Patents by Inventor Lei Gu

Lei Gu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10810089
    Abstract: Backup metrics are received from multiple endpoints. Backup baselines are established, based on backup metrics received over a period of time. Each established backup baseline specifies an empirically determined baseline level of backup activity according to specific criteria. Changes in backup behavior are detected, as measured against established backup baselines, based on analyzing received backup metrics. Such changes can be detected by applying a non-supervised machine learning technique to backup metrics. Detected backup behavior changes that meet a corresponding threshold are further analyzed to determine whether to alter corresponding backup activity in response. Backup activity on endpoints can be modified, in response to the analysis. This can take the form of omitting specific files or folders from corresponding backups, or changing default backup configuration(s). For example, a new or modified default backup configuration can be transmitted to one or more endpoints.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: October 20, 2020
    Assignee: NORTONLIFELOCK INC.
    Inventors: Lei Gu, Ilya Sokolov
  • Patent number: 10810088
    Abstract: A system and method of dynamic backup policy generation based upon a user's behavior is provided. The method may include detecting a user's usage pattern of files within a computing system based upon the user's backup or restore activities. In some embodiments, the backup system may identify the files that have been modified and calculate the percentage of modification away from a predetermined baseline or another previously stored version. The system may generate a list of the identified files along with these percentages to form the user's usage pattern. The method may further include generating a user's profile including files having high access rates in accordance with this usage pattern and adjusting a backup policy based upon the user's profile such that these files are backed-up more frequently. The backup policy may also be adjusted based upon a detected level of risk associated with the user.
    Type: Grant
    Filed: May 13, 2016
    Date of Patent: October 20, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Lei Gu, Ilya Sokolov
  • Publication number: 20200328737
    Abstract: In specific examples, aspects are directed towards eliminating, mitigating or reducing gate loss in circuits including, for example, WBG power devices. One such example is directed towards an apparatus including first and second types of field-effect transistor (FET), where the first type is characterized as being a normally-on FET in a switching-circuit operation with a high-voltage rating, and the second type of FET is characterized as being a normally-off FET in a switching-circuit operation with a voltage rating that is much less than the high-voltage rating of the first type of FET circuit. The FET are arranged in a cascode manner so that, in response to a switching control signal received by the second type of FET circuit, the second type of FET circuit is active to drive the first type of FET.
    Type: Application
    Filed: April 13, 2020
    Publication date: October 15, 2020
    Inventors: Juan Rivas-Davila, Jiale Xu, Lei Gu
  • Patent number: 10795826
    Abstract: A translation lookaside buffer (TLB) management method and a multi-core processor are provided. The method includes: receiving, by a first core, a first address translation request; querying a TLB of the first core based on the first address translation request; determining that a first target TLB entry corresponding to the first address translation request is missing in the TLB of the first core, obtaining the first target TLB entry; determining that entry storage in the TLB of the first core is full; determining a second core from cores in an idle state in the multi-core processor; replacing a first entry in the TLB of the first core with the first target TLB entry; storing the first entry in a TLB of the second core. Accordingly, a TLB miss rate is reduced and program execution is accelerated.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: October 6, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Lei Fang, Weiguang Cai, Xiongli Gu
  • Patent number: 10789593
    Abstract: A usage frequency attribute is determined for each biometric feature in a biometric feature database. The usage frequency attribute indicates a matching success frequency of matching the biometric feature to a user having the biometric feature. The biometric features of the user are sorted in descending order of the usage frequency attribute. The sorting is based on a descending order of the usage frequency attributes for a given user. The biometric features in the biometric feature database are stored in descending order. The storing includes providing prioritized access to the biometric feature having a highest value of the usage frequency attribute so that the biometric feature is selected first in response to a request for the biometric feature of the user.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: September 29, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Fen Zhai, Chunlei Gu, Lei Lu, Yanghui Liu
  • Patent number: 10783261
    Abstract: The disclosed computer-implemented method for preventing sensitive information exposure based on a surrounding audience may include (1) detecting, from one or more communication devices, surrounding audience data associated with an audience presentation on a presentation device, the audience presentation including sensitive information and non-sensitive information, (2) determining an audience profile based on the surrounding audience data, the audience profile identifying one or more unintended audience members in the surrounding audience, (3) assigning an information exposure policy to the audience presentation based on the audience profile, and (4) performing a security action to enforce the information exposure policy on the presentation device such that the sensitive information is prevented from being exposed to the surrounding audience during the audience presentation. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: May 16, 2018
    Date of Patent: September 22, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Lei Gu, Ilya Sokolov
  • Patent number: 10785559
    Abstract: The present application is applicable to the technical field of intelligent home, and provides a method and a device for switching play modes of a wireless speaker, and a wireless speaker. The method for switching play modes of a wireless speaker includes: acquiring user information in a current application scenario by the camera and/or the microphone array; and controlling the wireless speaker to switch into a play mode corresponding to the user information. The embodiments of the present application can automatically switch the play modes according to the application scenario, thereby improving the switching efficiency, reducing the waiting time of the user, and having strong ease of use and practicability.
    Type: Grant
    Filed: March 25, 2019
    Date of Patent: September 22, 2020
    Assignee: SHENZHEN GRANDSUN ELECTRONIC CO., LTD.
    Inventors: Rongfang Huang, Haiquan Wu, Weifeng Gu, Enqin Zhang, Lei Cao, Ruiwen Shi
  • Publication number: 20200272356
    Abstract: A method and a system for creating a workload distribution plan on a storage system. The method includes, for each storage location, initializing components for at least one data type, such that the components establish a baseline distribution percentage. The method also includes writing data packages onto the storage system over a predetermined time period. The method also includes, for each data type on each storage location, creating a workload distribution plan, where the workload distribution plan distributes a workload of the storage system to the storage location. The method also includes implementing the workload distribution plan on the storage system.
    Type: Application
    Filed: February 21, 2019
    Publication date: August 27, 2020
    Inventors: Da Lei Zhang, Jia Jun Lu, Li Li Gu, Le Yi Zhou, Xiao Yu Wang, Wen Bao Yin
  • Publication number: 20200267647
    Abstract: A capability indication method, a route setup method, a mobile terminal, and a network device, the capability indication method including a network device sending first indication information to a mobile terminal, where the first indication information is used to indicate that a communications network in which the network device is located supports communication between mobile terminals having a multi-hop capability, and where the mobile terminal having the multi-hop capability is a mobile terminal having a capability of directly communicating with one or more mobile terminals.
    Type: Application
    Filed: February 20, 2020
    Publication date: August 20, 2020
    Inventors: Yongzhao Cao, Fangfu Guo, Lei Gu, Chi Zhang
  • Patent number: 10742665
    Abstract: A computer-implemented method for modifying file backups in response to detecting potential ransomware may include (1) detecting, during a file backup process, an anomaly that is potentially indicative of ransomware on a computing device, (2) in response to detecting the anomaly that is potentially indicative of ransomware, storing a backup copy in a separate location from other backup copies, (3) confirming that the anomaly is indicative of ransomware on the computing device, (4) adjusting a backup policy in response to confirming that the anomaly is indicative of ransomware on the computing device, and (5) managing the backup copy based on the adjusted backup policy. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 1, 2016
    Date of Patent: August 11, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Lei Gu, Ilya Sokolov
  • Patent number: 10740247
    Abstract: A method for accessing an entry in a translation lookaside buffer and a processing chip are provided. In the method, the entry includes at least one combination entry, and the combination entry includes a virtual huge page number, a bit vector field, and a physical huge page number. The physical huge page number is an identifier of N consecutive physical pages corresponding to the N consecutive virtual pages. One entry is used to represent a plurality of virtual-to-physical page mappings, so that when a page table length is fixed, a quantity of entries in the TLB can be increased exponentially, thereby increasing a TLB hit probability, and reducing TLB misses. In this way, a delay in program processing can be reduced, and processing efficiency of the processing chip can be improved.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: August 11, 2020
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Weiguang Cai, Xiongli Gu, Lei Fang
  • Patent number: 10725870
    Abstract: The content of each specific image file on an endpoint is analyzed. Each analyzed image file is categorized based on the results of analyzing its content. The analysis can be in the form identifying one or more objects graphically represented in given image files, and the categorization of image files can be based on these identified graphically represented object(s). A backup policy is configured to automatically backup specific image files on the endpoint, based on their content as per the categorization. Information concerning the content-based categorization of the image files on the endpoint can be output to a user. In response, directives for backing-up image files according to their content-based categorization can be received from the user. Specific images files are backed-up automatically, regardless of their location on the endpoint, according to the configured backup policy.
    Type: Grant
    Filed: January 2, 2018
    Date of Patent: July 28, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Lei Gu, Ilya Sokolov
  • Patent number: 10715011
    Abstract: An electrical machine includes an electric motor, a cooling jacket over the electric motor, and a power inverter having multiple AC power outlets. The electrical machine also includes an elongated busbar having an end adjacent to and coupled to an AC power outlet. The other end of the elongated busbar is adjacent to and coupled to the electric motor. The elongated busbar traverses from one end of the electric motor to a second end of the electric motor over, and in thermal contact with, the cooling jacket so as to reduce a high temperature at the electric motor to a low temperature at the AC power outlet.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: July 14, 2020
    Assignee: Karma Automotive LLC
    Inventors: Lei Gu, Zhong Nie, Yu Liu, Xiaogang Wang
  • Publication number: 20200218289
    Abstract: An information processing apparatus for generating an aerial photography path for aerial photography by an aircraft is provided. The information processing apparatus includes a processing unit for performing processes related to generating the aerial photography path. The processing unit is configured to acquire terrain information of an aerial photography area, divide the aerial photography area at each height above ground level in the aerial photography area to generate a plurality of zones, generate a first aerial photography path for aerial photography in each generated zone, and connect the generated first aerial photography path for each generation zone to generate a second aerial photography path for capturing aerial photographs in the aerial photography area.
    Type: Application
    Filed: March 17, 2020
    Publication date: July 9, 2020
    Inventors: Lei GU, Bin CHEN
  • Publication number: 20200217665
    Abstract: A photo-imaging route generating method includes obtaining information on a photo-imaging range, generating a first photo-imaging route, the first photo-imaging route passing through a first photo-imaging position at which a first range of photographic images is captured within the photo-imaging range, calculating a first repeatability of the first range of photographic images obtained at the first photo-imaging position, when the first repeatability is below a threshold, generating a second photo-imaging position at which a second batch of photographic images is captured, and generating a second photo-imaging route, the second photo-imaging route passing through both the first photo-imaging position and the second photo-imaging position.
    Type: Application
    Filed: March 13, 2020
    Publication date: July 9, 2020
    Inventors: Lei GU, Zhejun CHEN
  • Patent number: 10706167
    Abstract: A computer-implemented method for enforcing privacy in cloud security may include (i) identifying, by a computing device, a set of files in a backup process for a cloud service, (ii) determining, by the computing device, that at least one file in the set of files is a private file, (iii) modifying, by the computing device encrypting the private file, the set of files in the backup process, (iv) completing the backup process for the cloud service with the modified set of files, and (v) enforcing a security policy of the cloud service based on a scan of file hashes. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: July 7, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Ilya Sokolov, Lei Gu, Jason Holler, Tim van der Horst
  • Patent number: 10693998
    Abstract: The disclosed computer-implemented method for creating application ratings may include (i) determining that a user device has downloaded an application, (ii) monitoring the usage of the application on the user device, (iii) deducing a value of the application based at least in part on the monitored usage, and (iv) creating a rating for the application that indicates the deduced value of the application. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: August 15, 2016
    Date of Patent: June 23, 2020
    Assignee: NortonLifeLock Inc.
    Inventors: Lei Gu, Keith Newstadt
  • Publication number: 20200147612
    Abstract: A microfluidic device, a method of using a microfluidic device and a micro total analysis system are provided. The microfluidic device includes a first substrate, and the first substrate includes a base substrate and a pixel array. The pixel array includes a plurality of pixels and is on the base substrate, and each of the plurality of pixels includes a driving electrode. Driving electrodes of two adjacent pixels are in different layers.
    Type: Application
    Filed: May 23, 2019
    Publication date: May 14, 2020
    Inventors: Yingming LIU, Haisheng WANG, Xiaochuan CHEN, Xue DONG, Xiaoliang DING, Pinchao GU, Lei WANG, Changfeng LI, Ping ZHANG
  • Publication number: 20200151668
    Abstract: An information processing device for generating a transport network for transporting a cargo by a flying object is provided in the present disclosure. The information processing device includes a processing element for performing a processing related to a generation of the transport network. The processing element is configured to acquire information of three-dimensional positions of each of a plurality of bases located on a ground in a transport region with the cargo to be transported, and further configured to, by adding a predetermined height to the three-dimensional positions of each of the plurality of bases, calculate three-dimensional positions of each of a plurality of air passing-nodes for the flying object to fly through.
    Type: Application
    Filed: January 10, 2020
    Publication date: May 14, 2020
    Inventors: Lei GU, Xiangwei WANG
  • Publication number: 20200126088
    Abstract: A usage frequency attribute is determined for each biometric feature in a biometric feature database. The usage frequency attribute indicates a matching success frequency of matching the biometric feature to a user having the biometric feature. The biometric features of the user are sorted in descending order of the usage frequency attribute. The sorting is based on a descending order of the usage frequency attributes for a given user. The biometric features in the biometric feature database are stored in descending order. The storing includes providing prioritized access to the biometric feature having a highest value of the usage frequency attribute so that the biometric feature is selected first in response to a request for the biometric feature of the user.
    Type: Application
    Filed: December 18, 2019
    Publication date: April 23, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Fen Zhai, Chunlei Gu, Lei Lu, Yanghui Liu