Patents by Inventor Lele Ma

Lele Ma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240111288
    Abstract: A method and system for decomposing cross-domain path planning of an amphibious vehicle.
    Type: Application
    Filed: January 13, 2023
    Publication date: April 4, 2024
    Applicants: CHONGQING UNIVERSITY, SHANGHAI UNIVERSITY
    Inventors: Huayan PU, Lele DING, Xuyang ZHENG, Jun LUO, Jie MA, Jing HUANG, Yongbing CHEN, Hongliang LIU, Anming SHEN, Haonan SUN
  • Publication number: 20240073197
    Abstract: A security defending method, a coprocessor, and a processing apparatus are disclosed. The security defending method is applicable in a coprocessor, including: receiving a jump destination encryption request for the operation task; using mask configuration to perform first mask processing on the first jump destination address value to obtain a first intermediate jump destination address value; performing an authentication operation based on the first jump destination storage address, a key reference value corresponding to the operation task and the first intermediate jump destination address value, to obtain a first encryption result value; using the mask configuration to perform second mask processing on the first encryption result value to obtain a first intermediate encryption result value; performing an authentication operation on the first intermediate encryption result value and the first jump destination address value to obtain a first encryption jump destination address value.
    Type: Application
    Filed: December 29, 2022
    Publication date: February 29, 2024
    Inventors: Baoguang LIU, Dan LIU, Liu CAO, Lele MA, Wenjuan ZHANG, Xun ZHANG, Xianshuai YANG, Bin LIU, Xinyu QIN, Yifan LIU, Kaixuan WANG, Jun HAN
  • Publication number: 20240070263
    Abstract: A security defending method and an electronic apparatus are disclosed. The security defending method is applicable in a coprocessor, including: receiving a jump destination encryption request for the operation task; using mask configuration to perform first mask processing on the first jump destination address value to obtain a first intermediate jump destination address value; performing an authentication operation based on the first jump destination storage address, a key reference value corresponding to the operation task and the first intermediate jump destination address value, to obtain a first encryption result value; using the mask configuration to perform second mask processing on the first encryption result value to obtain a first intermediate encryption result value; performing an authentication operation on the first intermediate encryption result value and the first jump destination address value to obtain a first encryption jump destination address value.
    Type: Application
    Filed: December 29, 2022
    Publication date: February 29, 2024
    Inventors: Baoguang LIU, Dan LIU, Liu CAO, Lele MA, Wenjuan ZHANG, Xun ZHANG, Xianshuai YANG, Bin LIU, Xinyu QIN, Yifan LIU, Kaixuan WANG, Jun HAN
  • Patent number: 11917532
    Abstract: This disclosure relates to techniques for multi-RAT and DSDA capable wireless devices to handle frame blanking in a wireless communication system. A wireless device may establish wireless links according to a first radio access technology and a second radio access technology. The wireless device may determine to perform transmit and receive blanking for one or more antennas of the wireless device for the first radio access technology to perform sounding reference signal transmissions for the second radio access technology based at least in part on a band combination for the wireless links. The wireless device may determine a modification to channel state feedback reporting for the first radio access technology based at least in part on the transmit and receive blanking. The wireless device may perform channel state feedback reporting using the determined modification.
    Type: Grant
    Filed: September 21, 2021
    Date of Patent: February 27, 2024
    Assignee: Apple Inc.
    Inventors: Junzhen Qin, Wen Zhao, Lijie Zhang, Lele Cui, Wenping Lou, Qiang Miao, Zhiwei Wang, Ying Zhang, Deepankar Bhattacharjee, Kexin Ma, Alex Yee Kit Ho
  • Patent number: 11159561
    Abstract: A method including acquiring a suspect data traffic set, the suspect data traffic set including data traffic corresponding to each suspect IP address in a suspect IP address set included in original data traffic drawn by a defense terminal located in a cloud platform; acquiring normal data traffic, the normal data traffic being data traffic that remains after the defense terminal cleans the suspect data traffic set according to a preset defense strategy; acquiring host performance parameters, the host performance parameters being a set of parameters extracted from the target terminal after the defense terminal sends the normal data traffic to the target terminal; and quantifying a defense result based on a target parameter set, wherein the target parameter set at least includes: the suspect data traffic set, the normal data traffic and the host performance parameters. The defense result is accurate by comprehensively considering evaluation aspects and indexes.
    Type: Grant
    Filed: February 2, 2018
    Date of Patent: October 26, 2021
    Assignee: Alibaba Group Holding Limited
    Inventors: Lele Ma, Jianyue Zhu, Jiarui Zhu
  • Patent number: 10798110
    Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.
    Type: Grant
    Filed: February 6, 2019
    Date of Patent: October 6, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Yangyang Song, Lele Ma, Min Hu
  • Publication number: 20190190924
    Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.
    Type: Application
    Filed: February 6, 2019
    Publication date: June 20, 2019
    Inventors: Yangyang Song, Lele Ma, Min Hu
  • Patent number: 10243969
    Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.
    Type: Grant
    Filed: August 24, 2016
    Date of Patent: March 26, 2019
    Assignee: Alibaba Group Holding Limited
    Inventors: Yangyang Song, Lele Ma, Min Hu
  • Publication number: 20190068635
    Abstract: The present application provides data processing methods and apparatuses. A data processing apparatus can include: a communication interface; a memory storing a set of instructions; and at least one processor configured to execute the set of instructions to cause the apparatus to perform: receiving a target data packet sent by a network device; cleaning the target data packet; and sending the cleaned target data packet to a target website server.
    Type: Application
    Filed: October 26, 2018
    Publication date: February 28, 2019
    Inventors: Jianyong GE, Lele MA, Yangyang SONG
  • Publication number: 20180367566
    Abstract: A method including parsing an attack packet when a network attack is detected, wherein the attack packet includes address information; locating a first gateway device according to the address information; and sending a first instruction to the first gateway device, wherein the first instruction is used for instructing the first gateway device to perform security control on a terminal to which the attack packet belongs. The present disclosure solves the technical problem of low defense efficiency when a target server under attack defends passively due to the lack of techniques of monitoring and countering network attacks in conventional techniques.
    Type: Application
    Filed: August 28, 2018
    Publication date: December 20, 2018
    Inventors: Lele Ma, Yangyang SONG, Lai ZHOU
  • Publication number: 20180159895
    Abstract: A method including acquiring a suspect data traffic set, the suspect data traffic set including data traffic corresponding to each suspect IP address in a suspect IP address set included in original data traffic drawn by a defense terminal located in a cloud platform; acquiring normal data traffic, the normal data traffic being data traffic that remains after the defense terminal cleans the suspect data traffic set according to a preset defense strategy; acquiring host performance parameters, the host performance parameters being a set of parameters extracted from the target terminal after the defense terminal sends the normal data traffic to the target terminal; and quantifying a defense result based on a target parameter set, wherein the target parameter set at least includes: the suspect data traffic set, the normal data traffic and the host performance parameters. The defense result is accurate by comprehensively considering evaluation aspects and indexes.
    Type: Application
    Filed: February 2, 2018
    Publication date: June 7, 2018
    Inventors: Lele Ma, Jianyue ZHU, Jiarui Zhu
  • Publication number: 20170085531
    Abstract: Identifying network loops is disclosed including determining a first data packet having a time to live (TTL) that at least meets a first condition, the first data packet having a destination internet protocol (IP) address; within a time period after the determining of the first data packet, identifying a plurality of second data packets that are to be transmitted to the destination IP address; and determining whether a network loop exists for the destination IP address based on TTLs of the plurality of second data packets.
    Type: Application
    Filed: August 24, 2016
    Publication date: March 23, 2017
    Inventors: Yangyang Song, Lele Ma, Min Hu