A first verification code describing scenario information that is simple for a user to understand is displayed such that the user understands the scenario information corresponding to the first verification code and unauthorized users are prevented from stealing the verification codes using similar websites.Type: ApplicationFiled: December 17, 2015Publication date: April 14, 2016Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Yuhui HU, Longpan ZHANG, Shan LU, Zhipeng ZHOU
-
SYSTEM AND METHOD FOR IDENTITY AUTHENTICATION BASED ON FACE RECOGNITION, AND COMPUTER STORAGE MEDIUM
Publication number: 20140341445Abstract: The present disclosure relates to a method for identity authentication based on face recognition. The method comprises: initiating an interaction authentication request, which includes requested interaction tracks, and sending the interaction authentication request to an authentication client; receiving face interaction information sent by the authentication client; extracting face action tracks from the face interaction information; determining whether the face action tracks are consistent with the requested interaction tracks; if the face action tracks are consistent with the requested interaction tracks, determining that the authentication is passed, otherwise determining that the authentication fails. The above solution could prevent the authentication server from being cheated by face pictures or videos taken previously and could ensure that the face pictures or videos passing the authentication is taken in real time from a real person.Type: ApplicationFiled: August 1, 2014Publication date: November 20, 2014Inventors: Xin Yu, Lei Qin, Yuhui Hu, Yunyun Hao -
Patent number: D847385Type: GrantFiled: December 15, 2017Date of Patent: April 30, 2019Inventors: Kailang Huang, Yuhui Hu