Patents by Inventor Yao He

Yao He has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240152103
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing an electric grid time synchronization process. The process can include: receiving, from a GPS transceiver of a first device coupled to an electric power grid, data including a GPS time reference; formatting the GPS time reference into a data packet, where the data packet has a particular format compatible with power line communication; and broadcasting, by the first device and using power line communications, the data packet to a plurality of electric grid components.
    Type: Application
    Filed: November 4, 2022
    Publication date: May 9, 2024
    Inventors: Rui Yao, Xinyue Li, Leo Francis Casey, Mike Miao He
  • Publication number: 20240154782
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing electric grid timing coordination. The method can include: receiving, by a first electric grid device, a message from a second electric grid device, the message including a first clock value associated with an oscillator of the second electric grid device; determining, based on the first clock value, a second-first device time offset between the second electric grid device and the first electric grid device; and storing the second-first device time offset in a time offset table stored at the first electric grid device.
    Type: Application
    Filed: November 4, 2022
    Publication date: May 9, 2024
    Inventors: Mike Miao He, Rui Yao, Xinyue Li, Leo Francis Casey
  • Publication number: 20240140923
    Abstract: The present disclosure relates to the technical field of drug synthesis, and provides a method for preparing a key intermediate of ABT-737 and a method for preparing ABT-737. In the present disclosure, the compound having a structure represented by formula I is used as the starting material. The carboxyl group in the compound having a structure represented by formula I is first reduced to a hydroxyl group, followed by a vulcanization by a vulcanizing agent, and then an amination, a deprotection, a condensation, and a carbonyl group reduction, to obtain the key intermediate of ABT-737 having a structure represented by formula VI. Tert-butoxycarbonyl is used as the protecting group for the compound having a structure represented by formula I, and the subsequent intermediate containing the protecting group of tert-butoxycarbonyl is stable, and easy to be deprotected. This method is suitable for mass synthesis, with high product yield and low production cost, and thus has a good industrialization prospect.
    Type: Application
    Filed: June 17, 2021
    Publication date: May 2, 2024
    Applicant: Xeon Biopharmaceutical Limited
    Inventors: Yanfei GU, Yao HE
  • Publication number: 20240095061
    Abstract: A computer-implemented method for aligning a sensor to reference coordinate system includes initiating a plurality of threads, each thread executes simultaneously and independent of each other. A first thread parses data received from the sensor and stores the parsed data in a data buffer. A second thread computes an alignment transformation using the parsed data to determine alignment between the sensor and the reference coordinate system. The computing includes checking that the data buffer contains at least predetermined amount of data. If at least the predetermined amount of data exists, an intermediate result is computed using the parsed data in the data buffer; otherwise, the second thread waits for the first thread to add more data to the data buffer. The second thread outputs the intermediate result into the data buffer. A third thread outputs the alignment transformation, in response to completion of alignment computations.
    Type: Application
    Filed: September 19, 2022
    Publication date: March 21, 2024
    Inventors: Xinyu Du, Guanlun He, Yao Hu, Binbin Li, Hao Yu
  • Publication number: 20240095954
    Abstract: A vehicle includes a system performing a method of operating a camera for the vehicle. The camera is configured to capture an image. The processor is configured to query the camera to obtain an intrinsic parameter of the camera, estimate a unified parameter based on the intrinsic parameter of the camera, and perform at least one application on the image using the unified parameter.
    Type: Application
    Filed: September 19, 2022
    Publication date: March 21, 2024
    Inventors: Yao Hu, Hao Yu, Guanlun He, Xinyu Du, Binbin Li
  • Patent number: 11926914
    Abstract: Provided is a tungsten electrode for molten salt electrolysis for rare earth metals preparation, including an open tungsten shell and a copper alloy body; wherein the copper alloy body is arranged inside the open tungsten shell; a tungsten buffer layer is provided between a side wall of the copper alloy body and the open tungsten shell; and a bottom of the copper alloy body is in contact with an inner bottom of the open tungsten shell.
    Type: Grant
    Filed: August 28, 2023
    Date of Patent: March 12, 2024
    Assignee: Ganzhou Chenguang Rare Earths New Material Co., Ltd.
    Inventors: Shaohua Yang, Zhenhong Cui, Hui Li, Senlin Ouyang, Yao Xie, Fangsong He, Guangdong Wu, Kangwei Xie
  • Publication number: 20240013804
    Abstract: The present disclosure discloses a device with a protective layer, including a substrate, a seed layer formed on the substrate, and a diamond-like carbon layer formed on the seed layer, where the seed layer is a silicon nitride layer, and a content of nitrogen in the silicon nitride layer is 9%-17%. The present disclosure further discloses a microwave-assisted magnetic recording (MAMR) head slider, a head gimbal assembly, and a disk drive unit. The device has good thermal stability, oxidation resistance and corrosion resistance, thereby improving reliability and prolonging service life of an MAMR head.
    Type: Application
    Filed: July 6, 2023
    Publication date: January 11, 2024
    Inventors: Da Yao HE, Rong HUANG, Hua LI, Jian Hui HUANG, Peng LIU
  • Patent number: 11775511
    Abstract: A computer retrieves data from a database. The computer retrieves a Machine Learning (ML) model trained to generate database queries. The computer applies the ML model to generate a primary database query based, at least in part, on a user inquiry available to the computer. The computer retrieves the primary database query, an initial set of data from a database available to the computer. The computer, in response to retrieving the initial set of data, receives feedback assessing the initial set of data. The computer, in response to receiving the feedback, applies a Natural Language Processing (NLP) model to identify query adjustment content within the feedback. The computer revises the primary database query based, at least in part, on the model adjustment content, to generate a secondary database query. The computer retrieves using the secondary database query, a secondary set of data from the database.
    Type: Grant
    Filed: August 3, 2021
    Date of Patent: October 3, 2023
    Assignee: International Business Machines Corporation
    Inventors: Wen Wang, Yi Chen Zhong, Yi Ming Wang, Lu Yu, Liu Yao He
  • Publication number: 20230222214
    Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.
    Type: Application
    Filed: January 10, 2023
    Publication date: July 13, 2023
    Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
  • Publication number: 20230041181
    Abstract: A computer retrieves data from a database. The computer retrieves a Machine Learning (ML) model trained to generate database queries. The computer applies the ML model to generate a primary database query based, at least in part, on a user inquiry available to the computer. The computer retrieves the primary database query, an initial set of data from a database available to the computer. The computer, in response to retrieving the initial set of data, receives feedback assessing the initial set of data. The computer, in response to receiving the feedback, applies a Natural Language Processing (NLP) model to identify query adjustment content within the feedback. The computer revises the primary database query based, at least in part, on the model adjustment content, to generate a secondary database query. The computer retrieves using the secondary database query, a secondary set of data from the database.
    Type: Application
    Filed: August 3, 2021
    Publication date: February 9, 2023
    Inventors: Wen Wang, Yi Chen Zhong, Yi Ming Wang, Lu Yu, Liu Yao He
  • Patent number: 11550912
    Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.
    Type: Grant
    Filed: June 16, 2020
    Date of Patent: January 10, 2023
    Assignee: SONICWALL INC.
    Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
  • Publication number: 20220354923
    Abstract: The present invention provides compounds which are selective kappa-opioid receptor agonist, method of preparation of these compounds, compositions that comprise these compounds, and methods for treating kappa-opiod receptor agonist related medical disorders.
    Type: Application
    Filed: July 11, 2022
    Publication date: November 10, 2022
    Inventors: Subo Liao, Jun Yang, Jinliang Lv, Zongquan Liao, Hao Zhou, Jueyuan Gao, Tianpeng Xie, Quanli Yang, Yao He, Dali Liang, Rong Liu
  • Publication number: 20220012220
    Abstract: The present invention may include a computer receives raw data. The computer converts the raw data into a dataset, where the dataset comprises independent variables and dependent variables. Then, the computer clusters the dataset to determine a corresponding target value to each of a plurality of clusters. The computer constructs a nonlinear programming problem based on a prior experience and generates an enlarged dataset by solving the nonlinear programming problem.
    Type: Application
    Filed: July 7, 2020
    Publication date: January 13, 2022
    Inventors: Zhi Yong Jia, Yu Ying YY Wang, Wei Liu, Liu Yao He
  • Patent number: 10961512
    Abstract: The present disclosure provides methods for extracting viral particles from a sample comprising cells enclosing the viral particles. Also provided are kits that includes two or more items selected from a cell suspension solution, a cell lysis solution, a first fractionation solution, a second fractionation solution, a pellet suspension solution, a solid phase chromatography column, and a viral concentration set such as centrifugal filters.
    Type: Grant
    Filed: April 17, 2017
    Date of Patent: March 30, 2021
    Assignee: Dao-Yao He
    Inventor: Dao-Yao He
  • Publication number: 20200380127
    Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.
    Type: Application
    Filed: June 16, 2020
    Publication date: December 3, 2020
    Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
  • Patent number: 10685110
    Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: June 16, 2020
    Assignee: SONICWALL INC.
    Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
  • Publication number: 20190345434
    Abstract: The present disclosure provides compositions and methods for extracting viral particles of a recombinant adeno-associated virus (AAV) or an adenovirus (AdV) from a sample comprising cells enclosing the viral particles. The method can include lysing the cells with the addition of an alkaline lysis solution to the sample such that the sample comprises compound(s) buffering pH value about 9.0 to about 11.5 and about 0.1% to about 1% of a detergent precipitating host cell proteins by adding a salting solution to the sample such that the sample comprises about 0.5 M to about 2.0 M of a salt and has a pH of about 4.0 to about 7.0.
    Type: Application
    Filed: February 8, 2019
    Publication date: November 14, 2019
    Inventor: Dao-Yao He
  • Publication number: 20190205537
    Abstract: The present disclosure is directed to monitoring internal process memory of a computer at a time with program code executes. Methods and apparatus consistent with the present disclosure monitor the operation of program code with the intent of detecting whether received program inputs may exploit vulnerabilities that may exist in the program code at runtime. By detecting suspicious activity or malicious code that may affect internal process memory at run-time, methods and apparatus described herein identify suspected malware based on suspicious actions performed as program code executes. Runtime exploit detection may detect certain anomalous activities or chain of events in a potentially vulnerable application during execution. These events may be detected using instrumentation code when a regular code execution path of an application is deviated from.
    Type: Application
    Filed: December 29, 2017
    Publication date: July 4, 2019
    Inventors: Soumyadipta Das, Sai Sravan Kumar Ganachari, Yao He, Aleksandr Dubrovsky
  • Patent number: 10294452
    Abstract: The present disclosure provides compositions and methods for extracting viral particles of a recombinant adeno-associated virus (AAV) or an adenovirus (AdV) from a sample comprising cells enclosing the viral particles. The method can include lysing the cells with the addition of an alkaline lysis solution to the sample such that the sample comprises compound(s) buffering pH value about 9.0 to about 11.5 and about 0.1% to about 1% of a detergent precipitating host cell proteins by adding a salting solution to the sample such that the sample comprises about 0.5 M to about 2.0 M of a salt and has a pH of about 4.0 to about 7.0.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: May 21, 2019
    Inventor: Dao-Yao He
  • Patent number: 10148109
    Abstract: A charge wake-up circuit for a battery management system (“BMS”) for an electric vehicle, the circuit including a charging plug connection circuit, a comparator circuit, and a DC wake-up circuit. The charge wake-up circuit monitors the state of the charger after the BMS turns off. If the charger charges the battery pack after the BMS turns off, the BMS will be started by the charge wake-up circuit and continue to monitor the battery pack. If the charger is off-line, the BMS will maintain the low-power state to prevent the automotive lead-acid battery from over-discharging.
    Type: Grant
    Filed: April 12, 2016
    Date of Patent: December 4, 2018
    Assignee: Hefei University of Technology
    Inventors: Xintian Liu, Yao He, Xinxin Zheng