Patents by Inventor Qiang Yan
Qiang Yan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250148108Abstract: Differential privacy composition determination in a secure communication is provided. A method for determining differential privacy composition includes determining a differential privacy configuration including a first privacy parameter and a second privacy parameter, determining a privacy loss distribution, and performing a partial convolution operation of the privacy loss distribution by transforming the privacy loss distribution based on a predetermined parameter, determining an integral range based on the first privacy parameter and the privacy loss distribution, transforming the privacy loss distribution based on the integral range, and performing the partial convolution operation based on the integral range. The method also includes determining the second privacy parameter based on a result of the partial convolution operation, and controlling a dataset based on the differential privacy configuration to limit access to the dataset.Type: ApplicationFiled: November 6, 2023Publication date: May 8, 2025Inventors: Bo Jiang, Jian Du, Sagar Sharma, Qiang Yan
-
Publication number: 20250141657Abstract: Methods and systems for data security are provided. The method includes generating respective tags for data segments in a dataset, deriving respective temporal keys associated with the respective tags for the plurality of data segments from a master key, and transforming the plurality of data segments from a plaintext to a ciphertext using the respective temporal keys as a first input and the respective tags as a second input, while format-preserving the data segments. The master key can be updated to prevent from reverse-transforming a selected data segment in the dataset from the ciphertext to the plaintext.Type: ApplicationFiled: October 31, 2023Publication date: May 1, 2025Inventors: Yongjun ZHAO, Wei DAI, Donghang LU, Qiang YAN
-
Patent number: 12231563Abstract: Methods and systems for secure computation and communication are provided. The method includes transforming identifications of a first dataset using a first transforming scheme, and transforming attributes of the first dataset using a second transforming scheme. The method also includes dispatching the transformed first dataset, receiving a second dataset, transforming identifications of the received second dataset, dispatching the identifications of the transformed received second dataset, and receiving a set of identifications. The method further includes generating a first intersection of the received set of identifications and the transformed received second dataset, generating a first share based on the first intersection, receiving a second share, and constructing a result based on the first share and the second share.Type: GrantFiled: April 7, 2023Date of Patent: February 18, 2025Assignee: Lemon Inc.Inventors: Haohao Qian, Jian Du, Qiang Yan
-
Publication number: 20250045450Abstract: Methods and systems for evaluating privacy protection are provided. A method includes generating a first intersection of a first dataset and a second dataset. The method also includes determining a partition number based on the first dataset, the first intersection, and a number of iterations by: determining a privacy leakage for subsets of the first dataset based on the first dataset, the first intersection, and the number of iterations; and determining the partition number based on the privacy leakage for each of the subsets of the first dataset. The method further includes partitioning the first dataset into a first sub-dataset and a second sub-dataset using the partition number, and determining positive membership and negative membership for elements of the first sub-dataset in the second dataset and for elements of the second sub-dataset in the second dataset.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Inventors: Bo JIANG, Jian DU, Qiang YAN
-
Publication number: 20250045425Abstract: Methods and systems for evaluating privacy protection are provided. A method includes determining a first sub-dataset of a first dataset based on a sampling rate, a tolerance, and a first threshold. The method also includes determining a second sub-dataset of the first dataset based on the sampling rate, the tolerance, and a second threshold. The method includes determining a first distance between the first sub-dataset and the first threshold, determining a second distance between the second sub-dataset and the second threshold, generating a first intersection of the first sub-dataset and a second dataset and updating posterior for elements of the first dataset based on the first intersection when the first distance is less than or equal to the second distance, and determining positive membership and negative membership for the elements of the first dataset in the second dataset based on the posterior for the elements of the first dataset.Type: ApplicationFiled: August 2, 2023Publication date: February 6, 2025Inventors: Bo Jiang, Jian Du, Qiang Yan
-
Publication number: 20240386131Abstract: Data security for a dataset in interactive query or operation from users regarding data stored in the dataset is provided. A method for providing data security for the dataset in secure data computation and communication includes generating a query result corresponding to the user query for the dataset, determining a magnitude range of the query result, and generating an amount of random noise data based on the magnitude range. The amount of random noise data is calibrated by adjusting at least one of a first tunable parameter within a first range and a second tunable parameter within a second range of a differential privacy (DP) configuration. A noise-laden query result is generated by applying the noise data to the query result to satisfy an error tolerance level.Type: ApplicationFiled: May 15, 2023Publication date: November 21, 2024Inventors: Sagar Sharma, Xing Wu, Qiang Yan
-
Patent number: 12132669Abstract: Modelling for efficient resource allocation and/or distribution in secure computation and communication for differential privacy protocols and/or algorithms is provided. A method for allocating a resource of a differentially private system in secure computation and communication includes aggregating attributes from a usage log of the differentially private system for a predetermined period of time, generating a moving aggregation based on the aggregated attributes, training a machine learning model based on the aggregated attributes and the moving aggregation, predicting a distribution of the resource using the trained machine learning model, and allocating the resource based on the predicted distribution. The resource includes a differential privacy parameter.Type: GrantFiled: May 15, 2023Date of Patent: October 29, 2024Assignee: LEMON INC.Inventors: Sagar Sharma, Qiang Yan
-
Publication number: 20240338478Abstract: Methods and systems for protecting membership privacy for secure computation and communication are provided. The method includes providing a first dataset, determining a number N based on a data privacy configuration, and generating a padding dataset having more than N elements. An intersection of the padding dataset and the first dataset is empty. The method also includes shuffling the padding dataset, up-sampling the first dataset with a first N elements of the shuffled padding dataset, and performing an intersection operation based on the up-sampled first dataset and a received dataset.Type: ApplicationFiled: November 28, 2023Publication date: October 10, 2024Inventors: Jian Du, Bo Jiang, Haohao Qian, Qiang Yan
-
Publication number: 20240340178Abstract: Methods and systems for secure computation and communication are provided. The method includes transforming identifications of a first dataset using a first transforming scheme, and transforming attributes of the first dataset using a second transforming scheme. The method also includes dispatching the transformed first dataset, receiving a second dataset, transforming identifications of the received second dataset, dispatching the identifications of the transformed received second dataset, and receiving a set of identifications. The method further includes generating a first intersection of the received set of identifications and the transformed received second dataset, generating a first share based on the first intersection, receiving a second share, and constructing a result based on the first share and the second share.Type: ApplicationFiled: April 7, 2023Publication date: October 10, 2024Inventors: Haohao QIAN, Jian DU, Qiang YAN
-
Publication number: 20240282646Abstract: The present application discloses a method for measuring thickness of a silicon epitaxial layer, including: step 1: performing epitaxial growth to grow a first semiconductor material layer made of a material optically distinguishable from a silicon layer on a surface of a first wafer composed of a first silicon substrate; step 2: performing epitaxial growth to grow a first silicon epitaxial layer; step 3: measuring the thickness of silicon to obtain the first thickness of the first silicon epitaxial layer; step 4: performing epitaxial growth on a surface of the first silicon epitaxial layer to form a second silicon epitaxial layer; step 5: measuring the thickness of silicon to obtain the superposed thickness of the first silicon epitaxial layer and the second silicon epitaxial layer, and subtracting the first thickness from the superposed thickness to obtain the thickness of the silicon epitaxial layer.Type: ApplicationFiled: September 11, 2023Publication date: August 22, 2024Inventors: Jiaqi HONG, Jun TAN, Qiang YAN
-
Publication number: 20240202446Abstract: This application provide a keyword extraction method. The method includes: performing word segmentation on a text, to obtain a plurality of candidate words; selecting, from the plurality of candidate words, a candidate word that appears in the title; determining an extraction threshold according to an attention weight of the selected candidate word relative to the title; and determining a keyword of the text from the candidate words according to the extraction threshold.Type: ApplicationFiled: February 29, 2024Publication date: June 20, 2024Inventors: Wenhao ZHENG, Lie Kang, Qiang Yan
-
Patent number: 12010041Abstract: Dynamic allocation and/or distribution of a resource in secure computation and communication to achieve a desired level of data privacy protection is provided. A method for dynamically allocating a resource of a differentially private system in secure computation and communication includes aggregating attributes from a usage log of the differentially private system for a predetermined period of time, generating a moving aggregation based on the aggregated attributes, optimizing a first attribute of the attributes of the usage log based on the moving aggregation and a set of constraints, generating a distribution of the resource based on the optimized first attribute, and dynamically allocating the resource based on the generated distribution. The resource includes a differential privacy parameter.Type: GrantFiled: May 15, 2023Date of Patent: June 11, 2024Assignee: Lemon Inc.Inventors: Sagar Sharma, Qiang Yan
-
Publication number: 20240170287Abstract: The present application discloses an epitaxial growth method for an FDSOI hybrid region, comprising: step 1, providing an FDSOI substrate structure; step 2, forming a trench; step 3, performing first isotropic epitaxial growth, wherein a top surface of a first semiconductor epitaxial sublayer is located in a plane between a top surface and a bottom surface of a dielectric buried layer, and a second semiconductor epitaxial sublayer comprise a lateral protruding structure on the side face of the semiconductor top layer; and step 4, performing second epitaxial growth having a growth rate of the first crystalline face, which is greater than a growth rate of the second crystalline face, wherein the third semiconductor epitaxial sublayer has a chamfered recess near the side face of the semiconductor top layer, finally the lateral protruding structure is located in the chamfered recess.Type: ApplicationFiled: August 16, 2023Publication date: May 23, 2024Inventors: Jiaqi HONG, Qiang YAN, Jun TAN
-
Publication number: 20240170344Abstract: The present application discloses a method for manufacturing a source/drain epitaxial layer of an FDSOI MOSFET, comprising: step 1, forming a shallow trench isolation on an FDSOI substrate; step 2, opening a formation region of a source/drain region of the MOSFET; step 3, performing first epitaxial growth to form a first pure silicon epitaxial layer; step 4, performing a first etching process to remove polysilicon particles generated from step 3; and step 5, performing epitaxial growth to sequentially form a second source/drain epitaxial seed layer, a third source/drain epitaxial bulk layer, and a fourth source/drain epitaxial cap layer on a surface of the first pure silicon epitaxial layer, so the four epitaxial layers are stacked to form the source/drain epitaxial layer.Type: ApplicationFiled: August 30, 2023Publication date: May 23, 2024Inventors: Jiaqi HONG, Jun TAN, Qiang YAN
-
Patent number: 11989325Abstract: Protecting membership in secure multi-party computation and communication is provided. A method of protecting membership includes generating a padding dataset, up-sampling a first dataset with the padding dataset, transforming and dispatching the first dataset, receiving a second dataset, and performing a private set intersection operation based on the first dataset and the second dataset to generate a third dataset. Each of the first dataset, the padding dataset, and/or the second dataset includes one or more personal identification information for each user or member in the dataset.Type: GrantFiled: October 23, 2023Date of Patent: May 21, 2024Assignee: Lemon Inc.Inventors: Jian Du, Yongjun Zhao, Haohao Qian, Bo Jiang, Qiang Yan
-
Patent number: 11983285Abstract: Protecting data privacy in secure multi-party computation and communication is provided. A method of protecting data privacy includes determining a differential privacy configuration, determining a number of iterations based on a first parameter and a second parameter, and for each of the number of iterations generating a random value and a random noise data; generating a first message and a second message; and performing a transfer based on the first message, the second message, and an input data to output one of the first message and the second message. The method also includes generating a first noise data based on the random noise data in each of the number of iterations, generating a first share based on a first dataset and a second dataset, applying the first noise data to the first share, and constructing a result based on the first share and a second share.Type: GrantFiled: October 20, 2023Date of Patent: May 14, 2024Assignee: Lemon Inc.Inventors: Jian Du, Haohao Qian, Yongjun Zhao, Bo Jiang, Chuyuan Chen, Qiang Yan
-
Patent number: 11947911Abstract: This application provides a keyword extraction method. The method includes: receiving an information entity including a title and a text; performing word segmentation on the text, to obtain a plurality of candidate words; and performing character segmentation on the title corresponding to semantics of the text, to obtain a plurality of characters; sequentially inputting the plurality of candidate words to a keyword extraction model, to obtain an attention weight of each candidate word relative to each character; selecting, from the plurality of candidate words, a candidate word that appears in the title; determining an extraction threshold according to an attention weight of the selected candidate word relative to each character; and determining a keyword of the text of the information entity from the candidate words according to the extraction threshold. This application further provide a method for training a keyword extraction model, a computer device, and a storage medium.Type: GrantFiled: February 23, 2021Date of Patent: April 2, 2024Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Wenhao Zheng, Lie Kang, Qiang Yan
-
Patent number: 11893236Abstract: This application discloses a method of displaying information in a program interface of an application performed by a computer device. The method includes: displaying a virtual keyboard control and an extension bar control in the program interface; in response to an input operation in the virtual keyboard control, displaying at least one character string in the extension bar control, the at least one character string being determined according to the input operation in the virtual keyboard control; and in response to a select operation on a target string among the at least one character string in the extension bar control, displaying a function interface of applying a target function to the target string. This embodiment allows a user to quickly switch between function interfaces when using an application, thereby reducing operation steps of the user and improving human-computer interaction efficiency.Type: GrantFiled: November 29, 2022Date of Patent: February 6, 2024Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Hao Zhou, Zhe Feng, Yuxuan Zhang, Xiaosi Lai, Xiangyi Feng, Jiayi Ding, Tao Huang, Ge Wang, Chuangmu Yao, Yixiang Fang, Haitao Chen, Jiashuai Shi, Meng Zhao, Qiang Yan, Jianxiong Feng, Cong Jiang, Jiamin Chen, Tianyi Liang, Hongfa Qiu, Huawei Zhang, Heyi Zhang
-
Patent number: 11886617Abstract: Protecting membership and data in secure multi-party computation and communication is provided. A method of protecting membership and data includes generating a padding dataset. A size of the padding dataset is determined based on a data privacy configuration. The method also includes up-sampling a first dataset with the padding dataset, transforming the first dataset, dispatching the first dataset, performing an intersection operation based on the first dataset and a second dataset to generate a third dataset, generating a first share based on the third dataset, and constructing a result based on the first share and a second share.Type: GrantFiled: April 7, 2023Date of Patent: January 30, 2024Assignee: Lemon Inc.Inventors: Jian Du, Haohao Qian, Yongjun Zhao, Bo Jiang, Qiang Yan
-
Patent number: 11874950Abstract: Methods and systems for protecting membership privacy for secure computation and communication are provided. The method includes providing a first dataset, determining a number N based on a data privacy configuration, and generating a padding dataset having more than N elements. An intersection of the padding dataset and the first dataset is empty. The method also includes shuffling the padding dataset, up-sampling the first dataset with a first N elements of the shuffled padding dataset, and performing an intersection operation based on the up-sampled first dataset and a received dataset.Type: GrantFiled: April 7, 2023Date of Patent: January 16, 2024Assignee: Lemon Inc.Inventors: Jian Du, Bo Jiang, Haohao Qian, Qiang Yan