Patents by Inventor Lele Ma
Lele Ma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240111288Abstract: A method and system for decomposing cross-domain path planning of an amphibious vehicle.Type: ApplicationFiled: January 13, 2023Publication date: April 4, 2024Applicants: CHONGQING UNIVERSITY, SHANGHAI UNIVERSITYInventors: Huayan PU, Lele DING, Xuyang ZHENG, Jun LUO, Jie MA, Jing HUANG, Yongbing CHEN, Hongliang LIU, Anming SHEN, Haonan SUN
-
Publication number: 20240073197Abstract: A security defending method, a coprocessor, and a processing apparatus are disclosed. The security defending method is applicable in a coprocessor, including: receiving a jump destination encryption request for the operation task; using mask configuration to perform first mask processing on the first jump destination address value to obtain a first intermediate jump destination address value; performing an authentication operation based on the first jump destination storage address, a key reference value corresponding to the operation task and the first intermediate jump destination address value, to obtain a first encryption result value; using the mask configuration to perform second mask processing on the first encryption result value to obtain a first intermediate encryption result value; performing an authentication operation on the first intermediate encryption result value and the first jump destination address value to obtain a first encryption jump destination address value.Type: ApplicationFiled: December 29, 2022Publication date: February 29, 2024Inventors: Baoguang LIU, Dan LIU, Liu CAO, Lele MA, Wenjuan ZHANG, Xun ZHANG, Xianshuai YANG, Bin LIU, Xinyu QIN, Yifan LIU, Kaixuan WANG, Jun HAN
-
Publication number: 20240070263Abstract: A security defending method and an electronic apparatus are disclosed. The security defending method is applicable in a coprocessor, including: receiving a jump destination encryption request for the operation task; using mask configuration to perform first mask processing on the first jump destination address value to obtain a first intermediate jump destination address value; performing an authentication operation based on the first jump destination storage address, a key reference value corresponding to the operation task and the first intermediate jump destination address value, to obtain a first encryption result value; using the mask configuration to perform second mask processing on the first encryption result value to obtain a first intermediate encryption result value; performing an authentication operation on the first intermediate encryption result value and the first jump destination address value to obtain a first encryption jump destination address value.Type: ApplicationFiled: December 29, 2022Publication date: February 29, 2024Inventors: Baoguang LIU, Dan LIU, Liu CAO, Lele MA, Wenjuan ZHANG, Xun ZHANG, Xianshuai YANG, Bin LIU, Xinyu QIN, Yifan LIU, Kaixuan WANG, Jun HAN
-
Patent number: 11917532Abstract: This disclosure relates to techniques for multi-RAT and DSDA capable wireless devices to handle frame blanking in a wireless communication system. A wireless device may establish wireless links according to a first radio access technology and a second radio access technology. The wireless device may determine to perform transmit and receive blanking for one or more antennas of the wireless device for the first radio access technology to perform sounding reference signal transmissions for the second radio access technology based at least in part on a band combination for the wireless links. The wireless device may determine a modification to channel state feedback reporting for the first radio access technology based at least in part on the transmit and receive blanking. The wireless device may perform channel state feedback reporting using the determined modification.Type: GrantFiled: September 21, 2021Date of Patent: February 27, 2024Assignee: Apple Inc.Inventors: Junzhen Qin, Wen Zhao, Lijie Zhang, Lele Cui, Wenping Lou, Qiang Miao, Zhiwei Wang, Ying Zhang, Deepankar Bhattacharjee, Kexin Ma, Alex Yee Kit Ho
-
Patent number: 11159561Abstract: A method including acquiring a suspect data traffic set, the suspect data traffic set including data traffic corresponding to each suspect IP address in a suspect IP address set included in original data traffic drawn by a defense terminal located in a cloud platform; acquiring normal data traffic, the normal data traffic being data traffic that remains after the defense terminal cleans the suspect data traffic set according to a preset defense strategy; acquiring host performance parameters, the host performance parameters being a set of parameters extracted from the target terminal after the defense terminal sends the normal data traffic to the target terminal; and quantifying a defense result based on a target parameter set, wherein the target parameter set at least includes: the suspect data traffic set, the normal data traffic and the host performance parameters. The defense result is accurate by comprehensively considering evaluation aspects and indexes.Type: GrantFiled: February 2, 2018Date of Patent: October 26, 2021Assignee: Alibaba Group Holding LimitedInventors: Lele Ma, Jianyue Zhu, Jiarui Zhu
-
Patent number: 10798110Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.Type: GrantFiled: February 6, 2019Date of Patent: October 6, 2020Assignee: Alibaba Group Holding LimitedInventors: Yangyang Song, Lele Ma, Min Hu
-
Publication number: 20190190924Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.Type: ApplicationFiled: February 6, 2019Publication date: June 20, 2019Inventors: Yangyang Song, Lele Ma, Min Hu
-
Patent number: 10243969Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.Type: GrantFiled: August 24, 2016Date of Patent: March 26, 2019Assignee: Alibaba Group Holding LimitedInventors: Yangyang Song, Lele Ma, Min Hu
-
Publication number: 20190068635Abstract: The present application provides data processing methods and apparatuses. A data processing apparatus can include: a communication interface; a memory storing a set of instructions; and at least one processor configured to execute the set of instructions to cause the apparatus to perform: receiving a target data packet sent by a network device; cleaning the target data packet; and sending the cleaned target data packet to a target website server.Type: ApplicationFiled: October 26, 2018Publication date: February 28, 2019Inventors: Jianyong GE, Lele MA, Yangyang SONG
-
Publication number: 20180367566Abstract: A method including parsing an attack packet when a network attack is detected, wherein the attack packet includes address information; locating a first gateway device according to the address information; and sending a first instruction to the first gateway device, wherein the first instruction is used for instructing the first gateway device to perform security control on a terminal to which the attack packet belongs. The present disclosure solves the technical problem of low defense efficiency when a target server under attack defends passively due to the lack of techniques of monitoring and countering network attacks in conventional techniques.Type: ApplicationFiled: August 28, 2018Publication date: December 20, 2018Inventors: Lele Ma, Yangyang SONG, Lai ZHOU
-
Publication number: 20180159895Abstract: A method including acquiring a suspect data traffic set, the suspect data traffic set including data traffic corresponding to each suspect IP address in a suspect IP address set included in original data traffic drawn by a defense terminal located in a cloud platform; acquiring normal data traffic, the normal data traffic being data traffic that remains after the defense terminal cleans the suspect data traffic set according to a preset defense strategy; acquiring host performance parameters, the host performance parameters being a set of parameters extracted from the target terminal after the defense terminal sends the normal data traffic to the target terminal; and quantifying a defense result based on a target parameter set, wherein the target parameter set at least includes: the suspect data traffic set, the normal data traffic and the host performance parameters. The defense result is accurate by comprehensively considering evaluation aspects and indexes.Type: ApplicationFiled: February 2, 2018Publication date: June 7, 2018Inventors: Lele Ma, Jianyue ZHU, Jiarui Zhu
-
Publication number: 20170085531Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.Type: ApplicationFiled: August 24, 2016Publication date: March 23, 2017Inventors: Yangyang Song, Lele Ma, Min Hu