Patents by Inventor Fangming Chai

Fangming Chai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240004695
    Abstract: A method for processing an interrupt request includes: receiving a first interrupt request, where operations that the first interrupt request requests to execute include a first operation, execution of the first operation needs to occupy a critical resource, and the critical resource cannot be simultaneously occupied by a plurality of operations; determining, based on at least the received first interrupt request, that the first operation is an operation that does not need to be executed immediately; and storing the first operation into a temporary storage area.
    Type: Application
    Filed: September 18, 2023
    Publication date: January 4, 2024
    Inventors: Fangming Chai, Wenjing Wang, Kun Huang
  • Publication number: 20230396634
    Abstract: A device may include a vehicle comprising a plurality of network zones, each network zone comprising a plurality of end points. A device may include a controller, comprising: a log monitoring component configured to interpret a log corpus associated with at least one of the plurality of end points, a log analysis component configured to detect a risk event in response to the log corpus, and a risk response component configured to perform a risk response operation in response to the detected risk event.
    Type: Application
    Filed: August 18, 2023
    Publication date: December 7, 2023
    Inventors: Yu Fang, Andrew Ling, Felipe Andres Valdes Valenzuela, Xuanran Zong, Sudhir Ramphal Dhankhar, Fangming Chai
  • Publication number: 20090327688
    Abstract: Embodiments of the present invention provide a method and a system for detecting a malicious code. The method includes obtaining first system information and second system information, and detecting the malicious code by identifying difference between the first system information and the second system information, which thus can detect an unknown malicious code, improve the system security, and can be easily implemented.
    Type: Application
    Filed: June 12, 2009
    Publication date: December 31, 2009
    Applicant: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD.
    Inventors: Yichao Li, Lingzhi Gu, Yuqi Yang, Huan Du, Haowen Bai, Dan Liu, Yue Cao, Xiao Liang, Sheng Xu, Bocheng Shu, Fangming Chai