Patents by Inventor Si Wang

Si Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12273376
    Abstract: A computer implemented malware protection method to mitigate malware spread within a set of communicating computer systems from an infected computer system is disclosed.
    Type: Grant
    Filed: December 1, 2021
    Date of Patent: April 8, 2025
    Assignee: British Telecommunications Public Limited Company
    Inventors: Xiao-Si Wang, Conor Hocking, Bogdan Blaga
  • Publication number: 20250097441
    Abstract: Uploading of a video file is performed by transcoding, processing and uploading portions of the video file in parallel, to reduce total processing and upload time. The processing of the video file may include applying associated augmented reality effects to a raw video recording, to generate an enhanced video recording for transmission and viewing at a recipient device. The uploaded portions of the video file may be assembled into a fragmented file format such as fMP4, in which portions of the video file are stored as fragments.
    Type: Application
    Filed: September 18, 2023
    Publication date: March 20, 2025
    Inventors: Yichen Wang, Yuechuan Li, Si Wang, Yihuan Zhou, Haoyun Wu, Junhong Nie
  • Publication number: 20240414141
    Abstract: Aspects of the subject technology include determining an association between a first and second user account that comprises a first condition corresponding to a first action to be performed in association with the first user account and a second condition corresponding to a second action to be performed in association with the second user account. Aspects also include generating a first entry based on the association, receiving a first indication indicating completion the first and/or second actions, generating a second entry based on the first indication, wherein the second entry corresponds to the first and/or second conditions, determining whether the first and second condition of the first entry are satisfied based in part on entries in the data structure that correspond to the first and/or second conditions, and transmitting a second indication that the first entry is complete, in response to determining that the first and second condition are satisfied.
    Type: Application
    Filed: June 12, 2023
    Publication date: December 12, 2024
    Inventors: Ji HUANG, Angelica SCHWARTZ, Stefan GAWRYS, Alexander THIEMANN, Si WANG, Hongshan ZHOU, Justin AHN, Ken THAI, Yue BU, Tyler DOSS
  • Publication number: 20240235106
    Abstract: Connection system, in particular for a charger or a power tool, containing a connection plug with a power line and containing a socket apparatus with at least one socket element for releasable connection to the connection plug. The socket apparatus contains a first strain-relief device in order to counteract a tensile load, exerted on the power line, when the connection plug and the socket element are in a connected state. Charger with a connection system containing a connection plug with a power line and containing a socket apparatus with at least one socket element for releasable connection to the connection plug. Power tool with a connection system containing a connection plug with a power line and containing a socket apparatus with at least one socket element for releasable connection to the connection plug. Socket apparatus with at least one socket element for releasable connection to a connection plug for a connection system.
    Type: Application
    Filed: June 8, 2022
    Publication date: July 11, 2024
    Inventors: Michael REINER, Leonard JANCZYK, Si WANG, Kay PASZEHR, Karl-Heinz HOFMANN
  • Publication number: 20240060131
    Abstract: A method using an endogenous retrovirus (ERV) as a biomarker for detecting a degree of aging of an object or a cell, tissue or organ or isolated cell thereof. A method using an ERV as a target for treating, preventing or delaying aging of the subject or a cell, tissue or organ or isolated cell thereof.
    Type: Application
    Filed: August 3, 2023
    Publication date: February 22, 2024
    Inventors: Guanghui LIU, Jing Qu, Weiqi Zhang, Xiaoqian Liu, Zunpeng Liu, Zeming Wu, Si Wang
  • Publication number: 20230416712
    Abstract: The present invention discloses an application of a substance that reduces the content or activity of KAT7 in preventing senescence and treating hepatic fibrosis. The present invention finds out that knockdown KAT7 genes have a definite effect on delaying senescence and treating hepatic fibrosis; and WM-3835 as a KAT7 inhibitor has a definite effect on delaying the senescence of hepatocytes. The present invention provides a new idea for developing genes for delaying senescence and treating hepatic fibrosis, and expands the options of clinical gene therapy and drug therapy.
    Type: Application
    Filed: June 4, 2021
    Publication date: December 28, 2023
    Inventors: Guanghui LIU, Jing QU, Weiqi ZHANG, Wei WANG, Shuhui SUN, Wei LI, Moshi SONG, Si WANG
  • Publication number: 20230396646
    Abstract: A computer implemented malware protection method to mitigate malware spread within a set of communicating computer systems from an infected computer system is disclosed.
    Type: Application
    Filed: December 1, 2021
    Publication date: December 7, 2023
    Inventors: Xiao-Si WANG, Conor HOCKING, Bogdan BLAGA
  • Publication number: 20230379355
    Abstract: A computer implemented security method for a set of internet-of-things (IoT) devices, the set of devices comprising network-connected sensors and actuators, wherein a data repository stores data about the devices, actions performable by each of the devices and one or more network attacks to which at least a subset of the devices are susceptible, the method comprising: defining, for each network attack, one or more responsive actions for the attack, each responsive action identifying one or more performable actions for performance by one or more devices to mitigate the attack; detecting a device in a compromised state, the compromised state being determined based on a threshold number of occurrences of an attack perpetrated against the device; selecting responsive actions for the perpetrated attack; and triggering the responsive actions to mitigate the perpetrated attack.
    Type: Application
    Filed: September 29, 2021
    Publication date: November 23, 2023
    Inventors: Xiao-Si WANG, Christopher NUGENT, Pushpinder CHOUHAN, Md BISWAS
  • Publication number: 20230376598
    Abstract: A computer implemented malware protection method to protect a target computer system in a set of computer systems from a malware, the method comprising: accessing a model of the set of computer systems, the model identifying interacting pairs of the computer systems in the set based on interactions corresponding to previous communication occurring between the computer systems in the pairs, and the model identifying the target computer system; simulating, over a plurality of time periods, a propagation of the malware originating from a predetermined source computer system in the model, the simulation being based on a number of interactions per time period between each interacting pair of computer systems in the set, and a rate of transmission of the malware per interaction; evaluating, for each of at least a subset of the time periods, a probability of infection of the target computer system in the time period; responsive to the simulating step, identifying an earliest time period during which the probability
    Type: Application
    Filed: September 27, 2021
    Publication date: November 23, 2023
    Inventors: Xiao-Si WANG, Conor HOCKING
  • Publication number: 20230279685
    Abstract: An automatic swimming pool cleaning robot capable of lateral translation relates to a technical field of cleaning robots for swimming pools. A controller compartment is disposed in a housing of the automatic swimming pool cleaning robot, the controller compartment is a sealed compartment, and a control circuit is disposed in the controller compartment. A driving motor is disposed in the housing, crawler belts are disposed on both sides of the housing, a cleaning rolling brush is disposed at a bottom of the housing, and the driving motor drives the cleaning rolling brush and the crawler belts through the transmission mechanism. A water inlet is defined at the bottom of the housing, a filtering device is disposed on the water inlet, and the housing covers above the filtering device. Two water outlets are defined at a top of the housing.
    Type: Application
    Filed: April 10, 2023
    Publication date: September 7, 2023
    Inventors: SI’AO WANG, WEIWEI LI, XIAOLONG LI, LANSHAN YIN, ZHE WANG, CHAOMIN CHEN
  • Patent number: 11730392
    Abstract: A breathing-driven flexible respiratory sensor includes: a test cavity and a digital electrometer, wherein an upper internal wall of the test cavity is provided with an upper detecting component, and a lower internal wall of the test cavity is provided with a lower detecting component; the upper detecting component and the lower detecting component is arranged in a longitudinal symmetry form; wherein the upper detecting component comprises a substrate, an electrode and a gas sensitive film bonded in sequence from top to bottom, and the substrate is bonded to the upper internal wall of the test cavity; wherein a rubber airbag is disposed in the test cavity, and a friction film is bonded to the rubber airbag; an air inlet cylinder is connected to a left end of the rubber airbag, and an air outlet cylinder is connected to a right end of the rubber airbag.
    Type: Grant
    Filed: August 13, 2019
    Date of Patent: August 22, 2023
    Assignee: University of Electronic Science and Technology of China
    Inventors: Yadong Jiang, Huiling Tai, Bohao Liu, Si Wang, Zhen Yuan, Qi Huang, Guangzhong Xie
  • Publication number: 20230123046
    Abstract: A malware protection method to protect at least a subset of a set of computer systems from a malware includes accessing a model of the set of computer systems, the model identifying interacting pairs of the computer systems in the set based on interactions corresponding to previous communication occurring between the computer systems in the pair; simulating, over a plurality of time periods, a propagation of the malware originating from a predetermined source computer system in the model, the simulation being based on a number of interactions per time period between each interacting pair of computer systems in the set, and a rate of transmission of the malware per interaction; and, responsive to the simulating step, identifying one or more computer systems or interacting pairs of computer systems to deploy a malware protection measure thereto so as to inhibit a propagation of the malware through the set of computer systems.
    Type: Application
    Filed: February 16, 2021
    Publication date: April 20, 2023
    Inventors: Xiao-Si WANG, Jessica WELDING
  • Publication number: 20230100643
    Abstract: A malware protection method to protect at least a subset of a set of computer systems from a malware propagating through the set of computer systems, including accessing a model of the set of computer systems, wherein each computer system is identified by the model as having an indication of a state of malware infection; simulating, over a plurality of time periods, a propagation of the malware from infected computer systems to susceptible computer systems, the simulation being based on a number of interactions per time period between each interacting pair of computer systems in the set, and a rate of transmission of the malware per interaction; responsive to the simulating, identifying one or more computer systems to deploy a malware protection measure thereto so as to inhibit a propagation of the malware through the set of computer systems.
    Type: Application
    Filed: February 16, 2021
    Publication date: March 30, 2023
    Inventors: Xiao-Si WANG, Stephanie KISS
  • Patent number: 11533333
    Abstract: A computer implemented method of protecting a target subnet, including a set of network connected devices in a hierarchy of subnets of a computer network, from malware attack. The method includes generating a dynamical system for each subnet in the network, each dynamical system modelling a rate of change of a number of network connected devices in the subnet that are: susceptible to infection by the malware; infected by the malware; protected against infection by the malware; and remediated of infection by the malware. The dynamical systems are based on rates of transmission of the malware between pairs of subnets; evaluating a measure of risk of infection of the target subnet at a predetermined point in time based on the dynamical system for the target subnet; and responsive to the measure of risk meeting a predetermined threshold, deploying malware protection measures to devices in the target subnet.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: December 20, 2022
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Xiao-Si Wang, Zhan Cui, Ian Herwono
  • Patent number: 11470109
    Abstract: A computer implemented method of protecting a portion of a computer network from malware attack, the computer network including a network connected devices organized into hierarchical subnets modelled by a tree data structure in which each subnet is represented as a node in the tree, each node having a connection to parent node save for a root node, the method including performing protective actions on devices in subnets associated with a first subset of nodes to provide protection against the malware, prioritizing devices in the subnets associated with a second subset of nodes so as to provide a barrier of subnets protected against the malware to impede the propagation of the malware to devices in subnets associated with each of the first subset of nodes.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: October 11, 2022
    Assignee: British Telecommunications Public Limited Company
    Inventors: Xiao-Si Wang, Zhan Cui, Ian Herwono
  • Publication number: 20220272107
    Abstract: A computer implemented method to block malware propagation in a network of computer systems, each computer system in the network having associated location information indicating a physical location, by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a physical location at which one or more computer systems are involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems; colocation of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the physical location so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: August 25, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Publication number: 20220247759
    Abstract: A computer implemented method to block malware propagation in a network of computer systems by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a common resource in the network involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the common resource so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: August 4, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Publication number: 20220239671
    Abstract: A computer implemented method to block malware propagation in a network of computer systems by receiving, for each of a plurality of time periods, a historical model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; generating, for each of a plurality of subsequent time periods, a forecast model of the network of computer systems in which each forecast model identifies communications between computer systems and malware infection state of computer systems being determined based on an extrapolation of the set of historical models; identifying a common resource in the network involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems and the communications therebetween identified in the forecast models; and implementing protective measures in respect to the common resource so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: July 28, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Patent number: 11382239
    Abstract: A fan module configured to be detachably connected to an electronic device includes an electrical connector and a circuit board assembly. The electrical connector includes a plurality of pins configured to be electrically connected to the electronic device. The circuit board assembly is embedded inside the electrical connector and is electrically connected to one or more of the pins. The circuit board assembly includes a circuit board and an integrated circuit disposed on the circuit board.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: July 5, 2022
    Assignee: ACCTON TECHNOLOGY CORPORATION
    Inventor: Hong-Si Wang
  • Publication number: 20220159020
    Abstract: There is provided a computer implemented method, computer system and computer program for protecting a network. The method comprises: gathering traffic data for the network; identifying a set of loT devices in the network based on the output from a machine learning model for classifying loT devices using features extracted from the traffic data that are indicative of an loT device; and causing one or more predetermined actions to be taken in respect of the set of loT devices to protect the network.
    Type: Application
    Filed: March 3, 2020
    Publication date: May 19, 2022
    Inventors: Xiao-Si WANG, Ali SAJJAD