Patents by Inventor Le GUAN
Le GUAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11948220Abstract: The disclosed computer-implemented method may include dynamically selecting transportation options to present to a transportation requestor device based on current transportation network conditions and transportation requestor device history. In some embodiments, transportation network may have many different ways of arranging a transportation requestor's trip, such as private rides, shared rides, immediate rides, and delayed rides. In some examples, the requestor's choice of transportation option may have an impact on the transportation network. In anticipation of or in response to a transportation request, the method may determine which transportation options will better benefit the transportation network and determine which transportation options to display to the requestor and/or the prominence with which the transportation products are displayed. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: December 21, 2021Date of Patent: April 2, 2024Assignee: Lyft, Inc.Inventors: Abhinav Amrut Vora, Hao Yu Liu, Benjamin Han, Julia Yu, Le Guan, Xiaoyuan Xu, Mayank Gulati, Charles Parker Spielman, Chirag Chhagan Chheda, David Chouinard
-
Publication number: 20220164914Abstract: The disclosed computer-implemented method may include dynamically selecting transportation options to present to a transportation requestor device based on current transportation network conditions and transportation requestor device history. In some embodiments, transportation network may have many different ways of arranging a transportation requestor's trip, such as private rides, shared rides, immediate rides, and delayed rides. In some examples, the requestor's choice of transportation option may have an impact on the transportation network. In anticipation of or in response to a transportation request, the method may determine which transportation options will better benefit the transportation network and determine which transportation options to display to the requestor and/or the prominence with which the transportation products are displayed. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: December 21, 2021Publication date: May 26, 2022Inventors: Abhinav Amrut Vora, Hao Yu Liu, Benjamin Han, Julia Yu, Le Guan, Xiaoyuan Xu, Mayank Gulati, Charles Parker Spielman, Chirag Chhagan Chheda, David Chouinard
-
Patent number: 11238555Abstract: The disclosed computer-implemented method may include dynamically selecting transportation options to present to a transportation requestor device based on current transportation network conditions and transportation requestor device history. In some embodiments, transportation network may have many different ways of arranging a transportation requestor's trip, such as private rides, shared rides, immediate rides, and delayed rides. In some examples, the requestor's choice of transportation option may have an impact on the transportation network. In anticipation of or in response to a transportation request, the method may determine which transportation options will better benefit the transportation network and determine which transportation options to display to the requestor and/or the prominence with which the transportation products are displayed. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: November 30, 2018Date of Patent: February 1, 2022Assignee: Lyft, Inc.Inventors: Abhinav Amrut Vora, Hao Yu Liu, Benjamin Han, Julia Yu, Le Guan, Xiaoyuan Xu, Mayank Gulati, Charles Parker Spielman, Chirag Chhagan Chheda, David Chouinard
-
Publication number: 20200175632Abstract: The disclosed computer-implemented method may include dynamically selecting transportation options to present to a transportation requestor device based on current transportation network conditions and transportation requestor device history. In some embodiments, transportation network may have many different ways of arranging a transportation requestor's trip, such as private rides, shared rides, immediate rides, and delayed rides. In some examples, the requestor's choice of transportation option may have an impact on the transportation network. In anticipation of or in response to a transportation request, the method may determine which transportation options will better benefit the transportation network and determine which transportation options to display to the requestor and/or the prominence with which the transportation products are displayed. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: November 30, 2018Publication date: June 4, 2020Inventors: Abhinav Amrut Vora, Hao Yu Liu, Benjamin Han, Julia Yu, Le Guan, Xiaoyuan Xu, Mayank Gulati, Charles Parker Spielman, Chirag Chhagan Chheda, David Chouinard
-
Patent number: 10313111Abstract: An embodiment of the present disclosure provide a key protection method, via setting that each core of the multi-core process may have one symmetric master key, dynamically obtaining the plaintext private key of the asymmetric algorithm via a decryption operation and using the Intel TSX, it may be ensured that the private key and the intermediate variables used in the computation process may be stored in the cache occupied by the operation core only in terms of the hardware level, which may prevent the attackers from stealing the private key from the physical memory and ensure the security of the implementation of the public-key cryptographic algorithm in the computer system.Type: GrantFiled: August 27, 2014Date of Patent: June 4, 2019Assignee: DATA ASSURANCE AND COMMUNICATION SECURITY RESEARCH CENTER, CHINESE ACADEMY OF SCIENCESInventors: Jingqiang Lin, Le Guan, Qiongxiao Wang, Jing Wang, Jiwu Jing
-
Patent number: 9898624Abstract: A multi-core processor based key protection method and system is described. An Operating System (OS) supporting Symmetric Multi-Processing (SMP) is set up on a multi-core processor. One core of the multi-core processor is configured as a cryptographic operation core, which is prohibited from running other processes of the OS and dedicated to perform a public-key cryptographic operation. The private key and an intermediate variable in a process of the public-key cryptographic operation are stored in a cache exclusively occupied by the cryptographic operation core.Type: GrantFiled: June 19, 2015Date of Patent: February 20, 2018Assignees: Data Assurance and Communication Security Center, Chinese Academy of Sciencess, Institute of Information Engineering, Chinese Academy of SciencesInventors: Jingqiang Lin, Le Guan, Jing Wang, Qiongxiao Wang, Jiwu Jing, Bao Li
-
Patent number: 9819496Abstract: The present invention discloses a method and a system for protecting root CA certificates in a virtualization environment. The method installs a root CA certificate security manager on a host computer. The root CA certificate security manager stores the lists of root CA certificates and provides certificate validation service to virtual machines via a read-only interface. When a virtual machine needs the verification of a certificate, it sends a certificate validation service request to the root CA security manager. The root CA certificate security manager provides certificate validation services to the virtual machine in response to the request.Type: GrantFiled: January 16, 2015Date of Patent: November 14, 2017Assignees: Institute of Information Engineering, Chinese Academy of Sciences, Data Assurance & Communications Security Center, Chinese Academy of SciencesInventors: Jingqiang Lin, Jiwu Jing, Le Guan, Bingyu Li, Jing Wang, Wuqiong Pan, Yuewu Wang
-
Publication number: 20170295024Abstract: The present invention discloses a method and a system for protecting root CA certificates in a virtualization environment. The method installs a root CA certificate security manager on a host computer. The root CA certificate security manager stores the lists of root CA certificates and provides certificate validation service to virtual machines via a read-only interface. When a virtual machine needs the verification of a certificate, it sends a certificate validation service request to the root CA security manager. The root CA certificate security manager provides certificate validation services to the virtual machine in response to the request.Type: ApplicationFiled: January 16, 2015Publication date: October 12, 2017Inventors: Jingqiang Lin, Jiwu Jing, Le Guan, Bingyu Li, Jing Wang, Wuqiong Pan, Yuewu Wang
-
Publication number: 20160359621Abstract: An embodiment of the present disclosure provide a key protection method, via setting that each core of the multi-core process may have one symmetric master key, dynamically obtaining the plaintext private key of the asymmetric algorithm via a decryption operation and using the Intel TSX, it may be ensured that the private key and the intermediate variables used in the computation process may be stored in the cache occupied by the operation core only in terms of the hardware level, which may prevent the attackers from stealing the private key from the physical memory and ensure the security of the implementation of the public-key cryptographic algorithm in the computer system.Type: ApplicationFiled: August 27, 2014Publication date: December 8, 2016Applicant: DATA ASSURANCE AND COMMUNICATION SECURITY RESEARCH CENTER, CHINESE ACADEMY OF SCIENCESInventors: Jingqiang LIN, Le GUAN, Qiongxiao WANG, Jing WANG, Jiwu JING
-
Publication number: 20150310231Abstract: A multi-core processor based key protection method and system is described. An Operating System (OS) supporting Symmetric Multi-Processing (SMP) is set up on a multi-core processor. One core of the multi-core processor is configured as a cryptographic operation core, which is prohibited from running other processes of the OS and dedicated to perform a public-key cryptographic operation. The private key and an intermediate variable in a process of the public-key cryptographic operation are stored in a cache exclusively occupied by the cryptographic operation core.Type: ApplicationFiled: June 19, 2015Publication date: October 29, 2015Inventors: Jingqiang LIN, Le GUAN, Jing WANG, Qiongxiao WANG, Jiwu JING, Bao LI