Patents by Inventor Rong Wu

Rong Wu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10504945
    Abstract: A method for manufacturing an array substrate includes: forming a metal-oxide semiconductor layer, a first conductive layer and a second conductive layer sequentially on a substrate; and treating the metal-oxide semiconductor layer, the first conductive layer and the second conductive layer in a single patterning process using a mask, to form an active layer, pixel electrodes, a source drain pattern layer which includes source electrodes, drain electrodes and data lines, and a reserved pattern of the first conductive layer which is provided in a same layer as the pixel electrodes and formed on sides of the source electrodes and the data lines close to the active layer. The drain electrode is in direct contact with the pixel electrode, and a partial region of the pixel electrode is unobstructed from the drain electrode.
    Type: Grant
    Filed: February 7, 2018
    Date of Patent: December 10, 2019
    Assignees: BOE TECHNOLOGY GROUP CO., LTD., CHONGQING BOE OPTOELECTRONICS TECHNOLOGY CO., LTD.
    Inventors: Xu Wu, Rong Wu, Chao Zhang, Zhonghao Huang
  • Patent number: 10505052
    Abstract: A semiconductor device includes a first film disposed over a semiconductor substrate, the first film comprising a first transition metal dichalcogenide; a second film disposed over the first film, the second film comprising a second transition metal dichalcogenide different from the first transition metal dichalcogenide; source and drain features formed over the second film; a first gate stack formed over the second film and interposed between the source and drain features; and a second gate stack formed over the semiconductor substrate opposite from the first gate stack such that the semiconductor substrate is between the first and second gate stacks.
    Type: Grant
    Filed: December 19, 2018
    Date of Patent: December 10, 2019
    Assignees: Taiwan Semiconductor Manufacturing Co., Ltd., National Taiwan University
    Inventors: Shih-Yen Lin, Chi-Wen Liu, Chong-Rong Wu, Xiang-Rui Chang
  • Patent number: 10495957
    Abstract: A wavelength conversion device includes a main body, at least one wavelength conversion layer, at least one heat dissipation plate, a heat conducting component and a driving unit. The wavelength conversion layer is disposed on the main body. The heat dissipation plate is disposed on a side of the main body with an interval. The heat conducting component is connected between the heat dissipation plate and the main body. The driving unit is connected to the main body and the heat dissipation plate and adapted to drive the main body and the heat dissipation plate to rotate. The driving unit and the heat conducting component have a gap therebetween. In addition, a projector including the wavelength conversion device is also provided. The wavelength conversion device according to the disclosure has good heat dissipation efficiency.
    Type: Grant
    Filed: November 12, 2018
    Date of Patent: December 3, 2019
    Assignee: Coretronic Corporation
    Inventors: Te-Ying Tsai, Tsung-Ching Lin, Shi-Wen Lin, Pei-Rong Wu, Chia-Lun Tsai
  • Publication number: 20190348142
    Abstract: A method for fixing outlier bits is provided in the invention. The method is applied to a memory device, and a memory array of the memory device is divided into a plurality of blocks. The method includes the steps of setting an initial voltage and a terminal voltage of a margin read (MGRD) operation in each block, wherein the initial voltage is set in a distribution of a threshold voltage of each block; finding a MGRD spec corresponding to each block at a range defined by the initial voltage and the terminal voltage; detecting outlier bits in each block according to the MGRD spec corresponding to each block; and fixing the outlier bits in each block.
    Type: Application
    Filed: March 6, 2019
    Publication date: November 14, 2019
    Inventors: Shang-Rong WU, Shang-Wen CHANG
  • Publication number: 20190349340
    Abstract: A security implementation method includes obtaining, by a first device, a security policy of a session and at least one key, and sending, by the first device, protected data to a second device, where the protected data is obtained by protecting security of session data of the session using the at least one key based on the security policy of the session, and the second device is configured to restore the protected data using the at least one key based on the security policy to obtain the session data, where when the first device is a terminal device, the second device is an access network node or a user plane node, or when the first device is an access network node or a user plane node, the second device is a terminal device.
    Type: Application
    Filed: July 24, 2019
    Publication date: November 14, 2019
    Inventors: Bo Zhang, Rong Wu, Lu Gan
  • Publication number: 20190349763
    Abstract: A security protection negotiation method and a network element are disclosed, to implement, based on a 5G network architecture, negotiation between UE and a UPF to start user plane security protection for a current session. The method includes: determining, by an SMF, security protection information used on a user plane in a current session process; sending, by the SMF to UE, a first message including the security protection information used on the user plane; performing, by the UE, integrity protection authentication on the first message based on the security protection information used on the user plane; when the authentication performed by the UE on the first message succeeds, starting, by the UE, user plane security protection, and sending, to the SMF, a second message used to indicate that the authentication performed by the UE on the first message succeeds.
    Type: Application
    Filed: July 24, 2019
    Publication date: November 14, 2019
    Inventors: Rong WU, Bo ZHANG, Lu GAN
  • Publication number: 20190297494
    Abstract: An anchor key generation method, device, and system, where the method includes generating, by a unified data management network element (UDM), an intermediate key based on a cipher key (CK), an integrity key (IK), and indication information regarding an operator; sending, by the UDM, the intermediate key to an authentication server function (AUSF); receiving, by the AUSF, the intermediate key; generating, by the AUSF, an anchor key based on the intermediate key; sending, by the AUSF, the anchor key to a security anchor function (SEAF); and generating, by the SEAF, a key (Kamf) based on the anchor key, where the Kamf is used to derive a 3rd Generation Partnership Project (3GPP) key.
    Type: Application
    Filed: June 14, 2019
    Publication date: September 26, 2019
    Inventors: Rong Wu, Bo Zhang, Lu Gan
  • Publication number: 20190281070
    Abstract: A system and method for detecting a man-in-the-middle attack, where the includes sending, by a secondary base station, a first check request message to a master base station, wherein the first check request message comprises first identifier information of an evolved random access bearer (ERAB) and a first data packet count value corresponding to the first identifier information; receiving, by the master base station, the first check request message; obtaining second identifier information that matches the first identifier information, wherein the second identifier information is an identifier of a data radio bearer (DRB) corresponding to the ERAB; sending a second check request message to a user terminal, wherein the second check request message comprises the first data packet count value and the second identifier information; and receiving, by the master base station, a check response message from the user terminal.
    Type: Application
    Filed: May 24, 2019
    Publication date: September 12, 2019
    Inventors: Rong Wu, Chengdong He, Lu Gan
  • Publication number: 20190274038
    Abstract: A security implementation method includes receiving, by a first network element, a request for handing over user equipment from a source access network device to a target access network device to perform communication. The method further includes obtaining, by the first network element, a security key, where the security key is used for protecting the communication between the user equipment and the target access network device after the user equipment is handed over from the source access network device to the target access network device, and sending, by the first network element, the security key to the target access network device.
    Type: Application
    Filed: May 10, 2019
    Publication date: September 5, 2019
    Inventors: Rong Wu, Lu Gan, Bo Zhang, Shuaishuai Tan
  • Patent number: 10403744
    Abstract: A method for manufacturing a semiconductor device comprising two-dimensional (2D) materials may include: epitaxially forming a first two-dimensional (2D) material layer over a substrate; calculating a mean thickness of the first 2D material layer; comparing the mean thickness of the first 2D material layer with a reference parameter; determining that the mean thickness of the first 2D material layer is not substantially equal to the reference parameter; and after the determining, epitaxially forming a second 2D material layer over the first 2D material layer.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: September 3, 2019
    Assignees: Taiwan Semiconductor Manufacturing Company, Ltd., National Taiwan University
    Inventors: Shih-Yen Lin, Samuel C. Pan, Chong-Rong Wu, Xian-Rui Chang
  • Publication number: 20190261167
    Abstract: Embodiments of the present invention disclose a data transmission method and a related device and system. The system includes an access network device AN and user equipment UE. The AN is configured to receive a base key sent by a key management device in a core network, where the base key is a key generated from two-way authentication between the UE and the core; the AN and the UE are configured to process the base key according to a preset rule to generate an air interface protection key; the UE is configured to: protect a target field in an uplink protocol data unit PDU by using the air interface protection key; and the AN is configured to parse the target field in the uplink protocol data unit by using the air interface protection key.
    Type: Application
    Filed: April 30, 2019
    Publication date: August 22, 2019
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Bo ZHANG, Lu GAN, Rong WU
  • Patent number: 10387563
    Abstract: Parsing XML (extensible markup language) data by performing the following operations: (i) dividing the piece of markup language into a plurality of pre-parsing segments; (ii) assigning the pre-parsing segment to a pre-parsing processor thread of a plurality of pre-parsing processor threads; (iii) determining any parsing division point(s) occurring in the pre-parsing segment so that data corresponding to a single tabular record is between each consecutive pair of parsing division points; (iv) dividing the piece of language into a plurality of parsing segments defined by the parsing division points so that each parsing segment corresponds to a single tabular record; (v) assigning the parsing segment to a parsing processor thread of a plurality of parsing processor threads; and (vi) parsing to generate a parsed tabular record corresponding to the parsing segment.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: August 20, 2019
    Assignee: International Business Machines Corporation
    Inventors: Zhen Li, Mi Wan Shum, DongJie Wei, Samuel H. Wong, Xian Rong Wu
  • Publication number: 20190253889
    Abstract: Embodiments of this application provide an anchor key generation method, device, and system. The method includes generating, by a user equipment, an intermediate key based on a cipher key (CK), an integrity key (IK), and an indication information regarding an operator; generating, by the user equipment, an anchor key based on the intermediate key; generating, by the user equipment, a key (Kamf) based on the anchor key; and deriving, by the user equipment, a 3rd Generation Partnership Project (3GPP) key based on the Kamf.
    Type: Application
    Filed: April 18, 2019
    Publication date: August 15, 2019
    Inventors: Rong Wu, Bo Zhang, Lu Gan
  • Patent number: 10364903
    Abstract: A multifunctional softening valve and a water processing apparatus thereof. The multifunctional softening valve comprises a valve body, an ejector, a movable valve plate, a fixed valve plate, and a saline water control valve. The valve body is provided with a water inlet, a water outlet, a water drainage port, and a salt absorbing branch runner. The valve body is provided with a through-hole in communication with a filter element upper portion, a filter element lower portion and an ejector inlet. An ejector outlet is in communication with the filter element lower portion. The salt absorbing branch runner is provided with a saline water inlet. The saline water inlet is provided with a saline water control valve. The fixed valve plate is provided with a plurality of through-holes, and the through-holes are distributed according to a distribution mode of equally dividing the cross section of the fixed valve plate into six parts, and the movable valve plate is fitted to the fixed valve plate.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: July 30, 2019
    Assignee: WENZHOU RUNXIN MANUFACTURING MACHINE CO., LTD.
    Inventors: Xiao-Rong Wu, Hai-Lin Yuan
  • Patent number: 10359122
    Abstract: A control valve with a planar seal structure having a valve body with a water inlet, water outlet, and water drainage port. A spool with a planar seal structure and having fixed valve plate and movable valve plate is disposed in the valve body. The movable valve plate is rotationally fitted to the fixed valve plate. The fixed valve plate has a plurality of through-holes. One through-hole with an arc and fan shape is in communication with the water outlet. The outer diameter of the through-hole with an arc and fan shape is greater than that of another through-hole of the fixed valve plate. The through-hole is in communication with the valve body's water inlet. The fixed valve plate has at least one arc communicating blind hole. The through-holes of the fixed valve plate are mutually fitted with the communicating blind hole.
    Type: Grant
    Filed: January 20, 2015
    Date of Patent: July 23, 2019
    Assignee: WENZHOU RUNXIN MANUFACTURING MACHINE CO., LTD.
    Inventors: Xiao-Rong Wu, Hai-Lin Yuan, Xian-Shui Wu
  • Patent number: 10362043
    Abstract: A method and an apparatus for detecting a man-in-the-middle attack, where the method includes receiving, by a macro evolved Node B (MeNB), a first check request message sent by a secondary evolved Node B (SeNB), where the first check request message includes first identifier information and a first data packet count value, generating a second check request message according to the first identifier information, sending the second check request message to a user terminal, receiving a first check response message generated by the user terminal according to the second check request message, where the first check response message includes second identifier information and a second data packet count value, determining, by the MeNB, that the man-in-the-middle attack exists between the SeNB and the user terminal when the first data packet count value is different from the second data packet count value.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: July 23, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Rong Wu, Chengdong He, Lu Gan
  • Publication number: 20190215904
    Abstract: Embodiments of the present disclosure disclose a network roaming protection method and related device. The method includes: receiving, by a visited session management device, a first session establishment request that includes a first security requirement; obtaining, by the visited session management device, a target security policy, where the target security policy is obtained by processing the first security requirement set and a second security requirement set using a preset rule; and sending the target security policy to the UE instructing the UE to generate a target shared key based on a reference shared key and according to a rule defined by the target security policy, where the target shared key is used to protect secure end-to-end data transmission between the UE and the visited gateway.
    Type: Application
    Filed: March 13, 2019
    Publication date: July 11, 2019
    Inventors: Rong WU, Bo ZHANG, Lu GAN
  • Publication number: 20190212409
    Abstract: A method for estimating angle information for a wireless communication system includes receiving, by a wireless transmit/receive unit (WTRU), a plurality of first training symbols during a first period of time, wherein the plurality of first training symbols is transmitted using a first transmit beamforming vector fixed during the first period of time and received using a first receive beamforming, vector varied during the first period of time; estimating, by the WTRU, a plurality of first channel delay values based on the plurality of first training symbols; estimating, by the WTRU, a plurality of first channel values based on the plurality of first channel delay values; and estimating, by the WTRU, a first angle value of a path of a wireless channel based on the plurality of first channel values.
    Type: Application
    Filed: January 10, 2019
    Publication date: July 11, 2019
    Inventors: WEN-RONG WU, PEN-YAO LU
  • Publication number: 20190215903
    Abstract: A method includes: receiving, by a session management device, a path switching request used to request to hand over user equipment UE from a source network to a target network; obtaining a target security policy based on the path switching request, and obtaining a second shared key generated based on a first shared key and the target security policy, and sending the second shared key to a target gateway; and sending, by the session management device, the second shared key to the UE; or sending the target security policy to the UE, so that the UE generates the second shared key based on the first shared key and the target security policy, where the second shared key is used to perform end-to-end protection on secure data transmission between the UE and the target gateway.
    Type: Application
    Filed: March 12, 2019
    Publication date: July 11, 2019
    Inventors: Rong Wu, Bo Zhang, Lu Gan
  • Publication number: 20190182077
    Abstract: A method for channel estimation, performed by a wireless transmit/receive unit (WTRU), includes: receiving a plurality of input signals, generating a plurality of sensing matrices for the input signals, generating an augmented sensing matrix and an augmented observation vector according to the sensing matrices and the input signals, estimating a plurality of channel delay parameters according to the augmented sensing matrix and the augmented observation vector, and estimating channel information according to the channel delay parameters.
    Type: Application
    Filed: December 13, 2018
    Publication date: June 13, 2019
    Inventors: WEN-RONG WU, PEN-YAO LU