Patents by Inventor Tao Wei

Tao Wei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210173934
    Abstract: According to one embodiment, a system performs a secure boot using a security module such as a trusted platform module (TPM) of a host system. The system establishes a trusted execution environment (TEE) associated with one or more processors of the host system. The system launches a memory manager within the TEE, where the memory manager is configured to manage memory resources of a data processing (DP) accelerator coupled to the host system over a bus, including maintaining memory usage information of global memory of the DP accelerator. In response to a request received from an application running within the TEE for accessing a memory location of the DP accelerator, the system allows or denies the request based on the memory usage information.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Applicants: Baidu.com Times Technology (Beijing) Co., Ltd., Baidu USA LLC
    Inventors: Yong LIU, Yueqiang CHENG, Jian OUYANG, Tao WEI
  • Publication number: 20210173661
    Abstract: According to one embodiment, a system receives, at a host system a public attestation key (PK_ATT) or a signed PK_ATT from a data processing (DP) accelerator over a bus. The system verifies the PK_ATT using a public root key (PK_RK) associated with the DP accelerator. In response to successfully verifying the PK_ATT, the system transmits a kernel identifier (ID) to the DP accelerator to request attesting a kernel object stored in the DP accelerator. In response to the system receives a kernel digest or a signed kernel digest corresponding to the kernel object form the DP accelerator, verifying the kernel digest using the PK_ATT. The system sends the verification results to the DP accelerator for the DP accelerator to access the kernel object based on the verification results.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yueqiang CHENG, Yong LIU, Tao WEI, Jian OUYANG
  • Publication number: 20210173428
    Abstract: According to one embodiment, a DP accelerator includes one or more execution units (EUs) configured to perform data processing operations in response to an instruction received from a host system coupled over a bus. The DP accelerator includes a security unit (SU) configured to establish and maintain a secure channel with the host system to exchange commands and data associated with the data processing operations. The DP accelerator includes a time unit (TU) coupled to the security unit to provide timestamp services to the security unit, where the time unit includes a clock generator to generate clock signals locally without having to derive the clock signals from an external source. The TU includes a timestamp generator coupled to the clock generator to generate a timestamp based on the clock signals, and a power supply to provide power to the clock generator and the timestamp generator.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yong LIU, Yueqiang CHENG, Jian OUYANG, Tao WEI
  • Publication number: 20210173666
    Abstract: According to one embodiment, a data processing system performs a secure boot using a security module (e.g., a trusted platform module (TPM)) of a host system. The system verifies that an operating system (OS) and one or more drivers including an accelerator driver associated with a data processing (DP) accelerator is provided by a trusted source. The system launches the accelerator driver within the OS. The system generates a trusted execution environment (TEE) associated with one or more processors of the host system. The system launches an application and a runtime library within the TEE, where the application communicates with the DP accelerator via the runtime library and the accelerator driver.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yueqiang CHENG, Yong LIU, Tao WEI, Jian OUYANG
  • Publication number: 20210176063
    Abstract: According to one embodiment, a system receives, at a host channel manager (HCM) of a host system, a request from an application to establish a secure channel with a data processing (DP) accelerator, where the DP accelerator is coupled to the host system over a bus. In response to the request, the system generates a first session key for the secure channel based on a first private key of a first key pair associated with the HCM and a second public key of a second key pair associated with the DP accelerator. In response to a first data associated with the application to be sent to the DP accelerator, the system encrypts the first data using the first session key. The system then transmits the encrypted first data to the DP accelerator via the secure channel over the bus.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yong LIU, Yueqiang CHENG, Jian OUYANG, Tao WEI
  • Publication number: 20210173917
    Abstract: According to one embodiment, a system receives, at a runtime library executed within a trusted execution environment (TEE) of a host system, a request from an application to invoke a predetermined function to perform a predefined operation. In response to the request, the system identifies a kernel object associated with the predetermined function. The system verifies an executable image of the kernel object using a public key corresponding to a private key that was used to sign the executable image of the kernel object. In response to successfully the system verifies the executable image of the kernel object, transmitting the verified executable image of the kernel object to a data processing (DP) accelerator over a bus to be executed by the DP accelerator to perform the predefined operation.
    Type: Application
    Filed: January 4, 2019
    Publication date: June 10, 2021
    Inventors: Yueqiang CHENG, Yong LIU, Tao WEI, Jian OUYANG
  • Patent number: 10990855
    Abstract: In one embodiment, a system receives a first image captured by a capturing device of an ADV. The system applies an image transformation to the first image to generate a second image. The system applies an object detection model to the first and the second images to generate a first and a second output, respectively. The system calculates a similarity metric between the first and the second output. The system detects the first image as an adversarial sample if a temporal variation of the similarity metric between the first image and a prior image is above a threshold.
    Type: Grant
    Filed: June 13, 2019
    Date of Patent: April 27, 2021
    Assignee: BAIDU USA LLC
    Inventors: Yunhan Jia, Zhenyu Zhong, Yulong Zhang, Tao Wei
  • Publication number: 20210118423
    Abstract: According to various embodiments, an end-to-end TTS framework can integrate a watermarking process into the training of the TTS framework, which enables watermarks to be imperceptible within a synthesized/cloned audio segment generated by the TTS framework. The watermarks added in such a matter are statistically undetectable to prevent authorized removal. According to an exemplary method of training the TTS framework, a TTS neural network model and a watermarking neural network mode in the TTS framework are trained in an end to end manner, with the watermarking being part of the optimization process of the TTS framework. During the training, neuron values of the TTS neural network model are adjusted based on training data to prepare one or more spaces for adding a watermark in a synthesized audio segment to be generated by the TTS framework.
    Type: Application
    Filed: October 21, 2019
    Publication date: April 22, 2021
    Inventors: Wei PING, Zhenyu ZHONG, Yueqiang CHENG, Xing LI, Tao WEI
  • Patent number: 10936705
    Abstract: Embodiments of the present disclosure disclose an authentication method, an electronic device, and a computer-readable program medium. A specific embodiment of the method comprises: acquiring multimedia input information of a user in response to receiving an authentication request from the user; parsing the multimedia input information to obtain a parsing result; authenticating the user based on the parsing result; and transmitting an authentication result to the user; wherein the multimedia input information includes human face video input information and voice input information of the user; and the parsing result includes at least two of: biometric feature information of the user, voice content information, and behavior feature information of the user. The embodiments may lower a risk that a hacker forges the information for authentication inputted by the user.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: March 2, 2021
    Assignee: BAIDU USA LLC
    Inventors: Zhebin Qiu, Tao Wei, Zhenyu Zhong
  • Publication number: 20210055181
    Abstract: A fatigue test assessment method for assessing a suspension point of a cylinder block by means of a fatigue test includes: fixing a suspension point of a cylinder block test piece by using a power assembly installation approach; applying a load to the suspension point of the cylinder block test piece in a preset direction; and determining whether the suspension point of the cylinder block fails. The method can ascertain, by means of assessment during a stage of parts testing, whether the structural strength of a suspension point of a cylinder block meets user requirements, so as to predict and prevent breakage of and faults in the suspension point of the cylinder block, thereby enhancing overall test validity.
    Type: Application
    Filed: September 3, 2018
    Publication date: February 25, 2021
    Inventors: Fandong Meng, Tao Wei, Shuai Teng
  • Publication number: 20210052179
    Abstract: The present disclosure provides a method for determining R peaks of an electrocardiogram (ECG/EKG). First, an ECG/EKG complex is provided, and then, a maximum peak of the ECG/EKG complex is obtained. Following that, a half of a largest voltage of the maximum peak is defined as a threshold voltage. Later, an R peak number estimating process is performed to obtain an estimated number of all R peaks of the ECG/EKG complex and a plurality of peaks of the ECG/EKG complex with voltages greater than the threshold voltage and followed by determining whether a number of the peaks is equal to the estimated number of the all R peaks. When the number of the peaks is equal to the estimated number of the all R peaks, the peaks serve as the all R peaks.
    Type: Application
    Filed: August 18, 2020
    Publication date: February 25, 2021
    Inventors: Tao-Wei Wang, Chih-Wen Hung, Ming-Chiuan Jing, Shih-Cheng Lan
  • Patent number: 10913659
    Abstract: A novel synthetic crystalline aluminogermanosilicate molecular sieve material, designated SSZ-114, is provided. SSZ-114 can be synthesized by treating an aluminogermanosilicate molecular sieve of CTH framework topology with water or an aqueous solution of a mineral acid under conditions sufficient to degermanate at least a portion of aluminogermanosilicate molecular sieve to form a degermanated molecular sieve and calcining the degermanated molecular sieve under conditions sufficient to convert the degermanated molecular sieve to SSZ-114. Molecular sieve SSZ-114 may be used in organic compound conversion reactions and/or sorptive processes.
    Type: Grant
    Filed: June 23, 2020
    Date of Patent: February 9, 2021
    Assignee: CHEVRON U.S.A. INC.
    Inventors: Christopher Michael Lew, Stacey Ian Zones, Dan Xie, Howard Steven Lacheen, Tao Wei
  • Publication number: 20210020251
    Abstract: The present disclosure relates to a method and apparatus for determining a reference voltage. The method may comprise: reading data from a first flash memory page by using a plurality of different reference voltages, and taking, as a first target reference voltage, one of the plurality of different reference voltages at which the first number of erroneous bits of the data that is read reaches a convergence value, wherein the first flash memory page is any one of a plurality of flash memory pages of a flash memory block to be tested; adjusting the first target reference voltage to obtain a plurality of second target reference voltages; and reading data from the plurality of flash memory pages of the flash memory block by using the plurality of second target reference voltages, and taking, as a target reference voltage, one of the plurality of second target reference voltages at which the second number of erroneous bits of the data that is read is the smallest.
    Type: Application
    Filed: April 24, 2020
    Publication date: January 21, 2021
    Inventors: Tao WEI, Zhengtian FENG, Ke WEI
  • Publication number: 20210019250
    Abstract: The present disclosure provides a method, apparatus, device and computer-readable storage medium for guiding symbolic execution. According to embodiments of the present disclosure, it is possible to determine the specific code region of the program, and obtain the program loop output of the program corresponding to the specific code region of the program by using the program inverse analysis method, so that it is possible to obtain the program loop input of the program corresponding to the specific code region by using the program loop predictor according to the program loop output of the program. In this way, the obtained program loop input of the program corresponding to the specific code region may be used to guide the symbolic execution to filter out impossible execution paths and jump out of the program code and reach the specific code region, thereby improving the reliability of the symbolic execution.
    Type: Application
    Filed: March 25, 2020
    Publication date: January 21, 2021
    Applicant: BAIDU ONLINE NETWORK TECHNOLOGY (BEIJING) CO., LTD.
    Inventors: Qian FENG, Shengjian GUO, Peng LI, Minghua WANG, Yulong ZHANG, Tao WEI
  • Publication number: 20200394311
    Abstract: According to one embodiment, a system receives an intermediate result generated by a compiler based on source code, where the intermediate result includes one or more vulnerability indicators indicating one or more lines of the source code being potentially vulnerable. The system performs a grey box fuzzing on a first executable code generated from the intermediate result to generate a first set of seed inputs. The system calculates a vulnerability score for each of the seed inputs of the first set based on the vulnerability indicators for the lines of the source code reachable but has not been explored by the grey box fuzzing. The system selects one of the seed inputs in the first set having a highest vulnerability score. The system performs a concolic execution using the selected seed input as priority, the concolic execution being performed on a second executable code generated from the intermediate result.
    Type: Application
    Filed: June 17, 2019
    Publication date: December 17, 2020
    Inventors: Peng LI, Yulong ZHANG, Tao WEI
  • Publication number: 20200394472
    Abstract: In one embodiment, a system receives a first image captured by a capturing device of an ADV. The system applies an image transformation to the first image to generate a second image. The system applies an object detection model to the first and the second images to generate a first and a second output, respectively. The system calculates a similarity metric between the first and the second output. The system detects the first image as an adversarial sample if a temporal variation of the similarity metric between the first image and a prior image is above a threshold.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: Yunhan JIA, Zhenyu ZHONG, Yulong ZHANG, Tao WEI
  • Publication number: 20200394466
    Abstract: Embodiments of the disclosure disclose a system to mitigate against adversarial input samples for machine learning (ML)/artificial intelligence (AI) models. According to one embodiment, a system receives a query from a client for a ML service. The system calculates a similarity score for the query based on a number of prior queries received from the client, the similarity score representing a similarity between the received query and the prior queries. The system determines that the query is an adversarial query in response to determining that the similarity score is above a predetermined threshold.
    Type: Application
    Filed: June 13, 2019
    Publication date: December 17, 2020
    Inventors: Yunhan JIA, Zhenyu ZHONG, Yulong ZHANG, Tao WEI
  • Publication number: 20200378770
    Abstract: The present invention discloses a navigation method for electric vehicles based on electricity quantity guidance of energy-storage charging piles. The electric vehicles select charging piles nearby that can meet own charging quantity demands to charge according to location information of charging piles and real-time stored electricity information of energy storage modules of the charging piles; a system using the method includes the charging piles. The navigation method and system can reasonably guide the electric vehicles to charge according to the distribution and the stored electricity of the charging piles, and can dynamically plan travel charging solutions for the electric vehicles, thereby avoiding problems that the electric vehicles stop running without electricity on the way to the charging piles and inefficiently wait for charging for a long time, so that the stored electricity of the charging piles can be reasonably distributed and utilized, and energy idleness and waste are avoided.
    Type: Application
    Filed: June 28, 2020
    Publication date: December 3, 2020
    Inventors: Tao WEI, Jingwen HUANG, Jiaren LUO, Jin LIU
  • Publication number: 20200378867
    Abstract: Methods, systems and a self-sensing valve assembly are described for monitoring seal life. The method includes providing a valve assembly movable from an open position to a closed position and including a seal seated within the valve and in contact with a surface of the valve assembly, wherein when the seal is in operation it is subject to degradation. At least one sensor is placed for measuring micro strain on a surface of the valve assembly or within the valve assembly. The valve assembly is placed in an operation wherein the seal is subject to degradation and the operation of the valve assembly is initiated.
    Type: Application
    Filed: May 30, 2020
    Publication date: December 3, 2020
    Inventors: Carmen J. Quartapella, Mookkan Periyasamy, Elizabeth Sassano, Otto J. Gregory, Godi Fischer, Tao Wei, Zakary Kinzel, Noah A. Burke
  • Publication number: 20200356670
    Abstract: Embodiments of the disclosure disclose a system to prevent data of a client from leaking to untrusted parties in a multiparty computation environment. According to one embodiment, in response to a request received at a gateway (e.g., a non-bypassable gateway) of a server from a user device of a user over a network to process user data by an execution service, the system sanitizes the user data by scanning the user data for malicious code. The system selects a trusted execution environment (TEE) worker from a number of TEE workers and initiates an execution of the execution service by the selected TEE worker. The system receives execution results from the selected TEE worker. The system transmits the execution results to the user device of the user over the network.
    Type: Application
    Filed: May 8, 2019
    Publication date: November 12, 2020
    Inventors: Yueqiang CHENG, Tongxin LI, Yulong ZHANG, Tao WEI