Patents by Inventor Yuan Fan

Yuan Fan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12274957
    Abstract: A process for treating aged oil by electron beam irradiation is disclosed, comprising the following steps: step 1, homogenizing the aged oil and then feeding the aged oil into a distributor; step 2, forming a liquid layer having a certain thickness on the distributor; step 3, installing and debugging an electron beam irradiation device on the distributor; step 4, installing and debugging a phased-array microwave emitter on the distributor after installing and debugging the electron beam irradiation device; step 5, turning on the electron beam irradiation device and the phased-array microwave emitter; and step 6, dividing the treated aged oil and then allowing the aged oil after dividing to enter an oil pool and a water pool for standing. Oil flows out from an upper layer of the oil pool, a lower layer of the oil pool flows back to an aged oil storage pool.
    Type: Grant
    Filed: April 25, 2022
    Date of Patent: April 15, 2025
    Assignee: Shandong Hygiya Envtl Protection Equip Co., Ltd.
    Inventors: Yi Li, Xiaohui Fan, Liping Wei, Xudong Qing, Yuan Fan, Guangchuan Liu, Dong Yang, Xiuding Hu, Haitao Cui, Liqing Wang, Lingli Ren
  • Publication number: 20250077661
    Abstract: The present disclosure relates to the field of email security detection. Disclosed are an email security detection apparatus, method and device, and a storage medium. The method includes: an email feature extraction component, configured to collect and extract the behavior features of a sender and a recipient of an email, and the main body features of the email; a behavior feature analysis component, configured to comprehensively analyze the extracted behavior features of the sender and the receiver to identify a suspicious phishing email; a main body feature analysis component, configured to detect and analyze the extracted main body features of the email, and identify a suspicious phishing email; and an email filtering and alarming component, configured to perform filtering and real-time alarming and pushing on the suspicious phishing email identified by at least one of the behavior feature analysis component and the main body feature analysis component.
    Type: Application
    Filed: December 19, 2023
    Publication date: March 6, 2025
    Inventors: Ru FAN, Shilin MA, Yuan FAN
  • Patent number: 12216768
    Abstract: An asset scoring method and apparatus, a computer device, and a storage medium are provided. The method includes: obtaining multi-dimensional threat information data of assets to be assessed; obtaining sub-scores of dimensions according to the multi-dimensional threat information data and a preset security scoring model; according to the sub-scores of the dimensions, determining a security scoring result of the corresponding assets to be assessed; and according to the security scoring result and a preset level division rule, determining security levels of the corresponding assets to be assessed.
    Type: Grant
    Filed: April 28, 2021
    Date of Patent: February 4, 2025
    Assignee: DBAPPSECURITY CO., LTD
    Inventors: Wei Wang, Yuan Fan
  • Publication number: 20240422014
    Abstract: A TEE-based method to establish trusted and secure channel between the user and public cloud environment, an apparatus, a computer device, and a computer-readable storage medium are provided. After a TEE is started, a trusted measurement mechanism of the TEE is called to perform security measurement on an operation environment and an operation content of a computing node operated in the TEE, and a measurement result is sent to a trusted verification module. Relevant verification information is acquired from a remote verification server of the TEE, and the trusted verification module is controlled to verify the measurement result according to the relevant verification information. When it is confirmed that the operation environment of the computing node is credible and the operation content of the computing node is secure, a communication channel is established between the user and the computing node.
    Type: Application
    Filed: August 22, 2024
    Publication date: December 19, 2024
    Applicant: DBAPPSECURITY CO., LTD
    Inventors: Wubing WANG, Dongde XU, Lifeng TAO, Bo LIU, Yuan FAN
  • Publication number: 20240236144
    Abstract: Provided are a method and apparatus for identifying a malicious mining behavior, an electronic device, and a storage medium. The method includes: obtaining operation data corresponding to a target operation, on capturing of the target operation; extracting a wallet address from the operation data to obtain a wallet address set obtaining data of a network outgoing connection for external access, and determining whether the data of the network outgoing connection comprises a wallet address belonging to the wallet address set and determining that the data of the network outgoing connection corresponds to the malicious mining behavior, on determining that the data of the network outgoing connection comprises a wallet address belonging to the wallet address set.
    Type: Application
    Filed: June 30, 2021
    Publication date: July 11, 2024
    Applicant: DBAPPSECURITY CO., LTD
    Inventors: Yunchao ZHENG, Yuan FAN, Jin HUANG
  • Patent number: 11971603
    Abstract: A scope includes an objective lens system having refractive power, a relay lens system having refractive power, and an eyepiece system having refractive power. The relay lens system includes a first, a second, and a third lens groups. The second lens group includes a II-2-1 lens and a II-2-2 lens, and both of which are cemented. The third lens group includes a II-3-1 lens having a convex surface facing an object side and a II-3-2 lens having a convex surface facing an image side, and both of which are cemented. The second lens group and the third lens group can move along an optical axis to change a magnification of the relay lens system and thereby change a magnification of the scope. The objective lens system, the relay lens system, and the eyepiece system are arranged in order from the object side to the image side along the optical axis.
    Type: Grant
    Filed: December 3, 2021
    Date of Patent: April 30, 2024
    Assignees: SINTAI OPTICAL (SHENZHEN) CO., LTD., ASIA OPTICAL CO., INC.
    Inventor: Yuan-Fan Liang
  • Publication number: 20240137385
    Abstract: Provided are a method and apparatus for identifying a malicious mining behavior, an electronic device, and a storage medium. The method includes: obtaining operation data corresponding to a target operation, on capturing of the target operation; extracting a wallet address from the operation data to obtain a wallet address set obtaining data of a network outgoing connection for external access, and determining whether the data of the network outgoing connection comprises a wallet address belonging to the wallet address set and determining that the data of the network outgoing connection corresponds to the malicious mining behavior, on determining that the data of the network outgoing connection comprises a wallet address belonging to the wallet address set.
    Type: Application
    Filed: June 29, 2021
    Publication date: April 25, 2024
    Applicant: DBAPPSECURITY CO., LTD
    Inventors: Yunchao ZHENG, Yuan FAN, Jin HUANG
  • Publication number: 20240123372
    Abstract: A process for treating aged oil by electron beam irradiation is disclosed, comprising the following steps: step 1, homogenizing the aged oil and then feeding the aged oil into a distributor; step 2, forming a liquid layer having a certain thickness on the distributor; step 3, installing and debugging an electron beam irradiation device on the distributor; step 4, installing and debugging a phased-array microwave emitter on the distributor after installing and debugging the electron beam irradiation device; step 5, turning on the electron beam irradiation device and the phased-array microwave emitter; and step 6, dividing the treated aged oil and then allowing the aged oil after dividing to enter an oil pool and a water pool for standing. Oil flows out from an upper layer of the oil pool, a lower layer of the oil pool flows back to an aged oil storage pool.
    Type: Application
    Filed: April 25, 2022
    Publication date: April 18, 2024
    Inventors: YI LI, Xiaohui FAN, Liping WEI, Xudong QING, Yuan FAN, Guangchuan LIU, Dong YANG, Xiuding HU, Haitao CUI, Liqing WANG, Lingli REN
  • Patent number: 11956128
    Abstract: A test method and device for simulating a customer series deployment environment, an electronic device, and a storage medium are provided. The test method for simulating a customer series deployment environment includes: obtaining traffic data of an on-site protected host; obtaining session data between the on-site protected host and a server on the basis of the traffic data, and extracting application layer data from the session data; and transmitting and receiving the application layer data in a local test environment to carry out simulation test.
    Type: Grant
    Filed: April 28, 2021
    Date of Patent: April 9, 2024
    Assignee: DBAPPSECURITY CO., LTD
    Inventors: Wanyan Shao, Yuan Fan, Bo Liu
  • Publication number: 20240061936
    Abstract: The disclosure relates to the field of artificial intelligence. Disclosed in the disclosure are a method and apparatus for detecting a malicious Portable Executable (PE) file, and a device and a medium. The method includes: disassembling a target PE file according to a preset file disassembling method, so as to acquire file header information, file optional header information, file section header information, and section information; using a trained sparse self-encoding neural network model to respectively vectorize each piece of header information, and using a trained text classification model to vectorize the section information; and fusing each vectorized vector, and inputting fused vectors into a neural network model, so as to acquire a detection result outputted by the neural network model. The neural network model is obtained by using a preset knowledge transfer method to perform model transfer on each trained sparse self-encoding neural network model and text classification model.
    Type: Application
    Filed: August 17, 2023
    Publication date: February 22, 2024
    Inventors: Aocen PAN, Yuan FAN, Xin WANG, Xuefei SHUI, Tongjian AN, Da CHEN
  • Publication number: 20230418026
    Abstract: A lens assembly includes a first lens, a second lens, a third lens, and a cover glass. The first lens is with positive refractive power and includes a convex surface facing an image side. The second lens is a meniscus lens with refractive power. The third lens is with positive refractive power and includes a convex surface facing the image side. The first lens, the second lens, the third lens, and the cover glass are arranged in order from the image side to an object side along a first optical axis.
    Type: Application
    Filed: April 25, 2023
    Publication date: December 28, 2023
    Inventors: Yuan-Fan Liang, Jia-Sin Chen
  • Publication number: 20230376606
    Abstract: An asset risk assessment method, an apparatus, a computer device, and a storage medium are provided. The asset risk assessment method includes: receiving an alert message of an asset to be assessed; obtaining an attack depth of the alert message based on the alert message, and the attack depth being a degree to which the asset to be assessed is subjected to attack; obtaining a security feature value of the asset to be assessed; obtaining a feature weight of the security feature value based on the attack depth; and performing a risk assessment of the asset to be assessed based on the security feature value and the feature weight thereof, to obtain a risk assessment result.
    Type: Application
    Filed: May 7, 2021
    Publication date: November 23, 2023
    Inventors: Shuhang LIU, Yuan FAN, Lang LANG, Bo LIU
  • Publication number: 20230370846
    Abstract: Disclosed are a method and apparatus for detecting a logic vulnerability allowing arbitrary password reset for an account, and a computer readable storage medium. The method includes: invoking a preset identification program to determine whether a request for a verification code is initiated in a to-be-detected webpage; obtaining, from a front-end page, a response packet sent in response to the request for a verification code, and determining whether there is a short message service (SMS) verification code in the response packet, on determining that a request for a verification code is initiated in the to-be-detected webpage; and; and determining that the logic vulnerability allowing arbitrary password reset for an account exists in the to-be-detected webpage, on determining that there is an SMS verification code in the response packet.
    Type: Application
    Filed: June 8, 2021
    Publication date: November 16, 2023
    Applicant: DBAPPSECURITY CO., LTD
    Inventors: Yu LOU, Yuan FAN
  • Publication number: 20230353459
    Abstract: A test method and device for simulating a customer series deployment environment, an electronic device, and a storage medium are provided. The test method for simulating a customer series deployment environment includes: obtaining traffic data of an on-site protected host; obtaining session data between the on-site protected host and a server on the basis of the traffic data, and extracting application layer data from the session data; and transmitting and receiving the application layer data in a local test environment to carry out simulation test.
    Type: Application
    Filed: April 28, 2021
    Publication date: November 2, 2023
    Inventors: Wanyan SHAO, Yuan FAN, Bo LIU
  • Publication number: 20230315835
    Abstract: A weak password detection method and device based on deep learning, an electronic device, and a storage medium are provided. The method includes: acquiring a password character string to be detected; processing, by applying a fully trained weak password detection model, the password character string to be detected to obtain a strong/weak password classification label of the password character string to be detected, the fully trained weak password detection model being obtained by training a deep learning model with a password character string as an input and a strong/weak password classification label corresponding to the password character string as a supervision; and marking the password character string to be detected as a weak password under the condition that the strong/weak password classification label is a weak password label.
    Type: Application
    Filed: April 28, 2021
    Publication date: October 5, 2023
    Inventors: Fan MO, Chenyue YU, Yuan FAN, Bo LIU
  • Publication number: 20230315863
    Abstract: An asset scoring method and apparatus, a computer device, and a storage medium are provided. The method includes: obtaining multi-dimensional threat information data of assets to be assessed; obtaining sub-scores of dimensions according to the multi-dimensional threat information data and a preset security scoring model; according to the sub-scores of the dimensions, determining a security scoring result of the corresponding assets to be assessed; and according to the security scoring result and a preset level division rule, determining security levels of the corresponding assets to be assessed.
    Type: Application
    Filed: April 28, 2021
    Publication date: October 5, 2023
    Inventors: Wei WANG, Yuan FAN
  • Publication number: 20230300159
    Abstract: A network traffic anomaly detection method and apparatus, and an electronic apparatus and a storage medium are provided. The network traffic anomaly detection method includes: acquiring multiple segments of traffic data in different monitoring states; acquiring an anomaly feature vector from the multiple segments of traffic data; training an initial classification model according to the anomaly feature vector and on the basis of a KNN algorithm, so as to obtain multiple initial classifiers; training an initial Adaboost classification model according to the anomaly feature vector and the multiple initial classifiers and on the basis of an Adaboost algorithm, so as to obtain an Adaboost classifier; and classifying collected traffic data via the Adaboost classifier.
    Type: Application
    Filed: May 7, 2021
    Publication date: September 21, 2023
    Inventors: Yueqing LIN, Yuan FAN, Bo LIU
  • Publication number: 20230243744
    Abstract: Disclosed are a method and a system for automatically detecting and reconstructing spectrum peaks in near infrared spectrum analysis of tea, including the following steps: firstly collecting initial spectrum data, then initializing parameters, then calculating the position and width of absorption peaks, then updating correlation coefficients and screening sparse blocks, then calculating the cost function and the expectation, then determining termination conditions, and finally outputting reconstruction data.
    Type: Application
    Filed: March 30, 2023
    Publication date: August 3, 2023
    Inventors: Tianhong PAN, Chao WU, Qi CHEN, Shan CHEN, Yuan FAN, Qiong WU, Xiaofeng YU
  • Patent number: 11714261
    Abstract: A wide-angle lens assembly includes a first lens group with negative refractive power, a second lens group with negative refractive power, a third lens group with positive refractive power, a fourth lens group with positive refractive power and a fifth lens group with positive refractive power. The first lens group includes a first lens, the second lens group includes a second lens, and the third lens group includes a third lens. The wide-angle lens assembly satisfies: 0.5<|fLG4/fLG5|<1.8, where fLG4 is an effective focal length of the fourth lens group, and fLG5 is an effective focal length of the fifth lens group.
    Type: Grant
    Filed: April 10, 2020
    Date of Patent: August 1, 2023
    Assignees: SINTAI OPTICAL (SHENZHEN) CO., LTD., ASIA OPTICAL CO., INC.
    Inventor: Yuan-Fan Liang
  • Publication number: 20230204504
    Abstract: Disclosed is a method for extracting net signal of near infrared spectrum and a system thereof, and relates to the technical field of near infrared spectrum. The method comprises the following steps: collecting a sample to obtain the original data of the near infrared spectrum of the sample; detecting the content of the analyte of interest by using a chemical detection method as a response variable; applying different spectral pre-processing methods and the combination of different spectral pre-processing methods to the original spectral data, and the optimal pre-processing scheme is found by using the ten-fold cross test, and selecting the wave band related to the response variables by using a Least Absolute Shrinkage and Selection Operator (LASSO) algorithm.
    Type: Application
    Filed: February 14, 2023
    Publication date: June 29, 2023
    Inventors: Tianhong PAN, Menghu LI, Qi CHEN, Shan CHEN, Yuan FAN, Xiaofeng YU