Patents by Inventor Weihua Mao
Weihua Mao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210021924Abstract: A mobile terminal includes a display screen, an earpiece assembly, and a camera. The earpiece assembly includes an earpiece and a sound conduction tube in communication with the earpiece. They form a stepped structure, and a surface that is used to connect to the sound conduction tube is a first stepped surface. The camera includes a body and a lens connected to the body; the body and the lens form a stepped structure, and a surface that is on the body and that is used to connect to the lens is a second stepped surface. The display screen is provided with a notch, and the sound conduction tube and the lens are located in the notch. In a direction perpendicular to the display screen, the display screen covers a part of the first stepped surface and/or a part of the second stepped surface.Type: ApplicationFiled: March 26, 2018Publication date: January 21, 2021Inventors: Bo Huang, Weihua Mao, Ren Lv, Peng Zha, Zhixiao Xu, Wangyi Li, Lei Wang
-
Publication number: 20200342091Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.Type: ApplicationFiled: July 13, 2020Publication date: October 29, 2020Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
-
Patent number: 10713351Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.Type: GrantFiled: September 17, 2018Date of Patent: July 14, 2020Assignee: Apple Inc.Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
-
Publication number: 20190018952Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.Type: ApplicationFiled: September 17, 2018Publication date: January 17, 2019Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
-
Patent number: 10078749Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.Type: GrantFiled: August 16, 2017Date of Patent: September 18, 2018Assignee: Apple Inc.Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
-
Publication number: 20170364676Abstract: An apparatus, a method, and a system are presented in which the apparatus includes an interface control circuit that may be configured to receive a message including a cryptographic keyword and a policy value. The policy value may include one or more data bits indicative of one or more policies that define allowable usage of the cryptographic keyword. The apparatus also includes a security circuit that may be configured to extract the cryptographic keyword and the policy value from the message, and to apply at least one policy of the one or more policies to usage of the cryptographic keyword in response to a determination that an authentication of the message succeeded.Type: ApplicationFiled: August 16, 2017Publication date: December 21, 2017Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
-
Patent number: 9747435Abstract: An apparatus, a method, and a system are presented in which the apparatus may include a security circuit, a processor, and an interface controller. The security circuit may be configured to generate a keyword. The processor may be configured to determine one or more policies to be applied to usage of the keyword, and to generate a policy value. The policy value may include one or more data bits indicative of the determined one or more policies. The interface controller may be configured to generate a message including the keyword and the policy value. The interface controller may also be configured to send the message.Type: GrantFiled: April 27, 2015Date of Patent: August 29, 2017Assignee: Apple Inc.Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
-
Publication number: 20160314295Abstract: An apparatus, a method, and a system are presented in which the apparatus may include a security circuit, a processor, and an interface controller. The security circuit may be configured to generate a keyword. The processor may be configured to determine one or more policies to be applied to usage of the keyword, and to generate a policy value. The policy value may include one or more data bits indicative of the determined one or more policies. The interface controller may be configured to generate a message including the keyword and the policy value. The interface controller may also be configured to send the message.Type: ApplicationFiled: April 27, 2015Publication date: October 27, 2016Inventors: Timothy R. Paaske, Weihua Mao, Shu-Yi Yu
-
Patent number: 9256551Abstract: In an embodiment, a peripheral interface controller may include an inline cryptographic engine which may encrypt data being sent over a peripheral interface and decrypt data received from the peripheral interface. The encryption may be transparent to the device connected to the peripheral interface that is receiving/supplying the data. In an embodiment, the peripheral interface controller is included in a system on a chip (SOC) that also includes a memory controller configured to couple to a memory. The memory may be mounted on the SOC in a chip-on-chip or package-on-package configuration. The unencrypted data may be stored in the memory for use by other parts of the SOC (e.g. processors, on-chip peripherals, etc.). The keys used for the encryption/decryption of data may remain within the SOC.Type: GrantFiled: August 9, 2013Date of Patent: February 9, 2016Assignee: Apple Inc.Inventors: Timothy R. Paaske, David S. Warren, Michael J. Smith, Diarmuid P. Ross, Weihua Mao
-
Publication number: 20150046702Abstract: In an embodiment, a peripheral interface controller may include an inline cryptographic engine which may encrypt data being sent over a peripheral interface and decrypt data received from the peripheral interface. The encryption may be transparent to the device connected to the peripheral interface that is receiving/supplying the data. In an embodiment, the peripheral interface controller is included in a system on a chip (SOC) that also includes a memory controller configured to couple to a memory. The memory may be mounted on the SOC in a chip-on-chip or package-on-package configuration. The unencrypted data may be stored in the memory for use by other parts of the SOC (e.g. processors, on-chip peripherals, etc.). The keys used for the encryption/decryption of data may remain within the SOC.Type: ApplicationFiled: August 9, 2013Publication date: February 12, 2015Applicant: Apple Inc.Inventors: Timothy R. Paaske, David S. Warren, Michael J. Smith, Diarmuid P. Ross, Weihua Mao
-
Patent number: 8947256Abstract: An intelligent monitoring system for a sucker rod including a monitor center, a remote wireless communication equipment communicating with the monitor center and connected with a movement detection and storage equipment of the sucker rod, a radio frequency reader/writer, and a radio frequency storage chip. The movement detection and storage equipment of the sucker rod is connected with the radio frequency reader/writer. The radio frequency storage chip is disposed on the sucker rod to store the information of the sucker rod. The monitoring system can detect and record reciprocating or circumvolving movement of the sucker rod as well as the motion state of the sucker rod in an oil well.Type: GrantFiled: December 6, 2011Date of Patent: February 3, 2015Assignee: Shandong Nine-Ring Petroleum Machinery Co., Ltd.Inventors: Minchang Xin, Haifeng Zhang, Tian Sang, Weihua Mao, Jialu Tang, Liang Yin, Juguo Zhang, Xinfang Yang
-
Patent number: 8681976Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.Type: GrantFiled: May 12, 2011Date of Patent: March 25, 2014Assignee: Apple Inc.Inventors: Conrad Sauerwald, Joseph P. Bratt, Joshua Phillips de Cesare, Timothy John Millet, Weihua Mao
-
Publication number: 20120288089Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.Type: ApplicationFiled: May 12, 2011Publication date: November 15, 2012Applicant: Apple Inc.Inventors: Conrad Sauerwald, Joseph P. Bratt, Joshua Phillips de Cesare, Timothy John Millet, Weihua Mao
-
Publication number: 20120075114Abstract: An intelligent monitoring system for a sucker rod including a monitor center, a remote wireless communication equipment communicating with the monitor center and connected with a movement detection and storage equipment of the sucker rod, a radio frequency reader/writer, and a radio frequency storage chip. The movement detection and storage equipment of the sucker rod is connected with the radio frequency reader/writer. The radio frequency storage chip is disposed on the sucker rod to store the information of the sucker rod. The monitoring system can detect and record reciprocating or circumvolving movement of the sucker rod as well as the motion state of the sucker rod in an oil well.Type: ApplicationFiled: December 6, 2011Publication date: March 29, 2012Applicant: SHANDONG NINE-RING PETROLEUM MACHINERY CO., LTD.Inventors: Minchang XIN, Haifeng ZHANG, Tian SANG, Weihua MAO, Jialu TANG, Liang YIN, Juguo ZHANG, Xinfang YANG
-
Patent number: 8121368Abstract: A medical imaging-based system and method uses both kV and MV images captured during a treatment period for organ motion tracking. 3D geometric locations of internal features are computationally tracked as a function of time from internal features, such as natural biological features or implanted fiducials, which are computationally extracted from the captured kV and MV images. A partial information method allows 3D tracking to be maintained in the event that imaging information is temporarily not available.Type: GrantFiled: November 12, 2008Date of Patent: February 21, 2012Assignee: The Board of Trustees of the Leland Stanford Junior UniversityInventors: Rodney D. Wiersma, Lei Xing, Weihua Mao
-
Patent number: 7626425Abstract: High performance clock-powered logic runs at below supply levels and reduces the need for faster digital logic circuitry. In a preferred embodiment, a clocked buffer is used to drive the signal line. The receiving end of the line is connected to a jam latch, preferably followed by an n-latch, followed by the digital logic, and followed by a second n-latch. The first n-latch is eliminated in an alternate embodiment, preferably one that uses complementary data signals.Type: GrantFiled: January 13, 2006Date of Patent: December 1, 2009Assignee: University of Southern CaliforniaInventors: William C. Athas, Nestor Tzartzanis, Weihua Mao, Lena Peterson
-
Publication number: 20090208074Abstract: A medical imaging-based system and method uses both kV and MV images captured during a treatment period for organ motion tracking. 3D geometric locations of internal features are computationally tracked as a function of time from internal features, such as natural biological features or implanted fiducials, which are computationally extracted from the captured kV and MV images. A partial information method allows 3D tracking to be maintained in the event that imaging information is temporarily not available.Type: ApplicationFiled: November 12, 2008Publication date: August 20, 2009Inventors: Rodney D. Wiersma, Lei Xing, Weihua Mao
-
Publication number: 20070018689Abstract: High performance clock-powered logic runs at below supply levels and reduces the need for faster digital logic circuitry. In a preferred embodiment, a clocked buffer is used to drive the signal line. The receiving end of the line is connected to a jam latch, preferably followed by an n-latch, followed by the digital logic, and followed by a second n-latch. The first n-latch is eliminated in an alternate embodiment, preferably one that uses complementary data signals.Type: ApplicationFiled: January 13, 2006Publication date: January 25, 2007Applicant: University of Southern CaliforniaInventors: William Athas, Nestor Tzartzanis, Weihua Mao, Lena Peterson
-
Patent number: 7005893Abstract: High performance clock-powered logic runs at below supply levels and reduces the need for faster digital logic circuitry. In a preferred embodiment, a clocked buffer (101) is used to drive the signal line. The receiving end of the line is connected to a jam latch (123), preferably followed by an n-latch (125), followed by the digital logic (109), and followed by a second n-latch (127). The first n-latch is eliminated in an alternative embodiment, preferably one that uses complementary data signals.Type: GrantFiled: July 18, 2000Date of Patent: February 28, 2006Assignee: University of Southern CaliforniaInventors: William C. Athas, Nestor Tzartzanis, Weihua Mao, Lena Peterson