Patents by Inventor Jiang Zhang

Jiang Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210115082
    Abstract: The present invention discloses a glycoside compound represented by Formula III, and a preparation method, a composition, use and an intermediate thereof. The glycoside compound provided in the present invention has simple preparation method, can significantly increase the expression of VEGF-A mRNA, and is effective in promoting the angiogenesis. This provides a reliable guarantee for the development of drugs with pro-angiogenic activity for treating cerebral infarction cerebral stroke, myocardial infarction, and ischemic microcirculatory disturbance of lower limbs.
    Type: Application
    Filed: May 7, 2019
    Publication date: April 22, 2021
    Inventors: Guoqiang LIN, Jiange ZHANG, Ping TIAN, Chenguo FENG, Changsen ZHAN, Junjie ZHOU
  • Publication number: 20210090890
    Abstract: A semiconductor structure and a method for forming the semiconductor structure are provided. The method includes providing a to-be-etched layer; forming an initial mask layer over the to-be-etched layer; forming a patterned structure, on the initial mask layer and exposing a portion of the initial mask layer; forming a barrier layer on a sidewall surface of the patterned structure; using the patterned structure and the barrier layer as a mask, performing an ion doping process on the initial mask layer to form a doped region and an un-doped region between doped regions in the initial mask layer; removing the patterned structure and the barrier layer; and forming a mask layer on a top surface of the to-be-etched layer by removing the un-doped region. The mask layer includes a first opening exposing the top surface of the to-be-etched layer.
    Type: Application
    Filed: September 17, 2020
    Publication date: March 25, 2021
    Inventors: Qian Jiang ZHANG, Bo SU, Tao DOU, Lin Lin SUN
  • Patent number: 10913427
    Abstract: Aspects of the invention are directed to techniques for mutual authentication between a passenger that has requested a transportation service and a dispatched vehicle for providing the requested transportation service. A user device associated with the passenger verifies the dispatched vehicle using a vehicle access token generated by a transportation service platform and sends a secret key to the dispatched vehicle. The dispatched vehicle uses the secret key to recover passenger biometric information from a passenger secret received from the user device through the transportation service platform, captures passenger biometric information on-site, and compares the recovered passenger biometric information and the passenger biometric information collected on-site to verify the passenger.
    Type: Grant
    Filed: October 25, 2019
    Date of Patent: February 9, 2021
    Assignee: Beijing Voyager Technology Co., Ltd.
    Inventors: Xiaoyong Yi, Fengmin Gong, Jiang Zhang, Qi Chen, Yu Wang
  • Publication number: 20210006571
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a system associated with a vehicle are provided. One of the systems includes one or more electronic control units (ECUs) connected to a controller area network (CAN) bus, one or more infotainment devices, and a security gateway coupled to the one or more ECUs via the CAN bus and connected to the one or more infotainment devices. The security gateway may be configured to receive signals from the CAN bus and the one or more infotainment devices and detect a security event based at least in part on received signals.
    Type: Application
    Filed: July 1, 2019
    Publication date: January 7, 2021
    Inventors: Xiaoyong YI, Alexander BURT, Jiang ZHANG, Fengmin GONG
  • Publication number: 20200406914
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing user intervention for a vehicle are provided. One of the methods includes: receiving an instruction to initiate an intervention session from a server, and providing, in response to receiving the instruction, a user interface associated with the intervention session for display on a terminal associated with the vehicle. The method further includes detecting, at the terminal, a user interaction corresponding to a command associated with operation of the vehicle, and generating a decision associated with the operation of the vehicle based at least in part on the command.
    Type: Application
    Filed: June 28, 2019
    Publication date: December 31, 2020
    Inventor: Jiang ZHANG
  • Patent number: 10870800
    Abstract: A process for operating a thermal or catalytic cracking unit is described. The process entails generating a product that includes cracked hydrocarbon vapor and solid coke-particles from a heavy hydrocarbon input. The product is communicated towards a fractionator and a quench liquid is introduced into the product for creating a two-phase flow of cracked hydrocarbon vapor and the quench liquid with solid coke-particles entrained in the quench liquid. The two-phase flow is introduced into the fractionator and the cracked hydrocarbon vapor are separated from the quench liquid and the solid coke-particles entrained therein by gravity separation. The two-phase flow can reduce or remove the requirement of a wash zone within the fractionator. A recirculation loop is included in a wash-zone circulation system. The recirculation loop bypasses one or more spray headers of the wash zone and returns to a first end of the wash-zone circulation system.
    Type: Grant
    Filed: April 26, 2018
    Date of Patent: December 22, 2020
    Assignee: Suncar Energy Inc.
    Inventors: Mingxing Gu, Michael Goulding, Jin Jiang Zhang, Hieu Tran
  • Publication number: 20200247802
    Abstract: The anionic imide material is obtained by preparing a solution or a suspension of an imide compound, then reducing and drying the same; the anionic material comprises anions of an imide compound, the anions being at least one selected from the following formula I or formula II; in formula I or II: n=1, 2, or 3; R1, R2 are respectively selected from at least one of H, amino, carboxyl, hydroxy, thiol, and pyridyl groups; X1-X4 are respectively an electron withdrawing group, and specifically selected from one of H, F, Cl, Br, CN, and NO2 groups. The anionic material of the present invention has a Curie temperature larger than room temperature and ferromagnetism, and is an organic magnetic material; it may be used for preparing an organic magnetic material and/or an organic magnetic device.
    Type: Application
    Filed: July 25, 2018
    Publication date: August 6, 2020
    Applicant: South China University Of Technology
    Inventors: Dehua HU, Qinglin JIANG, Yuguang MA, Duokai Zhao, Jiang ZHANG, Zhongquan MAO, Yao YAO
  • Publication number: 20200223396
    Abstract: Disclosed are techniques for mutual authentication between a passenger that has requested a transportation service and a dispatched vehicle for providing the requested transportation service. A user device associated with the passenger verifies the dispatched vehicle using a vehicle access token generated by a transportation service platform and sends a secret key to the dispatched vehicle. The dispatched vehicle uses the secret key to recover passenger biometric information from a passenger secret received from the user device through the transportation service platform, captures passenger biometric information on-site, and compares the recovered passenger biometric information and the passenger biometric information collected on-site to verify the passenger.
    Type: Application
    Filed: October 25, 2019
    Publication date: July 16, 2020
    Inventors: Xiaoyong Yi, Fengmin Gong, Jiang Zhang, Qi Chen, Yu Wang
  • Publication number: 20200223395
    Abstract: Methods and systems for improving security of a vehicle are disclosed. In one embodiment, a method comprises receiving, from a requester, a request to access a vehicle compartment of a vehicle; determining a scope of access of the vehicle compartment for the requester based on an operation of the vehicle; and configuring a lock mechanism of the vehicle compartment based on the scope of access.
    Type: Application
    Filed: October 21, 2019
    Publication date: July 16, 2020
    Inventors: Jiang Zhang, Fengmin Gong, Xiaoyong Yi, Qi Chen, Yu Wang
  • Publication number: 20200213287
    Abstract: Disclosed are techniques for securing electronic control units (ECUs) in a vehicle. A security platform for a vehicle includes a key distribution center (KDC) for the vehicle. The KDC is configured to verify that a digital certificate associated with a first electronic control unit (ECU) on the vehicle is a valid certificate, where the digital certificate indicates a first security level of the first ECU. The KDC is configured to generate, based on the first security level of the first ECU, one or more security keys for secure communication between the first ECU and a set of ECUs on the vehicle, and provision the one or more security keys to the first ECU and the set of ECUs. In some embodiments, the KDC uses the provisioned keys to authenticate each ECU when the vehicle is powered up.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 2, 2020
    Inventors: Jiang Zhang, Xiaoyong Yi, Qi Chen, Yu Wang, Fengmin Gong
  • Publication number: 20200211301
    Abstract: Disclosed are techniques for securing electronic control units (ECUs) in a vehicle while allowing secure repairing of the ECUs. A method of repairing a vehicle includes disabling message authentication in secure communication between any two ECUs in a plurality of ECUs on the vehicle, detecting a first ECU that has been changed based on detecting an absence of a valid security key on the first ECU, verifying that a digital certificate associated with the first ECU is a valid certificate, generating one or more security keys for secure communication between the first ECU and a set of ECUs in the plurality of ECUs, provisioning the one or more security keys to the first ECU and the set of ECUs, and enabling the message authentication in secure communication between any two ECUs of the plurality of ECUs.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 2, 2020
    Inventors: Jiang Zhang, Xiaoyong Yi, Qi Chen, Yu Wang, Fengmin Gong
  • Publication number: 20200211369
    Abstract: Systems and methods for vehicle identification are described herein. A set of vehicle identification information may be obtained from a set of autonomous vehicles. Individual vehicle identification information may convey identifications of one or more vehicles and locations of the one or more vehicles. Vehicle context information for individual vehicles may be determined from the set of vehicle identification information. The vehicle context information for the individual vehicles may describe a context of the individual vehicles. The context may include one or a combination of a speed of travel, a direction of travel, a trajectory, or an identity profile.
    Type: Application
    Filed: December 28, 2018
    Publication date: July 2, 2020
    Inventors: Xiaoyong YI, Liwei REN, Jiang ZHANG
  • Publication number: 20200210375
    Abstract: A first data tree and a second data tree may be accessed. The first data tree may include a first set of directory nodes and a first set of file nodes, and the second data tree may include a second set of directory nodes and a second set of file nodes. The first data tree may be converted into a first data tree file, and the second data tree may be converted into a second data tree file. A delta for the first data tree and the second data tree may be generated based on a comparison of the first data tree file and the second data tree file.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 2, 2020
    Inventors: Liwei REN, Jiang ZHANG, Xiaoyong YI
  • Publication number: 20200210171
    Abstract: A first data tree of a first version of the software and a second data tree of a second version of the software may be provided. The first data tree may be converted into a first data tree file, and the second data tree may be converted into a second data tree file. A delta for the first data tree and the second data tree may be generated based on a comparison of the first data tree file and the second data tree file. The delta may be packaged for provision to a client-side agent. The client-side agent may be configured to modify a client-side version of the software based on the delta.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 2, 2020
    Inventors: Liwei REN, Jiang ZHANG, Xiaoyong YI
  • Publication number: 20200213137
    Abstract: Systems and methods for managing a compromised autonomous vehicle server are described herein. A processor may obtain an indication of a first server configured to control an autonomous vehicle being compromised. The autonomous vehicle may have previously been provisioned with a first public key. The first public key may be paired with a first private key. A processor may compile command information. The command information may include a command for the autonomous vehicle and a digital certificate of a second server configured to control the autonomous vehicle in the event of the first server being compromised. The digital certificate may include a second public key and may be signed with the first private key. The command may be signed with a second private key associated with the second server. The second private key may be paired with the second public key.
    Type: Application
    Filed: December 30, 2018
    Publication date: July 2, 2020
    Inventors: Jiang ZHANG, Xiaoyong YI, Liwei REN
  • Publication number: 20200201626
    Abstract: Fingerprints of file node(s) within a first data tree and file node(s) within a second data tree may be generated. The first data tree may include a first set of directory nodes and a first set of file nodes. The second data tree may include a second set of directory nodes and a second set of file nodes. A delta between the first data tree and the second data tree may be generated based on a first classification of similarity between the first set of file nodes and the second set of file nodes, a second classification of similarity between the first set of directory nodes and the second set of directory nodes, and file-node delta(s) between file node(s) of the first set of file nodes and file node(s) of the second set of file nodes. The file-node delta(s) determined based on two or more of the fingerprints.
    Type: Application
    Filed: December 21, 2018
    Publication date: June 25, 2020
    Inventors: Liwei REN, Xiaoyong YI, Jiang ZHANG
  • Publication number: 20200201828
    Abstract: A first data tree may include a first set of directory nodes and a first set of file nodes. A second data tree may include a second set of directory nodes and a second set of file nodes. Similarity between the first set of file nodes and the second set of file nodes may be classified based on file names, file paths, and file values. Similarity between the first set of directory nodes and the second set of directory nodes may be classified based on directory names, directory paths, nested folders, and included files. A delta between the first data tree and the second data tree may be generated based on the classification of similarity between the first set of file nodes and the second set of file nodes and the classification of similarity between the first set of directory nodes and the second set of directory nodes.
    Type: Application
    Filed: December 21, 2018
    Publication date: June 25, 2020
    Inventors: Liwei REN, Xiaoyong YI, Jiang ZHANG
  • Publication number: 20200160633
    Abstract: Aspects of the invention relate to a method for securing a vehicle compartment including receiving authorization data; setting a mode of operation of an access element based on the authorization data, the access element operable to control a locking mechanism of the vehicle compartment in a vehicle; receiving sensor data indicating that the vehicle compartment in the vehicle has been opened; and in response to the authorization data corresponding to the second mode of operation and the sensor data contemporaneously indicating that the vehicle compartment is opened: initiating a security protocol. The access element (e.g., user accessible button disposed in the vehicle cabin) can be configured to operate in a first mode of operation that allows the access element to control the locking mechanism and a second mode of operation that prevents the access element from controlling the locking mechanism.
    Type: Application
    Filed: November 15, 2018
    Publication date: May 21, 2020
    Inventors: Jiang Zhang, Fengmin Gong, Xiaoyong Yi, Qi Chen, Yu Wang
  • Patent number: 10501055
    Abstract: Some embodiments include techniques for mutual authentication between a passenger that has requested a transportation service and a dispatched vehicle for providing the requested transportation service. A user device associated with the passenger verifies the dispatched vehicle using a vehicle access token generated by a transportation service platform and sends a secret key to the dispatched vehicle. The dispatched vehicle uses the secret key to recover passenger biometric information from a passenger secret received from the user device through the transportation service platform, captures passenger biometric information on-site, and compares the recovered passenger biometric information and the passenger biometric information collected on-site to verify the passenger.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: December 10, 2019
    Assignee: DiDi Research America, LLC
    Inventors: Xiaoyong Yi, Fengmin Gong, Jiang Zhang, Qi Chen, Yu Wang
  • Patent number: 10464529
    Abstract: Methods and systems for improving security of a vehicle are disclosed. In one embodiment, a method comprises receiving, from a requester, a request to access a vehicle compartment of a vehicle; determining a scope of access of the vehicle compartment for the requester based on an operation of the vehicle; and configuring a lock mechanism of the vehicle compartment based on the scope of access.
    Type: Grant
    Filed: November 15, 2018
    Date of Patent: November 5, 2019
    Assignee: Didi Research America, LLC
    Inventors: Jiang Zhang, Fengmin Gong, Xiaoyong Yi, Qi Chen, Yu Wang