Patents by Inventor Jinhui Hu
Jinhui Hu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250018471Abstract: A metal powder preparation system and method are provided. The metal powder preparation system includes a medium frequency smelting furnace, a homogeneous insulated quantitative pouring furnace, a precision-controlled liquid level temperature pouring ladle, and a plurality of groups of atomization mechanisms connected in sequence. The present application improves the preparation quality of the metal powder, so that the parameters such as the powder particle size, sphericity, fluidity, oxygen content, component distribution, and particle size distribution of the metal powder can all meet the requirements of high-quality metal additive manufacturing, achieving efficient and continuous preparation of the metal powder at the same time.Type: ApplicationFiled: November 7, 2022Publication date: January 16, 2025Applicant: Grinm Additive Manufacturing Technology co., LTD.Inventors: Shaoming ZHANG, Qiang HU, Yingjie LIU, Xinming ZHAO, Xuexin ZHU, Jinhui ZHANG, Yonghui WANG, Yanwei SHENG, Wenqian GUO, Wendong ZHAO, Bo LIANG, Liping LI, Xinyu YANG
-
Patent number: 11928761Abstract: The present disclosure relates to computer technology, and provides a method for identifying a K-line form and an electronic device. The method includes: obtaining, by a terminal device, data of N1 K-lines of a first stock in a first time window, where N1 is an integer greater than 1; obtaining, by the terminal device, a first target form corresponding to the data of the N1 K-lines and x key K-lines in, the data of the N1 K-lines, the first target form indicating a K-line form of the data of the N1 K-lines, where x?N1; displaying, by the terminal device, the N1 K-lines corresponding to the data of the N1 K-lines and drawing, by the terminal device, a first target form line on the N1 K-lines based on the first target form and the x key K-lines.Type: GrantFiled: September 1, 2022Date of Patent: March 12, 2024Assignee: FUTU NETWORK TECHNOLOGY (SHENZHEN) CO., LTDInventors: Xin Xie, Zheng Pei, Jinhui Hu
-
Publication number: 20230169705Abstract: The present disclosure relates to computer technology, and provides a method for identifying a K-line form and an electronic device. The method includes: obtaining, by a terminal device, data of N1 K-lines of a first stock in a first time window, where N1 is an integer greater than 1; obtaining, by the terminal device, a first target form corresponding to the data of the N1 K-lines and x key K-lines in the data of the N1 K-lines, the first target form indicating a K-line form of the data of the N1 K-lines, where x?N1; displaying, by the terminal device, the N1 K-lines corresponding to the data of the N1 K-lines; and drawing, by the terminal device, a first target form line on the N1 K-lines based on the first target form and the x key K-lines.Type: ApplicationFiled: September 1, 2022Publication date: June 1, 2023Inventors: Xin XIE, Zheng PEI, Jinhui HU
-
Patent number: 10489637Abstract: The present invention provides a method and device for acquiring a similar human face picture and acquiring information about a human face picture. It mainly relates to the field of Internet technology, and mainly aims to provide the user a similar human face picture including a similar person when a similar picture is provided. The method comprising: acquiring a human face picture specified by a user; conducting human face identification to the human face picture to identify a similar human face picture of the human face picture from human face pictures that have already been collected; and displaying the similar human face picture to the user.Type: GrantFiled: November 27, 2015Date of Patent: November 26, 2019Assignee: Beijing Qihoo Technology Company LimitedInventors: Jinhui Hu, Jin Zhao, Maoqing Zhu, Zhe Tao, Yuqi Guo, Yugang Han
-
Publication number: 20180005022Abstract: The present invention provides a method and device for acquiring a similar human face picture and acquiring information about a human face picture. It mainly relates to the field of Internet technology, and mainly aims to provide the user a similar human face picture including a similar person when a similar picture is provided. The method comprising: acquiring a human face picture specified by a user; conducting human face identification to the human face picture to identify a similar human face picture of the human face picture from human face pictures that have already been collected; and displaying the similar human face picture to the user.Type: ApplicationFiled: November 27, 2015Publication date: January 4, 2018Applicant: Beijing Qihoo Technology Company LimitedInventors: Jinhui Hu, Jin Zhao, Maoqing Zhu, Zhe Tao, Yuqi Guo, Yugang Han
-
Publication number: 20170154056Abstract: Disclosed are matching image searching method, image searching method, image matching method and devices thereof. The matching image searching method comprises: extracting local features from a to-be-queried image; matching local features of each images in an image database with the local features of the to-be-queried image, determining a matching proportion thereof; disposing images of which the matching proportion larger than or equal to a first proportion threshold value in the image database into an image matching result; and for images having matching proportion less than the first proportion threshold value and larger than a second proportion threshold value in the database, calculating hamming distance between perceptual hashing value of the images and a perceptual hashing value of the to-be-queried image, and disposing images having hamming distances less than a set first distance threshold into the image matching result.Type: ApplicationFiled: June 23, 2015Publication date: June 1, 2017Inventors: Xuekan QIU, Jinhui HU, Yugang HAN
-
Publication number: 20170132457Abstract: The invention provides a human face similarity recognition method and system, which relate to the field of computer technologies and are used for recognizing similar human face pictures accurately. The human face similarity recognition method comprises: generating a feature vector of a target human face picture according to features of the target human face picture; generating feature vectors of collected human face pictures according to features of the collected human face pictures; and selecting from the collected human face pictures at least one human face picture of which the feature vector has the minimum distance to the feature vector of the target human face picture as a similar human face picture of the target human face picture. The invention is beneficial to recognition of different pictures of the same human face which have a difference in expression, makeup or face angle, etc.Type: ApplicationFiled: June 26, 2015Publication date: May 11, 2017Applicant: BEIJING QIHOO TECHNOLOGY COMPANY LIMITEDInventors: Maoqing ZHU, Yu TANG, Hongxia XUE, Jinhui HU, Zhang LI, Yugang Han
-
Publication number: 20160328110Abstract: Disclosed are an image-based image identification method, system, equipment and device, the method comprising: extracting to-be-identified image information inputted by a user in an image identification field; transmitting a request carrying the to-be-identified image information to an image engine server; and receiving and displaying related information of other image resources matching the to-be-identified image information returned by the image engine server. In an embodiment of the present invention, the request is transmitted to an image engine server according to the obtained to-be-identified image information, and, according to the to-be-identified image information, the image engine server searches for the related information of other image resources matching the to-be-identified image information, thus realizing image identification based on image information, enlarging the application range of image identification, and facilitating use.Type: ApplicationFiled: September 30, 2014Publication date: November 10, 2016Inventors: Jin ZHAO, Yiguo CHEN, Jinhui HU, Yugang HAN
-
Patent number: 9436892Abstract: A method and apparatus for facial recognition by a computing device using an adaptive search window and regional similarity distribution analysis are disclosed herein.Type: GrantFiled: May 2, 2014Date of Patent: September 6, 2016Assignee: Hong Kong Applied Science and Technology Research Institute Co., Ltd.Inventors: Jinhui Hu, Yi Tian, Min Chen
-
Publication number: 20150317513Abstract: A method and apparatus for facial recognition by a computing device using an adaptive search window and regional similarity distribution analysis are disclosed herein.Type: ApplicationFiled: May 2, 2014Publication date: November 5, 2015Applicant: Hong Kong Applied Science and Technology Research Institute Co., Ltd.Inventors: Jinhui Hu, Yi Tian, Min Chen
-
Patent number: 8279254Abstract: According to some embodiments, a method and a system are provided to receive a first video signal at a first client and to receive a second video signal at a second client. The first video signal comprises an image of a first person and the second video signal comprises an image of a second person. The received first video signal and an image of a conference room are combined at the first client to create a first modified video signal comprising the image of the first person in the conference room. The received second video signal and the image of the conference room are combined at the second client to create a second modified video signal comprising the image of the second person in the conference room.Type: GrantFiled: July 29, 2008Date of Patent: October 2, 2012Assignee: Siemens Enterprise Communications GmbH & Co. KGInventors: Stuart Goose, Jinhui Hu, Mark Sher, Michael Wynblatt
-
Patent number: 7885413Abstract: A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that communicates securely with a remote cryptographic engine, and the repository cryptographic engine is associated with a user data store. The user data store includes a hidden link including a session key identifier encrypted with a protection key. The hidden link is associated with a remote data entity. A key data store associated with the repository server includes a session key encrypted with a session-key-protection key. The session key is used to encrypt and decrypt the remote data entity. The system also includes a repository key exchange module operable to exchange the session key with a remote key exchange module.Type: GrantFiled: October 31, 2007Date of Patent: February 8, 2011Assignee: Eruces, Inc.Inventors: Ognjen Vasic, Suhail Ansari, Ping Gan, Jinhui Hu, Bassam Khulusi, Adam A. Madoukh, Alexander Tyshlek
-
Publication number: 20090033737Abstract: According to some embodiments, a method and a system are provided to receive a first video signal at a first client and to receive a second video signal at a second client. The first video signal comprises an image of a first person and the second video signal comprises an image of a second person. The received first video signal and an image of a conference room are combined at the first client to create a first modified video signal comprising the image of the first person in the conference room. The received second video signal and the image of the conference room are combined at the second client to create a second modified video signal comprising the image of the second person in the conference room.Type: ApplicationFiled: July 29, 2008Publication date: February 5, 2009Inventors: Stuart Goose, Jinhui Hu, Mark Sher, Michael Wynblatt
-
Publication number: 20080301445Abstract: A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that communicates securely with a remote cryptographic engine, and the repository cryptographic engine is associated with a user data store. The user data store includes a hidden link including a session key identifier encrypted with a protection key. The hidden link is associated with a remote data entity. A key data store associated with the repository server includes a session key encrypted with a session-key-protection key. The session key is used to encrypt and decrypt the remote data entity. The system also includes a repository key exchange module operable to exchange the session key with a remote key exchange module.Type: ApplicationFiled: October 31, 2007Publication date: December 4, 2008Inventors: Ognjen VASIC, Suhail Ansari, Ping Gan, Jinhui Hu, Bassam Khulusi, Adam A. Madoukh, Alexander Tyshlek
-
Patent number: 7362868Abstract: A computer system (20) having a security domain (22), at least one client business domain (26), and a plurality of client terminals (34) utilizes a hidden link dynamic key manager (24, 84) and a database structure that includes encrypted data entities (30C, 30D) and a security identification attribute (32) for storage of encrypted data. Methods for encrypting data and for storing, decrypting, and retrieving encrypted data operate on the computer system (20), which also includes an information database (62) and a key database (44). The key database (44) is isolated from the information database (62). The hidden link key manager is stored in the security domain (22) and includes a system key manager (84) operable to generate system keys with system key common names and an encryption key manager (24) operable to generate encryption keys having encryption key identifications. The key managers (24, 84) operate on a key server (40), which is mirrored by a secondary key server (42).Type: GrantFiled: October 20, 2000Date of Patent: April 22, 2008Assignee: Eruces, Inc.Inventors: Ashraf Madoukh, Ognjen Vasic, Suhail Ansari, Bassam Khulusi, Jinhui Hu
-
Publication number: 20030021417Abstract: A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that communicates securely with a remote cryptographic engine, and the repository cryptographic engine is associated with a user data store. The user data store includes a hidden link including a session key identifier encrypted with a protection key. The hidden link is associated with a remote data entity. A key data store associated with the repository server includes a session key encrypted with a session-key-protection key. The session key is used to encrypt and decrypt the remote data entity. The system also includes a repository key exchange module operable to exchange the session key with a remote key exchange module.Type: ApplicationFiled: May 15, 2002Publication date: January 30, 2003Inventors: Ognjen Vasic, Suhail Ansari, Ping Gan, Jinhui Hu, Bassam Khulusi, Adam A. Madoukh, Alexander Tyshlek
-
Patent number: D835695Type: GrantFiled: February 21, 2017Date of Patent: December 11, 2018Assignee: Shenzhen Visens Virtual Reality Technology Co., Ltd.Inventor: Jinhui Hu