Patents by Inventor Tao Wei

Tao Wei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12282052
    Abstract: Method and apparatus for detecting in impedance change in a transmission line, such as a line in a computer bus. A CMOS-compatible time domain reflectometer circuit comprising a comparator is embedded in one or more chips and connected to the transmission line. The circuit measures the impedance inhomogeneity pattern (IIP) of the transmission line prior to use, and then repeatedly measures the HP during operation of the transmission line to detect a change in IIP, without Interfering with data transfer through the transmission line. The present invention can detect and locate wire-tapping magnetic probing or snooping, and Trojan and cold boot attacks on interconnecting buses between computer chips or integrated circuits in a computer system, such as on external memory buses.
    Type: Grant
    Filed: January 29, 2021
    Date of Patent: April 22, 2025
    Assignee: University of Rhode Island Board of Trustees
    Inventors: Ken Qing Yang, Tao Wei, Zhenyu Xu
  • Publication number: 20250059278
    Abstract: An antibody targeting CD3 or an antigen-binding fragment thereof, which has a moderate ability to activate T cells and can effectively reduce cell factor release. A multispecific antibody targeting CD3 and other antigens, such as tumor-associated antigens and/or immune checkpoint molecules, which can significantly reduce cytokine release while ensuring efficient and specific killing of target cells, and has a significantly improved safety. The present invention also relates to uses of the antibody targeting CD3 or the antigen-binding fragment thereof, and the multispecific antibody or a composition comprising same in disease treatment.
    Type: Application
    Filed: December 28, 2022
    Publication date: February 20, 2025
    Inventors: Yan HU, Sanyou GUO, Yumin TENG, Tao WEI, Zhao DING
  • Patent number: 12222331
    Abstract: Provided are a system and a method for impact testing and monitoring of a high-energy flexible net. The system includes a vertical impact testing unit, a slope impact testing unit, an impact simulation unit, and an impact monitoring unit. The vertical impact testing unit includes a vertically positioned gravity wall. The slope impact testing unit includes a wall slope positioned perpendicularly to a second side of the gravity wall. A first side of the gravity wall and a slope surface of the wall slope are securely provided with a flexible net, respectively. The impact simulation unit includes an impact assembly and a lifting assembly. The impact monitoring unit is configured to monitor a deformation result and an internal force change result of the flexible net.
    Type: Grant
    Filed: September 26, 2024
    Date of Patent: February 11, 2025
    Assignees: RAILWAY ENGINEERING RESEARCH INSTITUTE, CHINA ACADEMY OF RAILWAY SCIENCES CO., LTD., CHINA ACADEMY OF RAILWAY SCIENCES CO., LTD.
    Inventors: Yufang Zhang, Kun Yuan, Xiaobing Li, Yong Yao, Tao Jia, Lining Du, Tao Wei, Wenchao Zhang, Jian Cui, Bo Liu, Jian Li, Yu Cheng, Shengyong Zeng, Shuangquan Lei, Shiwen Huang, Wenxin Tan, Junjie Zeng, Hao Lan, Jiawei Fan, Ning Xuan, Peng Zhang, Gongming Chen, Pan Chen, Fei Xian, Zehua Dong
  • Publication number: 20250015971
    Abstract: A computer-implemented method includes obtaining, by each secure multi-party computation (MPC) computation party of n secure MPC computation parties, a first data component sent by a data provider, obtained after the data provider splits to-be-processed data into n data components, and n is an integer not less than 3. M secure MPC computation parties are selected to respectively perform a shuffling operation on respectively held first data components, to obtain a second data component, so as to perform an MPC operation, wherein 1<m<n, and wherein m is a positive integer. Selecting m secure MPC computation parties is cyclically performed to perform a shuffling operation on first data components, until each secure MPC computation party is not selected for at least one time to perform the shuffling operation, where m secure MPC computation parties selected each time are not completely identical.
    Type: Application
    Filed: September 20, 2024
    Publication date: January 9, 2025
    Applicant: ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD.
    Inventors: Tianyi Li, Wuqiong Pan, Tingting Li, Tao Wei
  • Publication number: 20240427836
    Abstract: In an example data processing method, a data processing task is received, which includes a to-be-processed non-polynomial function and to-be-processed data corresponding to an independent variable of the non-polynomial function. A first linear transformation is performed on the to-be-processed data, so that an independent variable value corresponding to data obtained after the first linear transformation falls within a fitting domain of definition. The fitting domain of definition is an interval selected from a domain of definition of the independent variable of the non-polynomial function. A fitting polynomial function value is obtained based on the data obtained after the first linear transformation. The fitting polynomial is obtained by performing Chebyshev series fitting on the non-polynomial function in the fitting domain of definition.
    Type: Application
    Filed: September 4, 2024
    Publication date: December 26, 2024
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Tianyi Li, Wuqiong Pan, Tingting Li, Tao Wei, Zhongtian Qian
  • Publication number: 20240430081
    Abstract: Data processing methods, apparatuses, and computer-readable media are applied to a system including a data provider and N secure multi-party computation (MPC) computation parties. N is an integer greater than 3. In an example method, each MPC computation party obtains a first data component from a data message sent by the data provider. The first data component is a part of a plurality of data components obtained after the data provider splits private data, and the first data component is a logical component. Then, the first data component is converted from the logical component to an arithmetic component, to obtain a second data component, so as to perform MPC processing.
    Type: Application
    Filed: September 6, 2024
    Publication date: December 26, 2024
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Zhongtian Qian, Wuqiong Pan, Tao Wei, Tingting Li, Zhenqiang Wei, Tianyi Li
  • Publication number: 20240427937
    Abstract: A computer-implemented method for data processing includes obtaining, by each secure multi-party computation (MPC) computation party of a system including a data provider and n secure MPC computation parties, a data message sent by the data provider, where n is an integer greater than 3. As an obtained data message, a first data component is obtained based on the data message. Each MPC computation party, by using the first data component, performs arithmetic sharing processing to obtain a second data component, so as to perform MPC processing, where n data messages received by the n MPC computation parties include: a data message sent after the data provider splits private data into m data components and m data messages each are used to carry one data component, where m is greater than 1 and is less than or equal to n, and m is a positive integer.
    Type: Application
    Filed: September 6, 2024
    Publication date: December 26, 2024
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Zhongtian Qian, Wuqiong Pan, Tao Wei, Tingting Li, Zhenqiang Wei, Tianyi Li
  • Patent number: 12159060
    Abstract: The present disclosure relates to a data writing method and apparatus of a NAND flash, and a storage medium. The method includes: for each channel in the NAND flash, pairing all logic units, namely LUNs, in the channel so that each LUN pair includes at least two LUNs; and for each LUN pair, sequentially writing data to one same page in a plurality of pages corresponding to a program mode included in each word line of each LUN in the LUN pair, and after completing data writing to the same page of the word line of all the LUNs in the LUN pair, sequentially writing data to a next same page in the plurality of pages of the word line of each LUN in the LUN pair, until the data writing is sequentially performed on a last same page in the plurality of pages of the word line of each LUN in the LUN pair. Therefore, the transmission efficiency of a NAND bus can be improved, and the data writing performance of the NAND flash can be improved.
    Type: Grant
    Filed: June 2, 2022
    Date of Patent: December 3, 2024
    Assignee: INNOGRIT TECHNOLOGIES CO., LTD.
    Inventors: Tao Wei, Zhengtian Feng, Ke Wei
  • Publication number: 20240396707
    Abstract: A computer-implemented method for data processing includes obtaining, by each secure multi-party computation (MPC) computation party of a system comprising a data provider and n secure MPC computation parties, a first data component from a data message sent by the data provider, where n is an integer greater than 3, where the first data component is one of a plurality of data components obtained after the data provider splits private data, and where the first data component is an address-geocoded component. Perform MPC processing to obtain a second data component by converting the first data component from the address-geocoded component and to a one-hot encoded component.
    Type: Application
    Filed: August 8, 2024
    Publication date: November 28, 2024
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Zhongtian Qian, Wuqiong Pan, Tao Wei, Tingting Li, Zhenqiang Wei, Tianyi Li
  • Publication number: 20240370578
    Abstract: Data query methods, apparatuses and computer-readable media are described. In an example process of processing, by a third party, a federated data table formed based on data of a plurality of data parties, if related data need to be obtained based on sorting of multiple attribute columns of the data table, when the federated data table is sorted based on attribute values of the attribute columns, a row identifier is introduced for an out-of-order data table obtained by disordering the federated data table, and an index is created based on the row identifier. The row identifier is determined by the third party and exists in a form of ciphertext in an index table. A row identifier of a candidate row can be restored to a plaintext.
    Type: Application
    Filed: July 19, 2024
    Publication date: November 7, 2024
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Wuqiong Pan, Tao Wei, Tingting Li, Ran Duan, Bei Jin
  • Publication number: 20240364419
    Abstract: Systems and methods are provided for a software defined optical time-domain reflectometer (SD-OTDR) using high-speed optical transceiver modules. Enabled by the reconfigurable computing resource, an SD-OTDR in accordance with an embodiment of the present disclosure can realize in-situ diagnostics of optical fiber without adding any overhead to existing systems. In addition, an SD-OTDR in accordance with an embodiment of the present disclosure can also be used for high-resolution distributed sensing. Additionally, an SD-OTDR in accordance with an embodiment of the present disclosure can directly map optical reflections at different locations along the length of a fiber to a processing element array in a Field-Programmable Gate Array for real-time in-sensor parallel data processing.
    Type: Application
    Filed: January 3, 2024
    Publication date: October 31, 2024
    Inventors: Tao Wei, Thomas Mauldin, Zhenyu Xu
  • Publication number: 20240313667
    Abstract: A synchronous rectifier module includes a transformer sandwiched between a first circuit board and a second circuit board. A first plurality of switches are disposed on a first side of the first circuit board and form a first synchronous rectifier circuit, and a second plurality of switches are disposed on a second side of the first circuit board and form a second synchronous rectifier circuit. A third plurality of switches are disposed on a first side of the second circuit board and form a third synchronous rectifier circuit, and a fourth plurality of switches are disposed on a second side of the second circuit board and form a fourth synchronous rectifier circuit. The first, second, third and fourth synchronous rectifier circuits are each connected to secondary windings of the transformer.
    Type: Application
    Filed: March 8, 2024
    Publication date: September 19, 2024
    Applicant: Navitas Semiconductor Limited
    Inventors: Root Zhao, Tao Wei, Wenhao Yu, Yao Fowler
  • Publication number: 20240265316
    Abstract: The present disclosure discloses an electric-quantity-based path planning method for an electric vehicle compatible with an energy storage charging pile. The method includes the following steps: 1) charging piles in a whole network submitting state information of the piles to a dispatching system platform, and before departure, an electric vehicle applying for a reservation from the dispatching system platform; 2) finding a shortest path from a departure place to a destination; 3) the dispatching system platform judging whether the reserved allocated electric quantity of the electric vehicle at one or more charging piles along the path meets an endurance requirement for driving to the destination; 4) if so, generating a whole-journey reservation scheme; and 5) if not, excluding the shortest path, and finding the shortest path from the remaining paths, and performing cyclic execution from Step 3) until all paths are traversed.
    Type: Application
    Filed: May 14, 2022
    Publication date: August 8, 2024
    Inventor: Tao Wei
  • Publication number: 20240263871
    Abstract: The present invention discloses a hydrogen or helium throttling liquefaction system using direct current (DC) flow from the cold and hot ends of the regenerative cryocoolers, which belongs to the technical field of refrigeration and cryogenics. It includes a regenerative cryocooler module, a hot-end DC flow module, a cold-end DC flow module, a throttling liquefaction module, and a gas-phase circulation module. The modules are interconnected to form a closed loop for the flow of hydrogen or helium working fluid. DC flow is introduced from the cold and hot ends of the regenerative cryocooler through the DC flow pipelines and DC flow valves. The hot-end DC flow exchanges heat with the reflowing low-temperature working fluid and is cooled down. After that, it mixes with the cold-end DC flow and enters the throttling liquefaction module to generate liquid phase through throttling and liquefaction.
    Type: Application
    Filed: July 7, 2022
    Publication date: August 8, 2024
    Inventors: XIAOQIN ZHI, LIMIN QIU, TAO WEI, XIN CHEN, KAI WANG, SHIRAN BAO
  • Publication number: 20240255378
    Abstract: Methods, systems and a self-sensing valve assembly are described for monitoring seal life. The method includes providing a valve assembly movable from an open position to a closed position and including a seal seated within the valve and in contact with a surface of the valve assembly, wherein when the seal is in operation it is subject to degradation. At least one sensor is placed for measuring micro strain on a surface of the valve assembly or within the valve assembly. The valve assembly is placed in an operation wherein the seal is subject to degradation and the operation of the valve assembly is initiated.
    Type: Application
    Filed: January 2, 2024
    Publication date: August 1, 2024
    Inventors: Carmen J. Quartapella, Mookkan Periyasamy, Elizabeth Sassano, Otto J. Gregory, Godi Fischer, Tao Wei, Zakary Kinzel, Noah A. Burke
  • Patent number: 12045310
    Abstract: Disclosed is a method and system for achieving optimal separable convolutions, the method is applied to image analyzing and processing and comprises steps of: inputting an image to be analyzed and processed; calculating three sets of parameters of a separable convolution: an internal number of groups, a channel size and a kernel size of each separated convolution, and achieving optimal separable convolution process; and performing deep neural network image process. The method and system in the present disclosure adopts implementation of separable convolution which efficiently reduces a computational complexity of deep neural network process. Comparing to the FFT and low rank approximation approaches, the method and system disclosed in the present disclosure is efficient for both small and large kernel sizes and shall not require a pre-trained model to operate on and can be deployed to applications where resources are highly constrained.
    Type: Grant
    Filed: September 8, 2021
    Date of Patent: July 23, 2024
    Assignee: Peng Cheng Laboratory
    Inventors: Tao Wei, Yonghong Tian, Yaowei Wang, Yun Liang, Chang Wen Chen, Wen Gao
  • Publication number: 20240176899
    Abstract: Some embodiments of this specification provide a secure multi-party computation method and apparatus. According to the method in these embodiments, first, a TEE node cluster including K TEE nodes is joined based on a quantity N of data owners; then, a trusted execution environment is created in the TEE nodes, and a basic algorithm for secure K-party computation is loaded into the trusted execution environment; next, at least one data fragment is obtained from the trusted execution environment; and finally, secure K-party computation is performed by using the basic algorithm for secure K-party computation and the obtained data fragment.
    Type: Application
    Filed: February 18, 2022
    Publication date: May 30, 2024
    Inventors: Tao Wei, Yulong Zhang, Ran Duan, Zhenfei Zhang
  • Publication number: 20240137206
    Abstract: Embodiments of this specification provide methods and apparatuses for data privacy protection. An embodiment of the methods comprises receiving, by a first party from a second party, an encrypted integrated vector, determining an encrypted result vector based on the original matrix and the encrypted integrated vector, determining a data processing result based on the encrypted result vector, and sending the data processing result to the second party for the second party to obtain a multiplication calculation result of the original matrix and the n original vectors based on the data processing result.
    Type: Application
    Filed: December 29, 2023
    Publication date: April 25, 2024
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Wuqiong Pan, Tao Wei, Tingting Li, Zhenqiang Wei, Haonan Feng
  • Publication number: 20240135026
    Abstract: Embodiments of this specification provide multi-party data query methods and apparatuses for data privacy protection. One implementation of the methods includes obtaining, from each of a plurality of data owners, attribute value ciphertexts of N target objects to form a ciphertext table, disordering the ciphertext table in units of rows to obtain a disordered table, sorting, in response to a query instruction of querying sorting-related data for a target attribute item in the plurality of attribute items, attribute value ciphertexts corresponding to the target attribute item in the disordered table to obtain a target sorted table, and obtaining the sorting-related data as a query result based on the target sorted table.
    Type: Application
    Filed: December 29, 2023
    Publication date: April 25, 2024
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Wuqiong Pan, Tao Wei, Tingting Li, Tiany Li
  • Publication number: 20240135008
    Abstract: Computer-implemented methods, apparatuses and systems for obtaining data authorization are described. In an example method, a first computing node in a trusted computing center receives an authentication request from a first provider. Authentication information is returned to the first provider, where the authentication information comprises a first code hash of a first computing logic running in the first computing node. A channel establishment request sent by the first provider is received after determining that the first computing node passes trusted authentication and the first code hash passes correctness verification. A first trusted channel is established between the first provider and the first computing node according to the channel establishment request. A target encryption key is received through the first trusted channel, thereby authorization to perform computation on a target encrypted shard corresponding to the target encryption key based on the first computing logic is obtained.
    Type: Application
    Filed: December 29, 2023
    Publication date: April 25, 2024
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Wuqiong Pan, Tao Wei, Tingting Li, Zhongtian Qian, Tianyi Li, Zhenqiang Wei