Patents by Inventor Chao Wan

Chao Wan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250013590
    Abstract: The present application relate to the technical field of mobile communication, and in particular to a radio frequency chip, an algorithm reconstruction method and a computer-readable storage medium. The radio frequency chip includes a configuration interface, an interconnection bus, a processor and at least two operation units. Each operation unit is provided with different operation functions. The configuration interface is connected to the processor, and is configured to transmit the received routing information and the configuration data to the processor. The routing information and the configuration data are determined according to a target operation function of the radio frequency chip. The interconnection bus is communicated with each operation unit and is connected to the processor, and is configured to adjust an input and output relationship between each operation unit.
    Type: Application
    Filed: October 10, 2022
    Publication date: January 9, 2025
    Inventors: Chuang ZHENG, Zhengjian DAI, Chao WAN, Jiangli LEI, Zuofeng ZHANG
  • Publication number: 20240317986
    Abstract: A recycled material based on in-situ compatibilization and chain extension is mainly prepared from the following raw materials in parts by mass: 30-70 parts of waste HIPS, 30-70 parts of waste PP, 2-6 parts of POE, 0.1-0.4 part of an alkylation reaction catalyst, 0.1-0.3 part of a co-catalyst, and 2-8 parts of a macromolecular chain extender. Further, a preparation method for the recycled material based on in-situ compatibilization and chain extension is provided.
    Type: Application
    Filed: November 22, 2022
    Publication date: September 26, 2024
    Applicant: CHINA NATIONAL ELECTRIC APPARATUS RESEARCH INSTITUTE CO., LTD.
    Inventors: Yonggao FU, Nuo CAO, Jiaqi HU, Ling WANG, Chao WAN
  • Publication number: 20240230727
    Abstract: A circuit arrangement for detecting a glitch on a supply voltage comprising a low pass filter arrangement coupled to a supply terminal and configured provide a filtered supply voltage. The circuit arrangement comprises a first and second detector circuit each configured to receive the supply voltage and the filtered supply voltage and configured to provide a first and second detection signal indicative of a glitch comprising a transient, positive and a transient negative change in the supply voltage at a first detector output terminal and second detector output terminal respectively. The circuit arrangement further comprises a circuit-arrangement output terminal configured to provide an output signal indicative of the detection of a glitch in the supply voltage based on the first detection signal and the second detection signal.
    Type: Application
    Filed: September 29, 2023
    Publication date: July 11, 2024
    Inventors: Joachim Josef Maria Kruecken, Chao Wan
  • Publication number: 20240133927
    Abstract: A circuit arrangement for detecting a glitch on a supply voltage comprising a low pass filter arrangement coupled to a supply terminal and configured provide a filtered supply voltage. The circuit arrangement comprises a first and second detector circuit each configured to receive the supply voltage and the filtered supply voltage and configured to provide a first and second detection signal indicative of a glitch comprising a transient, positive and a transient negative change in the supply voltage at a first detector output terminal and second detector output terminal respectively. The circuit arrangement further comprises a circuit-arrangement output terminal configured to provide an output signal indicative of the detection of a glitch in the supply voltage based on the first detection signal and the second detection signal.
    Type: Application
    Filed: September 28, 2023
    Publication date: April 25, 2024
    Inventors: Joachim Josef Maria Kruecken, Chao Wan
  • Publication number: 20240117125
    Abstract: A regenerated polymer alloy material is provided. The regenerated polymer alloy material is mainly prepared from the following raw materials in parts by mass: a waste HIPS: 55-70, a PP: 30-45, an alkylation reaction catalyst: 0.1-0.4, a co-catalyst: 0.1-0.3, and a HIPS-based macromolecular chain extender: 2-8. The regenerated polymer alloy material uses the waste HIPS and the PP new materials as raw materials, to obtain a waste HIPS based regenerated polymer alloy material with excellent comprehensive properties by using two types of chemical modifiers in combination in segments. The waste HIPS based regenerated polymer alloy material has environmental protection and high value. Further, a method for preparing the regenerated polymer alloy material is also provided.
    Type: Application
    Filed: November 22, 2022
    Publication date: April 11, 2024
    Applicant: CHINA NATIONAL ELECTRIC APPARATUS RESEARCH INSTITUTE CO., LTD.
    Inventors: Nuo CAO, Jiaqi HU, Yonggao FU, Ling WANG, Chao WAN
  • Publication number: 20240012509
    Abstract: A circuit arrangement for a touch sensor comprising: a plurality of capacitive sensors configured to measure over a respective sampling period for detecting a touch event on a surface and provide an output; an ADC to receive the output of the capacitive sensors and determine a digital value over a conversion period; a first switch arrangement configured to selectively provide the output from the capacitive sensors to the ADC; a controller configured to: activate a first capacitive sensor to measure the capacitance for detecting a touch event and activate a second capacitive sensor for detecting a touch event such that the respective sampling periods are at least partly concurrent, and configured to control the first switch arrangement to cause the ADC to receive the output of the first capacitive sensor after its sampling time and receive the output of the second capacitive sensor after its sampling time.
    Type: Application
    Filed: July 6, 2023
    Publication date: January 11, 2024
    Inventor: Chao Wan
  • Publication number: 20230078328
    Abstract: The present invention discloses a regenerated HIPS/PPO alloy material based on chemical and physical co-modification, which is mainly composed of the following components in parts by mass: waste HIPS 60-70, PPO 30-40, HIPS-based macromolecular chain extender 2-8, elastomer toughening agent 2-10, oxazoline chain extender 0.2-1, and chain-extension catalyst 0.1-0.4. The alloy material uses chemical modification of in-situ chain extension and compatibilization of the macromolecular chain extender to restore a molecular chain structure, improve a phase interface and increase compatibility of the alloy. Through physical modification introduced by adding the elastomer toughening agent, a combined effect of chemical modification and physical modification is exploited, with target properties improved, a regenerated plastic alloy material with an excellent comprehensive property prepared, and the waste fully utilized to achieve energy saving and emission reduction.
    Type: Application
    Filed: July 28, 2021
    Publication date: March 16, 2023
    Applicant: CHINA NATIONAL ELECTRIC APPARATUS RESEARCH INSTITUTE CO., LTD.
    Inventors: Nuo CAO, Yonggao FU, Jiaqi HU, Ling WANG, Chao WAN
  • Patent number: 11366683
    Abstract: A process deployment controller creates an updated image for an intermediary engine in order to execute one or more applications on a host infrastructure. The process deployment controller generates a partial image by executing source code from a template repository. The partial image provides a structure used to create an intermediary engine used with a container, which includes an application, as well as binaries and libraries required to execute the application in an infrastructure via the intermediary engine. The process deployment controller transmits an identifier of the infrastructure to a component registry; receives a component description of the infrastructure from the component registry; and uses the component description to create an updated image of the partial image. The process deployment controller, upon receiving a request for the application to run on the infrastructure, utilizes the updated image and intermediary engine to execute the application on the infrastructure.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: June 21, 2022
    Assignee: International Business Machines Corporation
    Inventors: Yuan Yuan Wang, Qi Feng Huo, Da Li Liu, Cdl Lei Li, Yan Song Liu, Tian Xiaoyi, Shu Chao Wan
  • Patent number: 11093263
    Abstract: The present disclosure provides a method, computer system and computer program product for generating a conversation content. According to the method, a rule corresponding to a first component of a user interface can be obtained, wherein the first component represents one or more resources provided to a user, an operation for the first component can be determined based on the rule and a feature of the first component, a virtual component tree can be constructed according to the operation, wherein the virtual component tree depicts components to be included in the user interface and relationship between the components; and the user interface can be rendered based on the virtual component tree.
    Type: Grant
    Filed: April 18, 2019
    Date of Patent: August 17, 2021
    Assignee: International Business Machines Corporation
    Inventors: Shu Chao Wan, Jing Jing Pan, Xin Peng Liu, Yiwen Huang, Ye Cui
  • Publication number: 20210208916
    Abstract: A process deployment controller creates an updated image for an intermediary engine in order to execute one or more applications on a host infrastructure. The process deployment controller generates a partial image by executing source code from a template repository. The partial image provides a structure used to create an intermediary engine used with a container, which includes an application, as well as binaries and libraries required to execute the application in an infrastructure via the intermediary engine. The process deployment controller transmits an identifier of the infrastructure to a component registry; receives a component description of the infrastructure from the component registry; and uses the component description to create an updated image of the partial image. The process deployment controller, upon receiving a request for the application to run on the infrastructure, utilizes the updated image and intermediary engine to execute the application on the infrastructure.
    Type: Application
    Filed: January 3, 2020
    Publication date: July 8, 2021
    Inventors: YUAN YUAN WANG, QI FENG HUO, DA LI LIU, CDL LEI LI, YAN SONG LIU, TIAN XIAOYI, SHU CHAO WAN
  • Patent number: 11042426
    Abstract: Embodiments of the present disclosure relate to reuse ongoing reusable Ajax requests. According to the method, one or more processors receive a first Ajax request in a web application. The method further includes detecting at least one ongoing Ajax request comprising a second ongoing reusable Ajax request. The second ongoing Ajax request may be substantially similar to the first Ajax request. The method further includes receiving the second ongoing reusable Ajax request from a server of the web application. The method further includes executing a call-back function of the second ongoing reusable Ajax request.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: June 22, 2021
    Assignee: International Business Machines Corporation
    Inventors: Shu Chao Wan, Jing Jing Pan, Xin Peng Liu
  • Patent number: 10854009
    Abstract: A method for obtaining a virtual object for a first terminal includes obtaining a first current indoor position, and obtaining a second indoor position corresponding to the first indoor position and a corresponding identifier of a virtual object. The second indoor position is a position of the virtual object corresponding to the identifier of the virtual object. The method also includes, when moving from the first indoor position into a first preset position range including the second indoor position, displaying an actual image shot by a camera and, when the actual image includes the second indoor position, displaying the virtual object at a position in the actual image corresponding to the second indoor position, obtaining a selection operation on the virtual object displayed in the actual image, and sending an obtaining request for the virtual object to a server according to the selection operation.
    Type: Grant
    Filed: March 11, 2019
    Date of Patent: December 1, 2020
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Zijie Chen, Jie Gao, Yongtao Li, Jianfeng Chen, Zhijie Xie, Shipeng Zhang, Chao Wan, Lei Zhang
  • Patent number: 10839091
    Abstract: Machine logic (for example, software) for protecting sensitive and confidential user data and sending the protected user data to an authorized third party for predictive analytics purposes. The machine logic rules perform linear transformation operations on the sensitive and confidential user data in order to obscure the underlying data before it is sent to an authorized third party for performing predictive analysis of the underlying data. After performing predictive analysis on the obscured data by the authorized third party, the owner of the sensitive and confidential data takes a consequential action (that is, the owner of the data makes a business-related decision) based on the prediction.
    Type: Grant
    Filed: December 5, 2017
    Date of Patent: November 17, 2020
    Assignee: International Business Machines Corporation
    Inventors: Xu Nan Zhang, Ming Chao Wan, Miao He, Lin Tang, Yue Tong, Bing Shao, Changrui Ren
  • Publication number: 20200334053
    Abstract: The present disclosure provides a method, computer system and computer program product for generating a conversation content. According to the method, a rule corresponding to a first component of a user interface can be obtained, wherein the first component represents one or more resources provided to a user, an operation for the first component can be determined based on the rule and a feature of the first component, a virtual component tree can be constructed according to the operation, wherein the virtual component tree depicts components to be included in the user interface and relationship between the components; and the user interface can be rendered based on the virtual component tree.
    Type: Application
    Filed: April 18, 2019
    Publication date: October 22, 2020
    Inventors: Shu Chao Wan, Jing Jing Pan, Xin Peng Liu, Yiwen Huang, YE CUI
  • Patent number: 10812761
    Abstract: A tracking method for a video surveillance system includes: obtaining identification information for a first target object uploaded by a positioning system; obtaining time information and location information for the positioning system at the time the positioning system uploads the identification information; storing the identification information, the location information, and the time information in a preset database to obtain a storage result; and generating tracking information for the first target object according to the storage result.
    Type: Grant
    Filed: May 25, 2018
    Date of Patent: October 20, 2020
    Assignee: Tencent Technology (Shenzhen) Company Limited
    Inventors: Lei Zhang, Shipeng Zhang, Zhijie Xie, Chao Wan, Xin Xu, Chaohui Ding, Hua Mao, Tao Wang, Chang Liu, Keji Wang, Fengli Ruan, Huiqin Yang, Mo Zhao, Zijie Chen
  • Publication number: 20200065169
    Abstract: Embodiments of the present disclosure relate to reuse ongoing reusable Ajax requests. According to the method, one or more processors receive a first Ajax request in a web application. The method further includes detecting at least one ongoing Ajax request comprising a second ongoing reusable Ajax request. The second ongoing Ajax request may be substantially similar to the first Ajax request. The method further includes receiving the second ongoing reusable Ajax request from a server of the web application. The method further includes executing a call-back function of the second ongoing reusable Ajax request.
    Type: Application
    Filed: August 23, 2018
    Publication date: February 27, 2020
    Inventors: Shu Chao Wan, Jing Jing Pan, Xin Peng Liu
  • Publication number: 20190206140
    Abstract: A method for obtaining a virtual object for a first terminal includes obtaining a first current indoor position, and obtaining a second indoor position corresponding to the first indoor position and a corresponding identifier of a virtual object. The second indoor position is a position of the virtual object corresponding to the identifier of the virtual object. The method also includes, when moving from the first indoor position into a first preset position range including the second indoor position, displaying an actual image shot by a camera and, when the actual image includes the second indoor position, displaying the virtual object at a position in the actual image corresponding to the second indoor position, obtaining a selection operation on the virtual object displayed in the actual image, and sending an obtaining request for the virtual object to a server according to the selection operation.
    Type: Application
    Filed: March 11, 2019
    Publication date: July 4, 2019
    Inventors: Zijie CHEN, Jie GAO, Yongtao LI, Jianfeng CHEN, Zhijie XIE, Shipeng ZHANG, Chao WAN, Lei ZHANG
  • Publication number: 20190171833
    Abstract: Machine logic (for example, software) for protecting sensitive and confidential user data and sending the protected user data to an authorized third party for predictive analytics purposes. The machine logic rules perform linear transformation operations on the sensitive and confidential user data in order to obscure the underlying data before it is sent to an authorized third party for performing predictive analysis of the underlying data. After performing predictive analysis on the obscured data by the authorized third party, the owner of the sensitive and confidential data takes a consequential action (that is, the owner of the data makes a business-related decision) based on the prediction.
    Type: Application
    Filed: December 5, 2017
    Publication date: June 6, 2019
    Inventors: Xu Nan Zhang, Ming Chao Wan, Miao He, Lin Tang, Yue Tong, Bing Shao, Changrui Ren
  • Publication number: 20190155851
    Abstract: This application discloses an information filtering method and an information processing apparatus. Shared information that is shared by a user account of an online service is obtained. A credibility reference rating associated with the user account is obtained. The credibility reference rating indicates account credibility of the user account. Whether the shared information satisfies a filtering condition is determined based on the credibility reference rating. Further, the shared information is filtered when the shared information is determined to satisfy the filtering condition.
    Type: Application
    Filed: January 29, 2019
    Publication date: May 23, 2019
    Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Xingya WANG, Qian Chen, Boen Liang, Jinzheng Zhang, Jianwei Yuan, Leming Fang, Chao Wan, Jilan Liang, Zijian He, Rui Tang, Zhike Liang, Xin Huang, Huankun Huang, Haixia Rao, Junwei Shen, Jun Zhang, Shuqin Sun, Pengfei Wang, Yingchao Liu, Wa Ye, Fei Huang, Jiasheng Huang, Zheqi Feng, Luting Chen, Shuwen Hu, Lingyun Xu
  • Patent number: 10171380
    Abstract: Embodiments of the invention provide a method, system and computer program product for the dynamic adjustment of a service level agreement (SLA) for a hosted computing environment based upon application capabilities. The method includes specifying in a user interface to the hosted computing environment one or more application components of an application to be hosted within the hosted computing environment. Thereafter, a resource utilization capability is determined for one of the components and a set of resource utilization options for an SLA for the application is filtered based upon the resource utilization capability of the component or components. One of the filtered set of options can be selected and the application is executed in the hosted computing environment. Finally, the utilization of resources accessible to the application is managed based upon the SLA during the execution of the application in the hosted computing environment.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Ajay A. Apte, Kirti A. Apte, Jianfeng Kong, Zhao Liu, Lin Sun, Shu Chao Wan, Li Yi