Patents by Inventor Tao Wei

Tao Wei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11128617
    Abstract: According to one embodiment, in response to a request received at a host agent of a server from a user device of a user over a network to process user data, a system transmits a token representing the request to an executor pool having a pool of a number of executors. The system receives by the host agent executable image(s) of an executor from the executor pool, where the executor pool allocated the executor from the pool of executors in response to successfully verifying the token. The system launches a restricted operating environment within the server, including providing the executable image(s) of the executor and the user data to the restricted operating environment. The system executes the executable image(s) of the executor within the restricted operating environment, where the executor, when executed, is to process the user data without accessing an external component external to the restricted operating environment.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: September 21, 2021
    Assignee: BAIDU USA LLC
    Inventors: Yueqiang Cheng, Yulong Zhang, Yu Ding, Tao Wei
  • Patent number: 11119892
    Abstract: The present disclosure provides a method, apparatus, device and computer-readable storage medium for guiding symbolic execution. According to embodiments of the present disclosure, it is possible to determine the specific code region of the program, and obtain the program loop output of the program corresponding to the specific code region of the program by using the program inverse analysis method, so that it is possible to obtain the program loop input of the program corresponding to the specific code region by using the program loop predictor according to the program loop output of the program. In this way, the obtained program loop input of the program corresponding to the specific code region may be used to guide the symbolic execution to filter out impossible execution paths and jump out of the program code and reach the specific code region, thereby improving the reliability of the symbolic execution.
    Type: Grant
    Filed: March 25, 2020
    Date of Patent: September 14, 2021
    Assignee: BAIDU ONLINE NETWORK TECHNOLOGY (BEIJING) CO., LTD.
    Inventors: Qian Feng, Shengjian Guo, Peng Li, Minghua Wang, Yulong Zhang, Tao Wei
  • Publication number: 20210281408
    Abstract: According to one embodiment, a DP accelerator includes one or more execution units (EUs) configured to perform data processing operations in response to an instruction received from a host system coupled over a bus. The DP accelerator includes a time unit (TU) coupled to the security unit to provide timestamp services. The DP accelerator includes a security unit (SU) configured to establish and maintain a secure channel with the host system to exchange commands and data associated with the data processing operations, where the security unit includes a secure storage area to store a private root key associated with the DP accelerator, where the private root key is utilized for authentication. The SU includes a random number generator to generate a random number, and a cryptographic engine to perform cryptographic operations on data exchanged with the host system over the bus using a session key derived based on the random number.
    Type: Application
    Filed: January 4, 2019
    Publication date: September 9, 2021
    Inventors: Yong LIU, Yueqiang CHENG, Jian OUYANG, Tao WEI
  • Publication number: 20210279344
    Abstract: According to one embodiment, a system establishes a secure connection between a host system and a data processing (DP) accelerator over a bus, the secure connection including one or more data channels. The system transmits a first instruction from the host system to the DP accelerator over a command channel, the first instruction requesting the DP accelerator to perform a data preparation operation. The system receives a first request to read a first data from a first memory location of the host system from the DP accelerator over one data channel. In response to the request, the system transmits the first data to the DP accelerator over the data channel, where the first data is utilized for a computation or a configuration operation. The system transmits a second instruction from the host system to the DP accelerator over the command channel to perform the computation or the configuration operation.
    Type: Application
    Filed: January 4, 2019
    Publication date: September 9, 2021
    Inventors: Yong LIU, Yueqiang CHENG, Jian OUYANG, Tao WEI
  • Publication number: 20210266461
    Abstract: In a described embodiment, a UAV and method for controlling a UAV are disclosed. The UAV is controlled along a predetermined flight path and the camera of UAV is controlled such that adjacent pictures of the captured pictures have an overlap in a predetermined range. In another embodiment, a device and method for detecting defects in image data of a UAV camera are disclosed. An image data management system for managing image data of a UAV and a client software application for performing surface scans with a UAV are also disclosed.
    Type: Application
    Filed: July 2, 2019
    Publication date: August 26, 2021
    Inventors: Tao Wei Shaun Koo, Wenjuan Dong, See Wei Yong, Cheng Lock Donny Soh, Jaime Rubio
  • Publication number: 20210250174
    Abstract: According to one embodiment, in response to receiving a temporary public key (PK_d) from a data processing (DP) accelerator, a system generates a first nonce (nc) at the host system, where the DP accelerator is coupled to the host system over a bus. The system transmits a request to create a session key from the host system to the DP accelerator, the request including a host public key (PK_O) and the first nonce. The system receives a second nonce (ns) from the DP accelerator, where the second nonce is encrypted using the host public key and a temporary private key (SK_d) corresponding to the temporary public key. The system generates a first session key based on the first nonce and the second nonce, which is utilized to encrypt or decrypt subsequent data exchanges between the host system and the DP accelerator.
    Type: Application
    Filed: January 4, 2019
    Publication date: August 12, 2021
    Inventors: Yueqiang CHENG, Yong LIU, Tao WEI, Jian OUYANG
  • Patent number: 11080584
    Abstract: The present disclosure is generally directed to an RFID tag for use with a metal fastener where the fastener operates as the antenna of the RFID tag. The RFID tag includes a microchip for storing data. The chip is electrically coupled to the metal fastener in order to receive and transmit the RF signal, the metal fastener thereby operating as the antenna for the RFID tag.
    Type: Grant
    Filed: April 27, 2020
    Date of Patent: August 3, 2021
    Inventors: Geoffrey Grove, Tao Wei, Otto Gregory
  • Patent number: 11075575
    Abstract: A resonant converter is disclosed, including: a primary side circuit including at least one set of primary side switches, where the primary side circuit is configured to receive an input voltage; a resonant network coupled to the primary side circuit; a transformer having a primary side winding and a secondary side winding, where the primary side winding is coupled to the resonant network; a secondary side circuit including at least one set of secondary side switches, where the secondary side circuit is coupled to the secondary side winding of the transformer; and a control block that controls the secondary side switches according to the input voltage, the output voltage and the current detection signal, so that the secondary side winding of the transformer is short-circuited during a preset time interval before operating state of the primary side switches changes.
    Type: Grant
    Filed: July 17, 2020
    Date of Patent: July 27, 2021
    Assignee: DELTA ELECTRONICS, INC.
    Inventors: Tao Wei, Hao Lu
  • Publication number: 20210173428
    Abstract: According to one embodiment, a DP accelerator includes one or more execution units (EUs) configured to perform data processing operations in response to an instruction received from a host system coupled over a bus. The DP accelerator includes a security unit (SU) configured to establish and maintain a secure channel with the host system to exchange commands and data associated with the data processing operations. The DP accelerator includes a time unit (TU) coupled to the security unit to provide timestamp services to the security unit, where the time unit includes a clock generator to generate clock signals locally without having to derive the clock signals from an external source. The TU includes a timestamp generator coupled to the clock generator to generate a timestamp based on the clock signals, and a power supply to provide power to the clock generator and the timestamp generator.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yong LIU, Yueqiang CHENG, Jian OUYANG, Tao WEI
  • Publication number: 20210176035
    Abstract: According to one embodiment, a system receives, at a host system from a data processing (DP) accelerator, an accelerator identifier (ID) that uniquely identifies the DP accelerator), wherein the host system is coupled to the DP accelerator over a bus. The system transmits the accelerator ID to a predetermined trusted server over a network. The system receives a certificate from the predetermined trusted server over the network, the certificate certifying the DP accelerator. The system extracts a public root key (PK_RK) from the certificate for verification, the PK_RK corresponding to a private root key (SK_RK) associated with the DP accelerator. The system establishes a secure channel with the DP accelerator using the PK_RK based on the verification to exchange data securely between the host system and the DP accelerator.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yueqiang CHENG, Yong LIU, Tao WEI, Jian OUYANG
  • Publication number: 20210173666
    Abstract: According to one embodiment, a data processing system performs a secure boot using a security module (e.g., a trusted platform module (TPM)) of a host system. The system verifies that an operating system (OS) and one or more drivers including an accelerator driver associated with a data processing (DP) accelerator is provided by a trusted source. The system launches the accelerator driver within the OS. The system generates a trusted execution environment (TEE) associated with one or more processors of the host system. The system launches an application and a runtime library within the TEE, where the application communicates with the DP accelerator via the runtime library and the accelerator driver.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yueqiang CHENG, Yong LIU, Tao WEI, Jian OUYANG
  • Publication number: 20210173917
    Abstract: According to one embodiment, a system receives, at a runtime library executed within a trusted execution environment (TEE) of a host system, a request from an application to invoke a predetermined function to perform a predefined operation. In response to the request, the system identifies a kernel object associated with the predetermined function. The system verifies an executable image of the kernel object using a public key corresponding to a private key that was used to sign the executable image of the kernel object. In response to successfully the system verifies the executable image of the kernel object, transmitting the verified executable image of the kernel object to a data processing (DP) accelerator over a bus to be executed by the DP accelerator to perform the predefined operation.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yueqiang CHENG, Yong LIU, Tao WEI, Jian OUYANG
  • Publication number: 20210173661
    Abstract: According to one embodiment, a system receives, at a host system a public attestation key (PK_ATT) or a signed PK_ATT from a data processing (DP) accelerator over a bus. The system verifies the PK_ATT using a public root key (PK_RK) associated with the DP accelerator. In response to successfully verifying the PK_ATT, the system transmits a kernel identifier (ID) to the DP accelerator to request attesting a kernel object stored in the DP accelerator. In response to the system receives a kernel digest or a signed kernel digest corresponding to the kernel object form the DP accelerator, verifying the kernel digest using the PK_ATT. The system sends the verification results to the DP accelerator for the DP accelerator to access the kernel object based on the verification results.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yueqiang CHENG, Yong LIU, Tao WEI, Jian OUYANG
  • Publication number: 20210173934
    Abstract: According to one embodiment, a system performs a secure boot using a security module such as a trusted platform module (TPM) of a host system. The system establishes a trusted execution environment (TEE) associated with one or more processors of the host system. The system launches a memory manager within the TEE, where the memory manager is configured to manage memory resources of a data processing (DP) accelerator coupled to the host system over a bus, including maintaining memory usage information of global memory of the DP accelerator. In response to a request received from an application running within the TEE for accessing a memory location of the DP accelerator, the system allows or denies the request based on the memory usage information.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Applicants: Baidu.com Times Technology (Beijing) Co., Ltd., Baidu USA LLC
    Inventors: Yong LIU, Yueqiang CHENG, Jian OUYANG, Tao WEI
  • Publication number: 20210176063
    Abstract: According to one embodiment, a system receives, at a host channel manager (HCM) of a host system, a request from an application to establish a secure channel with a data processing (DP) accelerator, where the DP accelerator is coupled to the host system over a bus. In response to the request, the system generates a first session key for the secure channel based on a first private key of a first key pair associated with the HCM and a second public key of a second key pair associated with the DP accelerator. In response to a first data associated with the application to be sent to the DP accelerator, the system encrypts the first data using the first session key. The system then transmits the encrypted first data to the DP accelerator via the secure channel over the bus.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yong LIU, Yueqiang CHENG, Jian OUYANG, Tao WEI
  • Patent number: 10990855
    Abstract: In one embodiment, a system receives a first image captured by a capturing device of an ADV. The system applies an image transformation to the first image to generate a second image. The system applies an object detection model to the first and the second images to generate a first and a second output, respectively. The system calculates a similarity metric between the first and the second output. The system detects the first image as an adversarial sample if a temporal variation of the similarity metric between the first image and a prior image is above a threshold.
    Type: Grant
    Filed: June 13, 2019
    Date of Patent: April 27, 2021
    Assignee: BAIDU USA LLC
    Inventors: Yunhan Jia, Zhenyu Zhong, Yulong Zhang, Tao Wei
  • Publication number: 20210118423
    Abstract: According to various embodiments, an end-to-end TTS framework can integrate a watermarking process into the training of the TTS framework, which enables watermarks to be imperceptible within a synthesized/cloned audio segment generated by the TTS framework. The watermarks added in such a matter are statistically undetectable to prevent authorized removal. According to an exemplary method of training the TTS framework, a TTS neural network model and a watermarking neural network mode in the TTS framework are trained in an end to end manner, with the watermarking being part of the optimization process of the TTS framework. During the training, neuron values of the TTS neural network model are adjusted based on training data to prepare one or more spaces for adding a watermark in a synthesized audio segment to be generated by the TTS framework.
    Type: Application
    Filed: October 21, 2019
    Publication date: April 22, 2021
    Inventors: Wei PING, Zhenyu ZHONG, Yueqiang CHENG, Xing LI, Tao WEI
  • Patent number: 10936705
    Abstract: Embodiments of the present disclosure disclose an authentication method, an electronic device, and a computer-readable program medium. A specific embodiment of the method comprises: acquiring multimedia input information of a user in response to receiving an authentication request from the user; parsing the multimedia input information to obtain a parsing result; authenticating the user based on the parsing result; and transmitting an authentication result to the user; wherein the multimedia input information includes human face video input information and voice input information of the user; and the parsing result includes at least two of: biometric feature information of the user, voice content information, and behavior feature information of the user. The embodiments may lower a risk that a hacker forges the information for authentication inputted by the user.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: March 2, 2021
    Assignee: BAIDU USA LLC
    Inventors: Zhebin Qiu, Tao Wei, Zhenyu Zhong
  • Publication number: 20210055181
    Abstract: A fatigue test assessment method for assessing a suspension point of a cylinder block by means of a fatigue test includes: fixing a suspension point of a cylinder block test piece by using a power assembly installation approach; applying a load to the suspension point of the cylinder block test piece in a preset direction; and determining whether the suspension point of the cylinder block fails. The method can ascertain, by means of assessment during a stage of parts testing, whether the structural strength of a suspension point of a cylinder block meets user requirements, so as to predict and prevent breakage of and faults in the suspension point of the cylinder block, thereby enhancing overall test validity.
    Type: Application
    Filed: September 3, 2018
    Publication date: February 25, 2021
    Inventors: Fandong Meng, Tao Wei, Shuai Teng
  • Publication number: 20210052179
    Abstract: The present disclosure provides a method for determining R peaks of an electrocardiogram (ECG/EKG). First, an ECG/EKG complex is provided, and then, a maximum peak of the ECG/EKG complex is obtained. Following that, a half of a largest voltage of the maximum peak is defined as a threshold voltage. Later, an R peak number estimating process is performed to obtain an estimated number of all R peaks of the ECG/EKG complex and a plurality of peaks of the ECG/EKG complex with voltages greater than the threshold voltage and followed by determining whether a number of the peaks is equal to the estimated number of the all R peaks. When the number of the peaks is equal to the estimated number of the all R peaks, the peaks serve as the all R peaks.
    Type: Application
    Filed: August 18, 2020
    Publication date: February 25, 2021
    Inventors: Tao-Wei Wang, Chih-Wen Hung, Ming-Chiuan Jing, Shih-Cheng Lan