Patents by Inventor Hao Weng
Hao Weng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12339052Abstract: A refrigerator is provided. The refrigerator includes a refrigerator body, a door body and an ice making compartment. The refrigerator body includes a storage compartment. The door body is configured to open or close the storage compartment. The ice making compartment is disposed in the storage compartment, and includes an ice making compartment shell, an ice maker, and an ice storage box. The ice maker is configured to make ice cubes. The ice storage box is located below the ice maker, and is configured to store the ice cubes made by the ice maker. The ice storage box includes a box body and a first ice baffle. At least a part of the first ice baffle is located in the box body, and the first ice baffle is configured to prevent the ice cubes from accumulating at a position of the box body close to the door body.Type: GrantFiled: December 30, 2021Date of Patent: June 24, 2025Assignee: HISENSE RONSHEN (GUANGDONG) REFRIGERATOR CO., LTD.Inventors: Huimin Yao, Jinbo Gan, Kunxiong Deng, Xiaofeng Liu, Zixuan Zhao, Hao Weng
-
Publication number: 20250117260Abstract: Systems and methods described herein relate to the handling of resource-intensive computing jobs in a cloud-based job execution environment. An unexecuted computing job has a plurality of features. A resource intensity prediction is generated for the unexecuted computing job based on the features and on historical job data that classifies each of a plurality of executed computing jobs as either resource intensive or non-resource intensive. The resource intensity prediction indicates that the unexecuted computing job is predicted to be classified as resource intensive. A predicted resource intensity category of the unexecuted computing job is determined. Utilization data associated with one or more of a plurality of job execution destinations may be accessed. The unexecuted computing job may be assigned to a selected job execution destination from among the plurality of job execution destinations based on the predicted resource intensity category and the utilization data.Type: ApplicationFiled: October 5, 2023Publication date: April 10, 2025Inventors: Wei Jiang, Hao Weng
-
Patent number: 12270709Abstract: An infrared sensor uses an infrared lens with infrared filtering and focusing functions. Thus, an infrared filter can be omitted to reduce the costs and volume. In addition, a getter on the inside of a metal cover of the infrared sensor can be activated when the metal cover is soldered to the substrate of the infrared sensor. Therefore, the packaging process of the infrared sensor can be simplified.Type: GrantFiled: May 25, 2021Date of Patent: April 8, 2025Assignee: TXC CORPORATIONInventors: Tzong-Sheng Lee, Jen-Wei Luo, Chia-Hao Weng, Chun-Chi Lin, Ting-Chun Hsu, Hui-Jou Yu, Yi-Hung Lin, Sung-Hung Lin
-
Publication number: 20250071040Abstract: Flexible scheduling, self-healing, high-utilization strong stability for cellular network communications are discussed. Cellular network communication settings and strategies are developed with communication interval, transmit power data rate, channel delay, spectrum occupancy, source coding, receiving sensitivity, channel coding, signal-to-noise ratio, packet loss rate, channel occupancy rate, reception frequencies frequency band size of data package transmission frequencies, data package structure, modulation scheme, information coding scheme, antenna configuration.Type: ApplicationFiled: September 3, 2022Publication date: February 27, 2025Inventors: Tiejun Wang, Tiehong Wang, Chengshuang Yang, Guang Zhang, Wei Zhang, Nan Zhou, Hao Weng, Tonghui Sun, Tao Liu
-
Publication number: 20240262150Abstract: The present disclosure relates to suspension systems, control methods, and vehicles. One example suspension system includes a suspension assembly, a driver, a controller, a compressor, and a gas tank. The suspension assembly has a gas spring and a height sensor. The gas tank contains gas, the gas tank is connected to the compressor through a first ventilation pipe, and the compressor is connected to the gas spring through a second ventilation pipe. A first switch valve is disposed on the first ventilation pipe, and a second switch valve is disposed on the second ventilation pipe. The driver is separately electrically connected to the controller, the compressor, the first switch valve, the second switch valve, and the height sensor. The suspension system is installed between a wheel and a vehicle body of the vehicle.Type: ApplicationFiled: April 19, 2024Publication date: August 8, 2024Inventors: Yinhui SHU, Jin SHU, Hao WENG
-
Publication number: 20220326085Abstract: An infrared sensor uses an infrared lens with infrared filtering and focusing functions. Thus, an infrared filter can be omitted to reduce the costs and volume. In addition, a getter on the inside of a metal cover of the infrared sensor can be activated when the metal cover is soldered to the substrate of the infrared sensor. Therefore, the packaging process of the infrared sensor can be simplified.Type: ApplicationFiled: May 25, 2021Publication date: October 13, 2022Applicant: TXC CORPORATIONInventors: Tzong-Sheng LEE, Jen-Wei LUO, Chia-Hao WENG, Chun-Chi LIN, Ting-Chun HSU, Hui-Jou YU, Yi-Hung LIN, Sung-Hung LIN
-
Publication number: 20220154990Abstract: A refrigerator is provided. The refrigerator includes a refrigerator body, a door body and an ice making compartment. The refrigerator body includes a storage compartment. The door body is configured to open or dose the storage compartment. The ice making compartment is disposed in the storage compartment, and includes an ice making compartment shell, an ice maker, and an ice storage box. The ice maker is configured to make ice cubes. The ice storage box is located below the ice maker, and is configured to store the ice cubes made by the ice maker. The ice storage box includes a box body and a first ice baffle. At least a part of the first ice baffle is located in the box body, and the first ice baffle is configured to prevent the ice cubes from accumulating at a position of the box body close to the door body.Type: ApplicationFiled: December 30, 2021Publication date: May 19, 2022Applicant: HISENSE RONSHEN (GUANGDONG) REFRIGERATOR CO., LTD.Inventors: Huimin YAO, Jinbo GAN, Kunxiong DENG, Xiaofeng LIU, Zixuan ZHAO, Hao WENG
-
Patent number: 11287440Abstract: An acceleration sensing structure includes a frame, a proof mass, a gimbal and at least two outer flexible arms. The proof mass is suspended from the frame and has a first thickness. The proof mass is surrounded by and connected to the gimbal. The gimbal has a second thickness. The at least two outer flexible arms are connected between the gimbal and the frame, and the at least two outer flexible arms are arranged symmetrically. The second thickness is larger than or equal to one-half of the first thickness and is smaller than or equal to the first thickness, and when the proof mass moves, the at least two outer flexible arms are deformed.Type: GrantFiled: July 2, 2020Date of Patent: March 29, 2022Assignee: NATIONAL TSING HUA UNIVERSITYInventors: Sheng-Shian Li, Ranjith Hosur Ganesh, Gayathri Pillai, Chien-Hao Weng
-
Patent number: 11157620Abstract: A cybersecurity server receives an executable file to be classified. A call graph of the executable file is generated. Functions of the executable file are represented as vertices in the call graph, and a vertex value is generated for each vertex. The vertex values are arranged in traversal order of the call graph to generate a call graph pattern. A digest of the call graph pattern is calculated and compared to one or more malicious digests.Type: GrantFiled: January 21, 2020Date of Patent: October 26, 2021Assignee: Trend Micro IncorporatedInventors: Chia-Ching Fang, Shih-Hao Weng
-
Publication number: 20210263067Abstract: An acceleration sensing structure includes a frame, a proof mass, a gimbal and at least two outer flexible arms. The proof mass is suspended from the frame and has a first thickness. The proof mass is surrounded by and connected to the gimbal. The gimbal has a second thickness. The at least two outer flexible arms are connected between the gimbal and the frame, and the at least two outer flexible arms are arranged symmetrically. The second thickness is larger than or equal to one-half of the first thickness and is smaller than or equal to the first thickness, and when the proof mass moves, the at least two outer flexible arms are deformed.Type: ApplicationFiled: July 2, 2020Publication date: August 26, 2021Inventors: Sheng-Shian LI, Ranjith Hosur GANESH, Gayathri PILLAI, Chien-Hao WENG
-
Publication number: 20210064747Abstract: A cybersecurity server receives an executable file to be classified. A call graph of the executable file is generated. Functions of the executable file are represented as vertices in the call graph, and a vertex value is generated for each vertex. The vertex values are arranged in traversal order of the call graph to generate a call graph pattern. A digest of the call graph pattern is calculated and compared to one or more malicious digests.Type: ApplicationFiled: January 21, 2020Publication date: March 4, 2021Applicant: Trend Micro IncorporatedInventors: Chia-Ching Fang, Shih-Hao Weng
-
Patent number: 10911447Abstract: An application error detection platform computer processor may monitor execution of an application for a customer and determine that an application error has occurred. Responsive to the determination that an application error has occurred, an error fingerprint creation platform computer processor may access a stack trace representing execution of the application when the application error occurred. An error fingerprint associated with the occurrence of the application error may then be determined by applying a hash function (e.g., SHA-1) to information contained in the stack trace. Electronic records including an indication of the error fingerprint may then be received by and stored in an application error log data store. The application error log data store may then be searched for duplicate error fingerprints to facilitate application error resolution.Type: GrantFiled: October 12, 2017Date of Patent: February 2, 2021Assignee: SAP SEInventors: Paul Coffey, Hao Weng, Jiayi Chen, Na Zhang
-
Publication number: 20190379574Abstract: Systems and methods are provided for receiving a notification of an issue with a cloud services application, determining that troubleshooting of the issue comprises review of server logs containing personal data, enabling a data protection and privacy log level instead of a default log level to capture the personal data, generating the one or more server logs containing personal data during replication of the issue based on detecting that the data protection and privacy log level is enabled, indexing the one or more server logs containing personal data and setting access permission to the one or more server logs, detecting that a specified retention time period for the personal data has lapsed, automatically purging the personal data of the one or more server logs based on detecting that the specified retention time period has lapsed, and recording a record that the personal data has been purged.Type: ApplicationFiled: June 11, 2018Publication date: December 12, 2019Inventors: Xun Sun, Hao Weng, Xiaoxiao Gu, You Li
-
Patent number: 10484234Abstract: Systems and methods are provided for receiving a notification of an issue with a cloud services application, determining that troubleshooting of the issue comprises review of server logs containing personal data, enabling a data protection and privacy log level instead of a default log level to capture the personal data, generating the one or more server logs containing personal data during replication of the issue based on detecting that the data protection and privacy log level is enabled, indexing the one or more server logs containing personal data and setting access permission to the one or more server logs, detecting that a specified retention time period for the personal data has lapsed, automatically purging the personal data of the one or more server logs based on detecting that the specified retention time period has lapsed, and recording a record that the personal data has been purged.Type: GrantFiled: June 11, 2018Date of Patent: November 19, 2019Assignee: SAP SEInventors: Xun Sun, Hao Weng, Xiaoxiao Gu, You Li
-
Patent number: 10320814Abstract: A system for detecting an advanced persistent threat (APT) attack on a private computer network includes hosts computers that receive network traffic and process the network traffic to identify an access event that indicates access to a critical asset of an organization that owns or maintains the private computer network. The critical asset may be a computer that stores confidential data of the organization. Access events may be stored in an event log as event data. Access events indicated in the event log may be correlated using a set of alert rules to identify an APT attack.Type: GrantFiled: October 2, 2015Date of Patent: June 11, 2019Assignee: TREND MICRO INCORPORATEDInventors: Li-Hsiang Chiu, Wei-Ching Chang, Shih-Hao Weng
-
Publication number: 20190116178Abstract: According to some embodiments, an application error detection platform computer processor may monitor execution of an application for a customer and determine that an application error has occurred. Responsive to the determination that an application error has occurred, an error fingerprint creation platform computer processor may access a stack trace representing execution of the application when the application error occurred. An error fingerprint associated with the occurrence of the application error may then be determined by applying a hash function (e.g., SHA-1) to information contained in the stack trace. Electronic records including an indication of the error fingerprint may then be received by and stored in an application error log data store. The application error log data store may then be searched for duplicate error fingerprints to facilitate application error resolution.Type: ApplicationFiled: October 12, 2017Publication date: April 18, 2019Inventors: Paul Coffey, Hao Weng, Jiayi Chen, Na Zhang
-
Publication number: 20170099306Abstract: A system for detecting an advanced persistent threat (APT) attack on a private computer network includes hosts computers that receive network traffic and process the network traffic to identify an access event that indicates access to a critical asset of an organization that owns or maintains the private computer network. The critical asset may be a computer that stores confidential data of the organization. Access events may be stored in an event log as event data. Access events indicated in the event log may be correlated using a set of alert rules to identify an APT attack.Type: ApplicationFiled: October 2, 2015Publication date: April 6, 2017Applicant: TREND MICRO INCORPORATEDInventors: Li-Hsiang CHIU, Wei-Ching CHANG, Shih-Hao WENG
-
Patent number: 9395839Abstract: A touch control method is implemented in an electronic system. A calculation of the product of a pressure value and the area over which pressure is applied are included in touch input data packets representing a touch operation, the values of net force associated with the touch input packets are thus obtained. A signal of a short press, if recognized, with a value of net force greater than a net force threshold can be recognized as a signal of a long press, thus simulating an operation of long press and triggering the selection of an object, where the selection of the object would otherwise require a long press operation. The touch control method operates to significantly speed up selection of an object.Type: GrantFiled: November 16, 2015Date of Patent: July 19, 2016Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: Cheng-Hao Weng, Deng-Rung Liu, Chi-Chang Lu
-
Publication number: 20160070400Abstract: A touch control method is implemented in an electronic system. A calculation of the product of a pressure value and the area over which pressure is applied are included in touch input data packets representing a touch operation, the values of net force associated with the touch input packets are thus obtained. A signal of a short press, if recognized, with a value of net force greater than a net force threshold can be recognized as a signal of a long press, thus simulating an operation of long press and triggering the selection of an object, where the selection of the object would otherwise require a long press operation. The touch control method operates to significantly speed up selection of an object.Type: ApplicationFiled: November 16, 2015Publication date: March 10, 2016Inventors: CHENG-HAO WENG, DENG-RUNG LIU, CHI-CHANG LU
-
Patent number: 9218077Abstract: A touch control method is implemented in an electronic system. A calculation of the product of a pressure value and the area over which pressure is applied are included in touch input data packets representing a touch operation, the values of net force associated with the touch input packets are thus obtained. A signal of a short press, if recognized, with a value of net force greater than a net force threshold can be recognized as a signal of a long press, thus simulating an operation of long press and triggering the selection of an object, where the selection of the object would otherwise require a long press operation. The touch control method operates to significantly speed up selection of an object.Type: GrantFiled: April 19, 2013Date of Patent: December 22, 2015Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: Cheng-Hao Weng, Deng-Rung Liu, Chi-Chang Lu