Patents by Inventor Xiaoran Wang
Xiaoran Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240125181Abstract: Hydrogeological drilling-type detection equipment includes a detection support frame, where the detection support frame is fixedly connected with a detection box body with a through hole, the through hole is communicated with an inside of the detection box body, a drilling box body is arranged inside the through hole, a lifting assembly is arranged inside the detection box body, the drilling box body is slidably connected with the through hole through the lifting assembly, a bottom end of the drilling box body is provided with a multifunctional drilling assembly provided with a blocking assembly, each of four corners of a bottom end of the detection support frame is provided with a moving wheel, the detection support frame is provided with a stable support assembly, the stable support assembly is correspondingly arranged with the moving wheel, and one side of the detection support frame is fixedly connected with an armrest.Type: ApplicationFiled: October 12, 2023Publication date: April 18, 2024Inventors: Shengbin WANG, Zexue QI, Fenglin WANG, Zhen ZHAO, Xiaoran CHAI, Guoqiang ZHANG, Long CHEN, Youjing YUAN, Haicong KOU, Shanhu XIAO, Shaokang YANG, Jianhui WANG
-
Publication number: 20240119639Abstract: An apparatus and a method for decoding a 3D map, and an encoded bitstream of a 3D map are provided. The apparatus for decoding a 3D map includes a transmitter and a decompressor. The transmitter is configured to receive a bitstream of a 3D map, where the 3D map includes a plurality of 3D map points. The decompressor is configured to decompress the bitstream of the 3D map to obtain reconstructed data of the 3D map, where the reconstructed data of the 3D map includes reconstructed data of the plurality of 3D map points. In this application, the decompressor end may support decompression of compressed data of the 3D map, to support compression/decompression of data of the 3D map.Type: ApplicationFiled: December 1, 2023Publication date: April 11, 2024Inventors: Xiaoran Cao, Kangying Cai, Pei Wang, Chenxi Tu, Qi Su
-
Publication number: 20240112372Abstract: Embodiments of this application belong to the field of 3D map technologies, and disclose methods and apparatuses for compressing and decompressing a 3D map, to reduce a data volume of a 3D map. The method for compressing a 3D map includes: obtaining a 3D map descriptor, where the 3D map descriptor corresponds to at least one 3D map point of the 3D map; performing binarization on a relationship between the 3D map descriptor and at least one preset threshold vector to obtain binary data; and performing quantization on a difference between the 3D map descriptor and the at least one preset threshold vector to obtain quantized data. In embodiments of this application, storage space required for storing a 3D map can be reduced, or transmission resources required for transmitting a 3D map can be reduced.Type: ApplicationFiled: December 1, 2023Publication date: April 4, 2024Inventors: Xiaoran Cao, Kangying Cai, Pei Wang
-
Publication number: 20240104781Abstract: A three-dimensional (3D) map compression method includes performing compaction processing on a to-be-encoded descriptor to obtain a first compact representation of the to-be-encoded descriptor, where the to-be-encoded descriptor corresponds to at least one 3D map point on a 3D map. A compact representation of at least one reference descriptor corresponding to the to-be-encoded descriptor is obtained, followed by obtaining a second compact representation of the to-be-encoded descriptor based on the first compact representation of the to-be-encoded descriptor and the compact representation of the at least one reference descriptor and encapsulating the second compact representation to obtain a bitstream of the 3D map.Type: ApplicationFiled: December 4, 2023Publication date: March 28, 2024Inventors: Xiaoran Cao, Pei Wang, Kangying Cai, Chenxi Tu
-
Publication number: 20240102826Abstract: An apparatus and a method for encoding a 3D map are provided. The apparatus for encoding a 3D map includes a compression module (51) and a transmission module (52). The compression module (51) is configured to compress data of a 3D map to obtain a bitstream of the 3D map, where the 3D map includes a plurality of 3D map points, and the data of the 3D map includes data of the plurality of 3D map points. The transmission module (52) is configured to transmit the bitstream of the 3D map. With the use of the apparatus, a data volume of a 3D map can be reduced, thereby reducing transmission bandwidth and improving transmission efficiency.Type: ApplicationFiled: December 1, 2023Publication date: March 28, 2024Inventors: Xiaoran Cao, Kangying Cai, Pei Wang, Chenxi Tu, Qi Su
-
Publication number: 20240104185Abstract: The present disclosure pertains to device registration method and apparatus, an electronic device and a storage medium. The method includes: detecting device information of a device accessing a terminal; generating a serial number of the device according to the device information; sending the serial number to a server such that the server completes registration for the device according to the serial number.Type: ApplicationFiled: May 27, 2021Publication date: March 28, 2024Inventors: Tongbo WANG, Xiaoran SUN, Jiao HUANG
-
Publication number: 20240100170Abstract: Provided are bivalent compounds (e.g., bi-functional small molecule compounds), compositions comprising one or more of the bivalent compounds, and methods of use the bivalent compounds for the treatment of certain disease in a subject in need thereof, and methods for identifying such bivalent compounds.Type: ApplicationFiled: August 27, 2021Publication date: March 28, 2024Inventors: Jing LIU, Michael Bruno PLEWE, Jialiang WANG, Xiaoran HAN, Liqun CHEN, Chengwei ZHANG
-
Publication number: 20240095265Abstract: A method and an apparatus for retrieving a 3D map is provided. The method for retrieving a 3D map includes: obtaining binary data of a plurality of 3D map descriptors, where the plurality of 3D map descriptors correspond to at least one 3D map point of a 3D map; obtaining a retrieval descriptor, where the retrieval descriptor is a feature that corresponds to a real environment and that is extracted from visual information collected by a sensor of an electronic device; and performing retrieval in the binary data of the plurality of 3D map descriptors based on binary data of the retrieval descriptor, to obtain at least one target 3D map descriptor, where a length of binary data of each of the plurality of 3D map descriptors is different from a length of the binary data of the retrieval descriptor.Type: ApplicationFiled: December 1, 2023Publication date: March 21, 2024Inventors: Xiaoran Cao, Pei Wang, Kangying Cai
-
Publication number: 20240066136Abstract: Provided herein are compounds, pharmaceutical compositions, and methods for binding or degrading target proteins. Further provided herein are compounds having a DNA damage-binding protein 1 (DDB1) binding moiety. Some such embodiments include a linker. Some such embodiments include a target protein binding moiety. Further provided herein are ligand-DDB1 complexes. Further provided herein are in vivo modified DDB1 proteins.Type: ApplicationFiled: July 28, 2023Publication date: February 29, 2024Inventors: Jing LIU, Michael Bruno PLEWE, Matthew Randolph LEE, Xiaoran HAN, Liqun CHEN, Chengwei ZHANG, Jialiang WANG
-
Publication number: 20220312819Abstract: Devices, systems, and methods are provided for opening a coconut. A coconut opening device or system may include a piercing component to pierce a coconut; an adjustable component to move the piercing component vertically with respect to the ground toward and away from a coconut based on a received user input; and a coconut holding component arranged below the piercing component to secure the coconut while the coconut is pierced by the piercing component.Type: ApplicationFiled: March 30, 2022Publication date: October 6, 2022Inventor: Xiaoran Wang
-
Patent number: 11367286Abstract: This application describes techniques for providing computer vision for manual services. In some instances, a remote system may determine that a current time is within a threshold period of time of a scheduled service and, based on the determination, send a first message requesting image data to a camera apparatus located within an environment. After sending the first message, the remote system may receive image data associated with the environment from the camera apparatus and use the image to detect an object within the environment. The remote system can then send a second message to a device of a guest and a third message to a device of a user, where each of the second message and the third message indicates that the object is within the environment. In some instances, the object can include an animal while in some instances, the object can include a person.Type: GrantFiled: March 5, 2020Date of Patent: June 21, 2022Assignee: Amazon Technologies, Inc.Inventors: Mashhour Solh, Siyi Ding, Rohith Mysore Vijaya Kumar, Xiaoran Wang
-
Patent number: 10769442Abstract: Techniques are generally described for scene change detection. A first and second histogram representing frames of a video may be received. A Euclidean distance between the first and second histogram may be determined. A third histogram of a third frame may be received. Values of the third histogram may be compared to corresponding values of a background model of the environment. A fourth frame and a fifth frame of image data of the video may be received. A flow value between a first block of pixels of the fourth frame and a corresponding second block of pixels of the fifth frame may be determined. The flow value may be determined based on a motion vector and a sum of absolute differences between the first and second block. A portion of the video may be streamed to a remote computing device if the flow value exceeds a threshold value.Type: GrantFiled: September 11, 2017Date of Patent: September 8, 2020Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Siyi Ding, Xiaoran Wang, Manika Puri, Mashhour Solh, Philip James Taylor
-
Patent number: 10657383Abstract: This application describes techniques for providing computer vision for manual services. In some instances, a remote system may determine that a current time is within a threshold period of time of a scheduled service and, based on the determination, send a first message requesting image data to a camera apparatus located within an environment. After sending the first message, the remote system may receive image data associated with the environment from the camera apparatus and use the image to detect an object within the environment. The remote system can then send a second message to a device of a guest and a third message to a device of a user, where each of the second message and the third message indicates that the object is within the environment. In some instances, the object can include an animal while in some instances, the object can include a person.Type: GrantFiled: September 23, 2016Date of Patent: May 19, 2020Assignee: Amazon Technologies, Inc.Inventors: Mashhour Solh, Siyi Ding, Rohith Mysore Vijaya Kumar, Xiaoran Wang
-
Patent number: 10387658Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.Type: GrantFiled: October 11, 2018Date of Patent: August 20, 2019Assignee: SALESFORCE.COM, INC.Inventors: Sergey Gorbaty, Travis Safford, Xiaoran Wang, Yoel Gluck
-
Patent number: 10388092Abstract: This application describes techniques for providing computer vision-based surveillance of in-home services. In some instances, a remote system may authenticate a guest at an environment using data that the remote system receives from a camera apparatus. To authenticate the guest, the remote system can determine that an identification of the guest matches an identification of a worker associated with a scheduled service at the environment. When the scheduled service includes an in-home delivery, the remote system can further determine that a package in possession of the guest matches an item for the scheduled in-home delivery. In some instances, after the guest enters the environment, the remote system can further monitor the environment to ensure that the guest stays within a designated location of the environment. The remote system can further send a message to an electronic device when the guest is outside of the designated location.Type: GrantFiled: September 28, 2016Date of Patent: August 20, 2019Assignee: Amazon Technologies, Inc.Inventors: Mashhour Solh, Siyi Ding, Rohith Mysore Vijaya Kumar, Xiaoran Wang
-
Patent number: 10380347Abstract: A runtime analysis framework (RTA) stores a hierarchical list of input tags and a hierarchical list of output tags. The RTA stores defined vulnerabilities that include associated input tags and output tags. During runtime the software application may receive a request from a user system. The RTA assigns an input tag from the hierarchical list of input tags to an object associated with the request and assigns an output tag from the hierarchical list of output tags to a method generating a response to the request. The RTA identifies one of the defined vulnerabilities as a potential vulnerability if the assigned output tag and output tag associated the potential vulnerability are in a same subtree of the hierarchical list of output tags and the assigned input tag and the input tag associated with the potential vulnerability are in a same subtree of the hierarchical list of input tags.Type: GrantFiled: June 8, 2016Date of Patent: August 13, 2019Assignee: SALESFORCE.COM., INC.Inventors: Sergey Gorbaty, Travis Safford, Xiaoran Wang
-
Publication number: 20190042762Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.Type: ApplicationFiled: October 11, 2018Publication date: February 7, 2019Applicant: salesforce.com, inc.Inventors: Sergey GORBATY, Trav is SAFFORD, Xiaoran WANG, Yoel GLUCK
-
Patent number: 10140456Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.Type: GrantFiled: June 8, 2016Date of Patent: November 27, 2018Assignee: SALESFORCE.COM, INC.Inventors: Sergey Gorbaty, Travis Safford, Xiaoran Wang, Yoel Gluck
-
Publication number: 20170357811Abstract: A runtime analysis framework (RTA) stores a hierarchical list of input tags and a hierarchical list of output tags. The RTA stores defined vulnerabilities that include associated input tags and output tags. During runtime the software application may receive a request from a user system. The RTA assigns an input tag from the hierarchical list of input tags to an object associated with the request and assigns an output tag from the hierarchical list of output tags to a method generating a response to the request. The RTA identifies one of the defined vulnerabilities as a potential vulnerability if the assigned output tag and output tag associated the potential vulnerability are in a same subtree of the hierarchical list of output tags and the assigned input tag and the input tag associated with the potential vulnerability are in a same subtree of the hierarchical list of input tags.Type: ApplicationFiled: June 8, 2016Publication date: December 14, 2017Applicant: salesforce.com, inc.Inventors: Sergey GORBATY, Travis SAFFORD, Xiaoran WANG
-
Publication number: 20170357810Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.Type: ApplicationFiled: June 8, 2016Publication date: December 14, 2017Applicant: salesforce.com, inc.Inventors: Sergey GORBATY, Travis SAFFORD, Xiaoran WANG, Yoel GLUCK