Patents by Inventor Yanjun Luo
Yanjun Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240122133Abstract: Disclosed are a low-cost high-efficiency drip irrigation system for a cotton field and a use method thereof. The drip irrigation system for a cotton field includes a filtering device and a water supply device; wherein the filtering device adopts different types of single filtering devices or combined filtering devices according to different water source types; the water supply device includes multiple stages of main pipes, submain pipes and laterals; the laterals (a drip irrigation tape with labyrinth on one side or a drip irrigation tape inlaid with emitters inside) are laid on the surface of the ground and located below a mulch film. The drip irrigation system adopts the design of large flow (1.5-3.4 L/h), slightly larger pipe diameter (>75 mm), low water pressure (operating pressure of drip irrigation tape being 0.03-0.07 MPa) and suitable drip irrigation uniformity (80%-90%).Type: ApplicationFiled: December 9, 2023Publication date: April 18, 2024Applicants: Institute of Cash Crops, Xinjiang Academy of Agricultural Sciences, Shihezi UniversityInventors: Liwen TIAN, Honghai Luo, Hezhong Dong, Na Zhang, Liantao Liu, Guangping Feng, Zhanbiao Wang, Yanjun Zhang, Xianzhe Hao, Jin Li, Zhi Chen, Nan Zhao, Changwen Liu
-
Publication number: 20240095360Abstract: Disclosed are a RISC-V and O-CFI mechanism-based defense method and apparatus for code reuse attacks, comprising: constructing a control flow graph according to program source codes randomized in a basic block order; on the basis of the control flow graph, obtaining a boundary range of a control flow transfer branch; executing the program source codes, obtaining a target node to which each control flow is to be transferred, and analyzing each target node in combination with the boundary range so as to defend against an abnormal control flow. The present invention can identify an illegal control flow transfer with the assistance of RISC-V security hardware according to the characteristics of a program control flow itself, and effectively handle code reuse attacks, thereby enhancing the security defense capabilities of an RISC-V system.Type: ApplicationFiled: December 3, 2021Publication date: March 21, 2024Inventors: Yanjun WU, Chang LIU, Chen ZHAO, Jingzheng WU, Zhiqing RUI, Bin WU, Tianyue LUO
-
Patent number: 11919273Abstract: A composite structure comprising a resinous component that is adhered to a surface of a metal component is provided. The resinous component is formed from a polymer composition that comprises a polyarylene sulfide, inorganic fibers, and an impact modifier. The inorganic fibers have an aspect ratio of from about 1.5 to about 10.Type: GrantFiled: July 11, 2022Date of Patent: March 5, 2024Assignee: Ticona LLCInventors: Junchen Ding, Yanjun Li, Rong Luo
-
Patent number: 10972908Abstract: A wireless network connection method includes: scanning a graphical code to acquire graphical code information carried in the graphical code, the graphical code information including encryption information and the encryption information being used for acquiring configuration information of a wireless network; decrypting the encryption information to acquire the configuration information; and connecting to the wireless network by using the configuration information.Type: GrantFiled: November 12, 2019Date of Patent: April 6, 2021Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Peng Jiang, Shaofei Ju, Jinkai Mai, Shichuan Liu, Yanjun Luo, Linpeng Liu
-
Publication number: 20200084621Abstract: A wireless network connection method includes: scanning a graphical code to acquire graphical code information carried in the graphical code, the graphical code information including encryption information and the encryption information being used for acquiring configuration information of a wireless network; decrypting the encryption information to acquire the configuration information; and connecting to the wireless network by using the configuration information.Type: ApplicationFiled: November 12, 2019Publication date: March 12, 2020Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Peng JIANG, Shaofei JU, Jinkai MAI, Shichuan LIU, Yanjun LUO, Linpeng LIU
-
Patent number: 10506428Abstract: A wireless network connection method includes: scanning a graphical code to acquire graphical code information carried in the graphical code, the graphical code information including encryption information and the encryption information being used for acquiring configuration information of a wireless network; decrypting the encryption information to acquire the configuration information; and connecting to the wireless network by using the configuration information.Type: GrantFiled: November 28, 2016Date of Patent: December 10, 2019Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Peng Jiang, Shaofei Ju, Jinkai Mai, Shichuan Liu, Yanjun Luo, Linpeng Liu
-
Patent number: 10212179Abstract: A method for checking security of a URL for a mobile terminal includes: receiving a URL security check request sent by a mobile terminal, where the URL security check request includes a URL; determining, through querying, whether there is security information corresponding to the URL; downloading, if there is no security information corresponding to the URL and the URL is a mobile application program download URL, a mobile application program corresponding to the URL; checking security of the mobile application program; and correspondingly storing the security information obtained through checking and the URL.Type: GrantFiled: May 20, 2016Date of Patent: February 19, 2019Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Peng Jiang, Zhen Zhang, Shaofei Ju, Shichuan Liu, Yanjun Luo, Jiubiao Chen, Xing Zeng
-
Patent number: 9772768Abstract: The present disclosure relates to a touch page control method, including: receiving a page opening request; performing determination on a page to be opened, to determine whether controls exist in the page; counting, if the controls exist in the page, the number of the controls, and determining locations of the controls; creating gesture areas according to the number of the controls, where the number of the gesture areas corresponds to the number of the controls; and displaying, in the gesture areas, gestures required for activating the corresponding controls. In addition, the present disclosure further provides a touch page control system.Type: GrantFiled: October 24, 2013Date of Patent: September 26, 2017Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Difei Zou, Jun Huang, Yanjun Luo, Shengwei Lin, Yusheng Zhong, Deliang Zhu
-
Publication number: 20170078876Abstract: A wireless network connection method includes: scanning a graphical code to acquire graphical code information carried in the graphical code, the graphical code information including encryption information and the encryption information being used for acquiring configuration information of a wireless network; decrypting the encryption information to acquire the configuration information; and connecting to the wireless network by using the configuration information.Type: ApplicationFiled: November 28, 2016Publication date: March 16, 2017Applicant: Tencent Technology (Shenzhen) Company LimitedInventors: Peng JIANG, Shaofei JU, Jinkai MAI, Shichuan LIU, Yanjun LUO, Linpeng LIU
-
Publication number: 20160269433Abstract: A method for checking security of a URL for a mobile terminal includes: receiving a URL security check request sent by a mobile terminal, where the URL security check request includes a URL; determining, through querying, whether there is security information corresponding to the URL; downloading, if there is no security information corresponding to the URL and the URL is a mobile application program download URL, a mobile application program corresponding to the URL; checking security of the mobile application program; and correspondingly storing the security information obtained through checking and the URL.Type: ApplicationFiled: May 20, 2016Publication date: September 15, 2016Inventors: Peng Jiang, Zhen Zhang, Shaofei Ju, Shichuan Liu, Yanjun Luo, Jiubiao Chen, Xing Zeng
-
Publication number: 20150277747Abstract: The present disclosure relates to a touch page control method, including: receiving a page opening request; performing determination on a page to be opened, to determine whether controls exist in the page; counting, if the controls exist in the page, the number of the controls, and determining locations of the controls; creating gesture areas according to the number of the controls, where the number of the gesture areas corresponds to the number of the controls; and displaying, in the gesture areas, gestures required for activating the corresponding controls. In addition, the present disclosure further provides a touch page control system.Type: ApplicationFiled: October 24, 2013Publication date: October 1, 2015Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Difei Zou, Jun Huang, Yanjun Luo, Shengwei Lin, Yusheng Zhong, Deliang Zhu