Patents by Inventor Hao Lei

Hao Lei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11966822
    Abstract: Disclosed are a computer-implemented method, a system and a computer program product for feature processing. In the computer-implemented method for feature processing, two input features selected from multiple features of each sample in a sample set are projected to one resulting feature by one or more processing units based on a specified curve. The sample set is updated by replacing the two input features with the one resulting feature for each sample in the sample set by one or more processing units. The projecting and the updating for the sample set are repeated by one or more processing units until the number of features of each sample in the sample set reaches a predetermined criterion.
    Type: Grant
    Filed: September 29, 2020
    Date of Patent: April 23, 2024
    Assignee: International Business Machines Corporation
    Inventors: Chun Lei Xu, Si Er Han, Shi Bin Liu, Yi Shao, Lei Tian, Hao Zheng, Jia Rui Wang
  • Patent number: 11956715
    Abstract: A terminal device obtains first slice selection assistance information, where the first slice selection assistance information is obtained by encrypting second slice selection assistance information, and the second slice selection assistance information is selection assistance information of a slice to which the terminal device is allowed to access. The terminal device sends a registration request message to an access network device, where the registration request message includes the first slice selection assistance information.
    Type: Grant
    Filed: October 25, 2021
    Date of Patent: April 9, 2024
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Hao Hu, Zhongding Lei, Rong Wu, Bo Zhang
  • Publication number: 20240106282
    Abstract: A magnetically-isolated wireless charging assembly enabling temporary attachment by magnetism to a device requiring charge by induction includes a housing defining an accommodating space, a plurality of magnetic members disposed within the accommodating space, a wireless charging receiver covering the plurality of magnetic members, and a wireless charging receiver. The wireless charging receiver is disposed on a side of the magnetic shielding member facing the plurality of magnetic members and the magnetic shielding member prevents the magnetic field of the magnetic members extending through or beyond the shielding member.
    Type: Application
    Filed: December 19, 2022
    Publication date: March 28, 2024
    Inventors: BO-DUO YUAN, YAN-LEI CAO, HAO-XIANG LI
  • Publication number: 20240095358
    Abstract: Techniques for snapshot classification involve generating a plurality of snapshots of a storage system at multiple times; clustering the plurality of snapshots into a first group of snapshots and a second group of snapshots based on data features of the plurality of snapshots; and determining a clean snapshot among the plurality of snapshots based on a comparison between the generation time of the first group of snapshots and the generation time of the second group of snapshots. Accordingly, a clean snapshot and a damaged snapshot can be automatically and quickly distinguished, thereby improving the efficiency of finding a clean snapshot and helping a user recover data quickly.
    Type: Application
    Filed: March 30, 2023
    Publication date: March 21, 2024
    Inventors: Weibing Zhang, Victor Lei Gao, Hao Fang, Donglei Wang, Zhe He
  • Publication number: 20230372740
    Abstract: A neutron-capture therapy system includes a charged particle beam generation unit, a beam transmission unit and a neutron beam generation unit. The charged particle beam generation unit includes an ion source and an accelerator. The accelerator accelerates charged particles generated by the ion source, so as to obtain a charged particle beam of the required energy. The neutron beam generation unit includes a target, a beam shaping body and a collimator. The charged particle beam irradiates onto the target through the beam transmission unit to generate neutrons, which sequentially pass through the beam shaping body and the collimator to form a neutron beam for therapy. The neutron-capture therapy system is accommodated in a concrete building including an irradiation room, an accelerator chamber and a beam transmission chamber. The neutron beam generation unit is at least partially accommodated in a partition wall of the irradiation chamber and the beam transmission chamber.
    Type: Application
    Filed: August 4, 2023
    Publication date: November 23, 2023
    Inventors: Yuan-Hao LIU, Wei-Hua LU, Qiu=Ping GONG, Hao-lei XU
  • Patent number: 11666905
    Abstract: Disclosed is a triboelectric nanogenerator-based biochemical droplet reaction device, which includes a reaction generating part and a power generation part. The power generation part includes a triboelectric component and a rectifier circuit. The triboelectric component includes a drive electrode, a substrate, a first friction electrode, a first friction material, a second friction material, and a second friction electrode arranged in sequence from top to bottom. A gap exists between the first friction material and the second friction material. The first friction electrode is connected to the first friction material. The second friction electrode is connected to the second friction material. The drive electrode, the first friction electrode, and the second friction electrode are all connected to the rectifier circuit. Also disclosed is a reaction method.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: June 6, 2023
    Assignee: SOOCHOW UNIVERSITY
    Inventors: Haibo Huang, Hao Shen, Zhen Wen, Liguo Chen, Hao Lei, Jizhu Liu, Yangjun Wang, Cihai Dai
  • Publication number: 20220355293
    Abstract: Disclosed is a triboelectric nanogenerator-based biochemical droplet reaction device, which includes a reaction generating part and a power generation part. The power generation part includes a triboelectric component and a rectifier circuit. The triboelectric component includes a drive electrode, a substrate, a first friction electrode, a first friction material, a second friction material, and a second friction electrode arranged in sequence from top to bottom. A gap exists between the first friction material and the second friction material. The first friction electrode is connected to the first friction material. The second friction electrode is connected to the second friction material. The drive electrode, the first friction electrode, and the second friction electrode are all connected to the rectifier circuit. Also disclosed is a reaction method.
    Type: Application
    Filed: December 11, 2020
    Publication date: November 10, 2022
    Inventors: Haibo HUANG, Hao SHEN, Zhen WEN, Liguo CHEN, Hao LEI, Jizhu LIU, Yangjun WANG, Cihai DAI
  • Patent number: 11196556
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: December 7, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Yao Wang, Hao Lei, Li Lin
  • Patent number: 11159305
    Abstract: A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<<n. A random number r is selected, so that hr belongs to the predetermined cyclic group. To-be-encrypted data m, corresponding to the target user using the public key pk and the random number r, is processed to generate a homomorphic ciphertext c=(1+N)m·(hN mod N2)r mod N2. The homomorphic ciphertext c is provided to the target user, where the homomorphic ciphertext c can be decrypted using a private key sk to obtain the data m.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: October 26, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Shuai Han, Zhangjie Huang, Huanyu Ma, Hao Lei
  • Publication number: 20210312429
    Abstract: Implementations are directed to cross-asset trading in blockchain networks, and include a first node providing transaction information based on a first value, a second value, and an exchange rate of a second node, receiving, from the second node, a first evidence set, a first range proof, and a digital signature of the second node, and submitting the transaction for verification based on the first range proof, a second range proof, the first evidence set, a second evidence set, a digital signature of the first node, and the digital signature of the second node, the transaction being executed to decrease a balance of the first node by the first value, increase a first balance of the second node by the first value, decrease a second balance of the second node by the second value, and increase a balance of the third node by the second value.
    Type: Application
    Filed: April 22, 2021
    Publication date: October 7, 2021
    Applicant: Advanced New Technologies Co., Ltd.
    Inventors: Wenbin Zhang, Hao Lei, Lichun Li, Zhangjie Huang
  • Publication number: 20210186610
    Abstract: Exemplary embodiments of system, methods and computer-accessible medium can be provided for performing feedback-controlled electromagnetic radiation (EMR)-based treatment. Some exemplary embodiments include an image acquisition system configured to detect information regarding at least one portion of a tissue, and an EMR source configured to generate an EMR beam. A controller can be provided that can be configured to (i) recognize one or more targets within the portion(s) of the tissue based upon the feedback data, (ii) locate one or more coordinates within the portion(s) associated with the target(s), and (iii) control the optical arrangement to direct the EMR beam to impact the coordinate(s).
    Type: Application
    Filed: December 18, 2020
    Publication date: June 24, 2021
    Inventors: VINCENT ZUO, HAO LEI, THOMAS DODD, JAYANT BHAWALKAR, LEWIS J. LEVINE, CHARLES HOLLAND DRESSER
  • Publication number: 20210160066
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key.
    Type: Application
    Filed: February 1, 2021
    Publication date: May 27, 2021
    Applicant: Advanced New Technologies Co., Ltd.
    Inventors: Yao Wang, Hao Lei, Li Lin
  • Patent number: 10990963
    Abstract: Implementations are directed to cross-asset trading in blockchain networks, and include a first node providing transaction information based on a first value, a second value, and an exchange rate of a second node, receiving, from the second node, a first evidence set, a first range proof, and a digital signature of the second node, and submitting the transaction for verification based on the first range proof, a second range proof, the first evidence set, a second evidence set, a digital signature of the first node, and the digital signature of the second node, the transaction being executed to decrease a balance of the first node by the first value, increase a first balance of the second node by the first value, decrease a second balance of the second node by the second value, and increase a balance of the third node by the second value.
    Type: Grant
    Filed: June 21, 2019
    Date of Patent: April 27, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Wenbin Zhang, Hao Lei, Lichun Li, Zhangjie Huang
  • Patent number: 10956900
    Abstract: Implementations are directed to cross-asset trading in blockchain networks, and include a first node providing transaction information based on a first value, a second value, and an exchange rate of a second node, receiving, from the second node, a first evidence set, a first range proof, and a digital signature of the second node, and submitting the transaction for verification based on the first range proof, a second range proof, the first evidence set, a second evidence set, a digital signature of the first node, and the digital signature of the second node, the transaction being executed to decrease a balance of the first node by the first value, increase a first balance of the second node by the first value, decrease a second balance of the second node by the second value, and increase a balance of the third node by the second value.
    Type: Grant
    Filed: June 21, 2019
    Date of Patent: March 23, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Wenbin Zhang, Hao Lei, Lichun Li, Zhangjie Huang
  • Patent number: 10911231
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: February 2, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Yao Wang, Hao Lei, Li Lin
  • Publication number: 20200382296
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key.
    Type: Application
    Filed: July 31, 2020
    Publication date: December 3, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Yao Wang, Hao Lei, Li Lin
  • Publication number: 20200366460
    Abstract: A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<<n. A random number r is selected, so that hr belongs to the predetermined cyclic group. To-be-encrypted data m, corresponding to the target user using the public key pk and the random number r, is processed to generate a homomorphic ciphertext c=(1+N)m·(hN mod N2)r mod N2. The homomorphic ciphertext c is provided to the target user, where the homomorphic ciphertext c can be decrypted using a private key sk to obtain the data m.
    Type: Application
    Filed: July 31, 2020
    Publication date: November 19, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Shuai Han, Zhangjie Huang, Huanyu Ma, Hao Lei
  • Patent number: 10778428
    Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for recovering and verifying a public key. One of the methods includes accepting information encoding parameters of an elliptic curve, a published public key, a hash value of a message, a digital signature, and an identification parameter; generating a recovered public key based on the parameters of the elliptic curve, the hash value of the message, the digital signature, and the identification parameter; comparing the published public key and the recovered public key to verify the published public key.
    Type: Grant
    Filed: December 13, 2019
    Date of Patent: September 15, 2020
    Assignee: Allibaba Group Holding Limited
    Inventors: Yao Wang, Hao Lei, Li Lin
  • Patent number: 10778410
    Abstract: A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<<n. A random number r is selected, so that hr belongs to the predetermined cyclic group. To-be-encrypted data m, corresponding to the target user using the public key pk and the random number r, is processed to generate a homomorphic ciphertext c=(1+N)m·(hN mod N2)r mod N2 . The homomorphic ciphertext c is provided to the target user, where the homomorphic ciphertext c can be decrypted using a private key sk to obtain the data m.
    Type: Grant
    Filed: February 5, 2020
    Date of Patent: September 15, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Shuai Han, Zhangjie Huang, Huanyu Ma, Hao Lei
  • Patent number: 10742469
    Abstract: A method and an apparatus for determining a time offset are disclosed. The method includes: obtaining, by a device at a head end, a time-domain signal based on a received signal; and then determining a time offset based on values of peak-to-average ratios of a preset quantity of symbols starting from a qth symbol in the time-domain signal, where a peak-to-average ratio of the qth symbol is greater than a preset threshold. A new method for determining a time offset is provided, and takes advantages that the time-domain signal obtained by the device at the head end has stronger capabilities of resisting interference such as frequency offset and phase noise. The method for determining a time offset can be applied both to initial ranging and periodic ranging.
    Type: Grant
    Filed: July 17, 2018
    Date of Patent: August 11, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Tao Ouyang, Syed Habib Rahman, Xiaoshu Si, Fan Wang, Hao Lei