Patents by Inventor Wenwei Tang

Wenwei Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11945202
    Abstract: A curved surface lamination device, comprising a profiling jig (01), the profiling jig (01) comprising a base (101) and a profiling portion (102), with the profiling portion (102) being configured to support a carrier film (02), and the side of the base (101) facing away from the profiling portion (102) being provided with an opening; and a lower jig (03), comprising a first sinking groove (301), with part of the base (101) being inserted into the first sinking groove (301), such that the lower jig (03) encloses a hollow structure (E) with the base (101) at the opening position.
    Type: Grant
    Filed: May 12, 2021
    Date of Patent: April 2, 2024
    Assignees: Chengdu BOE Optoelectronics Technology Co., Ltd., BOE Technology Group Co., Ltd.
    Inventors: Xingguo Liu, Wei Qing, Qiang Tang, Shaokui Liu, Wenwei Mo
  • Publication number: 20240036552
    Abstract: A device management method includes obtaining a management page for managing a first electronic device, performing a first management operation on the first electronic device based on the management page, obtaining an operation record generated when performing the first management operation on the first electronic device through the management page, and generating an executable command based on the operation record. The executable command is performed by a target device. The target device is configured to instruct one or more second electronic devices to perform the first management operation based on the executable command.
    Type: Application
    Filed: July 28, 2023
    Publication date: February 1, 2024
    Inventors: Jihao ZHANG, Wenwei TANG, Ming LEI, Jun WANG
  • Publication number: 20230195335
    Abstract: Disclosed systems and methods include a CPU coupled to one or more storage resources including a hybrid storage resource that is user-configurable during boot to allocate some, all, or none of its capacity as a conventional dual in-line memory module (DIMM) and some, all, or none of its capacity as a persistent storage resource. A utilization efficiency index (UEI) of the hybrid storage resource is assessed. The UEI may be determined based on a combination of memory resource utilization, a persistent storage resource utilization, and weighting parameters that reflect a comparative utility or value of memory vs storage resources. A target division between memory and storage resources may then be determined based on the UEI assessment. The hybrid storage resource may then be configured by dividing or allocating a first portion of its capacity to the volatile memory resource and a remaining portion of its capacity to the persistent storage resource.
    Type: Application
    Filed: December 23, 2021
    Publication date: June 22, 2023
    Applicant: Dell Products L.P.
    Inventors: Zheng ZHANG, Wenwei TANG
  • Patent number: 11593142
    Abstract: An information handling system may include at least one processor; and a non-transitory memory coupled to the at least one processor. The information handling system may be configured to: execute a plurality of virtual machines having workloads associated therewith; during selected times, apply a plurality of configuration settings relating to the at least one processor while executing the workloads of the plurality of virtual machines; track a plurality of performance metrics relating to the at least one processor during the selected times; and predictively determine a selected one of the plurality of configuration settings that is predicted to improve performance of the workloads.
    Type: Grant
    Filed: June 30, 2020
    Date of Patent: February 28, 2023
    Assignee: Dell Products L.P.
    Inventors: Wenwei Tang, Joan Jun Xiong
  • Patent number: 11394539
    Abstract: An information handling system may include a persistent memory configured to be secured via a passphrase; a basic input/output system (BIOS); and a management controller configured to provide out-of-band management of the information handling system. The BIOS may be configured to set the passphrase of the persistent memory, encrypt the passphrase via a first key of a first asymmetric key pair, and transmit the encrypted passphrase to the management controller. The management controller may be configured to decrypt the encrypted passphrase via a second key of the first asymmetric key pair, re-encrypt the passphrase via a first key of a second asymmetric key pair, and transmit the re-encrypted passphrase to an external management console via an out-of-band management interface.
    Type: Grant
    Filed: June 30, 2020
    Date of Patent: July 19, 2022
    Assignee: Dell Products L.P.
    Inventors: Wenwei Tang, Joan Jun Xiong
  • Publication number: 20210391989
    Abstract: An information handling system may include a persistent memory configured to be secured via a passphrase; a basic input/output system (BIOS); and a management controller configured to provide out-of-band management of the information handling system. The BIOS may be configured to set the passphrase of the persistent memory, encrypt the passphrase via a first key of a first asymmetric key pair, and transmit the encrypted passphrase to the management controller. The management controller may be configured to decrypt the encrypted passphrase via a second key of the first asymmetric key pair, re-encrypt the passphrase via a first key of a second asymmetric key pair, and transmit the re-encrypted passphrase to an external management console via an out-of-band management interface.
    Type: Application
    Filed: June 30, 2020
    Publication date: December 16, 2021
    Applicant: Dell Products L.P.
    Inventors: Wenwei TANG, Joan Jun XIONG
  • Publication number: 20210382744
    Abstract: An information handling system may include at least one processor; and a non-transitory memory coupled to the at least one processor. The information handling system may be configured to: execute a plurality of virtual machines having workloads associated therewith; during selected times, apply a plurality of configuration settings relating to the at least one processor while executing the workloads of the plurality of virtual machines; track a plurality of performance metrics relating to the at least one processor during the selected times; and predictively determine a selected one of the plurality of configuration settings that is predicted to improve performance of the workloads.
    Type: Application
    Filed: June 30, 2020
    Publication date: December 9, 2021
    Applicant: Dell Products L.P.
    Inventors: Wenwei TANG, Joan Jun XIONG
  • Patent number: 11134657
    Abstract: A pet leash preventing locking due to jerk includes a housing provided with a handle and a reel disk arranged in the housing. The reel disk is rotatably connected to the housing. A leash rope is wound on the reel disk. One end of the leash rope penetrates through the housing. The housing is provided with a rotary damper. A clutch structure is provided between the reel disk and the rotary damper, and is actuable under a centrifugal force to connect the reel disk to the rotary damper when a rotation speed of the reel disk exceeds a predetermined rotation speed.
    Type: Grant
    Filed: December 4, 2018
    Date of Patent: October 5, 2021
    Assignee: Best-Run Technology Ltd.
    Inventors: Wenwei Tang, Qingfeng Dai, Yingzhou Chen, Di Fang, Ying Tang
  • Patent number: 10909247
    Abstract: A computing device is provided including a motherboard including a control module, a first trusted platform module (TPM), and a second TPM. The control module directs security operations to the first TPM, wherein the control module is operable to detect whether or not the first TPM is damaged, and wherein the control module, in response to detecting that the first TPM is damaged, is operable to direct subsequent security operations to be performed by the second TPM. A computer program product is also provided including non-transitory computer readable storage media embodying program instructions executable by a processor to direct security operations to a first TPM coupled to a motherboard of the computing device, detect whether or not the first TPM is damaged, and, responsive to detecting that the first TPM is damaged, direct subsequent security operations to a second TPM coupled to the motherboard of the computing device.
    Type: Grant
    Filed: September 5, 2018
    Date of Patent: February 2, 2021
    Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.
    Inventors: Wenwei Tang, Tianhe Li, He Huang
  • Patent number: 10834903
    Abstract: A double rope pet leash includes a leash body. A leash cavity is located in the leash body. A first leash assembly and a second leash assembly are connected to the leash body. The first leash assembly is fixedly connected with the leash body. The second leash assembly is located in the leash cavity and rotatably connected to the leash body. A first leash rope is pressed on the surface of the first leash assembly, and a second leash rope is pressed on the surface of the second leash assembly. The double rope pet leash further includes an open-close assembly connected to the leash body and capable of opening or closing the leash cavity.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: November 17, 2020
    Assignee: Best-Run Technology Ltd.
    Inventors: Wenwei Tang, Qingfeng Dai, Yingzhou Chen, Zhaoxin Wu, Ying Tang
  • Publication number: 20200053985
    Abstract: A double rope pet leash includes a leash body. A leash cavity is located in the leash body. A first leash assembly and a second leash assembly are connected to the leash body. The first leash assembly is fixedly connected with the leash body. The second leash assembly is located in the leash cavity and rotatably connected to the leash body. A first leash rope is pressed on the surface of the first leash assembly, and a second leash rope is pressed on the surface of the second leash assembly. The double rope pet leash further includes an open-close assembly connected to the leash body and capable of opening or closing the leash cavity.
    Type: Application
    Filed: December 12, 2018
    Publication date: February 20, 2020
    Applicant: Best-Run Technology Ltd.
    Inventors: Wenwei Tang, Qingfeng Dai, Yingzhou Chen, Zhaoxin Wu, Ying Tang
  • Publication number: 20200045936
    Abstract: A pet leash preventing locking due to jerk includes a housing provided with a handle and a reel disk arranged in the housing. The reel disk is rotatably connected to the housing. A leash rope is wound on the reel disk. One end of the leash rope penetrates through the housing. The housing is provided with a rotary damper. A clutch structure is provided between the reel disk and the rotary damper, and is actuable under a centrifugal force to connect the reel disk to the rotary damper when a rotation speed of the reel disk exceeds a predetermined rotation speed.
    Type: Application
    Filed: December 4, 2018
    Publication date: February 13, 2020
    Applicant: Best-Run Technology Ltd.
    Inventors: Wenwei Tang, Qingfeng Dai, Yingzhou Chen, Di Fang, Ying Tang
  • Publication number: 20190228157
    Abstract: A computing device is provided including a motherboard including a control module, a first trusted platform module (TPM), and a second TPM. The control module directs security operations to the first TPM, wherein the control module is operable to detect whether or not the first TPM is damaged, and wherein the control module, in response to detecting that the first TPM is damaged, is operable to direct subsequent security operations to be performed by the second TPM. A computer program product is also provided including non-transitory computer readable storage media embodying program instructions executable by a processor to direct security operations to a first TPM coupled to a motherboard of the computing device, detect whether or not the first TPM is damaged, and, responsive to detecting that the first TPM is damaged, direct subsequent security operations to a second TPM coupled to the motherboard of the computing device.
    Type: Application
    Filed: September 5, 2018
    Publication date: July 25, 2019
    Inventors: Wenwei Tang, Tianhe Li, He Huang
  • Patent number: 10181036
    Abstract: A method includes a unified extensible firmware interface of a compute node identifying an option ROM or an OS boot loader within the compute node, wherein the option ROM or OS boot loader stores a signed image that can be verified using a required digital certificate. The method further includes determining that the unified extensible firmware interface does not store the required digital certificate in a revocation database or in an authorization database. Still further, the method includes automatically identifying the required digital certificate in a database of digital certificates other than the revocation database or the authorization database, and providing the required digital certificate to the authorization database.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: January 15, 2019
    Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
    Inventors: Nathan K. Campbell, Douglas W. Oliver, ShengRui Ji, SongWu Shen, WenWei Tang
  • Publication number: 20160378970
    Abstract: A method includes a unified extensible firmware interface of a compute node identifying an option ROM or an OS boot loader within the compute node, wherein the option ROM or OS boot loader stores a signed image that can be verified using a required digital certificate. The method further includes determining that the unified extensible firmware interface does not store the required digital certificate in a revocation database or in an authorization database. Still further, the method includes automatically identifying the required digital certificate in a database of digital certificates other than the revocation database or the authorization database, and providing the required digital certificate to the authorization database.
    Type: Application
    Filed: June 24, 2015
    Publication date: December 29, 2016
    Inventors: Nathan K. Campbell, Douglas W. Oliver, ShengRui Ji, SongWu Shen, WenWei Tang
  • Publication number: 20160323251
    Abstract: A method includes a firmware layer of a computing device receiving data input via a data input device, the received data being inaccessible by an operating system layer of the computing device, the data is to be sent to a remote server, and the firmware layer being independent of the operating system layer. The method further includes the firmware layer encrypting the received data, and the operating system layer sending the encrypted data to the remote server. A computing device includes a data input device, an operating system layer, and a firmware layer, wherein the computing device is capable of performing the method.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 3, 2016
    Inventors: Mehul M. Shah, WenWei Tang, Yufeng Zhou, Nian Nian Xia, Weiyi Xie
  • Patent number: 8826864
    Abstract: The present invention relates to a pet retractor, more particularly to an emergency self-locking pet retractor, comprising a collar, a leash, a leash spool, a shell body and a grip handle, in which it also comprises an emergency self-locking device. The emergency self-locking device includes a switch sliding block disposed on an external surface of the shell body and inserted into the shell body, a self-locking sliding block and a return spring thereof disposed in the shell body and attached to the switch sliding block, a self-locking baffle and a return torsion spring thereof disposed on an external surface of the leash spool and whose one end is hinged on the leash spool, and a self-locking baffle block disposed at the corresponding part on the external surface of the leash spool. When the pet suddenly breaks out or rises up, the emergency self-locking device can automatically lock the spool to prevent the leash from being pulled out, so that the pet cannot run around, attack people or damage properties.
    Type: Grant
    Filed: August 30, 2011
    Date of Patent: September 9, 2014
    Assignee: Zhejiang Universe Industry Co., Ltd.
    Inventor: Wenwei Tang
  • Publication number: 20130125832
    Abstract: The present invention relates to a pet retractor, more particularly to an emergency self-locking pet retractor, comprising a collar, a leash, a leash spool, a shell body and a grip handle, in which it also comprises an emergency self-locking device. The emergency self-locking device includes a switch sliding block disposed on an external surface of the shell body and inserted into the shell body, a self-locking sliding block and a return spring thereof disposed in the shell body and attached to the switch sliding block, a self-locking baffle and a return torsion spring thereof disposed on an external surface of the leash spool and whose one end is hinged on the leash spool, and a self-locking baffle block disposed at the corresponding part on the external surface of the leash spool. When the pet suddenly breaks out or rises up, the emergency self-locking device can automatically lock the spool to prevent the leash from being pulled out, so that the pet cannot run around, attack people or damage properties.
    Type: Application
    Filed: August 30, 2011
    Publication date: May 23, 2013
    Applicant: ZHEJIANG UNIVERSE INDUSTRY CO., LTD.
    Inventor: Wenwei Tang