Patents by Inventor Chong Zhou
Chong Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210264715Abstract: Provided are a vending machine and a merchandise dispensing method thereof. A merchandise dispensing method comprising: driving the gate to move from a closed position to an open position and driving the receiving bin to rotate from a receiving position to a dispensing position in the case where a bucket containing the commodity for sale is located at a pickup port; when a baffle is inserted into the pickup port, the baffle and the gate move simultaneously, and the spacing between them is always less than or equal to a first preset value.Type: ApplicationFiled: June 20, 2019Publication date: August 26, 2021Inventors: Chunguang ZHANG, Chong ZHOU, Jiansong LIU, Tianxin JIANG, Chuntao WANG
-
Patent number: 11095674Abstract: This application discloses a distributed denial of service attack detection method. The method includes: obtaining a data stream sent to a protection object device in each detection period, obtaining total duration of each data stream; dividing each data stream into a long data stream or a short data stream based on the total duration of each data stream; adding, based on a detection period through which the long data stream goes, total data traffic of the long data stream to statistical traffic; adding data traffic of a short data stream in each detection period to the data traffic, of the long data stream, that is added to a corresponding detection period, to determine statistical traffic in each detection period; and if there is a detection period in which the statistical traffic exceeds a preset traffic threshold, determining that the protection object device undergoes a DDoS attack in the detection period.Type: GrantFiled: June 27, 2019Date of Patent: August 17, 2021Assignee: Huawei Technologies Co., Ltd.Inventors: Chong Zhou, Tienan Wang
-
Publication number: 20210124820Abstract: Embodiments of the present disclosure disclose an application program integrity verification method and a network device. The method includes: performing characteristic value calculation on data of an application program when the application program starts, to obtain a first digest of the application program; decrypting a stored digital signature of the application program according to a public key in an embedded key pair to obtain a second digest of the application program, where the digital signature is obtained, according to a private key in the key pair, by signing data of the application program each time the application program is updated, and the key pair is a manufacturer key pair corresponding to the application program; and determining that integrity verification of the application program passes if the first digest and the second digest are the same, otherwise, determining that integrity verification of the application program does not pass.Type: ApplicationFiled: November 5, 2020Publication date: April 29, 2021Inventors: Tianfu FU, Chong ZHOU
-
Publication number: 20210088783Abstract: A laminated glass for implementing HUD function, the laminated glass including an outer glass layer; an inner glass layer; a PVB film located between the outer glass layer and the inner glass layer; wherein the PVB film is of a uniform thickness, the laminated glass further includes a reflection film.Type: ApplicationFiled: March 27, 2018Publication date: March 25, 2021Inventors: Ce SHI, Yunxin GU, Chong ZHOU
-
Publication number: 20200374696Abstract: A device identifier (ID) obtaining method, a terminal, and a network device, where the method includes sending, by a terminal to a network device, a first message used to obtain a device ID, where the device ID is used to globally identify the terminal uniquely, receiving, by the terminal, an encrypted key pair sent by the network device, where the key pair includes a first public key and a first private key, receiving, by the terminal, information sent by the network device, where the information is used to identify that the first public key is the device ID of the terminal, and determining, by the terminal, that the first public key is the device ID.Type: ApplicationFiled: August 11, 2020Publication date: November 26, 2020Inventors: Chong Zhou, Tianfu Fu, Dacheng Zhang, Jianxiong Wei
-
Patent number: 10846393Abstract: Embodiments of the present disclosure disclose an application program integrity verification method and a network device. The method includes: performing eigenvalue calculation on data of an application program when the application program starts, to obtain a first digest of the application program (101); decrypting a stored digital signature of the application program according to a public key in an embedded key pair to obtain a second digest of the application program, where the digital signature is obtained, according to a private key in the key pair, by signing data of the application program each time the application program is updated (102), and the key pair is a manufacturer key pair corresponding to the application program; and determining that integrity verification of the application program passes if the first digest and the second digest are the same, otherwise, determining that integrity verification of the application program does not pass (103).Type: GrantFiled: May 12, 2017Date of Patent: November 24, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Tianfu Fu, Chong Zhou
-
Publication number: 20200354265Abstract: A thermal insulating glass includes a glass substrate and a thermal insulating layer. The thermal insulating layer includes composite tungsten oxide and a binder. The composite tungsten oxide is represented by formula (1): MxWO3?yAy (1), where M is an alkali metal element or an alkaline earth metal element, W is tungsten, O is oxygen, A is a halogen element, and 0?x?1 and 0?y?0.5. And the binder includes one or more of the following components: silicon dioxide, titanium dioxide, and aluminium oxide. The thermal insulating glass can prevent the occurrence of obscuration. The thermal insulating has infrared reflectivity, high strength and good wear resistance, and can effectively resist high temperature and strong oxidation environment.Type: ApplicationFiled: December 25, 2018Publication date: November 12, 2020Inventors: Yunxin GU, Ce SHI, Chong ZHOU
-
Patent number: 10801858Abstract: A map based navigation method, apparatus and storage medium. The method includes: acquiring a location status of a user terminal carrying a navigation client and a navigation operation of a user; and switching automatically between at least two types of navigation pages of the navigation client, based on the location status of the user terminal and the navigation operation of the user. This method can achieve an automatic switching between different types of navigation pages and satisfy different needs of the user in different situations.Type: GrantFiled: September 28, 2018Date of Patent: October 13, 2020Assignee: Baidu Online Network Technology (Beijing) Co., Ltd.Inventors: Dongmin Li, Weihao Gu, Yang Yu, Huirong Yang, Haoran Yu, Minghao Lei, Zijia Liu, Nanhao Qin, Chong Zhou, Zhengtao Zhu, Xintao Chen, Wenbin Mou, Yang Wang
-
Patent number: 10713352Abstract: A method and an apparatus for trusted measurement, where the method includes: obtaining a first processing result by performing a first-manner processing on a code segment, and using a result obtained by performing a second-manner processing on the first processing result as a reference value; obtaining, at a first moment when the system is running, a second processing result by performing the first-manner processing on the code segment, and obtaining a first measurement value by performing the second-manner processing on the second processing result; and determining whether the first measurement value and the reference value are equal, and when the first measurement value and the reference value are equal, the system is trusted, where the code segment in the memory is a code segment that does not change with normal running of the system during one start-up and a running process of the system.Type: GrantFiled: March 16, 2017Date of Patent: July 14, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Chong Zhou, Tianfu Fu
-
Patent number: 10635224Abstract: An information input method and apparatus for a touch screen are provided. The method includes acquiring a contact parameter and a contact position between an object and a touch screen. The contact parameter at least includes a pressure value exerted on the touch screen by the object and a contact area between the object and the touch screen, generating, according to the contact parameter and the contact position, a corresponding operation instruction, and executing, according to the operation instruction, a corresponding operation.Type: GrantFiled: March 24, 2016Date of Patent: April 28, 2020Assignee: XI'AN ZHONGXING NEW SOFTWARE CO., LTD.Inventors: Zhijian Hao, Shifeng Que, Chong Zhou
-
Publication number: 20190327224Abstract: This application provides a certificate obtaining method, an authentication method, and a network device, to improve control over operation permission of an APP on an API. The certificate is used for permission authentication when the APP accesses an API of a controller. The certificate includes one or more of (a) to (c): (a) information about operation permission of the APP on N application programming interfaces APIs of the controller, (b) identifiers of L APIs that are of the N APIs and that the APP has permission to operate, and (c) identifiers of R APIs that are of the N APIs and that the APP has no permission to operate.Type: ApplicationFiled: June 28, 2019Publication date: October 24, 2019Inventors: Dacheng Zhang, Tianfu Fu, Chong Zhou
-
Publication number: 20190327255Abstract: This application discloses a distributed denial of service attack detection method. The method includes: obtaining a data stream sent to a protection object device in each detection period, obtaining total duration of each data stream; dividing each data stream into a long data stream or a short data stream based on the total duration of each data stream; adding, based on a detection period through which the long data stream goes, total data traffic of the long data stream to statistical traffic; adding data traffic of a short data stream in each detection period to the data traffic, of the long data stream, that is added to a corresponding detection period, to determine statistical traffic in each detection period; and if there is a detection period in which the statistical traffic exceeds a preset traffic threshold, determining that the protection object device undergoes a DDoS attack in the detection period.Type: ApplicationFiled: June 27, 2019Publication date: October 24, 2019Inventors: Chong Zhou, Tienan Wang
-
Patent number: 10223241Abstract: Aspects include detecting, by an agent of a remote debugging tool that a first controller currently associated with the agent for a debugging session has not responded to a status inquiry from the agent. The first controller interacts with an end user, sends requests to the agent to operate a target program, and processes responses from the agent. Based on detecting that the first controller has not responded to the status inquiry from the agent, the agent identifies a second controller, associates the second controller with the agent for the debugging session, and resumes the debugging session with the second controller in place of the first controller. The associating includes synchronizing a debugging session state between the second controller and the agent. The target program continues to execute during the identifying, associating, and resuming, and the debugging session state is not changed by the identifying, associating, and resuming.Type: GrantFiled: March 2, 2017Date of Patent: March 5, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Wu Wei, Jian Xu, Chong Zhou
-
Patent number: 10204094Abstract: Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). The expanded row (or column width) is automatically displayed with proposed divisions (for example, represented with dashed lines). The user indicates acceptance of the proposed divisions. The expanded row (or column) is automatically divided into multiple rows (or columns) as indicated by the proposed divisions.Type: GrantFiled: May 4, 2018Date of Patent: February 12, 2019Assignee: International Business Machines CorporationInventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Chong Zhou
-
Publication number: 20190033089Abstract: A map based navigation method, apparatus and storage medium. The method includes: acquiring a location status of a user terminal carrying a navigation client and a navigation operation of a user; and switching automatically between at least two types of navigation pages of the navigation client, based on the location status of the user terminal and the navigation operation of the user. This method can achieve an automatic switching between different types of navigation pages and satisfy different needs of the user in different situations.Type: ApplicationFiled: September 28, 2018Publication date: January 31, 2019Inventors: Dongmin LI, Weihao GU, Yang YU, Huirong YANG, Haoran YU, Minghao LEI, Zijia LIU, Nanhao QIN, Chong ZHOU, Zhengtao ZHU, Xintao CHEN, Wenbin MOU, Yang WANG
-
Publication number: 20180348946Abstract: An information input method and apparatus for a touch screen are provided. The method includes acquiring a contact parameter and a contact position between an object and a touch screen. The contact parameter at least includes a pressure value exerted on the touch screen by the object and a contact area between the object and the touch screen, generating, according to the contact parameter and the contact position, a corresponding operation instruction, and executing, according to the operation instruction, a corresponding operation.Type: ApplicationFiled: March 24, 2016Publication date: December 6, 2018Inventors: Zhijian HAO, Shifeng QUE, Chong ZHOU
-
Patent number: 10095603Abstract: A method, computer program product and/or system for pre-fetching disassembly code. A breakpoint is set within an application under test (AUT). Setting of the breakpoint triggers pre-fetching of disassembly code associated with the breakpoint. The pre-fetched disassembly code is retained in a store local to a debug analysis system. When runtime processing of the AUT reaches the breakpoint, the debug analysis system retrieves the disassembly code from the local store.Type: GrantFiled: January 9, 2017Date of Patent: October 9, 2018Assignee: International Business Machines CorporationInventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Jian Xu, Chong Zhou
-
Publication number: 20180278632Abstract: This application relates to the field of network security technologies, and provides a method and a device for detecting a network attack. The method includes: collecting characteristic information of each of N sessions in a network, where N is an integer greater than 1; obtaining a statistical result, where the statistical result is a result obtained by collecting statistics on the characteristic information of the N sessions by using each of the N sessions as a sampling unit and by using the characteristic information as a sample value; and when a difference between the statistical result and a reference result exceeds a preset condition, determining the network is under a network attack. According to this application, a session-type network attack can be effectively detected because instead of a packet, a session is used as a sampling unit.Type: ApplicationFiled: May 30, 2018Publication date: September 27, 2018Inventors: Tianfu Fu, Chong Zhou, Ziyi Liu
-
Publication number: 20180253371Abstract: Aspects include detecting, by an agent of a remote debugging tool that a first controller currently associated with the agent for a debugging session has not responded to a status inquiry from the agent. The first controller interacts with an end user, sends requests to the agent to operate a target program, and processes responses from the agent. Based on detecting that the first controller has not responded to the status inquiry from the agent, the agent identifies a second controller, associates the second controller with the agent for the debugging session, and resumes the debugging session with the second controller in place of the first controller. The associating includes synchronizing a debugging session state between the second controller and the agent. The target program continues to execute during the identifying, associating, and resuming, and the debugging session state is not changed by the identifying, associating, and resuming.Type: ApplicationFiled: March 2, 2017Publication date: September 6, 2018Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Wu Wei, Jian Xu, Chong Zhou
-
Patent number: 10067851Abstract: A method, computer program product and/or system for pre-fetching disassembly code. A breakpoint is set within an application under test (AUT). Setting of the breakpoint triggers pre-fetching of disassembly code associated with the breakpoint. The pre-fetched disassembly code is retained in a store local to a debug analysis system. When runtime processing of the AUT reaches the breakpoint, the debug analysis system retrieves the disassembly code from the local store.Type: GrantFiled: August 22, 2017Date of Patent: September 4, 2018Assignee: International Business Machines CorporationInventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Jian Xu, Chong Zhou