Patents by Inventor Le He
Le He has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12230242Abstract: Provided are a sound gathering device for voiceprint monitoring and a preparation method. The sound gathering device is a cone structure and includes a front end portion (1) and a rear end portion (2), the front end portion (1) is trumpet-shaped, an inner wall surface of the front end portion (1) is present a pattern array of a microstructure (3), and the microstructure (3) presenting the pattern array is formed through laser etching. A sound wave frequency monitored by the sound gathering device is 50 Hz˜10 kHz, and a sound wave enters the sound gathering device from an entrance of the front end portion (1), is reflected through the pattern array of the microstructure (3) on the inner wall surface of the front end portion (1), and is transmitted from an exit of the rear end portion (2), and a sound pressure of the exit of the rear end portion (2) is 4 times˜8 times a sound pressure of the entrance of the front end portion (1).Type: GrantFiled: July 20, 2023Date of Patent: February 18, 2025Assignee: State Grid Jiangsu Taizhou Power Supply CompanyInventors: Yong Li, Ting Chen, Ling Ju, Jijing Yin, Ze Zhang, Xingchun Xu, Beibei Weng, Zhenguo Chuai, Yan Wu, Li Chen, Yang Cheng, Tianyu He, Le Yuan, Jie Qian, Debao Tang, Yanquan Zhu, Anqi Ding, Kaiming Bian, Wen Chen, Wanjian Hu, Hongbo Dai, Weijun Shi
-
Patent number: 12221849Abstract: An internal blowout-prevention gas-retaining connector has a body mounted at the bottom of a drill pipe. The body includes a valve pipe section and a connecting pipe section arranged from top to bottom. The bottom of the valve pipe section is inserted into the top of the connecting pipe section. The blowout-prevention valve seat is provided at a bottom end of the valve pipe section while a blowout-prevention valve bonnet is provided on a bottom surface of the valve pipe section. The edge of the blowout-prevention valve bonnet is rotatably connected to a bottom surface edge of the valve pipe section. A torsion spring is provided on a bottom surface of the blowout-prevention valve bonnet. One end of the torsion spring is connected to the bottom surface of the blowout-prevention valve bonnet while the other end is connected to the inner wall of the connecting pipe section.Type: GrantFiled: January 26, 2021Date of Patent: February 11, 2025Assignee: SICHUAN UNIVERSITYInventors: Mingzhong Gao, Ling Chen, Jianan Li, Cong Li, Zhiqiang He, Le Zhao, Mingqing Yang, Nianhan Wu, Bo Yu
-
Patent number: 12222641Abstract: The present disclosure provides a method for optimizing mask parameters, and the method includes: acquiring a test pattern, light source parameters, and initial mask parameters, the initial mask parameters including a mask thickness and an initial mask sidewall angle; generating multiple sets of candidate mask parameters according to the initial mask sidewall angle in the initial mask parameters; the multiple sets of candidate mask parameters including different mask sidewall angles and the same mask thickness; obtaining an imaging contrast of each set of candidate mask parameters based on the test pattern and the light source parameters; and selecting an optimal mask sidewall angle from the multiple sets of candidate mask parameters according to the imaging contrasts.Type: GrantFiled: November 8, 2021Date of Patent: February 11, 2025Assignee: INSTITUTE OF MICROELECTRONICS, CHINESE ACADEMY OF SCIENCESInventors: Jianfang He, Yayi Wei, Yajuan Su, Lisong Dong, Libin Zhang, Rui Chen, Le Ma
-
Publication number: 20250024368Abstract: Methods, systems, and devices for wireless communications are described. A user equipment (UE) may receive control signaling from a base station that indicates a multicast or broadcast wake up signal (WUS) format. The UE may receive a multicast or broadcast WUS from the base station during a WUS monitoring occasion of a connected mode discontinuous reception (C-DRX) cycle in accordance with the control signaling. The multicast or broadcast WUS may indicate upcoming transmissions for a set of multicast or broadcast services (MBSs). If, for example, the UE is subscribed to a first MBS from the set of MBSs and the multicast or broadcast WUS indicates an upcoming transmission for the first MBS, the UE may monitor for the upcoming transmission during an active duration of the C-DRX cycle. Otherwise, the UE may enter a sleep mode to conserve power.Type: ApplicationFiled: September 26, 2024Publication date: January 16, 2025Inventors: Prasada Reddy KADIRI, Alberto RICO ALVARINO, Le LIU, Umesh PHUYAL, Linhai HE, Huilin XU
-
Patent number: 12158063Abstract: A method for predicting a risk of early screen-out in a near-well zone based on distributed fiber acoustic sensing (DAS) is provided.Type: GrantFiled: December 15, 2023Date of Patent: December 3, 2024Assignee: SOUTHWEST PETROLEUM UNIVERSITYInventors: Xiyu Chen, Jingze Li, Yongming Li, Tai Chang, Le He, Juhui Zhu
-
Publication number: 20240200432Abstract: A method for predicting a risk of early screen-out in a near-well zone based on distributed fiber acoustic sensing (DAS) is provided.Type: ApplicationFiled: December 15, 2023Publication date: June 20, 2024Applicant: SOUTHWEST PETROLEUM UNIVERSITYInventors: Xiyu CHEN, Jingze LI, Yongming LI, Tai CHANG, Le HE, Juhui ZHU
-
Patent number: 11765182Abstract: A system for location-aware authentication is configured to receive an authentication request associated with an identifier of a user for accessing an application and retrieves user information associated with the identifier and the application. The system then determines that the user information includes a geofence and information associated with a device of the user. Based on the geofence and the device information, the system sends a geolocation data request to the device, causing the device to gather and send the device's current geolocation data to the computing system. A data structure is generated to store data related to the device's current geolocation and sent to the application, which in turn causes the application to grant or deny the authentication request.Type: GrantFiled: October 23, 2020Date of Patent: September 19, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Olena Lanxin Huang, Jia Le He, Samir Vasantbhai Shah, Andrew Pickering
-
Patent number: 11408281Abstract: A method for determining sand pumping parameters based on width distribution of fracture, including: acquire basic parameters of a target reservoir, simulate a propagation of the fracture, and obtain a propagation pattern and width distribution of the fracture; determine a maximum proppant particle size for entering the fracture at all width levels according to statistical results of the width distribution of the fracture; determine a multi-size combination of proppants according to a mapping table for particle size vs mesh of proppants, and determine an initial ratio of the proppant with each particle size; conduct a numerical simulation of proppant transportation in the fracture to determine a retention ratio of the proppants with each particle size; correct the initial ratio of the proppants with each particle size; calculate an amount of the proppants with each particle size according to the final ratio and the sand pumping intensity and fracturing interval length.Type: GrantFiled: December 2, 2021Date of Patent: August 9, 2022Assignee: SOUTHWEST PETROLEUM UNIVERSITYInventors: Qianli Lu, Jianchun Guo, Zhuang Liu, Le He, Songgen He, Yong Ren, Ji Zeng, Shouyi Wang, Shan Ren
-
Publication number: 20220131871Abstract: A system for location-aware authentication is configured to receive an authentication request associated with an identifier of a user for accessing an application and retrieves user information associated with the identifier and the application. The system then determines that the user information includes a geofence and information associated with a device of the user. Based on the geofence and the device information, the system sends a geolocation data request to the device, causing the device to gather and send the device's current geolocation data to the computing system. A data structure is generated to store data related to the device's current geolocation and sent to the application, which in turn causes the application to grant or deny the authentication request.Type: ApplicationFiled: October 23, 2020Publication date: April 28, 2022Inventors: Olena Lanxin HUANG, Jia Le HE, Samir Vasantbhai SHAH, Andrew PICKERING
-
Publication number: 20220090495Abstract: A method for determining sand pumping parameters based on width distribution of fracture, including: acquire basic parameters of a target reservoir, simulate a propagation of the fracture, and obtain a propagation pattern and width distribution of the fracture; determine a maximum proppant particle size for entering the fracture at all width levels according to statistical results of the width distribution of the fracture; determine a multi-size combination of proppants according to a mapping table for particle size vs mesh of proppants, and determine an initial ratio of the proppant with each particle size; conduct a numerical simulation of proppant transportation in the fracture to determine a retention ratio of the proppants with each particle size; correct the initial ratio of the proppants with each particle size; calculate an amount of the proppants with each particle size according to the final ratio and the sand pumping intensity and fracturing interval length.Type: ApplicationFiled: December 2, 2021Publication date: March 24, 2022Applicant: SOUTHWEST PETROLEUM UNIVERSITYInventors: Qianli Lu, Jianchun Guo, Zhuang Liu, Le He, Songgen He, Yong Ren, Ji Zeng, Shouyi Wang, Shan Ren
-
Patent number: 11119911Abstract: Heterogeneous garbage types are collected by scanning all of the service items to identify all of the service types that are included within the service items, identifying garbage collection components that correspond with the service types, and then collecting garbage for the corresponding target service types by using the corresponding garbage collection components.Type: GrantFiled: March 7, 2017Date of Patent: September 14, 2021Assignee: Alibaba Group Holding LimitedInventors: Jie Zhang, Chen Zhang, Le He, Yingjie Shi, Yan Huang
-
Patent number: 11038684Abstract: User authentication techniques that use a companion device associated with a mobile computing device are described. The companion device receives a user authentication request from a user authentication service via the mobile computing device, displays information related to the user authentication request, receives an approval of the user authentication request, and transmits the approval of the user authentication request to the service via the mobile computing device. In one embodiment, after transmitting the approval, the companion device receives a token from the mobile computing device that includes a value obtained from the service, signs the token with a private key of a securely-stored signing key pair and provides the signed token to the service via the mobile computing device. In another embodiment, after the companion device transmits the approval to the mobile computing device, the mobile computing device provides a personal identification code from secure storage to the service.Type: GrantFiled: September 14, 2018Date of Patent: June 15, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Samir Vasantbhai Shah, Jia Le He
-
Patent number: 10997443Abstract: This specification discloses a user identity verification method, apparatus, and system, relating to the field of information technology. The method comprises: receiving a facial image and one or more eye-print pair images corresponding to an identity verification object from a client, wherein a number of the one or more eye-print pair images corresponds to a number of eye-print collection steps, comparing the facial image to a preset facial image and comparing the one or more eye-print pair images to preset eye-print templates, and sending successful identity verification information to a client when comparison results for the facial image and the one or more eye-print pair images meet preset conditions.Type: GrantFiled: September 30, 2019Date of Patent: May 4, 2021Assignee: ADVANCED NEW TECHNOLOGIES CO., LTD.Inventors: Le He, Yukun Tuo, Liang Li, Mian Huang, Jidong Chen, Wenbo Yang
-
Patent number: 10922133Abstract: The disclosed embodiments provide a task scheduling method and apparatus. Network resources needed for a task to perform cross-cluster reading and writing are analyzed to obtain usage information of the occupied network resources for reading and writing; and the task is scheduled according to the usage information of the network resources needed for reading and writing. Because the usage information of the network resources occupied for reading and writing respectively represent network resources that can be saved by the cluster where access data is located when the task is scheduled for reading and writing, it can be determined that the cluster to which the task is scheduled can enable the task to occupy less network resources, thereby solving the problem of high bandwidth usage across clusters in current systems.Type: GrantFiled: March 16, 2017Date of Patent: February 16, 2021Assignee: ALIBABA GROUP HOLDING LIMITEDInventors: Le He, Yan Huang, Yingjie Shi, Jie Zhang, Chen Zhang
-
Publication number: 20200026940Abstract: This specification discloses a user identity verification method, apparatus, and system, relating to the field of information technology. The method comprises: receiving a facial image and one or more eye-print pair images corresponding to an identity verification object from a client, wherein a number of the one or more eye-print pair images corresponds to a number of eye-print collection steps, comparing the facial image to a preset facial image and comparing the one or more eye-print pair images to preset eye-print templates, and sending successful identity verification information to a client when comparison results for the facial image and the one or more eye-print pair images meet preset conditions.Type: ApplicationFiled: September 30, 2019Publication date: January 23, 2020Inventors: Le HE, Yukun TUO, Liang LI, Mian HUANG, Jidong CHEN, Wenbo YANG
-
Publication number: 20200007334Abstract: User authentication techniques that use a companion device associated with a mobile computing device are described. The companion device receives a user authentication request from a user authentication service via the mobile computing device, displays information related to the user authentication request, receives an approval of the user authentication request, and transmits the approval of the user authentication request to the service via the mobile computing device. In one embodiment, after transmitting the approval, the companion device receives a token from the mobile computing device that includes a value obtained from the service, signs the token with a private key of a securely-stored signing key pair and provides the signed token to the service via the mobile computing device. In another embodiment, after the companion device transmits the approval to the mobile computing device, the mobile computing device provides a personal identification code from secure storage to the service.Type: ApplicationFiled: September 14, 2018Publication date: January 2, 2020Inventors: Samir Vasantbhai Shah, Jia Le He
-
Patent number: 10467490Abstract: This specification discloses a user identity verification method, apparatus, and system, relating to the field of information technology. The method comprises: receiving a facial image and one or more eye-print pair images corresponding to an identity verification object from a client, wherein a number of the one or more eye-print pair images corresponds to a number of eye-print collection steps, comparing the facial image to a preset facial image and comparing the one or more eye-print pair images to preset eye-print templates, and sending successful identity verification information to a client when comparison results for the facial image and the one or more eye-print pair images meet preset conditions.Type: GrantFiled: February 21, 2019Date of Patent: November 5, 2019Assignee: ALIBABA GROUP HOLDING LIMITEDInventors: Le He, Yukun Tuo, Liang Li, Mian Huang, Jidong Chen, Wenbo Yang
-
Publication number: 20190196965Abstract: Heterogeneous garbage types are collected by scanning all of the service items to identify all of the service types that are included within the service items, identifying garbage collection components that correspond with the service types, and then collecting garbage for the corresponding target service types by using the corresponding garbage collection components.Type: ApplicationFiled: March 7, 2017Publication date: June 27, 2019Applicant: Alibaba Group Holding LimitedInventors: Jie ZHANG, Chen ZHANG, Le HE, Yingjie SHI, Yan HUANG
-
Publication number: 20190188509Abstract: This specification discloses a user identity verification method, apparatus, and system, relating to the field of information technology. The method comprises: receiving a facial image and one or more eye-print pair images corresponding to an identity verification object from a client, wherein a number of the one or more eye-print pair images corresponds to a number of eye-print collection steps, comparing the facial image to a preset facial image and comparing the one or more eye-print pair images to preset eye-print templates, and sending successful identity verification information to a client when comparison results for the facial image and the one or more eye-print pair images meet preset conditions.Type: ApplicationFiled: February 21, 2019Publication date: June 20, 2019Inventors: Le HE, Yukun TUO, Liang LI, Mian HUANG, Jidong CHEN, Wenbo YANG
-
Publication number: 20190034228Abstract: The disclosed embodiments provide a task scheduling method and apparatus. Network resources needed for a task to perform cross-cluster reading and writing are analyzed to obtain usage information of the occupied network resources for reading and writing; and the task is scheduled according to the usage information of the network resources needed for reading and writing. Because the usage information of the network resources occupied for reading and writing respectively represent network resources that can be saved by the cluster where access data is located when the task is scheduled for reading and writing, it can be determined that the cluster to which the task is scheduled can enable the task to occupy less network resources, thereby solving the problem of high bandwidth usage across clusters in current systems.Type: ApplicationFiled: March 16, 2017Publication date: January 31, 2019Applicant: Alibaba Group Holding LimitedInventors: Le HE, Yan HUANG, Yingjie SHI, Jie ZHANG, Chen ZHANG