Patents by Inventor Jian Du
Jian Du has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250020794Abstract: Embodiments of this application provide a measurement method, an apparatus, and a device. The embodiments may be applied to wireless local area network systems of the 802.11 series protocols such as 802.11be, Wi-Fi 7, EHT, Wi-Fi 8, 802.11bf, and sensing. The embodiments provide an approach of generating, by a first device, a sensing measurement setup request frame that includes first ranging indication information used to request a second device to perform ranging measurement in a sensing measurement process. The approach then sends, by the first device, the sensing measurement setup request frame to the second device.Type: ApplicationFiled: September 27, 2024Publication date: January 16, 2025Inventors: Gerile NAREN, Xiao HAN, Mengshi HU, Rui DU, Jian YU, Yunbo LI, Chenchen LIU
-
Publication number: 20250019735Abstract: The disclosure discloses a Saccharomyces cerevisiae lysate containing one or more cytokines, a preparation method therefor and an application thereof in cell-cultured meat, and belongs to the technical field of genetic engineering and cell-cultured meat. The disclosure provides a method for further increasing recombinant cytokine yields using the GRAS strain of S. cerevisiae recombinantly expressing a single cytokine or co-expressing a combination of cytokines through promoter optimization, knockout of endogenous protease in yeast, genome-integrated expression and other means. The yeast lysate may be directly used for muscle stem cell culture after the process such as filtration, sterilization, and cytokine concentration measurement, effectively promoting muscle stem cell proliferation. The disclosure avoids the complex purification process in the production of recombinant cytokines, reduces the cost of cytokine production, and provides new ideas for large-scale low-cost development of cell-cultured meat.Type: ApplicationFiled: September 27, 2024Publication date: January 16, 2025Inventors: Xin Guan, Jingwen Zhou, Qingzi Lei, Jian Chen, Guocheng Du
-
Publication number: 20250024503Abstract: This application relates to the field of WLAN technologies, and in particular, to a null data physical layer protocol data unit transmitting method and an apparatus, and may be used in a wireless communication system that supports the 802.11be standard or the EHT standard. In the method, a first device transmits a sensing NDPA frame, where the sensing NDPA frame indicates to transmit an NDP; and then, the first device transmits the NDP, where the NDP is a first NDP or a second NDP. A physical layer version of the first NDP is different from a physical layer version of the second NDP. Correspondingly, a second device receives the sensing NDPA frame and the NDP from the first device.Type: ApplicationFiled: October 1, 2024Publication date: January 16, 2025Inventors: Mengshi HU, Xiao HAN, Jian YU, Rui DU, Gerile NAREN, Yan XIN, Jung Hoon SUH
-
Publication number: 20240419839Abstract: Embodiments of this specification provide a method for jointly training a natural language processing (NLP) model based on privacy protection. The NLP model includes an encoding network located at a first party and a processing network located at a second party. According to the method, the first party obtains a local target training statement, inputs the target training statement to the encoding network, and forms a sentence representation vector based on an encoding output of the encoding network; and then adds target noise that conforms to differential privacy to the sentence representation vector, to obtain a target noise addition representation, and sends the target noise addition representation to the second party for training of the processing network.Type: ApplicationFiled: October 14, 2022Publication date: December 19, 2024Inventors: Jian DU, Fengran MO, Lei WANG
-
Publication number: 20240362243Abstract: This specification provides a multi-party database including a central node and a plurality of databases. The central node has a disclosed first interface. Each of a plurality of query engines corresponding to the plurality of databases includes a second interface configured to interact with the first interface. The central node can determine a plurality of target databases related to a query request from the plurality of databases based on the query request; and send a query indication to a plurality of target query engines corresponding to the plurality of target databases through the first interface. The plurality of target query engines can receive the query indication from second interfaces in the plurality of target query engines, and execute the query indication to obtain a query result; and send the query result to the first interface in the central node through the second interfaces.Type: ApplicationFiled: July 7, 2022Publication date: October 31, 2024Inventors: Qunshan HUANG, Shunde CAO, Yang YANG, Jun QI, Lei WANG, Benyu ZHANG, Pu DUAN, Jian DU, Qingkai MAO, Yang ZHAO, Kefeng YU
-
Publication number: 20240338478Abstract: Methods and systems for protecting membership privacy for secure computation and communication are provided. The method includes providing a first dataset, determining a number N based on a data privacy configuration, and generating a padding dataset having more than N elements. An intersection of the padding dataset and the first dataset is empty. The method also includes shuffling the padding dataset, up-sampling the first dataset with a first N elements of the shuffled padding dataset, and performing an intersection operation based on the up-sampled first dataset and a received dataset.Type: ApplicationFiled: November 28, 2023Publication date: October 10, 2024Inventors: Jian Du, Bo Jiang, Haohao Qian, Qiang Yan
-
Publication number: 20240340178Abstract: Methods and systems for secure computation and communication are provided. The method includes transforming identifications of a first dataset using a first transforming scheme, and transforming attributes of the first dataset using a second transforming scheme. The method also includes dispatching the transformed first dataset, receiving a second dataset, transforming identifications of the received second dataset, dispatching the identifications of the transformed received second dataset, and receiving a set of identifications. The method further includes generating a first intersection of the received set of identifications and the transformed received second dataset, generating a first share based on the first intersection, receiving a second share, and constructing a result based on the first share and the second share.Type: ApplicationFiled: April 7, 2023Publication date: October 10, 2024Inventors: Haohao QIAN, Jian DU, Qiang YAN
-
Patent number: 11989325Abstract: Protecting membership in secure multi-party computation and communication is provided. A method of protecting membership includes generating a padding dataset, up-sampling a first dataset with the padding dataset, transforming and dispatching the first dataset, receiving a second dataset, and performing a private set intersection operation based on the first dataset and the second dataset to generate a third dataset. Each of the first dataset, the padding dataset, and/or the second dataset includes one or more personal identification information for each user or member in the dataset.Type: GrantFiled: October 23, 2023Date of Patent: May 21, 2024Assignee: Lemon Inc.Inventors: Jian Du, Yongjun Zhao, Haohao Qian, Bo Jiang, Qiang Yan
-
Patent number: 11983285Abstract: Protecting data privacy in secure multi-party computation and communication is provided. A method of protecting data privacy includes determining a differential privacy configuration, determining a number of iterations based on a first parameter and a second parameter, and for each of the number of iterations generating a random value and a random noise data; generating a first message and a second message; and performing a transfer based on the first message, the second message, and an input data to output one of the first message and the second message. The method also includes generating a first noise data based on the random noise data in each of the number of iterations, generating a first share based on a first dataset and a second dataset, applying the first noise data to the first share, and constructing a result based on the first share and a second share.Type: GrantFiled: October 20, 2023Date of Patent: May 14, 2024Assignee: Lemon Inc.Inventors: Jian Du, Haohao Qian, Yongjun Zhao, Bo Jiang, Chuyuan Chen, Qiang Yan
-
Publication number: 20240152643Abstract: Embodiments of this specification provide a differential privacy-based feature processing method and apparatus. The method relates to a first party and a second party, the first party stores a first feature portion of a plurality of samples, the second party stores a plurality of binary classification labels corresponding to the plurality of samples, and the method includes: The second party separately encrypts the plurality of binary classification labels corresponding to the plurality of samples, to obtain a plurality of encrypted labels. The first party determines, based on the plurality of encrypted labels and a differential privacy noise, a positive sample encrypted noise addition quantity and a negative sample encrypted noise addition quantity corresponding to each bin in a plurality of bins. The plurality of bins are obtained by performing binning processing on the plurality of samples for a feature in the first feature portion.Type: ApplicationFiled: December 22, 2023Publication date: May 9, 2024Inventors: Jian DU, Pu DUAN, Benyu ZHANG
-
Publication number: 20240135024Abstract: Methods, systems, and apparatuses, including computer programs encoded on computer storage media, for data communication with differentially private intersection dataset. On example method includes: determining a plurality of bias parameters based on a parameter for establishing a differential privacy (DP) data protection; determining an intersection dataset based on client data from a client device and server data from the server device; updating the intersection dataset based on the client data and the plurality of bias parameters; and returning the updated intersection data having the DP data protection to the client device.Type: ApplicationFiled: December 20, 2023Publication date: April 25, 2024Inventors: Jian DU, Pu DUAN, Benyu ZHANG, Yang YANG, Qunshan HUANG
-
Publication number: 20240135025Abstract: Implementations of the present specification provide a query processing method and apparatus. The method includes: first, determining query types of L queries to be performed on a target dataset, where the target dataset includes data of an object; next, determining query sensitivity of each query type of the query types for the target dataset; and then, determining, based on the query sensitivity corresponding to each query and a privacy budget parameter predetermined for a total set of the L queries, a noise power allocated to each query. Based on this, for a target query in the L queries, an actually returned result of the target query can be determined as an original query result of the target query added with a target noise sampled from target noise distribution of differential privacy, where the target noise distribution is determined based on the noise power allocated to the target query. As such, privacy of the target dataset can be protected.Type: ApplicationFiled: December 22, 2023Publication date: April 25, 2024Inventors: Jian DU, Benyu ZHANG
-
Patent number: 11964443Abstract: The invention relates to a method for connecting a connection piece to a U-shaped ring anchor for a head module for rail vehicles, the head module consisting predominantly of fiber-reinforced plastic material and having an outer shell and the ring anchor consisting of fiber-reinforced plastic material and being arranged in the roof region of the outer shell as a stiffening means. According to the method, connecting elements are fed through the dry or matrix-material-impregnated, unconsolidated fiber reinforcement structure of the ring anchor.Type: GrantFiled: February 5, 2018Date of Patent: April 23, 2024Assignees: CRRC QINGDAO SIFANG CO., LTD., CG RAIL—CHINESISCH-DEUTSCHES FORSCHUNGS- UND ENTWICKLUNGSZENTRUM FÜR BAHN- UND VERKEHRSTECHNIK DRESDEN GMBHInventors: Jian Du, Peng Lin, Dongfang Chen, Zhengmin Zhang, Yonggui Zhang, Chunpeng Cao, Werner Hufenbach, Andreas Ulbricht
-
Publication number: 20240054129Abstract: Implementations of this specification provide query optimization methods, apparatuses, and systems for secure multi-party databases. In an implementation, a method includes: receiving a current query associated with a plurality of target database of a multi-party database system, generating a plurality of execution plans for the current query, determining, for each execution plan, a respective cost computation formula of a plurality of cost computation values for computing an execution cost of jointly executing the execution plan by the plurality of target databases, receiving a secure computation result from each of a plurality of query engines corresponding to the plurality of target databases, and determining an optimal execution plan having a lowest cost value in the plurality of cost computation formulas based on the secure computation result.Type: ApplicationFiled: October 23, 2023Publication date: February 15, 2024Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Yang YANG, Qunshan Huang, Jun Qi, Shunde Cao, Pu Duan, Jian Du, Qingkai Mao, Yang Zhao, Kefeng Yu, Lei Wang, Benyu Zhang
-
Publication number: 20240045985Abstract: This specification provides example data query methods, apparatuses, and systems for a multi-party secure database. In an example computer-implemented method, a central node receives a data query request from a data requester, where the data query request relates to one or more pieces of target data stored at one or more data providers. The central node determines whether the data query request satisfies respective security requirements of the one or more pieces of target data. In response to determining that the data query request satisfies respective security requirements of the one or more pieces of target data, the central node processes the one or more pieces of target data to obtain result data; and sends the result data to the data requester. The central node can restrict query of the target data by the data requester based on the security requirement of the target data stored at the data provider.Type: ApplicationFiled: October 23, 2023Publication date: February 8, 2024Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Yang YANG, Qunshan Huang, Jun Qi, Shunde Cao, Pu Duan, Jian Du, Qingkai Mao, Yang Zhao, Kefeng Yu, Lei Wang, Benyu Zhang
-
Patent number: 11886617Abstract: Protecting membership and data in secure multi-party computation and communication is provided. A method of protecting membership and data includes generating a padding dataset. A size of the padding dataset is determined based on a data privacy configuration. The method also includes up-sampling a first dataset with the padding dataset, transforming the first dataset, dispatching the first dataset, performing an intersection operation based on the first dataset and a second dataset to generate a third dataset, generating a first share based on the third dataset, and constructing a result based on the first share and a second share.Type: GrantFiled: April 7, 2023Date of Patent: January 30, 2024Assignee: Lemon Inc.Inventors: Jian Du, Haohao Qian, Yongjun Zhao, Bo Jiang, Qiang Yan
-
Patent number: 11874950Abstract: Methods and systems for protecting membership privacy for secure computation and communication are provided. The method includes providing a first dataset, determining a number N based on a data privacy configuration, and generating a padding dataset having more than N elements. An intersection of the padding dataset and the first dataset is empty. The method also includes shuffling the padding dataset, up-sampling the first dataset with a first N elements of the shuffled padding dataset, and performing an intersection operation based on the up-sampled first dataset and a received dataset.Type: GrantFiled: April 7, 2023Date of Patent: January 16, 2024Assignee: Lemon Inc.Inventors: Jian Du, Bo Jiang, Haohao Qian, Qiang Yan
-
Patent number: 11868497Abstract: Differential privacy composition determination in secure computation and communication of a dataset is provided. A method for differential privacy composition determination includes determining a differential privacy configuration that includes a first privacy parameter and a second privacy parameter, determining a privacy loss distribution, and providing a number of composition operations. The method also includes determining a third privacy parameter and a fourth privacy parameter for a differential privacy composition based on the differential privacy configuration, the privacy loss distribution, and the number of composition operations. The method further includes controlling the dataset based on at least one of the third privacy parameter and the fourth privacy parameter.Type: GrantFiled: April 7, 2023Date of Patent: January 9, 2024Assignee: Lemon Inc.Inventors: Bo Jiang, Jian Du, Haohao Qian, Yongjun Zhao, Qiang Yan
-
Patent number: 11836263Abstract: Protecting data privacy in secure multi-party computation and communication is provided. A method of protecting data privacy includes determining a differential privacy configuration, determining a number of iterations based on a first parameter and a second parameter, and for each of the number of iterations generating a random value and a random noise data; generating a first message and a second message; and performing a transfer based on the first message, the second message, and an input data to output one of the first message and the second message. The method also includes generating a first noise data based on the random noise data in each of the number of iterations, generating a first share based on a first dataset and a second dataset, applying the first noise data to the first share, and constructing a result based on the first share and a second share.Type: GrantFiled: April 7, 2023Date of Patent: December 5, 2023Assignee: Lemon Inc.Inventors: Jian Du, Haohao Qian, Yongjun Zhao, Bo Jiang, Chuyuan Chen, Qiang Yan
-
Patent number: 11829512Abstract: Protecting membership in secure multi-party computation and communication is provided. A method of protecting membership includes generating a padding dataset, up-sampling a first dataset with the padding dataset, transforming and dispatching the first dataset, receiving a second dataset, and performing a private set intersection operation based on the first dataset and the second dataset to generate a third dataset. Each of the first dataset, the padding dataset, and/or the second dataset includes one or more personal identification information for each user or member in the dataset.Type: GrantFiled: April 7, 2023Date of Patent: November 28, 2023Assignee: Lemon Inc.Inventors: Jian Du, Yongjun Zhao, Haohao Qian, Bo Jiang, Qiang Yan