Patents by Inventor Ruichen Wang

Ruichen Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210065945
    Abstract: A detachable cryostat includes many novel structures. Two radiation shields are installed in the detachable cryostat. One of the radiation shields is cooled by the second-stage cold chamber utilized to contain a cryogen, and the other one is cooled by the first-stage cold head of the cryocooler. These structures are both used for reducing heat loads from an outside. The resilient supporting device, the resilient circular sleeve, the bellows and the conductive blocks are utilized to achieve excellent thermal contact and complete thermal isolation between the cryocooler and the cryogen. A detachable binary current lead device can be introduced in the detachable cryostat, wherein, the detachable binary current lead includes a superconducting current lead and a copper current lead. When the installation adjustment mechanism is tightly pressed and loosened, it can enable the superconducting current lead to contact and separate from the copper current lead.
    Type: Application
    Filed: December 10, 2019
    Publication date: March 4, 2021
    Applicant: Southwest Jiaotong University
    Inventors: Guangtong MA, Zhen LUO, Xingchao NIE, Ruichen WANG
  • Publication number: 20200382551
    Abstract: One or more computing devices, systems, and/or methods are provided. A request for content associated with a device and/or a set of request information associated with the request for content may be received. A content item may be transmitted to the device. A set of client information associated with the device may be received. The set of client information may be analyzed to determine a fraudulence label associated with the request for content. Fraud detection information generated based upon the set of request information, the set of client information and/or the fraudulence label may be stored in a fraud detection database. A second request for content associated with a second device and/or a second set of request information associated with the second request for content may be received. A second fraudulence label may be determined based upon the second set of request information and/or the fraud detection database.
    Type: Application
    Filed: May 30, 2019
    Publication date: December 3, 2020
    Inventors: Robert Jason Harris, Jaime Morales, JR., Ruichen Wang, Helen W. Xie, Jian Tian
  • Publication number: 20200382532
    Abstract: One or more computing devices, systems, and/or methods for determining thresholds are provided. For example, first activity associated with a plurality of client devices may be detected. A first activity distribution associated with the plurality of client devices may be determined based upon the first activity. A plurality of peaks of the first activity distribution may be identified. A plurality of gradients associated with pairs of peaks of the plurality of peaks may be determined. A target peak of the plurality of peaks may be determined based upon the plurality of gradients. A threshold amount of activity associated with the first activity may be determined based upon the target peak. A first set of activity associated with a first client device may be detected. A fraudulence label associated with the first client device may be determined based upon the first set of activity and/or the threshold amount of activity.
    Type: Application
    Filed: May 30, 2019
    Publication date: December 3, 2020
    Inventors: Robert Jason Harris, Ruichen Wang, Helen W. Xie
  • Patent number: 10701179
    Abstract: Services often utilize scoring techniques to distinguish between user requests that comply with a usage policy of the service from those that represent a misuse of the service. Users who endeavor to misuse the service engages in probing by submitting a variety of requests to the service until one such request exhibiting a score that is within a score threshold, and then patterning further requests that misuse the service upon the successful request. Instead, when a first request from a user is identified that violates the score threshold, a score offset is selected. The scores of second and future requests by the user are adjusted by the score offset, indicating increased suspicion of the user's requests, while allowing legitimate requests that fulfill the score threshold by a larger margin. Additionally, absent further misuse, the score offset decays over time to restore trust incrementally in the legitimacy of the user's requests.
    Type: Grant
    Filed: November 1, 2017
    Date of Patent: June 30, 2020
    Assignee: Oath Inc.
    Inventors: Liang Wang, Xianen Qiu, Chun Han, Yan Han, Ruichen Wang
  • Publication number: 20190132419
    Abstract: Services often utilize scoring techniques to distinguish between user requests that comply with a usage policy of the service from those that represent a misuse of the service. Users who endeavor to misuse the service engages in probing by submitting a variety of requests to the service until one such request exhibiting a score that is within a score threshold, and then patterning further requests that misuse the service upon the successful request. Instead, when a first request from a user is identified that violates the score threshold, a score offset is selected. The scores of second and future requests by the user are adjusted by the score offset, indicating increased suspicion of the user's requests, while allowing legitimate requests that fulfill the score threshold by a larger margin. Additionally, absent further misuse, the score offset decays over time to restore trust incrementally in the legitimacy of the user's requests.
    Type: Application
    Filed: November 1, 2017
    Publication date: May 2, 2019
    Inventors: Liang Wang, Xianen Qiu, Chun Han, Yan Han, Ruichen Wang