Patents by Inventor Xiaoran Wang

Xiaoran Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240125181
    Abstract: Hydrogeological drilling-type detection equipment includes a detection support frame, where the detection support frame is fixedly connected with a detection box body with a through hole, the through hole is communicated with an inside of the detection box body, a drilling box body is arranged inside the through hole, a lifting assembly is arranged inside the detection box body, the drilling box body is slidably connected with the through hole through the lifting assembly, a bottom end of the drilling box body is provided with a multifunctional drilling assembly provided with a blocking assembly, each of four corners of a bottom end of the detection support frame is provided with a moving wheel, the detection support frame is provided with a stable support assembly, the stable support assembly is correspondingly arranged with the moving wheel, and one side of the detection support frame is fixedly connected with an armrest.
    Type: Application
    Filed: October 12, 2023
    Publication date: April 18, 2024
    Inventors: Shengbin WANG, Zexue QI, Fenglin WANG, Zhen ZHAO, Xiaoran CHAI, Guoqiang ZHANG, Long CHEN, Youjing YUAN, Haicong KOU, Shanhu XIAO, Shaokang YANG, Jianhui WANG
  • Publication number: 20240119639
    Abstract: An apparatus and a method for decoding a 3D map, and an encoded bitstream of a 3D map are provided. The apparatus for decoding a 3D map includes a transmitter and a decompressor. The transmitter is configured to receive a bitstream of a 3D map, where the 3D map includes a plurality of 3D map points. The decompressor is configured to decompress the bitstream of the 3D map to obtain reconstructed data of the 3D map, where the reconstructed data of the 3D map includes reconstructed data of the plurality of 3D map points. In this application, the decompressor end may support decompression of compressed data of the 3D map, to support compression/decompression of data of the 3D map.
    Type: Application
    Filed: December 1, 2023
    Publication date: April 11, 2024
    Inventors: Xiaoran Cao, Kangying Cai, Pei Wang, Chenxi Tu, Qi Su
  • Publication number: 20240112372
    Abstract: Embodiments of this application belong to the field of 3D map technologies, and disclose methods and apparatuses for compressing and decompressing a 3D map, to reduce a data volume of a 3D map. The method for compressing a 3D map includes: obtaining a 3D map descriptor, where the 3D map descriptor corresponds to at least one 3D map point of the 3D map; performing binarization on a relationship between the 3D map descriptor and at least one preset threshold vector to obtain binary data; and performing quantization on a difference between the 3D map descriptor and the at least one preset threshold vector to obtain quantized data. In embodiments of this application, storage space required for storing a 3D map can be reduced, or transmission resources required for transmitting a 3D map can be reduced.
    Type: Application
    Filed: December 1, 2023
    Publication date: April 4, 2024
    Inventors: Xiaoran Cao, Kangying Cai, Pei Wang
  • Publication number: 20240104781
    Abstract: A three-dimensional (3D) map compression method includes performing compaction processing on a to-be-encoded descriptor to obtain a first compact representation of the to-be-encoded descriptor, where the to-be-encoded descriptor corresponds to at least one 3D map point on a 3D map. A compact representation of at least one reference descriptor corresponding to the to-be-encoded descriptor is obtained, followed by obtaining a second compact representation of the to-be-encoded descriptor based on the first compact representation of the to-be-encoded descriptor and the compact representation of the at least one reference descriptor and encapsulating the second compact representation to obtain a bitstream of the 3D map.
    Type: Application
    Filed: December 4, 2023
    Publication date: March 28, 2024
    Inventors: Xiaoran Cao, Pei Wang, Kangying Cai, Chenxi Tu
  • Publication number: 20240102826
    Abstract: An apparatus and a method for encoding a 3D map are provided. The apparatus for encoding a 3D map includes a compression module (51) and a transmission module (52). The compression module (51) is configured to compress data of a 3D map to obtain a bitstream of the 3D map, where the 3D map includes a plurality of 3D map points, and the data of the 3D map includes data of the plurality of 3D map points. The transmission module (52) is configured to transmit the bitstream of the 3D map. With the use of the apparatus, a data volume of a 3D map can be reduced, thereby reducing transmission bandwidth and improving transmission efficiency.
    Type: Application
    Filed: December 1, 2023
    Publication date: March 28, 2024
    Inventors: Xiaoran Cao, Kangying Cai, Pei Wang, Chenxi Tu, Qi Su
  • Publication number: 20240104185
    Abstract: The present disclosure pertains to device registration method and apparatus, an electronic device and a storage medium. The method includes: detecting device information of a device accessing a terminal; generating a serial number of the device according to the device information; sending the serial number to a server such that the server completes registration for the device according to the serial number.
    Type: Application
    Filed: May 27, 2021
    Publication date: March 28, 2024
    Inventors: Tongbo WANG, Xiaoran SUN, Jiao HUANG
  • Publication number: 20240100170
    Abstract: Provided are bivalent compounds (e.g., bi-functional small molecule compounds), compositions comprising one or more of the bivalent compounds, and methods of use the bivalent compounds for the treatment of certain disease in a subject in need thereof, and methods for identifying such bivalent compounds.
    Type: Application
    Filed: August 27, 2021
    Publication date: March 28, 2024
    Inventors: Jing LIU, Michael Bruno PLEWE, Jialiang WANG, Xiaoran HAN, Liqun CHEN, Chengwei ZHANG
  • Publication number: 20240095265
    Abstract: A method and an apparatus for retrieving a 3D map is provided. The method for retrieving a 3D map includes: obtaining binary data of a plurality of 3D map descriptors, where the plurality of 3D map descriptors correspond to at least one 3D map point of a 3D map; obtaining a retrieval descriptor, where the retrieval descriptor is a feature that corresponds to a real environment and that is extracted from visual information collected by a sensor of an electronic device; and performing retrieval in the binary data of the plurality of 3D map descriptors based on binary data of the retrieval descriptor, to obtain at least one target 3D map descriptor, where a length of binary data of each of the plurality of 3D map descriptors is different from a length of the binary data of the retrieval descriptor.
    Type: Application
    Filed: December 1, 2023
    Publication date: March 21, 2024
    Inventors: Xiaoran Cao, Pei Wang, Kangying Cai
  • Publication number: 20240066136
    Abstract: Provided herein are compounds, pharmaceutical compositions, and methods for binding or degrading target proteins. Further provided herein are compounds having a DNA damage-binding protein 1 (DDB1) binding moiety. Some such embodiments include a linker. Some such embodiments include a target protein binding moiety. Further provided herein are ligand-DDB1 complexes. Further provided herein are in vivo modified DDB1 proteins.
    Type: Application
    Filed: July 28, 2023
    Publication date: February 29, 2024
    Inventors: Jing LIU, Michael Bruno PLEWE, Matthew Randolph LEE, Xiaoran HAN, Liqun CHEN, Chengwei ZHANG, Jialiang WANG
  • Publication number: 20220312819
    Abstract: Devices, systems, and methods are provided for opening a coconut. A coconut opening device or system may include a piercing component to pierce a coconut; an adjustable component to move the piercing component vertically with respect to the ground toward and away from a coconut based on a received user input; and a coconut holding component arranged below the piercing component to secure the coconut while the coconut is pierced by the piercing component.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 6, 2022
    Inventor: Xiaoran Wang
  • Patent number: 11367286
    Abstract: This application describes techniques for providing computer vision for manual services. In some instances, a remote system may determine that a current time is within a threshold period of time of a scheduled service and, based on the determination, send a first message requesting image data to a camera apparatus located within an environment. After sending the first message, the remote system may receive image data associated with the environment from the camera apparatus and use the image to detect an object within the environment. The remote system can then send a second message to a device of a guest and a third message to a device of a user, where each of the second message and the third message indicates that the object is within the environment. In some instances, the object can include an animal while in some instances, the object can include a person.
    Type: Grant
    Filed: March 5, 2020
    Date of Patent: June 21, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Mashhour Solh, Siyi Ding, Rohith Mysore Vijaya Kumar, Xiaoran Wang
  • Patent number: 10769442
    Abstract: Techniques are generally described for scene change detection. A first and second histogram representing frames of a video may be received. A Euclidean distance between the first and second histogram may be determined. A third histogram of a third frame may be received. Values of the third histogram may be compared to corresponding values of a background model of the environment. A fourth frame and a fifth frame of image data of the video may be received. A flow value between a first block of pixels of the fourth frame and a corresponding second block of pixels of the fifth frame may be determined. The flow value may be determined based on a motion vector and a sum of absolute differences between the first and second block. A portion of the video may be streamed to a remote computing device if the flow value exceeds a threshold value.
    Type: Grant
    Filed: September 11, 2017
    Date of Patent: September 8, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Siyi Ding, Xiaoran Wang, Manika Puri, Mashhour Solh, Philip James Taylor
  • Patent number: 10657383
    Abstract: This application describes techniques for providing computer vision for manual services. In some instances, a remote system may determine that a current time is within a threshold period of time of a scheduled service and, based on the determination, send a first message requesting image data to a camera apparatus located within an environment. After sending the first message, the remote system may receive image data associated with the environment from the camera apparatus and use the image to detect an object within the environment. The remote system can then send a second message to a device of a guest and a third message to a device of a user, where each of the second message and the third message indicates that the object is within the environment. In some instances, the object can include an animal while in some instances, the object can include a person.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: May 19, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Mashhour Solh, Siyi Ding, Rohith Mysore Vijaya Kumar, Xiaoran Wang
  • Patent number: 10387658
    Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: August 20, 2019
    Assignee: SALESFORCE.COM, INC.
    Inventors: Sergey Gorbaty, Travis Safford, Xiaoran Wang, Yoel Gluck
  • Patent number: 10388092
    Abstract: This application describes techniques for providing computer vision-based surveillance of in-home services. In some instances, a remote system may authenticate a guest at an environment using data that the remote system receives from a camera apparatus. To authenticate the guest, the remote system can determine that an identification of the guest matches an identification of a worker associated with a scheduled service at the environment. When the scheduled service includes an in-home delivery, the remote system can further determine that a package in possession of the guest matches an item for the scheduled in-home delivery. In some instances, after the guest enters the environment, the remote system can further monitor the environment to ensure that the guest stays within a designated location of the environment. The remote system can further send a message to an electronic device when the guest is outside of the designated location.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: August 20, 2019
    Assignee: Amazon Technologies, Inc.
    Inventors: Mashhour Solh, Siyi Ding, Rohith Mysore Vijaya Kumar, Xiaoran Wang
  • Patent number: 10380347
    Abstract: A runtime analysis framework (RTA) stores a hierarchical list of input tags and a hierarchical list of output tags. The RTA stores defined vulnerabilities that include associated input tags and output tags. During runtime the software application may receive a request from a user system. The RTA assigns an input tag from the hierarchical list of input tags to an object associated with the request and assigns an output tag from the hierarchical list of output tags to a method generating a response to the request. The RTA identifies one of the defined vulnerabilities as a potential vulnerability if the assigned output tag and output tag associated the potential vulnerability are in a same subtree of the hierarchical list of output tags and the assigned input tag and the input tag associated with the potential vulnerability are in a same subtree of the hierarchical list of input tags.
    Type: Grant
    Filed: June 8, 2016
    Date of Patent: August 13, 2019
    Assignee: SALESFORCE.COM., INC.
    Inventors: Sergey Gorbaty, Travis Safford, Xiaoran Wang
  • Publication number: 20190042762
    Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.
    Type: Application
    Filed: October 11, 2018
    Publication date: February 7, 2019
    Applicant: salesforce.com, inc.
    Inventors: Sergey GORBATY, Trav is SAFFORD, Xiaoran WANG, Yoel GLUCK
  • Patent number: 10140456
    Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.
    Type: Grant
    Filed: June 8, 2016
    Date of Patent: November 27, 2018
    Assignee: SALESFORCE.COM, INC.
    Inventors: Sergey Gorbaty, Travis Safford, Xiaoran Wang, Yoel Gluck
  • Publication number: 20170357811
    Abstract: A runtime analysis framework (RTA) stores a hierarchical list of input tags and a hierarchical list of output tags. The RTA stores defined vulnerabilities that include associated input tags and output tags. During runtime the software application may receive a request from a user system. The RTA assigns an input tag from the hierarchical list of input tags to an object associated with the request and assigns an output tag from the hierarchical list of output tags to a method generating a response to the request. The RTA identifies one of the defined vulnerabilities as a potential vulnerability if the assigned output tag and output tag associated the potential vulnerability are in a same subtree of the hierarchical list of output tags and the assigned input tag and the input tag associated with the potential vulnerability are in a same subtree of the hierarchical list of input tags.
    Type: Application
    Filed: June 8, 2016
    Publication date: December 14, 2017
    Applicant: salesforce.com, inc.
    Inventors: Sergey GORBATY, Travis SAFFORD, Xiaoran WANG
  • Publication number: 20170357810
    Abstract: During runtime of the software application, the runtime analysis framework may assign input tags to objects associated with the user requests. The input tags may identify the requests as potentially malicious and carry a security risk. The RTA framework then may assign sanitization tags to the objects identifying security checks performed on the objects during runtime. The RTA framework identifies output responses to the user requests that include the objects and compares the input tags assigned to the objects with any sanitization tags assigned to the objects. The RTA framework may identify the software application as susceptible to a security vulnerability when the input tags for the objects do not include corresponding sanitization tags.
    Type: Application
    Filed: June 8, 2016
    Publication date: December 14, 2017
    Applicant: salesforce.com, inc.
    Inventors: Sergey GORBATY, Travis SAFFORD, Xiaoran WANG, Yoel GLUCK