Patents by Inventor Si Wang
Si Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12273376Abstract: A computer implemented malware protection method to mitigate malware spread within a set of communicating computer systems from an infected computer system is disclosed.Type: GrantFiled: December 1, 2021Date of Patent: April 8, 2025Assignee: British Telecommunications Public Limited CompanyInventors: Xiao-Si Wang, Conor Hocking, Bogdan Blaga
-
Publication number: 20250097441Abstract: Uploading of a video file is performed by transcoding, processing and uploading portions of the video file in parallel, to reduce total processing and upload time. The processing of the video file may include applying associated augmented reality effects to a raw video recording, to generate an enhanced video recording for transmission and viewing at a recipient device. The uploaded portions of the video file may be assembled into a fragmented file format such as fMP4, in which portions of the video file are stored as fragments.Type: ApplicationFiled: September 18, 2023Publication date: March 20, 2025Inventors: Yichen Wang, Yuechuan Li, Si Wang, Yihuan Zhou, Haoyun Wu, Junhong Nie
-
Publication number: 20240414141Abstract: Aspects of the subject technology include determining an association between a first and second user account that comprises a first condition corresponding to a first action to be performed in association with the first user account and a second condition corresponding to a second action to be performed in association with the second user account. Aspects also include generating a first entry based on the association, receiving a first indication indicating completion the first and/or second actions, generating a second entry based on the first indication, wherein the second entry corresponds to the first and/or second conditions, determining whether the first and second condition of the first entry are satisfied based in part on entries in the data structure that correspond to the first and/or second conditions, and transmitting a second indication that the first entry is complete, in response to determining that the first and second condition are satisfied.Type: ApplicationFiled: June 12, 2023Publication date: December 12, 2024Inventors: Ji HUANG, Angelica SCHWARTZ, Stefan GAWRYS, Alexander THIEMANN, Si WANG, Hongshan ZHOU, Justin AHN, Ken THAI, Yue BU, Tyler DOSS
-
Publication number: 20240235106Abstract: Connection system, in particular for a charger or a power tool, containing a connection plug with a power line and containing a socket apparatus with at least one socket element for releasable connection to the connection plug. The socket apparatus contains a first strain-relief device in order to counteract a tensile load, exerted on the power line, when the connection plug and the socket element are in a connected state. Charger with a connection system containing a connection plug with a power line and containing a socket apparatus with at least one socket element for releasable connection to the connection plug. Power tool with a connection system containing a connection plug with a power line and containing a socket apparatus with at least one socket element for releasable connection to the connection plug. Socket apparatus with at least one socket element for releasable connection to a connection plug for a connection system.Type: ApplicationFiled: June 8, 2022Publication date: July 11, 2024Inventors: Michael REINER, Leonard JANCZYK, Si WANG, Kay PASZEHR, Karl-Heinz HOFMANN
-
Publication number: 20240060131Abstract: A method using an endogenous retrovirus (ERV) as a biomarker for detecting a degree of aging of an object or a cell, tissue or organ or isolated cell thereof. A method using an ERV as a target for treating, preventing or delaying aging of the subject or a cell, tissue or organ or isolated cell thereof.Type: ApplicationFiled: August 3, 2023Publication date: February 22, 2024Inventors: Guanghui LIU, Jing Qu, Weiqi Zhang, Xiaoqian Liu, Zunpeng Liu, Zeming Wu, Si Wang
-
Publication number: 20230416712Abstract: The present invention discloses an application of a substance that reduces the content or activity of KAT7 in preventing senescence and treating hepatic fibrosis. The present invention finds out that knockdown KAT7 genes have a definite effect on delaying senescence and treating hepatic fibrosis; and WM-3835 as a KAT7 inhibitor has a definite effect on delaying the senescence of hepatocytes. The present invention provides a new idea for developing genes for delaying senescence and treating hepatic fibrosis, and expands the options of clinical gene therapy and drug therapy.Type: ApplicationFiled: June 4, 2021Publication date: December 28, 2023Inventors: Guanghui LIU, Jing QU, Weiqi ZHANG, Wei WANG, Shuhui SUN, Wei LI, Moshi SONG, Si WANG
-
Publication number: 20230396646Abstract: A computer implemented malware protection method to mitigate malware spread within a set of communicating computer systems from an infected computer system is disclosed.Type: ApplicationFiled: December 1, 2021Publication date: December 7, 2023Inventors: Xiao-Si WANG, Conor HOCKING, Bogdan BLAGA
-
Publication number: 20230379355Abstract: A computer implemented security method for a set of internet-of-things (IoT) devices, the set of devices comprising network-connected sensors and actuators, wherein a data repository stores data about the devices, actions performable by each of the devices and one or more network attacks to which at least a subset of the devices are susceptible, the method comprising: defining, for each network attack, one or more responsive actions for the attack, each responsive action identifying one or more performable actions for performance by one or more devices to mitigate the attack; detecting a device in a compromised state, the compromised state being determined based on a threshold number of occurrences of an attack perpetrated against the device; selecting responsive actions for the perpetrated attack; and triggering the responsive actions to mitigate the perpetrated attack.Type: ApplicationFiled: September 29, 2021Publication date: November 23, 2023Inventors: Xiao-Si WANG, Christopher NUGENT, Pushpinder CHOUHAN, Md BISWAS
-
Publication number: 20230376598Abstract: A computer implemented malware protection method to protect a target computer system in a set of computer systems from a malware, the method comprising: accessing a model of the set of computer systems, the model identifying interacting pairs of the computer systems in the set based on interactions corresponding to previous communication occurring between the computer systems in the pairs, and the model identifying the target computer system; simulating, over a plurality of time periods, a propagation of the malware originating from a predetermined source computer system in the model, the simulation being based on a number of interactions per time period between each interacting pair of computer systems in the set, and a rate of transmission of the malware per interaction; evaluating, for each of at least a subset of the time periods, a probability of infection of the target computer system in the time period; responsive to the simulating step, identifying an earliest time period during which the probabilityType: ApplicationFiled: September 27, 2021Publication date: November 23, 2023Inventors: Xiao-Si WANG, Conor HOCKING
-
Publication number: 20230279685Abstract: An automatic swimming pool cleaning robot capable of lateral translation relates to a technical field of cleaning robots for swimming pools. A controller compartment is disposed in a housing of the automatic swimming pool cleaning robot, the controller compartment is a sealed compartment, and a control circuit is disposed in the controller compartment. A driving motor is disposed in the housing, crawler belts are disposed on both sides of the housing, a cleaning rolling brush is disposed at a bottom of the housing, and the driving motor drives the cleaning rolling brush and the crawler belts through the transmission mechanism. A water inlet is defined at the bottom of the housing, a filtering device is disposed on the water inlet, and the housing covers above the filtering device. Two water outlets are defined at a top of the housing.Type: ApplicationFiled: April 10, 2023Publication date: September 7, 2023Inventors: SI’AO WANG, WEIWEI LI, XIAOLONG LI, LANSHAN YIN, ZHE WANG, CHAOMIN CHEN
-
Patent number: 11730392Abstract: A breathing-driven flexible respiratory sensor includes: a test cavity and a digital electrometer, wherein an upper internal wall of the test cavity is provided with an upper detecting component, and a lower internal wall of the test cavity is provided with a lower detecting component; the upper detecting component and the lower detecting component is arranged in a longitudinal symmetry form; wherein the upper detecting component comprises a substrate, an electrode and a gas sensitive film bonded in sequence from top to bottom, and the substrate is bonded to the upper internal wall of the test cavity; wherein a rubber airbag is disposed in the test cavity, and a friction film is bonded to the rubber airbag; an air inlet cylinder is connected to a left end of the rubber airbag, and an air outlet cylinder is connected to a right end of the rubber airbag.Type: GrantFiled: August 13, 2019Date of Patent: August 22, 2023Assignee: University of Electronic Science and Technology of ChinaInventors: Yadong Jiang, Huiling Tai, Bohao Liu, Si Wang, Zhen Yuan, Qi Huang, Guangzhong Xie
-
Publication number: 20230123046Abstract: A malware protection method to protect at least a subset of a set of computer systems from a malware includes accessing a model of the set of computer systems, the model identifying interacting pairs of the computer systems in the set based on interactions corresponding to previous communication occurring between the computer systems in the pair; simulating, over a plurality of time periods, a propagation of the malware originating from a predetermined source computer system in the model, the simulation being based on a number of interactions per time period between each interacting pair of computer systems in the set, and a rate of transmission of the malware per interaction; and, responsive to the simulating step, identifying one or more computer systems or interacting pairs of computer systems to deploy a malware protection measure thereto so as to inhibit a propagation of the malware through the set of computer systems.Type: ApplicationFiled: February 16, 2021Publication date: April 20, 2023Inventors: Xiao-Si WANG, Jessica WELDING
-
Publication number: 20230100643Abstract: A malware protection method to protect at least a subset of a set of computer systems from a malware propagating through the set of computer systems, including accessing a model of the set of computer systems, wherein each computer system is identified by the model as having an indication of a state of malware infection; simulating, over a plurality of time periods, a propagation of the malware from infected computer systems to susceptible computer systems, the simulation being based on a number of interactions per time period between each interacting pair of computer systems in the set, and a rate of transmission of the malware per interaction; responsive to the simulating, identifying one or more computer systems to deploy a malware protection measure thereto so as to inhibit a propagation of the malware through the set of computer systems.Type: ApplicationFiled: February 16, 2021Publication date: March 30, 2023Inventors: Xiao-Si WANG, Stephanie KISS
-
Patent number: 11533333Abstract: A computer implemented method of protecting a target subnet, including a set of network connected devices in a hierarchy of subnets of a computer network, from malware attack. The method includes generating a dynamical system for each subnet in the network, each dynamical system modelling a rate of change of a number of network connected devices in the subnet that are: susceptible to infection by the malware; infected by the malware; protected against infection by the malware; and remediated of infection by the malware. The dynamical systems are based on rates of transmission of the malware between pairs of subnets; evaluating a measure of risk of infection of the target subnet at a predetermined point in time based on the dynamical system for the target subnet; and responsive to the measure of risk meeting a predetermined threshold, deploying malware protection measures to devices in the target subnet.Type: GrantFiled: March 19, 2019Date of Patent: December 20, 2022Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANYInventors: Xiao-Si Wang, Zhan Cui, Ian Herwono
-
Patent number: 11470109Abstract: A computer implemented method of protecting a portion of a computer network from malware attack, the computer network including a network connected devices organized into hierarchical subnets modelled by a tree data structure in which each subnet is represented as a node in the tree, each node having a connection to parent node save for a root node, the method including performing protective actions on devices in subnets associated with a first subset of nodes to provide protection against the malware, prioritizing devices in the subnets associated with a second subset of nodes so as to provide a barrier of subnets protected against the malware to impede the propagation of the malware to devices in subnets associated with each of the first subset of nodes.Type: GrantFiled: March 19, 2019Date of Patent: October 11, 2022Assignee: British Telecommunications Public Limited CompanyInventors: Xiao-Si Wang, Zhan Cui, Ian Herwono
-
Publication number: 20220272107Abstract: A computer implemented method to block malware propagation in a network of computer systems, each computer system in the network having associated location information indicating a physical location, by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a physical location at which one or more computer systems are involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems; colocation of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the physical location so as to block propagation of the malware through the network.Type: ApplicationFiled: June 24, 2020Publication date: August 25, 2022Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
-
Publication number: 20220247759Abstract: A computer implemented method to block malware propagation in a network of computer systems by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a common resource in the network involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the common resource so as to block propagation of the malware through the network.Type: ApplicationFiled: June 24, 2020Publication date: August 4, 2022Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
-
Publication number: 20220239671Abstract: A computer implemented method to block malware propagation in a network of computer systems by receiving, for each of a plurality of time periods, a historical model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; generating, for each of a plurality of subsequent time periods, a forecast model of the network of computer systems in which each forecast model identifies communications between computer systems and malware infection state of computer systems being determined based on an extrapolation of the set of historical models; identifying a common resource in the network involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems and the communications therebetween identified in the forecast models; and implementing protective measures in respect to the common resource so as to block propagation of the malware through the network.Type: ApplicationFiled: June 24, 2020Publication date: July 28, 2022Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
-
Patent number: 11382239Abstract: A fan module configured to be detachably connected to an electronic device includes an electrical connector and a circuit board assembly. The electrical connector includes a plurality of pins configured to be electrically connected to the electronic device. The circuit board assembly is embedded inside the electrical connector and is electrically connected to one or more of the pins. The circuit board assembly includes a circuit board and an integrated circuit disposed on the circuit board.Type: GrantFiled: September 23, 2020Date of Patent: July 5, 2022Assignee: ACCTON TECHNOLOGY CORPORATIONInventor: Hong-Si Wang
-
Publication number: 20220159020Abstract: There is provided a computer implemented method, computer system and computer program for protecting a network. The method comprises: gathering traffic data for the network; identifying a set of loT devices in the network based on the output from a machine learning model for classifying loT devices using features extracted from the traffic data that are indicative of an loT device; and causing one or more predetermined actions to be taken in respect of the set of loT devices to protect the network.Type: ApplicationFiled: March 3, 2020Publication date: May 19, 2022Inventors: Xiao-Si WANG, Ali SAJJAD