Patents by Inventor Weisheng Li

Weisheng Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11974124
    Abstract: This application provides a method for identifying a terminal device and a communications apparatus. A core network element obtains classification information for classifying a terminal device, and then determines, based on the classification information and a parameter of a first terminal device, a type of the first terminal device, to identify the first terminal device. In this process, the core network element identifies the first terminal device in a supervision area by using the classification information and the parameter of the first terminal device, to identify a terminal device that is not registered in a supervision system, thereby improving security of the terminal device.
    Type: Grant
    Filed: February 26, 2021
    Date of Patent: April 30, 2024
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Haoren Zhu, Gang Li, Weisheng Jin, Yang Xin
  • Patent number: 11945954
    Abstract: The invention relates to a method for preparing high-stability liquid blueberry anthocyanins, belonging to the field of food processing. A method for preparing high-stability liquid blueberry anthocyanins comprises the following process steps: adding graphene oxide and chitosan to an MES buffer solution at room temperature, mixing homogeneously and adding EDC and NHS sequentially, reacting to obtain a first solution; adding dry blueberry anthocyanin powder in the first solution, adjusting pH to 4.5 to 5.0 and mixing homogeneously to obtain a second solution, and treating the second solution at 350 to 420 MPa and 2 to 4° C. to obtain the product. The method for increasing the stability of blueberry anthocyanins provided by the present invention uses dry blueberry anthocyanin powder as a raw material and adds graphene oxide combined with chitosan compound as an anthocyanin stabilizer, thereby increasing the stability of blueberry anthocyanins during processing and production.
    Type: Grant
    Filed: July 19, 2019
    Date of Patent: April 2, 2024
    Assignee: SHENYANG AGRICULTURAL UNIVERSITY
    Inventors: Bin Li, Bo Xue, Ruihai Liu, Xianjun Meng, Ye Zhang, Yuxi Lang, Xulong Ran, Xu Xie, Zhihuan Zang, Weisheng Wang
  • Publication number: 20240105821
    Abstract: A structure of a two-dimensional material-based device having an air-gap and a method for preparing same comprises a substrate, a gate, an dielectric, a two-dimensional material-based film, and source and drain electrodes; the air-gap is formed between the two-dimensional material-based film and the side wall of the dielectric on the gate, or the air-gap is formed between the dielectric and the gate; two-dimensional material-based devices of the above structure utilize the ductility and flexibility of two-dimensional materials to reduce the coupling between the gate and the source/drain electrodes, thereby reducing the parasitic capacitance and the circuit delay; also, the structure ensures that a part of the contact region of the source and drain electrodes with the two-dimensional material can be controlled by the gate, and can thus avoid the reduction in electrical properties and keep a low resistance of the device.
    Type: Application
    Filed: November 9, 2023
    Publication date: March 28, 2024
    Applicant: NANJING UNIVERSITY
    Inventors: Xinran Wang, Dongxu Fan, Weisheng Li, Hao Qiu, Yi Shi
  • Publication number: 20240096491
    Abstract: A computer readable storage medium is provided. When contents of the computer readable storage medium are executed by a processor, multi-photon imaging may be performed on a histopathological section containing tumor environment information, and pathological partitioning of a tumor microenvironment may be further performed through image processing. A value of each collagen feature parameters, such as a morphological feature parameter, an energy feature parameter and a texture feature parameter, may be extracted from a tumor tissue region, an invasive margin (IM) region and a normal tissue (N) region. An inter-region difference and a variation may be calculated according to feature parameters of regions. A collagen feature scoring model may be established. A collagen feature score may be calculated with the collagen feature parameters input to the model.
    Type: Application
    Filed: November 15, 2022
    Publication date: March 21, 2024
    Inventors: Jun YAN, Shumin DONG, Botao YAN, Weisheng CHEN, Xiaoyu DONG, Xiumin LIU, Shuhan ZHAO, Jiaxin CHENG, Yanfeng DONG, Wei JIANG, Dexin CHEN, Guoxin LI
  • Patent number: 11930393
    Abstract: Embodiments of this application provide a session management method to provide quality of service (QoS) assurance for a service of a terminal. The method includes: determining, by a first control plane network element in a second network, to manage a session, where the session is used to provide a connection in the first network for a terminal, and the first control plane network element is a network element in the first network; and managing, by the first control plane network element, the session.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: March 12, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Hualin Zhu, Huan Li, Weisheng Jin
  • Patent number: 11902299
    Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.
    Type: Grant
    Filed: November 3, 2020
    Date of Patent: February 13, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mihai Costea, Michael Abraham Betser, Ravi Kiran Reddy Poluri, Hua Ding, Weisheng Li, Phanindra Pampati, David Nicholas Yost
  • Patent number: 11647046
    Abstract: Aspects of this disclosure include fuzzy inclusion based impersonation detection technology. In one embodiment, a reverse n-gram map is created for the list of protected entities. A suspicious string may be broken into n-grams, and each n-gram of the suspicious string is to be searched in the reverse n-gram map for corresponding protected entities. A fuzzy inclusion of a protected entity may be detected in the suspicious string depending on the protected entities found during the search. Subsequently, impersonation can be identified based on the characteristics of the fuzzy inclusion. In this way, the communication system can detect impersonation techniques using visually similar text, and accordingly take various actions to help user mitigate risks caused by impersonation.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: May 9, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Weisheng Li
  • Publication number: 20220416051
    Abstract: It is a two-dimensional semiconductor-metal ohmic-contact structure, a preparation method therefor and use thereof, wherein the ohmic-contact structure comprises two-dimensional semiconductor having semimetal antimony or an alloy containing semimetal antimony deposited thereon to form an ideal van der Waals interface with strong orbital hybridization, and semimetal antimony is deposited on the two-dimensional semiconductor by high-vacuum evaporation; which is applied to semiconductor devices and realizes ultralow contact resistance between the metal and the two-dimensional semiconductor and significantly improve the performance of two-dimensional semiconductor devices.
    Type: Application
    Filed: August 3, 2022
    Publication date: December 29, 2022
    Inventors: Xinran WANG, Weisheng LI, Zhihao YU, Yi SHI
  • Publication number: 20220414137
    Abstract: The technology described herein determines whether a candidate text is in a requested class by using a generative model that may not be trained on the requested class. The present technology may use of a model trained primarily in an unsupervised mode, without requiring a large number of manual user-input examples of a label class. The may produce a semantically rich positive example of label text from a candidate text and label. Likewise, the technology may produce from the candidate text and the label a semantically rich negative example of label text. The labeling service makes use of a generative model to produce a generative result, which estimates the likelihood that the label properly applies to the candidate text. In another aspect, the technology is directed toward a method for obtaining a semantically rich example that is similar to a candidate text.
    Type: Application
    Filed: April 1, 2022
    Publication date: December 29, 2022
    Inventors: Mohit SEWAK, Ravi Kiran Reddy POLURI, William BLUM, Pak On CHAN, Weisheng LI, Sharada Shirish ACHARYA, Christian RUDNICK, Michael Abraham BETSER, Milenko DRINIC, Sihong LIU
  • Publication number: 20220172170
    Abstract: The technology described herein visibly depicts hidden message traits to help users determine whether an email is genuine or deceptive. The hidden message traits are revealed by identifying and changing attributes that keep the hidden traits from being displayed in a rendered message. Spam messages, phishing messages, and messages that include or link to malicious programs (e.g., malware, ransomware) are examples of unwanted messages that can harm a recipient. These messages often rely on deception to get past email filtering systems and to trick a user into acting on content in a message. The deception often involves including hidden traits in a message that fool an automated filtering system. The technology described herein shows the visible traits to a user by including them in the rendered version of the message.
    Type: Application
    Filed: June 10, 2021
    Publication date: June 2, 2022
    Inventor: Weisheng LI
  • Patent number: 11316971
    Abstract: Embodiments of the present invention relate to a method for controlling temperature of a terminal, including: receiving, by the terminal, an instruction for triggering execution of a first task; obtaining, by the terminal, a current temperature of the terminal; and controlling, by the terminal, an execution manner of the first task based on the current temperature, to control temperature of the terminal. When the terminal obtains the current temperature of the terminal, the terminal may control, based on the current temperature of the terminal, the first task to be executed in different manners, so as to control temperature of the terminal and ensure that the mobile phone is in a safe state.
    Type: Grant
    Filed: December 27, 2016
    Date of Patent: April 26, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Jianhua Guo, Hu Peng, Weisheng Li, Sihua Tu
  • Patent number: 11055669
    Abstract: The technology described herein visibly depicts hidden message traits to help users determine whether an email is genuine or deceptive. The hidden message traits are revealed by identifying and changing attributes that keep the hidden traits from being displayed in a rendered message. Spam messages, phishing messages, and messages that include or link to malicious programs (e.g., malware, ransomware) are examples of unwanted messages that can harm a recipient. These messages often rely on deception to get past email filtering systems and to trick a user into acting on content in a message. The deception often involves including hidden traits in a message that fool an automated filtering system. The technology described herein shows the visible traits to a user by including them in the rendered version of the message.
    Type: Grant
    Filed: March 1, 2019
    Date of Patent: July 6, 2021
    Inventor: Weisheng Li
  • Publication number: 20210136089
    Abstract: Methods, systems, and computer storage media for providing a multi-attribute cluster-identifier that supports identifying malicious activity in computing environments. An instance of an activity having an attribute set can be assessed. The attribute set of the instance of the activity is analyzed to determine whether the instance of the activity is a malicious activity. The attribute set of the instance of the activity is compared to a plurality of multi-attribute cluster-identifiers of previous instances of the activity, such that, a determination that the instance of the activity is a malicious activity is made when the attribute set of the instance of the activity corresponds to an identified multi-attribute cluster-identifier. The identified multi-attribute cluster-identifier has a risk score and an attribute set that indicate a likelihood that the instance of the activity is a malicious activity. A visualization that identifies the instance of the activity as a malicious activity is generated.
    Type: Application
    Filed: November 3, 2020
    Publication date: May 6, 2021
    Inventors: Mihai COSTEA, Michael Abraham BETSER, Ravi Kiran Reddy POLURI, Hua DING, Weisheng LI, Phanindra PAMPATI, David Nicholas YOST
  • Publication number: 20210062426
    Abstract: Disclosed is a process for producing biomass fiber molding material, and relates to the technical field of biological fibers. In the present disclosure, pretreated dried leaf fibers are softened by being subjected to a soaking process; the leaf fibers are grounded through a high-concentration grinder to obtain primary pulp of biomass fiber molding material; and then excess water is removed from the primary pulp of biomass fiber molding material through a pulp squeezing thickener to obtain the biomass fiber molding material. The primary pulp of biomass fiber molding material obtained by the production process of the present disclosure meets the specification for manufacturing safe paper, water is recycled in the production process to reduce water resource consumption; and the adding of auxiliary agents is reduced, which can reduce the cleaning of the product and improve the utilization rate of the leaf fibers.
    Type: Application
    Filed: July 1, 2020
    Publication date: March 4, 2021
    Inventors: Jiawang LI, Weisheng LI, Xue'an MAI
  • Patent number: 10853925
    Abstract: Implementations of the disclosure provide for methods, systems, and machine-readable media for image processing. In some embodiments, a method for image processing includes: generating, by a processor, a first histogram and a first parameter set for a first image; constructing, by the processor, a model representative of a second histogram of a second image based on an adjustment parameter set and the first parameter set; generating the second histogram based on the model; and generating a second image based on the first image and the second histogram. In some embodiments, the first histogram is a two-dimensional histogram.
    Type: Grant
    Filed: August 2, 2018
    Date of Patent: December 1, 2020
    Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS
    Inventors: Bin Xiao, Guoyin Wang, Weisheng Li
  • Publication number: 20200279225
    Abstract: The technology described herein visibly depicts hidden message traits to help users determine whether an email is genuine or deceptive. The hidden message traits are revealed by identifying and changing attributes that keep the hidden traits from being displayed in a rendered message. Spam messages, phishing messages, and messages that include or link to malicious programs (e.g., malware, ransomware) are examples of unwanted messages that can harm a recipient. These messages often rely on deception to get past email filtering systems and to trick a user into acting on content in a message. The deception often involves including hidden traits in a message that fool an automated filtering system. The technology described herein shows the visible traits to a user by including them in the rendered version of the message.
    Type: Application
    Filed: March 1, 2019
    Publication date: September 3, 2020
    Inventor: Weisheng LI
  • Publication number: 20200099718
    Abstract: Aspects of this disclosure include fuzzy inclusion based impersonation detection technology. In one embodiment, a reverse n-gram map is created for the list of protected entities. A suspicious string may be broken into n-grams, and each n-gram of the suspicious string is to be searched in the reverse n-gram map for corresponding protected entities. A fuzzy inclusion of a protected entity may be detected in the suspicious string depending on the protected entities found during the search. Subsequently, impersonation can be identified based on the characteristics of the fuzzy inclusion. In this way, the communication system can detect impersonation techniques using visually similar text, and accordingly take various actions to help user mitigate risks caused by impersonation.
    Type: Application
    Filed: November 27, 2018
    Publication date: March 26, 2020
    Inventor: Weisheng LI
  • Publication number: 20190327359
    Abstract: Embodiments of the present invention relate to a method for controlling temperature of a terminal, including: receiving, by the terminal, an instruction for triggering execution of a first task; obtaining, by the terminal, a current temperature of the terminal; and controlling, by the terminal, an execution manner of the first task based on the current temperature, to control temperature of the terminal. When the terminal obtains the current temperature of the terminal, the terminal may control, based on the current temperature of the terminal, the first task to be executed in different manners, so as to control temperature of the terminal and ensure that the mobile phone is in a safe state.
    Type: Application
    Filed: December 27, 2016
    Publication date: October 24, 2019
    Inventors: Jianhua Guo, Hu Peng, Weisheng Li, Sihua Tu
  • Publication number: 20180374203
    Abstract: Implementations of the disclosure provide for methods, systems, and machine-readable media for image processing. In some embodiments, a method for image processing includes: generating, by a processor, a first histogram and a first parameter set for a first image; constructing, by the processor, a model representative of a second histogram of a second image based on an adjustment parameter set and the first parameter set; generating the second histogram based on the model; and generating a second image based on the first image and the second histogram. In some embodiments, the first histogram is a two-dimensional histogram.
    Type: Application
    Filed: August 2, 2018
    Publication date: December 27, 2018
    Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS
    Inventors: Bin XIAO, Guoyin WANG, Weisheng LI
  • Patent number: 9979685
    Abstract: A messaging application filters electronic messages based on domain attributes without a reputation. A message with a uniform resource identifier (URI) is received and determined to not be included within a trusted or a block list. A total score is computed from weighted scores assigned to factors associated with the message. The message is evaluated for an unsolicited message determination by comparing the total score against a predetermined threshold.
    Type: Grant
    Filed: November 16, 2015
    Date of Patent: May 22, 2018
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Alexander V. Nikolayev, Weisheng Li, Mauktik Gandhi