Patents by Inventor Qiang Yan

Qiang Yan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250148108
    Abstract: Differential privacy composition determination in a secure communication is provided. A method for determining differential privacy composition includes determining a differential privacy configuration including a first privacy parameter and a second privacy parameter, determining a privacy loss distribution, and performing a partial convolution operation of the privacy loss distribution by transforming the privacy loss distribution based on a predetermined parameter, determining an integral range based on the first privacy parameter and the privacy loss distribution, transforming the privacy loss distribution based on the integral range, and performing the partial convolution operation based on the integral range. The method also includes determining the second privacy parameter based on a result of the partial convolution operation, and controlling a dataset based on the differential privacy configuration to limit access to the dataset.
    Type: Application
    Filed: November 6, 2023
    Publication date: May 8, 2025
    Inventors: Bo Jiang, Jian Du, Sagar Sharma, Qiang Yan
  • Publication number: 20250141657
    Abstract: Methods and systems for data security are provided. The method includes generating respective tags for data segments in a dataset, deriving respective temporal keys associated with the respective tags for the plurality of data segments from a master key, and transforming the plurality of data segments from a plaintext to a ciphertext using the respective temporal keys as a first input and the respective tags as a second input, while format-preserving the data segments. The master key can be updated to prevent from reverse-transforming a selected data segment in the dataset from the ciphertext to the plaintext.
    Type: Application
    Filed: October 31, 2023
    Publication date: May 1, 2025
    Inventors: Yongjun ZHAO, Wei DAI, Donghang LU, Qiang YAN
  • Patent number: 12231563
    Abstract: Methods and systems for secure computation and communication are provided. The method includes transforming identifications of a first dataset using a first transforming scheme, and transforming attributes of the first dataset using a second transforming scheme. The method also includes dispatching the transformed first dataset, receiving a second dataset, transforming identifications of the received second dataset, dispatching the identifications of the transformed received second dataset, and receiving a set of identifications. The method further includes generating a first intersection of the received set of identifications and the transformed received second dataset, generating a first share based on the first intersection, receiving a second share, and constructing a result based on the first share and the second share.
    Type: Grant
    Filed: April 7, 2023
    Date of Patent: February 18, 2025
    Assignee: Lemon Inc.
    Inventors: Haohao Qian, Jian Du, Qiang Yan
  • Publication number: 20250045450
    Abstract: Methods and systems for evaluating privacy protection are provided. A method includes generating a first intersection of a first dataset and a second dataset. The method also includes determining a partition number based on the first dataset, the first intersection, and a number of iterations by: determining a privacy leakage for subsets of the first dataset based on the first dataset, the first intersection, and the number of iterations; and determining the partition number based on the privacy leakage for each of the subsets of the first dataset. The method further includes partitioning the first dataset into a first sub-dataset and a second sub-dataset using the partition number, and determining positive membership and negative membership for elements of the first sub-dataset in the second dataset and for elements of the second sub-dataset in the second dataset.
    Type: Application
    Filed: August 1, 2023
    Publication date: February 6, 2025
    Inventors: Bo JIANG, Jian DU, Qiang YAN
  • Publication number: 20250045425
    Abstract: Methods and systems for evaluating privacy protection are provided. A method includes determining a first sub-dataset of a first dataset based on a sampling rate, a tolerance, and a first threshold. The method also includes determining a second sub-dataset of the first dataset based on the sampling rate, the tolerance, and a second threshold. The method includes determining a first distance between the first sub-dataset and the first threshold, determining a second distance between the second sub-dataset and the second threshold, generating a first intersection of the first sub-dataset and a second dataset and updating posterior for elements of the first dataset based on the first intersection when the first distance is less than or equal to the second distance, and determining positive membership and negative membership for the elements of the first dataset in the second dataset based on the posterior for the elements of the first dataset.
    Type: Application
    Filed: August 2, 2023
    Publication date: February 6, 2025
    Inventors: Bo Jiang, Jian Du, Qiang Yan
  • Publication number: 20240386131
    Abstract: Data security for a dataset in interactive query or operation from users regarding data stored in the dataset is provided. A method for providing data security for the dataset in secure data computation and communication includes generating a query result corresponding to the user query for the dataset, determining a magnitude range of the query result, and generating an amount of random noise data based on the magnitude range. The amount of random noise data is calibrated by adjusting at least one of a first tunable parameter within a first range and a second tunable parameter within a second range of a differential privacy (DP) configuration. A noise-laden query result is generated by applying the noise data to the query result to satisfy an error tolerance level.
    Type: Application
    Filed: May 15, 2023
    Publication date: November 21, 2024
    Inventors: Sagar Sharma, Xing Wu, Qiang Yan
  • Patent number: 12132669
    Abstract: Modelling for efficient resource allocation and/or distribution in secure computation and communication for differential privacy protocols and/or algorithms is provided. A method for allocating a resource of a differentially private system in secure computation and communication includes aggregating attributes from a usage log of the differentially private system for a predetermined period of time, generating a moving aggregation based on the aggregated attributes, training a machine learning model based on the aggregated attributes and the moving aggregation, predicting a distribution of the resource using the trained machine learning model, and allocating the resource based on the predicted distribution. The resource includes a differential privacy parameter.
    Type: Grant
    Filed: May 15, 2023
    Date of Patent: October 29, 2024
    Assignee: LEMON INC.
    Inventors: Sagar Sharma, Qiang Yan
  • Publication number: 20240338478
    Abstract: Methods and systems for protecting membership privacy for secure computation and communication are provided. The method includes providing a first dataset, determining a number N based on a data privacy configuration, and generating a padding dataset having more than N elements. An intersection of the padding dataset and the first dataset is empty. The method also includes shuffling the padding dataset, up-sampling the first dataset with a first N elements of the shuffled padding dataset, and performing an intersection operation based on the up-sampled first dataset and a received dataset.
    Type: Application
    Filed: November 28, 2023
    Publication date: October 10, 2024
    Inventors: Jian Du, Bo Jiang, Haohao Qian, Qiang Yan
  • Publication number: 20240340178
    Abstract: Methods and systems for secure computation and communication are provided. The method includes transforming identifications of a first dataset using a first transforming scheme, and transforming attributes of the first dataset using a second transforming scheme. The method also includes dispatching the transformed first dataset, receiving a second dataset, transforming identifications of the received second dataset, dispatching the identifications of the transformed received second dataset, and receiving a set of identifications. The method further includes generating a first intersection of the received set of identifications and the transformed received second dataset, generating a first share based on the first intersection, receiving a second share, and constructing a result based on the first share and the second share.
    Type: Application
    Filed: April 7, 2023
    Publication date: October 10, 2024
    Inventors: Haohao QIAN, Jian DU, Qiang YAN
  • Publication number: 20240282646
    Abstract: The present application discloses a method for measuring thickness of a silicon epitaxial layer, including: step 1: performing epitaxial growth to grow a first semiconductor material layer made of a material optically distinguishable from a silicon layer on a surface of a first wafer composed of a first silicon substrate; step 2: performing epitaxial growth to grow a first silicon epitaxial layer; step 3: measuring the thickness of silicon to obtain the first thickness of the first silicon epitaxial layer; step 4: performing epitaxial growth on a surface of the first silicon epitaxial layer to form a second silicon epitaxial layer; step 5: measuring the thickness of silicon to obtain the superposed thickness of the first silicon epitaxial layer and the second silicon epitaxial layer, and subtracting the first thickness from the superposed thickness to obtain the thickness of the silicon epitaxial layer.
    Type: Application
    Filed: September 11, 2023
    Publication date: August 22, 2024
    Inventors: Jiaqi HONG, Jun TAN, Qiang YAN
  • Publication number: 20240202446
    Abstract: This application provide a keyword extraction method. The method includes: performing word segmentation on a text, to obtain a plurality of candidate words; selecting, from the plurality of candidate words, a candidate word that appears in the title; determining an extraction threshold according to an attention weight of the selected candidate word relative to the title; and determining a keyword of the text from the candidate words according to the extraction threshold.
    Type: Application
    Filed: February 29, 2024
    Publication date: June 20, 2024
    Inventors: Wenhao ZHENG, Lie Kang, Qiang Yan
  • Patent number: 12010041
    Abstract: Dynamic allocation and/or distribution of a resource in secure computation and communication to achieve a desired level of data privacy protection is provided. A method for dynamically allocating a resource of a differentially private system in secure computation and communication includes aggregating attributes from a usage log of the differentially private system for a predetermined period of time, generating a moving aggregation based on the aggregated attributes, optimizing a first attribute of the attributes of the usage log based on the moving aggregation and a set of constraints, generating a distribution of the resource based on the optimized first attribute, and dynamically allocating the resource based on the generated distribution. The resource includes a differential privacy parameter.
    Type: Grant
    Filed: May 15, 2023
    Date of Patent: June 11, 2024
    Assignee: Lemon Inc.
    Inventors: Sagar Sharma, Qiang Yan
  • Publication number: 20240170287
    Abstract: The present application discloses an epitaxial growth method for an FDSOI hybrid region, comprising: step 1, providing an FDSOI substrate structure; step 2, forming a trench; step 3, performing first isotropic epitaxial growth, wherein a top surface of a first semiconductor epitaxial sublayer is located in a plane between a top surface and a bottom surface of a dielectric buried layer, and a second semiconductor epitaxial sublayer comprise a lateral protruding structure on the side face of the semiconductor top layer; and step 4, performing second epitaxial growth having a growth rate of the first crystalline face, which is greater than a growth rate of the second crystalline face, wherein the third semiconductor epitaxial sublayer has a chamfered recess near the side face of the semiconductor top layer, finally the lateral protruding structure is located in the chamfered recess.
    Type: Application
    Filed: August 16, 2023
    Publication date: May 23, 2024
    Inventors: Jiaqi HONG, Qiang YAN, Jun TAN
  • Publication number: 20240170344
    Abstract: The present application discloses a method for manufacturing a source/drain epitaxial layer of an FDSOI MOSFET, comprising: step 1, forming a shallow trench isolation on an FDSOI substrate; step 2, opening a formation region of a source/drain region of the MOSFET; step 3, performing first epitaxial growth to form a first pure silicon epitaxial layer; step 4, performing a first etching process to remove polysilicon particles generated from step 3; and step 5, performing epitaxial growth to sequentially form a second source/drain epitaxial seed layer, a third source/drain epitaxial bulk layer, and a fourth source/drain epitaxial cap layer on a surface of the first pure silicon epitaxial layer, so the four epitaxial layers are stacked to form the source/drain epitaxial layer.
    Type: Application
    Filed: August 30, 2023
    Publication date: May 23, 2024
    Inventors: Jiaqi HONG, Jun TAN, Qiang YAN
  • Patent number: 11989325
    Abstract: Protecting membership in secure multi-party computation and communication is provided. A method of protecting membership includes generating a padding dataset, up-sampling a first dataset with the padding dataset, transforming and dispatching the first dataset, receiving a second dataset, and performing a private set intersection operation based on the first dataset and the second dataset to generate a third dataset. Each of the first dataset, the padding dataset, and/or the second dataset includes one or more personal identification information for each user or member in the dataset.
    Type: Grant
    Filed: October 23, 2023
    Date of Patent: May 21, 2024
    Assignee: Lemon Inc.
    Inventors: Jian Du, Yongjun Zhao, Haohao Qian, Bo Jiang, Qiang Yan
  • Patent number: 11983285
    Abstract: Protecting data privacy in secure multi-party computation and communication is provided. A method of protecting data privacy includes determining a differential privacy configuration, determining a number of iterations based on a first parameter and a second parameter, and for each of the number of iterations generating a random value and a random noise data; generating a first message and a second message; and performing a transfer based on the first message, the second message, and an input data to output one of the first message and the second message. The method also includes generating a first noise data based on the random noise data in each of the number of iterations, generating a first share based on a first dataset and a second dataset, applying the first noise data to the first share, and constructing a result based on the first share and a second share.
    Type: Grant
    Filed: October 20, 2023
    Date of Patent: May 14, 2024
    Assignee: Lemon Inc.
    Inventors: Jian Du, Haohao Qian, Yongjun Zhao, Bo Jiang, Chuyuan Chen, Qiang Yan
  • Patent number: 11947911
    Abstract: This application provides a keyword extraction method. The method includes: receiving an information entity including a title and a text; performing word segmentation on the text, to obtain a plurality of candidate words; and performing character segmentation on the title corresponding to semantics of the text, to obtain a plurality of characters; sequentially inputting the plurality of candidate words to a keyword extraction model, to obtain an attention weight of each candidate word relative to each character; selecting, from the plurality of candidate words, a candidate word that appears in the title; determining an extraction threshold according to an attention weight of the selected candidate word relative to each character; and determining a keyword of the text of the information entity from the candidate words according to the extraction threshold. This application further provide a method for training a keyword extraction model, a computer device, and a storage medium.
    Type: Grant
    Filed: February 23, 2021
    Date of Patent: April 2, 2024
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Wenhao Zheng, Lie Kang, Qiang Yan
  • Patent number: 11893236
    Abstract: This application discloses a method of displaying information in a program interface of an application performed by a computer device. The method includes: displaying a virtual keyboard control and an extension bar control in the program interface; in response to an input operation in the virtual keyboard control, displaying at least one character string in the extension bar control, the at least one character string being determined according to the input operation in the virtual keyboard control; and in response to a select operation on a target string among the at least one character string in the extension bar control, displaying a function interface of applying a target function to the target string. This embodiment allows a user to quickly switch between function interfaces when using an application, thereby reducing operation steps of the user and improving human-computer interaction efficiency.
    Type: Grant
    Filed: November 29, 2022
    Date of Patent: February 6, 2024
    Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventors: Hao Zhou, Zhe Feng, Yuxuan Zhang, Xiaosi Lai, Xiangyi Feng, Jiayi Ding, Tao Huang, Ge Wang, Chuangmu Yao, Yixiang Fang, Haitao Chen, Jiashuai Shi, Meng Zhao, Qiang Yan, Jianxiong Feng, Cong Jiang, Jiamin Chen, Tianyi Liang, Hongfa Qiu, Huawei Zhang, Heyi Zhang
  • Patent number: 11886617
    Abstract: Protecting membership and data in secure multi-party computation and communication is provided. A method of protecting membership and data includes generating a padding dataset. A size of the padding dataset is determined based on a data privacy configuration. The method also includes up-sampling a first dataset with the padding dataset, transforming the first dataset, dispatching the first dataset, performing an intersection operation based on the first dataset and a second dataset to generate a third dataset, generating a first share based on the third dataset, and constructing a result based on the first share and a second share.
    Type: Grant
    Filed: April 7, 2023
    Date of Patent: January 30, 2024
    Assignee: Lemon Inc.
    Inventors: Jian Du, Haohao Qian, Yongjun Zhao, Bo Jiang, Qiang Yan
  • Patent number: 11874950
    Abstract: Methods and systems for protecting membership privacy for secure computation and communication are provided. The method includes providing a first dataset, determining a number N based on a data privacy configuration, and generating a padding dataset having more than N elements. An intersection of the padding dataset and the first dataset is empty. The method also includes shuffling the padding dataset, up-sampling the first dataset with a first N elements of the shuffled padding dataset, and performing an intersection operation based on the up-sampled first dataset and a received dataset.
    Type: Grant
    Filed: April 7, 2023
    Date of Patent: January 16, 2024
    Assignee: Lemon Inc.
    Inventors: Jian Du, Bo Jiang, Haohao Qian, Qiang Yan