Patents by Inventor Wenwei Tang
Wenwei Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11945202Abstract: A curved surface lamination device, comprising a profiling jig (01), the profiling jig (01) comprising a base (101) and a profiling portion (102), with the profiling portion (102) being configured to support a carrier film (02), and the side of the base (101) facing away from the profiling portion (102) being provided with an opening; and a lower jig (03), comprising a first sinking groove (301), with part of the base (101) being inserted into the first sinking groove (301), such that the lower jig (03) encloses a hollow structure (E) with the base (101) at the opening position.Type: GrantFiled: May 12, 2021Date of Patent: April 2, 2024Assignees: Chengdu BOE Optoelectronics Technology Co., Ltd., BOE Technology Group Co., Ltd.Inventors: Xingguo Liu, Wei Qing, Qiang Tang, Shaokui Liu, Wenwei Mo
-
Publication number: 20240036552Abstract: A device management method includes obtaining a management page for managing a first electronic device, performing a first management operation on the first electronic device based on the management page, obtaining an operation record generated when performing the first management operation on the first electronic device through the management page, and generating an executable command based on the operation record. The executable command is performed by a target device. The target device is configured to instruct one or more second electronic devices to perform the first management operation based on the executable command.Type: ApplicationFiled: July 28, 2023Publication date: February 1, 2024Inventors: Jihao ZHANG, Wenwei TANG, Ming LEI, Jun WANG
-
Publication number: 20230195335Abstract: Disclosed systems and methods include a CPU coupled to one or more storage resources including a hybrid storage resource that is user-configurable during boot to allocate some, all, or none of its capacity as a conventional dual in-line memory module (DIMM) and some, all, or none of its capacity as a persistent storage resource. A utilization efficiency index (UEI) of the hybrid storage resource is assessed. The UEI may be determined based on a combination of memory resource utilization, a persistent storage resource utilization, and weighting parameters that reflect a comparative utility or value of memory vs storage resources. A target division between memory and storage resources may then be determined based on the UEI assessment. The hybrid storage resource may then be configured by dividing or allocating a first portion of its capacity to the volatile memory resource and a remaining portion of its capacity to the persistent storage resource.Type: ApplicationFiled: December 23, 2021Publication date: June 22, 2023Applicant: Dell Products L.P.Inventors: Zheng ZHANG, Wenwei TANG
-
Patent number: 11593142Abstract: An information handling system may include at least one processor; and a non-transitory memory coupled to the at least one processor. The information handling system may be configured to: execute a plurality of virtual machines having workloads associated therewith; during selected times, apply a plurality of configuration settings relating to the at least one processor while executing the workloads of the plurality of virtual machines; track a plurality of performance metrics relating to the at least one processor during the selected times; and predictively determine a selected one of the plurality of configuration settings that is predicted to improve performance of the workloads.Type: GrantFiled: June 30, 2020Date of Patent: February 28, 2023Assignee: Dell Products L.P.Inventors: Wenwei Tang, Joan Jun Xiong
-
Patent number: 11394539Abstract: An information handling system may include a persistent memory configured to be secured via a passphrase; a basic input/output system (BIOS); and a management controller configured to provide out-of-band management of the information handling system. The BIOS may be configured to set the passphrase of the persistent memory, encrypt the passphrase via a first key of a first asymmetric key pair, and transmit the encrypted passphrase to the management controller. The management controller may be configured to decrypt the encrypted passphrase via a second key of the first asymmetric key pair, re-encrypt the passphrase via a first key of a second asymmetric key pair, and transmit the re-encrypted passphrase to an external management console via an out-of-band management interface.Type: GrantFiled: June 30, 2020Date of Patent: July 19, 2022Assignee: Dell Products L.P.Inventors: Wenwei Tang, Joan Jun Xiong
-
Publication number: 20210391989Abstract: An information handling system may include a persistent memory configured to be secured via a passphrase; a basic input/output system (BIOS); and a management controller configured to provide out-of-band management of the information handling system. The BIOS may be configured to set the passphrase of the persistent memory, encrypt the passphrase via a first key of a first asymmetric key pair, and transmit the encrypted passphrase to the management controller. The management controller may be configured to decrypt the encrypted passphrase via a second key of the first asymmetric key pair, re-encrypt the passphrase via a first key of a second asymmetric key pair, and transmit the re-encrypted passphrase to an external management console via an out-of-band management interface.Type: ApplicationFiled: June 30, 2020Publication date: December 16, 2021Applicant: Dell Products L.P.Inventors: Wenwei TANG, Joan Jun XIONG
-
Publication number: 20210382744Abstract: An information handling system may include at least one processor; and a non-transitory memory coupled to the at least one processor. The information handling system may be configured to: execute a plurality of virtual machines having workloads associated therewith; during selected times, apply a plurality of configuration settings relating to the at least one processor while executing the workloads of the plurality of virtual machines; track a plurality of performance metrics relating to the at least one processor during the selected times; and predictively determine a selected one of the plurality of configuration settings that is predicted to improve performance of the workloads.Type: ApplicationFiled: June 30, 2020Publication date: December 9, 2021Applicant: Dell Products L.P.Inventors: Wenwei TANG, Joan Jun XIONG
-
Patent number: 11134657Abstract: A pet leash preventing locking due to jerk includes a housing provided with a handle and a reel disk arranged in the housing. The reel disk is rotatably connected to the housing. A leash rope is wound on the reel disk. One end of the leash rope penetrates through the housing. The housing is provided with a rotary damper. A clutch structure is provided between the reel disk and the rotary damper, and is actuable under a centrifugal force to connect the reel disk to the rotary damper when a rotation speed of the reel disk exceeds a predetermined rotation speed.Type: GrantFiled: December 4, 2018Date of Patent: October 5, 2021Assignee: Best-Run Technology Ltd.Inventors: Wenwei Tang, Qingfeng Dai, Yingzhou Chen, Di Fang, Ying Tang
-
Patent number: 10909247Abstract: A computing device is provided including a motherboard including a control module, a first trusted platform module (TPM), and a second TPM. The control module directs security operations to the first TPM, wherein the control module is operable to detect whether or not the first TPM is damaged, and wherein the control module, in response to detecting that the first TPM is damaged, is operable to direct subsequent security operations to be performed by the second TPM. A computer program product is also provided including non-transitory computer readable storage media embodying program instructions executable by a processor to direct security operations to a first TPM coupled to a motherboard of the computing device, detect whether or not the first TPM is damaged, and, responsive to detecting that the first TPM is damaged, direct subsequent security operations to a second TPM coupled to the motherboard of the computing device.Type: GrantFiled: September 5, 2018Date of Patent: February 2, 2021Assignee: LENOVO ENTERPRISE SOLUTIONS (SINGAPORE) PTE. LTD.Inventors: Wenwei Tang, Tianhe Li, He Huang
-
Patent number: 10834903Abstract: A double rope pet leash includes a leash body. A leash cavity is located in the leash body. A first leash assembly and a second leash assembly are connected to the leash body. The first leash assembly is fixedly connected with the leash body. The second leash assembly is located in the leash cavity and rotatably connected to the leash body. A first leash rope is pressed on the surface of the first leash assembly, and a second leash rope is pressed on the surface of the second leash assembly. The double rope pet leash further includes an open-close assembly connected to the leash body and capable of opening or closing the leash cavity.Type: GrantFiled: December 12, 2018Date of Patent: November 17, 2020Assignee: Best-Run Technology Ltd.Inventors: Wenwei Tang, Qingfeng Dai, Yingzhou Chen, Zhaoxin Wu, Ying Tang
-
Publication number: 20200053985Abstract: A double rope pet leash includes a leash body. A leash cavity is located in the leash body. A first leash assembly and a second leash assembly are connected to the leash body. The first leash assembly is fixedly connected with the leash body. The second leash assembly is located in the leash cavity and rotatably connected to the leash body. A first leash rope is pressed on the surface of the first leash assembly, and a second leash rope is pressed on the surface of the second leash assembly. The double rope pet leash further includes an open-close assembly connected to the leash body and capable of opening or closing the leash cavity.Type: ApplicationFiled: December 12, 2018Publication date: February 20, 2020Applicant: Best-Run Technology Ltd.Inventors: Wenwei Tang, Qingfeng Dai, Yingzhou Chen, Zhaoxin Wu, Ying Tang
-
Publication number: 20200045936Abstract: A pet leash preventing locking due to jerk includes a housing provided with a handle and a reel disk arranged in the housing. The reel disk is rotatably connected to the housing. A leash rope is wound on the reel disk. One end of the leash rope penetrates through the housing. The housing is provided with a rotary damper. A clutch structure is provided between the reel disk and the rotary damper, and is actuable under a centrifugal force to connect the reel disk to the rotary damper when a rotation speed of the reel disk exceeds a predetermined rotation speed.Type: ApplicationFiled: December 4, 2018Publication date: February 13, 2020Applicant: Best-Run Technology Ltd.Inventors: Wenwei Tang, Qingfeng Dai, Yingzhou Chen, Di Fang, Ying Tang
-
Publication number: 20190228157Abstract: A computing device is provided including a motherboard including a control module, a first trusted platform module (TPM), and a second TPM. The control module directs security operations to the first TPM, wherein the control module is operable to detect whether or not the first TPM is damaged, and wherein the control module, in response to detecting that the first TPM is damaged, is operable to direct subsequent security operations to be performed by the second TPM. A computer program product is also provided including non-transitory computer readable storage media embodying program instructions executable by a processor to direct security operations to a first TPM coupled to a motherboard of the computing device, detect whether or not the first TPM is damaged, and, responsive to detecting that the first TPM is damaged, direct subsequent security operations to a second TPM coupled to the motherboard of the computing device.Type: ApplicationFiled: September 5, 2018Publication date: July 25, 2019Inventors: Wenwei Tang, Tianhe Li, He Huang
-
Patent number: 10181036Abstract: A method includes a unified extensible firmware interface of a compute node identifying an option ROM or an OS boot loader within the compute node, wherein the option ROM or OS boot loader stores a signed image that can be verified using a required digital certificate. The method further includes determining that the unified extensible firmware interface does not store the required digital certificate in a revocation database or in an authorization database. Still further, the method includes automatically identifying the required digital certificate in a database of digital certificates other than the revocation database or the authorization database, and providing the required digital certificate to the authorization database.Type: GrantFiled: June 24, 2015Date of Patent: January 15, 2019Assignee: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.Inventors: Nathan K. Campbell, Douglas W. Oliver, ShengRui Ji, SongWu Shen, WenWei Tang
-
Publication number: 20160378970Abstract: A method includes a unified extensible firmware interface of a compute node identifying an option ROM or an OS boot loader within the compute node, wherein the option ROM or OS boot loader stores a signed image that can be verified using a required digital certificate. The method further includes determining that the unified extensible firmware interface does not store the required digital certificate in a revocation database or in an authorization database. Still further, the method includes automatically identifying the required digital certificate in a database of digital certificates other than the revocation database or the authorization database, and providing the required digital certificate to the authorization database.Type: ApplicationFiled: June 24, 2015Publication date: December 29, 2016Inventors: Nathan K. Campbell, Douglas W. Oliver, ShengRui Ji, SongWu Shen, WenWei Tang
-
Publication number: 20160323251Abstract: A method includes a firmware layer of a computing device receiving data input via a data input device, the received data being inaccessible by an operating system layer of the computing device, the data is to be sent to a remote server, and the firmware layer being independent of the operating system layer. The method further includes the firmware layer encrypting the received data, and the operating system layer sending the encrypted data to the remote server. A computing device includes a data input device, an operating system layer, and a firmware layer, wherein the computing device is capable of performing the method.Type: ApplicationFiled: April 29, 2016Publication date: November 3, 2016Inventors: Mehul M. Shah, WenWei Tang, Yufeng Zhou, Nian Nian Xia, Weiyi Xie
-
Patent number: 8826864Abstract: The present invention relates to a pet retractor, more particularly to an emergency self-locking pet retractor, comprising a collar, a leash, a leash spool, a shell body and a grip handle, in which it also comprises an emergency self-locking device. The emergency self-locking device includes a switch sliding block disposed on an external surface of the shell body and inserted into the shell body, a self-locking sliding block and a return spring thereof disposed in the shell body and attached to the switch sliding block, a self-locking baffle and a return torsion spring thereof disposed on an external surface of the leash spool and whose one end is hinged on the leash spool, and a self-locking baffle block disposed at the corresponding part on the external surface of the leash spool. When the pet suddenly breaks out or rises up, the emergency self-locking device can automatically lock the spool to prevent the leash from being pulled out, so that the pet cannot run around, attack people or damage properties.Type: GrantFiled: August 30, 2011Date of Patent: September 9, 2014Assignee: Zhejiang Universe Industry Co., Ltd.Inventor: Wenwei Tang
-
Publication number: 20130125832Abstract: The present invention relates to a pet retractor, more particularly to an emergency self-locking pet retractor, comprising a collar, a leash, a leash spool, a shell body and a grip handle, in which it also comprises an emergency self-locking device. The emergency self-locking device includes a switch sliding block disposed on an external surface of the shell body and inserted into the shell body, a self-locking sliding block and a return spring thereof disposed in the shell body and attached to the switch sliding block, a self-locking baffle and a return torsion spring thereof disposed on an external surface of the leash spool and whose one end is hinged on the leash spool, and a self-locking baffle block disposed at the corresponding part on the external surface of the leash spool. When the pet suddenly breaks out or rises up, the emergency self-locking device can automatically lock the spool to prevent the leash from being pulled out, so that the pet cannot run around, attack people or damage properties.Type: ApplicationFiled: August 30, 2011Publication date: May 23, 2013Applicant: ZHEJIANG UNIVERSE INDUSTRY CO., LTD.Inventor: Wenwei Tang