Patents by Inventor Yi Gai
Yi Gai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240358771Abstract: Isolated Rhodococcus ruber, a product derived from the Rhodococcus ruber (in particular, a product derived from the Rhodococcus ruber cell wall), a method for preparing the product derived from the Rhodococcus ruber, and use of the product derived from the Rhodococcus ruber in prevention and/or treatment of lichen planus. The product derived from the Rhodococcus ruber effectively reduce the erosion area of lichen planus and relieve pain.Type: ApplicationFiled: July 12, 2024Publication date: October 31, 2024Inventors: Bo Gai, Chunyan Dou, Yi Zhang, Guoying Zhang
-
Patent number: 12102654Abstract: Isolated Rhodococcus ruber, a product derived from the Rhodococcus ruber (in particular, a product derived from the Rhodococcus ruber cell wall), a method for preparing the product derived from the Rhodococcus ruber, and use of the product derived from the Rhodococcus ruber in prevention and/or treatment of lichen planus. The product derived from the Rhodococcus ruber effectively reduce the erosion area of lichen planus and relieve pain.Type: GrantFiled: December 13, 2019Date of Patent: October 1, 2024Assignee: Liaoning Greatest Bio-Pharmaceutical Co., Ltd.Inventors: Bo Gai, Chunyan Dou, Yi Zhang, Guoying Zhang
-
Patent number: 12097224Abstract: Disclosed is a use of a cell wall skeleton of isolated Rhodococcus ruber or a composition containing the same for preparing a human papillomavirus infection treatment drug. The cell wall skeleton of Rhodococcus ruber isolated from Rhodococcus ruber was stored and preserved at China General Microbiological Culture Collection Center, No. 1, West Beichen Road, Chaoyang District, Beijing on Mar. 22, 2019 with accession number CGMCC 17431.Type: GrantFiled: December 24, 2019Date of Patent: September 24, 2024Assignee: Liaoning Greatest Bio-Pharmaceutical Co., Ltd.Inventors: Bo Gai, Chunyan Dou, Yi Zhang, Guoying Zhang
-
Patent number: 12064458Abstract: A use of a cell wall or a cell wall skeleton of Rhodococcus ruber in preparing a drug for treating a thermal injury. The thermal injury comprises a burn, a scald and a chemical burn. Applying the Rhodococcus ruber product to a subject has a good therapeutic effect on a thermal injury and has no side effects.Type: GrantFiled: April 23, 2020Date of Patent: August 20, 2024Assignee: Liaoning Greatest Bio-Pharmaceutical Co., Ltd.Inventors: Bo Gai, Chunyan Dou, Yi Zhang, Guoying Zhang
-
Patent number: 11783029Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to improve feature engineering efficiency. An example method disclosed herein includes retrieving a log file in a first file format, the log file containing feature occurrence data, generating a first unit operation based on the first file format to extract the feature occurrence data from the log file to a string, the first unit operation associated with a first metadata tag, generating second unit operations to identify respective features from the feature occurrence data, the second unit operations associated with respective second metadata tags, and generating a first sequence of the first metadata tag and the second metadata tags to create a first vector output file of the feature occurrence data.Type: GrantFiled: January 4, 2021Date of Patent: October 10, 2023Assignee: Intel CorporationInventors: Chih-Yuan Yang, Yi Gai
-
Patent number: 11620397Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate electronic data security. An example apparatus includes a data storage including a memory adjusted to store data organized according to a data table including columns identifying a first data record and a first security tag associated with the first data record. In the example apparatus, retrieval of data from the data storage involves a bit operation comparing the first security tag with a first privilege tag. In the example apparatus, the data storage provides the first data record when the bit operation comparing the first security tag with the first privilege tag has a non-zero result, and the data storage does not provide the first data record when the bit operation comparing the first security tag with the first privilege tag has a zero result.Type: GrantFiled: April 9, 2020Date of Patent: April 4, 2023Assignee: Intel CorporationInventors: Chih-Yuan Yang, Yi Gai
-
Patent number: 11568051Abstract: A malicious object detection system for use in managed runtime environments includes a check circuit to receive call information generated by an application, such as an Android application. A machine learning circuit coupled to the check circuit applies a machine learning model to assess the information and/or data included in the call and detect the presence of a malicious object, such as malware or a virus, in the application generating the call. The machine learning model may include a global machine learning model distributed across a number of devices, a local machine learning model based on use patterns of a particular device, or combinations thereof. A graphical user interface management circuit halts execution of applications containing malicious objects and generates a user perceptible output.Type: GrantFiled: February 3, 2020Date of Patent: January 31, 2023Assignee: Intel CorporationInventors: Mingwei Zhang, Xiaoning Li, Ravi L. Sahita, Aravind Subramanian, Abhay S. Kanhere, Chih-Yuan Yang, Yi Gai
-
Patent number: 11160113Abstract: Technology for switching from a wireless local area network (WLAN) to a wireless wide area network (WWAN) is disclosed. A multi-radio access technology (multi-RAT) user equipment (UE) can receive WLAN-specific dedicated physical random access channel (PRACH) allocation information from an evolved node B (eNB) to enable the multi-RAT UE to perform an inter-RAT WLAN-to-WWAN handover. The multi-RAT UE can initiate the inter-RAT WLAN-to-WWAN handover at the multi-RAT UE by performing random access with the eNB using the WLAN-specific dedicated PRACH allocation information.Type: GrantFiled: January 22, 2018Date of Patent: October 26, 2021Assignee: APPLE INC.Inventors: Jing Zhu, Yi Gai
-
Publication number: 20210200863Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to improve feature engineering efficiency.Type: ApplicationFiled: January 4, 2021Publication date: July 1, 2021Inventors: Chih-Yuan Yang, Yi Gai
-
Publication number: 20210056217Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate electronic data security. An example apparatus includes a data storage including a memory adjusted to store data organized according to a data table including columns identifying a first data record and a first security tag associated with the first data record. In the example apparatus, retrieval of data from the data storage involves a bit operation comparing the first security tag with a first privilege tag. In the example apparatus, the data storage provides the first data record when the bit operation comparing the first security tag with the first privilege tag has a non-zero result, and the data storage does not provide the first data record when the bit operation comparing the first security tag with the first privilege tag has a zero result.Type: ApplicationFiled: April 9, 2020Publication date: February 25, 2021Inventors: Chih-Yuan Yang, Yi Gai
-
Patent number: 10915627Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to improve feature engineering efficiency. An example method disclosed herein includes retrieving a log file in a first file format, the log file containing feature occurrence data, generating a first unit operation based on the first file format to extract the feature occurrence data from the log file to a string, the first unit operation associated with a first metadata tag, generating second unit operations to identify respective features from the feature occurrence data, the second unit operations associated with respective second metadata tags, and generating a first sequence of the first metadata tag and the second metadata tags to create a first vector output file of the feature occurrence data.Type: GrantFiled: February 28, 2020Date of Patent: February 9, 2021Assignee: INTEL CORPORATIONInventors: Chih-Yuan Yang, Yi Gai
-
Publication number: 20200372151Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to improve feature engineering efficiency.Type: ApplicationFiled: February 28, 2020Publication date: November 26, 2020Inventors: Chih-Yuan Yang, Yi Gai
-
Publication number: 20200175166Abstract: A malicious object detection system for use in managed runtime environments includes a check circuit to receive call information generated by an application, such as an Android application. A machine learning circuit coupled to the check circuit applies a machine learning model to assess the information and/or data included in the call and detect the presence of a malicious object, such as malware or a virus, in the application generating the call. The machine learning model may include a global machine learning model distributed across a number of devices, a local machine learning model based on use patterns of a particular device, or combinations thereof. A graphical user interface management circuit halts execution of applications containing malicious objects and generates a user perceptible output.Type: ApplicationFiled: February 3, 2020Publication date: June 4, 2020Applicant: Intel CorporationInventors: Mingwei Zhang, Xiaoning Li, Ravi L. Sahita, Aravind Subramanian, Abhay S. Kanhere, Chih-Yuan Yang, Yi Gai
-
Patent number: 10621370Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate electronic data security. An example apparatus includes a data storage including a memory adjusted to store data organized according to a data table including columns identifying a first data record and a first security tag associated with the first data record. In the example apparatus, retrieval of data from the data storage involves a bit operation comparing the first security tag with a first privilege tag. In the example apparatus, the data storage provides the first data record when the bit operation comparing the first security tag with the first privilege tag has a non-zero result, and the data storage does not provide the first data record when the bit operation comparing the first security tag with the first privilege tag has a zero result.Type: GrantFiled: May 27, 2016Date of Patent: April 14, 2020Assignee: Intel CorporationInventors: Chih-Yuan Yang, Yi Gai
-
Patent number: 10607004Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to improve feature engineering efficiency. An example method disclosed herein includes retrieving a log file in a first file format, the log file containing feature occurrence data, generating a first unit operation based on the first file format to extract the feature occurrence data from the log file to a string, the first unit operation associated with a first metadata tag, generating second unit operations to identify respective features from the feature occurrence data, the second unit operations associated with respective second metadata tags, and generating a first sequence of the first metadata tag and the second metadata tags to create a first vector output file of the feature occurrence data.Type: GrantFiled: September 29, 2016Date of Patent: March 31, 2020Assignee: INTEL CORPORATIONInventors: Chih-Yuan Yang, Yi Gai
-
Patent number: 10552609Abstract: A malicious object detection system for use in managed runtime environments includes a check circuit to receive call information generated by an application, such as an Android application. A machine learning circuit coupled to the check circuit applies a machine learning model to assess the information and/or data included in the call and detect the presence of a malicious object, such as malware or a virus, in the application generating the call. The machine learning model may include a global machine learning model distributed across a number of devices, a local machine learning model based on use patterns of a particular device, or combinations thereof. A graphical user interface management circuit halts execution of applications containing malicious objects and generates a user perceptible output.Type: GrantFiled: December 30, 2016Date of Patent: February 4, 2020Assignee: Intel CorporationInventors: Mingwei Zhang, Xiaoning Li, Ravi L. Sahita, Aravind Subramanian, Abhay S. Kanhere, Chih-Yuan Yang, Yi Gai
-
Patent number: 10333856Abstract: Systems and methods to support intra-application flow prioritization are disclosed herein. User equipment (UE) may be configured to communicatively couple to an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Node B (eNB). The eNB may transmit packets from the UE to an evolved packet core (EPC), which may transmit schedule packets to an application function (AF) via a network. The AF may provide classification information and prioritization information for a plurality of intra-application flows transmitted between the AF and the UE. The EPC may classify uplink and/or downlink traffic into the intra-application flows and mark and/or schedule the traffic based on the prioritization information. Absolute and/or modular length, payload values, and/or packet type may be used to classify the traffic into the intra-application flows.Type: GrantFiled: January 25, 2018Date of Patent: June 25, 2019Assignee: INTEL CORPORATIONInventors: Jing Zhu, Yi Gai
-
Publication number: 20190029048Abstract: Technology for switching from a wireless local area network (WLAN) to a wireless wide area network (WWAN) is disclosed. A multi-radio access technology (multi-RAT) user equipment (UE) can receive WLAN-specific dedicated physical random access channel (PRACH) allocation information from an evolved node B (eNB) to enable the multi-RAT UE to perform an inter-RAT WLAN-to-WWAN handover. The multi-RAT UE can initiate the inter-RAT WLAN-to-WWAN handover at the multi-RAT UE by performing random access with the eNB using the WLAN-specific dedicated PRACH allocation information.Type: ApplicationFiled: January 22, 2018Publication date: January 24, 2019Inventors: JING ZHU, YI GAI
-
Publication number: 20180189489Abstract: A malicious object detection system for use in managed runtime environments includes a check circuit to receive call information generated by an application, such as an Android application. A machine learning circuit coupled to the check circuit applies a machine learning model to assess the information and/or data included in the call and detect the presence of a malicious object, such as malware or a virus, in the application generating the call. The machine learning model may include a global machine learning model distributed across a number of devices, a local machine learning model based on use patterns of a particular device, or combinations thereof. A graphical user interface management circuit halts execution of applications containing malicious objects and generates a user perceptible output.Type: ApplicationFiled: December 30, 2016Publication date: July 5, 2018Inventors: Mingwei Zhang, Xiaoning Li, Ravi L. Sahita, Aravind Subramanian, Abhay S. Kanhere, Chih-Yuan Yang, Yi Gai
-
Publication number: 20180152389Abstract: Systems and methods to support intra-application flow prioritization are disclosed herein. User equipment (UE) may be configured to communicatively couple to an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Node B (eNB). The eNB may transmit packets from the UE to an evolved packet core (EPC), which may transmit schedule packets to an application function (AF) via a network. The AF may provide classification information and prioritization information for a plurality of intra-application flows transmitted between the AF and the UE. The EPC may classify uplink and/or downlink traffic into the intra-application flows and mark and/or schedule the traffic based on the prioritization information. Absolute and/or modular length, payload values, and/or packet type may be used to classify the traffic into the intra-application flows.Type: ApplicationFiled: January 25, 2018Publication date: May 31, 2018Applicant: INTEL CORPORATIONInventors: Jing Zhu, Yi Gai