Patents by Inventor Yulong Cao

Yulong Cao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12219458
    Abstract: A data packet transmission method and apparatus are provided. The method includes: An IAB donor determines first configuration information, where the first configuration information is used to indicate a first backhaul link BH RLC channel, and the first BH RLC channel is used to transmit a control protocol data unit PDU at a backhaul adaptation protocol BAP layer. The IAB donor sends the first configuration information to an IAB node. According to the foregoing procedure, the IAB donor indicates, by using the first configuration information, the IAB node to send the control PDU at the BAP layer through the first BH RLC channel, to implement bearer mapping when the IAB node needs to send the control PDU at the BAP layer.
    Type: Grant
    Filed: March 30, 2022
    Date of Patent: February 4, 2025
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Yuanping Zhu, Yulong Shi, Jing Liu, Yibin Zhuo, Zhenzhen Cao, Mingzeng Dai
  • Publication number: 20250029489
    Abstract: In various examples, a traffic model including one or more traffic scenarios may be generated and/or updated based on using human feedback. Human feedback may be provided indicating a preference for various traffic scenarios to identify which scenarios in a model are more realistic. A reward model may capture the preference information and rank the realism of one or more traffic scenarios.
    Type: Application
    Filed: October 12, 2023
    Publication date: January 23, 2025
    Inventors: Yulong Cao, Chaowei Xiao, Marco Pavone, Boris Ivanovic
  • Publication number: 20240017745
    Abstract: Apparatuses, systems, and techniques to generate trajectory data for moving objects. In at least one embodiment, adversarial trajectories are generated to evaluate a trajectory prediction model and are based, at least in part, on a differentiable dynamic model.
    Type: Application
    Filed: July 14, 2022
    Publication date: January 18, 2024
    Inventors: Yulong Cao, Chaowei Xiao, Danfei Xu, Anima Anandkumar, Marco Pavone
  • Patent number: 11120108
    Abstract: The present disclosure relates generally to managing security artifacts for a software application executing on a software stack. Techniques are described for defining a security configuration such that each layer of the software stack may be associated with one or more datastores, each datastore including one or more security artifacts for a particular layer. The security configuration may specify, for example, an order in which the various datastores are to be accessed when a request is received for a security artifact that is available from multiple datastores. Using the security configuration, access to security artifacts can be handled in connection with requests generated through a particular layer in the stack. A system managing the security artifacts can provide a unified view of the datastores such that, from the end-user's perspective, there is only one logical datastore.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: September 14, 2021
    Assignee: Oracle International Corporation
    Inventors: Rohit Koul, Amit Agarwal, Dongguang Zhou, Vineet Garg, Krishnakumar Sriramadhesikan, Supriya Kalyanasundaram, Yulong Cao, Srivatsa Manjunath, Anant D. Kadam, Deepika Damojipurapu
  • Publication number: 20190102526
    Abstract: The present disclosure relates generally to managing security artifacts for a software application executing on a software stack. Techniques are described for defining a security configuration such that each layer of the software stack may be associated with one or more datastores, each datastore including one or more security artifacts for a particular layer. The security configuration may specify, for example, an order in which the various datastores are to be accessed when a request is received for a security artifact that is available from multiple datastores. Using the security configuration, access to security artifacts can be handled in connection with requests generated through a particular layer in the stack. A system managing the security artifacts can provide a unified view of the datastores such that, from the end-user's perspective, there is only one logical datastore.
    Type: Application
    Filed: September 28, 2018
    Publication date: April 4, 2019
    Applicant: Oracle International Corporation
    Inventors: Rohit Koul, Amit Agarwal, Dongguang Zhou, Vineet Garg, Krishnakumar Sriramadhesikan, Supriya Kalyanasundaram, Yulong Cao, Srivatsa Manjunath, Anant D. Kadam, Deepika Damojipurapu
  • Patent number: 10104086
    Abstract: In certain embodiments, techniques are provided (e.g., a method, a system, non-transitory computer-readable medium storing code or instructions executable by one or more processors) to provide fine grained protection of resources in an access management environment. An access management service can intercept requests for resources (e.g., content in a content management system) and provide fine-grained authorization service for content management systems, such as Microsoft Office Sharepoint Server. The access management service can provide external policy management, evaluation and enforcement for content management systems. The access management service can include a plurality of plugins associated with different types of resources available through the content management systems. Integrating an access management service with content management systems provides both user and administrator efficiencies while enforcing a consistent level of access security across an enterprise system.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: October 16, 2018
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Srivatsa Manjunath, Yulong Cao, Premal Ramesh Desai, Juan Li, Cai Wenliang, Ding Wenfang
  • Publication number: 20160315943
    Abstract: In certain embodiments, techniques are provided (e.g., a method, a system, non-transitory computer-readable medium storing code or instructions executable by one or more processors) to provide fine grained protection of resources in an access management environment. An access management service can intercept requests for resources (e.g., content in a content management system) and provide fine-grained authorization service for content management systems, such as Microsoft Office Sharepoint Server. The access management service can provide external policy management, evaluation and enforcement for content management systems. The access management service can include a plurality of plugins associated with different types of resources available through the content management systems. Integrating an access management service with content management systems provides both user and administrator efficiencies while enforcing a consistent level of access security across an enterprise system.
    Type: Application
    Filed: December 18, 2015
    Publication date: October 27, 2016
    Inventors: Srivatsa Manjunath, Yulong Cao, Premal Ramesh Desai, Juan Li, Cai Wenliang, Ding Wenfang