Patents by Inventor Jiang Zhang
Jiang Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11418351Abstract: Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key.Type: GrantFiled: December 30, 2018Date of Patent: August 16, 2022Assignee: Beijing Voyager Technology, Inc.Inventors: Jiang Zhang, Xiaoyong Yi, Liwei Ren
-
Patent number: 11405206Abstract: Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key.Type: GrantFiled: December 30, 2018Date of Patent: August 2, 2022Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Jiang Zhang, Xiaoyong Yi, Liwei Ren
-
Publication number: 20220228628Abstract: A slewing bearing for vertical structural support, including a first bearing ring, a second bearing ring and at least one row of rolling elements arranged between the first and second bearing rings. The first or second bearing ring is provided with a gear for receiving the drive of an input torque, and the gear is provided axially thereunder with a lubricant collecting member for keeping the lubricant. A rotary support device is provided for supporting in a vertical structure. The device provides a first member that supports substantially in a vertical direction, a second member that is substantially supported by the first member in the vertical direction, and the slewing bearing acting as a rotary support between the first and second members. The first member is fixedly connected to the first bearing ring and the second member is fixedly connected to the second bearing ring.Type: ApplicationFiled: December 29, 2021Publication date: July 21, 2022Inventors: Guo Jiang Zhang, Bo Han
-
Patent number: 11368471Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a system associated with a vehicle are provided. One of the systems includes one or more electronic control units (ECUs) connected to a controller area network (CAN) bus, one or more infotainment devices, and a security gateway coupled to the one or more ECUs via the CAN bus and connected to the one or more infotainment devices. The security gateway may be configured to receive signals from the CAN bus and the one or more infotainment devices and detect a security event based at least in part on received signals.Type: GrantFiled: July 1, 2019Date of Patent: June 21, 2022Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Xiaoyong Yi, Alexander Burt, Jiang Zhang, Fengmin Gong
-
Publication number: 20220189292Abstract: Systems and methods for vehicle identification are described herein. A set of vehicle identification information may be obtained from a set of autonomous vehicles. Individual vehicle identification information may convey identifications of one or more vehicles and locations of the one or more vehicles. Vehicle context information for individual vehicles may be determined from the set of vehicle identification information. The vehicle context information for the individual vehicles may describe a context of the individual vehicles. The context may include one or a combination of a speed of travel, a direction of travel, a trajectory, or an identity profile.Type: ApplicationFiled: March 8, 2022Publication date: June 16, 2022Inventors: Xiaoyong YI, Liwei REN, Jiang ZHANG
-
Patent number: 11325937Abstract: The present invention discloses a glycoside compound represented by Formula III, and a preparation method, a composition, use and an intermediate thereof. The glycoside compound provided in the present invention has simple preparation method, can significantly increase the expression of VEGF-A mRNA, and is effective in promoting the angiogenesis. This provides a reliable guarantee for the development of drugs with pro-angiogenic activity for treating cerebral infarction cerebral stroke, myocardial infarction, and ischemic microcirculatory disturbance of lower limbs.Type: GrantFiled: May 7, 2019Date of Patent: May 10, 2022Assignee: SHANGHAI HUTCHISON PHARMACEUTICALS LIMITEDInventors: Guoqiang Lin, Jiange Zhang, Ping Tian, Chenguo Feng, Changsen Zhan, Junjie Zhou
-
Publication number: 20220131842Abstract: Disclosed are techniques for securing electronic control units (ECUs) in a vehicle. A security platform for a vehicle includes a key distribution center (KDC) for the vehicle. The KDC is configured to verify that a digital certificate associated with a first electronic control unit (ECU) on the vehicle is a valid certificate, where the digital certificate indicates a first security level of the first ECU. The KDC is configured to generate, based on the first security level of the first ECU, one or more security keys for secure communication between the first ECU and a set of ECUs on the vehicle, and provision the one or more security keys to the first ECU and the set of ECUs. In some embodiments, the KDC uses the provisioned keys to authenticate each ECU when the vehicle is powered up.Type: ApplicationFiled: January 5, 2022Publication date: April 28, 2022Inventors: Jiang Zhang, Xiaoyong Yi, Qi Chen, Yu Wang, Fengmin Gong
-
Patent number: 11302182Abstract: Systems and methods for vehicle identification are described herein. A set of vehicle identification information may be obtained from a set of autonomous vehicles. Individual vehicle identification information may convey identifications of one or more vehicles and locations of the one or more vehicles. Vehicle context information for individual vehicles may be determined from the set of vehicle identification information. The vehicle context information for the individual vehicles may describe a context of the individual vehicles. The context may include one or a combination of a speed of travel, a direction of travel, a trajectory, or an identity profile.Type: GrantFiled: December 28, 2018Date of Patent: April 12, 2022Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Xiaoyong Yi, Liwei Ren, Jiang Zhang
-
Publication number: 20220105951Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing user intervention for a vehicle are provided. One of the methods includes: receiving an instruction to initiate an intervention session from a server, and providing, in response to receiving the instruction, a user interface associated with the intervention session for display on a terminal associated with the vehicle. The method further includes detecting, at the terminal, a user interaction corresponding to a command associated with operation of the vehicle, and generating a decision associated with the operation of the vehicle based at least in part on the command.Type: ApplicationFiled: December 15, 2021Publication date: April 7, 2022Inventor: Jiang ZHANG
-
Patent number: 11290437Abstract: Disclosed are techniques for securing electronic control units (ECUs) in a vehicle. A security platform for a vehicle includes a key distribution center (KDC) for the vehicle. The KDC is configured to verify that a digital certificate associated with a first electronic control unit (ECU) on the vehicle is a valid certificate, where the digital certificate indicates a first security level of the first ECU. The KDC is configured to generate, based on the first security level of the first ECU, one or more security keys for secure communication between the first ECU and a set of ECUs on the vehicle, and provision the one or more security keys to the first ECU and the set of ECUs. In some embodiments, the KDC uses the provisioned keys to authenticate each ECU when the vehicle is powered up.Type: GrantFiled: December 27, 2018Date of Patent: March 29, 2022Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Jiang Zhang, Xiaoyong Yi, Qi Chen, Yu Wang, Fengmin Gong
-
Publication number: 20220045859Abstract: Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key.Type: ApplicationFiled: December 30, 2018Publication date: February 10, 2022Inventors: Jiang ZHANG, Xiaoyong YI, Liwei REN
-
Patent number: 11241725Abstract: The present invention discloses a method for rolling a metal composite plate/strip, comprising the following steps: 1) selecting a metal base plate and a metal cladding plate, cleaning the surfaces of the base plate and the cladding plate to be composited until the metal matrixes are exposed; 2) sequentially laminating the base plate and the cladding plate to obtain a composite plate slab; 3) rolling the composite plate slab through a composite rough rolling mill having a corrugated roll to obtain a composite plate having a corrugated mating surface on its composite surface; and 4) flattening the composite plate having a complete corrugated cladding plate by a composite finish rolling mill to a desirable thickness to obtain a composite plate/strip.Type: GrantFiled: May 27, 2016Date of Patent: February 8, 2022Assignee: TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGYInventors: Qingxue Huang, Lin Zhu, Yugui Li, Cunlong Zhou, Lifeng Ma, Guanghui Zhao, Jiang Zhang
-
Patent number: 11225262Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing user intervention for a vehicle are provided. One of the methods includes: receiving an instruction to initiate an intervention session from a server, and providing, in response to receiving the instruction, a user interface associated with the intervention session for display on a terminal associated with the vehicle. The method further includes detecting, at the terminal, a user interaction corresponding to a command associated with operation of the vehicle, and generating a decision associated with the operation of the vehicle based at least in part on the command.Type: GrantFiled: June 28, 2019Date of Patent: January 18, 2022Assignee: Beijing DiDi Infinity Technology and Development Co., Ltd.Inventor: Jiang Zhang
-
Patent number: 11163555Abstract: Fingerprints of file node(s) within a first data tree and file node(s) within a second data tree may be generated. The first data tree may include a first set of directory nodes and a first set of file nodes. The second data tree may include a second set of directory nodes and a second set of file nodes. A delta between the first data tree and the second data tree may be generated based on a first classification of similarity between the first set of file nodes and the second set of file nodes, a second classification of similarity between the first set of directory nodes and the second set of directory nodes, and file-node delta(s) between file node(s) of the first set of file nodes and file node(s) of the second set of file nodes. The file-node delta(s) determined based on two or more of the fingerprints.Type: GrantFiled: December 21, 2018Date of Patent: November 2, 2021Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Liwei Ren, Xiaoyong Yi, Jiang Zhang
-
Patent number: 11155239Abstract: Methods and systems for improving security of a vehicle are disclosed. In one embodiment, a method comprises receiving, from a requester, a request to access a vehicle compartment of a vehicle; determining a scope of access of the vehicle compartment for the requester based on an operation of the vehicle; and configuring a lock mechanism of the vehicle compartment based on the scope of access.Type: GrantFiled: October 21, 2019Date of Patent: October 26, 2021Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Jiang Zhang, Fengmin Gong, Xiaoyong Yi, Qi Chen, Yu Wang
-
Patent number: 11137999Abstract: A first data tree may include a first set of directory nodes and a first set of file nodes. A second data tree may include a second set of directory nodes and a second set of file nodes. Similarity between the first set of file nodes and the second set of file nodes may be classified based on file names, file paths, and file values. Similarity between the first set of directory nodes and the second set of directory nodes may be classified based on directory names, directory paths, nested folders, and included files. A delta between the first data tree and the second data tree may be generated based on the classification of similarity between the first set of file nodes and the second set of file nodes and the classification of similarity between the first set of directory nodes and the second set of directory nodes.Type: GrantFiled: December 21, 2018Date of Patent: October 5, 2021Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Liwei Ren, Xiaoyong Yi, Jiang Zhang
-
Patent number: 11084816Abstract: The anionic imide material is obtained by preparing a solution or a suspension of an imide compound, then reducing and drying the same; the anionic material comprises anions of an imide compound, the anions being at least one selected from the following formula I or formula II; in formula I or II: n=1, 2, or 3; R1, R2 are respectively selected from at least one of H, amino, carboxyl, hydroxy, thiol, and pyridyl groups; X1-X4 are respectively an electron withdrawing group, and specifically selected from one of H, F, Cl, Br, CN, and NO2 groups. The anionic material of the present invention has a Curie temperature larger than room temperature and ferromagnetism, and is an organic magnetic material; it may be used for preparing an organic magnetic material and/or an organic magnetic device.Type: GrantFiled: July 25, 2018Date of Patent: August 10, 2021Assignee: SOUTH CHINA UNIVERSITY OF TECHNOLOGYInventors: Dehua Hu, Qinglin Jiang, Yuguang Ma, Duokai Zhao, Jiang Zhang, Zhongquan Mao, Yao Yao
-
Publication number: 20210194904Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing security of a vehicle are provided. One of the methods includes: monitoring a plurality of activities of one or more electronic devices associated with the vehicle; generating a plurality of event logs based on the monitored activities; sending the generated event logs to a server; and receiving, from the server, one or more alerts created based on the generated event logs.Type: ApplicationFiled: December 20, 2019Publication date: June 24, 2021Inventors: Jiang ZHANG, Alexander BURT, Xiaoyong YI
-
Publication number: 20210188269Abstract: A cloud application may suggest speeds to vehicles based on weather and road conditions in order to improve vehicle safety. Status information associated with a vehicle may be received from one or more computing devices associated with the vehicle. The status information may comprise a location and a speed of the vehicle. A weather condition and a road condition associated with an upcoming location of the vehicle may be obtained. The upcoming location may be determined based at least in part on the received location of the vehicle. A suggested speed at the upcoming location may be determined for the vehicle based at least in part on the weather condition and the road condition. It may be determined that the received speed of the vehicle is greater than the suggested speed. The suggested speed may be sent to the one or more computing devices associated with the vehicle.Type: ApplicationFiled: December 18, 2019Publication date: June 24, 2021Inventor: Jiang ZHANG
-
Patent number: 10991175Abstract: Disclosed are techniques for securing electronic control units (ECUs) in a vehicle while allowing secure repairing of the ECUs. A method of repairing a vehicle includes disabling message authentication in secure communication between any two ECUs in a plurality of ECUs on the vehicle, detecting a first ECU that has been changed based on detecting an absence of a valid security key on the first ECU, verifying that a digital certificate associated with the first ECU is a valid certificate, generating one or more security keys for secure communication between the first ECU and a set of ECUs in the plurality of ECUs, provisioning the one or more security keys to the first ECU and the set of ECUs, and enabling the message authentication in secure communication between any two ECUs of the plurality of ECUs.Type: GrantFiled: December 27, 2018Date of Patent: April 27, 2021Assignee: Beijing Voyager Technology Co., Ltd.Inventors: Jiang Zhang, Xiaoyong Yi, Qi Chen, Yu Wang, Fengmin Gong