Patents by Inventor Yongwei Wu

Yongwei Wu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180006504
    Abstract: A power transmitting device is disclosed comprising: one or more coils; at least one memory that stores computer-executable instructions; and at least one processor configured to access the at least one memory. The at least one processor may be configured to execute the computer-executable instructions to: cause to send to a first device a first load measurement request at a first instance and a second load measurement request at a second instance. The computer-executable instructions may cause the processor to receive a first load measurement associated with the first load measurement request and a second load measurement associated with the second load measurement request. The computer-executable instructions may cause the processor to determine a first average measurement of the first load measurement and the second load measurement.
    Type: Application
    Filed: July 1, 2016
    Publication date: January 4, 2018
    Inventors: Xintian E. Lin, Lei Shao, Bolat Dinc, Kai Liu, Sen Lin, Qinghua Li, Yongwei Wu
  • Publication number: 20170229925
    Abstract: Wireless link management techniques for wireless charging systems are described. According to some such techniques, a power receiving unit (PRU) may be configured to observe a rectifier voltage while operating in a charge complete connected (CCC) mode according to which it possesses a wireless connection with a power transmitting unit (PTU) operating in a power save state. In various embodiments, the PRU may be configured to observe the rectifier voltage in an attempt to detect power beacons generated by the PTU. In some embodiments, the PRU may be configured to maintain the wireless connection if it detects power beacons, and to terminate the wireless connection if it does not detect any beacons. Other embodiments are described and claimed.
    Type: Application
    Filed: June 30, 2016
    Publication date: August 10, 2017
    Inventors: HOOMAN SHIRANI-MEHR, AHMAD KHOSHNEVIS, YONGWEI WU
  • Publication number: 20170170687
    Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for wireless power transfer with improved device identification and signaling security. A Power Receiving Unit (PRU) may include a receive resonator module to receive power from a Power Transmitting Unit (PTU) over an inductive resonant coupling link. The power may be modulated to provide signaling between the PRU and the PTU over the resonant coupling link. The PRU may also include a signaling link communication module to provide a second type of signaling between the PRU and the PTU over a wireless communication link. The PRU may further include a controller module to receive a random number, generated by the PTU, over the resonant coupling link; calculate an encoded response based on the random number and on an identifier of the PRU; and transmit the encoded response to the PTU over the wireless communication link, for verification by the PTU.
    Type: Application
    Filed: May 21, 2014
    Publication date: June 15, 2017
    Applicant: Intel Corporation
    Inventors: Yongwei Wu, Ahmad Farbod Khoshnevis
  • Publication number: 20150199243
    Abstract: A data backup method of a distributed file system is provided. The method is based on a comparison of a source file system and a target file system. Metadata of the target file system is compared with metadata of the source file system. The method includes: synchronizing target metadata of a target file according to source metadata of a source file, generating a file checksum list; determining whether a first target block is consistent with a first source block, obtaining and sending a first updated file checksum list to a first data node; determining whether a first chunk is consistent with a first target chunk, generating a first difference list, sending the first difference list and the first updated file checksum list to a first corresponding target data node; creating a temporary block, writing data in the temporary block, replacing the first corresponding target block with the temporary block.
    Type: Application
    Filed: January 9, 2015
    Publication date: July 16, 2015
    Inventors: Yongwei WU, Kang CHEN, Weimin ZHENG, Zhenqiang LI
  • Publication number: 20150186163
    Abstract: In an application virtualization method, a first scanning step for scanning a target operation system and recording document information and registry information of the target operation system; a tracking step for installing an application to the target operation system and tracking operations to the document information and the registry information of the target operation system during installing the application; a second scanning step for scanning the target operation system and obtaining changes of the document information and the registry information of the operation system; and a launcher generating step for generating a launcher for starting up the application according to the changes of the document information and the registry information of the operation system are included. The present disclosure also provides an application virtualization system. Virtualization level is increased by the method and the system.
    Type: Application
    Filed: December 23, 2014
    Publication date: July 2, 2015
    Inventors: YONGWEI WU, KANG CHEN, WENLEI ZHU, WEIMIN ZHENG
  • Publication number: 20150163668
    Abstract: The present disclosure disclosures a protecting system and method for privacy information in a mobile terminal. In the system, a crowdsourcing database stores security strategy information of applications. An interaction management module receives a recommendation request of security strategy sent by the mobile terminal. A recommendation algorithm module calculates according to the recommendation request of security strategy to obtain corresponding recommended security strategy. An interaction management module recommends the recommended security strategy to the privacy protecting module. A privacy protecting module notifies a user and assists the mobile terminal to set privacy protection strategy according to the recommended security strategy recommended by the interaction management module, and protects the privacy information in the mobile terminal according to the privacy protection strategy. The system can set privacy protection dynamically. In this way, user experience is improved.
    Type: Application
    Filed: December 9, 2014
    Publication date: June 11, 2015
    Inventors: Yongwei WU, Kai HUANG, Kang CHEN, Huan FENG
  • Publication number: 20150161030
    Abstract: In a detecting method for concurrency bugs, a Current Fetter Set is defined for a dynamic instance of a static instruction in program invariants. A Belonging Invariants Set and an Enforcing Invariants Set from the Current Fetter Set are extracted. The Belonging Invariants Set and the Enforcing Invariants Set are pruned to obtain final results after pruning and storing the final results after pruning in an invariants database. Invariant violation is detected using a detection unit whether a first Current Fetter Set dissatisfying with corresponding Belonging Invariants Set and Enforcing Invariants Set is shown. If yes, the first Current Fetter Set is determined to contain a bug, the detection unit generating a violation report. A currently-running thread (the violated thread) is stalled to prevent running of the bug.
    Type: Application
    Filed: December 6, 2014
    Publication date: June 11, 2015
    Inventors: Yongwei WU, Kang CHEN, Weimin ZHENG, Mingxing ZHANG
  • Publication number: 20050241267
    Abstract: Receptacles having a multi-ply panel wall structure. The multi-ply panel comprises primarily natural and/or bio-degradable fibrous or cellulose materials, such as wood. The wood multi-ply panel is processed and formed by pressing multiple layers of thin wood sheets that retain their natural grain structure. The sheets are heat pressed molded to shape into the desired receptacle configuration, which may be done in a single step. The wood layer may have a corrugated sheet structure.
    Type: Application
    Filed: April 11, 2005
    Publication date: November 3, 2005
    Inventor: Yongwei Wu