Patents by Inventor Yufei Lu
Yufei Lu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250129654Abstract: A powered actuator includes a leadscrew as an extensible member connected to a closure, such as a vehicle side door and is configured to move linearly for opening or closing the closure. The first powered actuator also includes a gearbox configured apply a force to the extensible member for causing the extensible member to move linearly. An adapter is configured to mount the gearbox to the vehicle body. The adapter allows the powered actuator to replace a non-powered door check device. The adapter also allows some relative rotation between the gearbox and the vehicle body for fitment of the powered actuator. An electromagnetic (EM) brake is coupled to the gearbox on an opposite side from the electric motor. A high-resolution position sensor is coupled to a driven shaft to measure a position of the actuator, the position sensor is spaced apart from the EM brake to prevent electromagnetic interference therefrom.Type: ApplicationFiled: October 4, 2024Publication date: April 24, 2025Inventors: Francesco CUMBO, Sandro BERTINI, Yufei LU
-
Publication number: 20250047462Abstract: This specification provides a data security detection method and device for privacy-preserving computing. The privacy-preserving computing includes a homomorphic encryption operation, a public key of the homomorphic encryption operation is in a public state, a private key is held by a first party, the private key includes a first private key value, and a decryption process of the homomorphic encryption is completed based on a modulo operation performed on the first private key value. The first party decrypts the second encrypted value by using the private key, to obtain a target plaintext value. The first party determines whether the target plaintext value is greater than a preset value, and if the target plaintext value is greater than the preset value, determines that there is a risk of a plaintext overflow attack, and ends current computing.Type: ApplicationFiled: July 12, 2024Publication date: February 6, 2025Inventor: Yufei LU
-
Publication number: 20240301741Abstract: A powered actuator assembly for a closure member of a motor vehicle includes an electric actuator, a leadscrew extending along a leadscrew axis between opposite leadscrew ends, the leadscrew being configured in operable communication with the electric motor for rotation in opposite directions about the leadscrew axis in response to the electric motor being energized, and a nut assembly configured for translation along the leadscrew in response to rotation of the leadscrew. The nut assembly has a nut with a through opening in threaded engagement with the leadscrew and a housing disposed about the nut. A push/pull rod has a first end coupled to the housing of the nut assembly and a second end configured to be coupled to a body of the motor vehicle, wherein the housing and the nut of the nut assembly can move relative to one another.Type: ApplicationFiled: March 1, 2024Publication date: September 12, 2024Inventors: Li WANG, Jiagui TAN, Yufei LU
-
Publication number: 20240289166Abstract: Embodiments of this specification provide a method and an apparatus for deploying a federated learning task based on a container. In the method, a federated learning task is deployed to a plurality of service party devices by using a container management platform, and the federated learning task is executed by using the plurality of service party devices. In the method, when receiving a task description file for the federated learning task, the container management platform can respectively generate first container group description files for the plurality of service party devices based on the task description file, and respectively send the plurality of generated first container group description files to the corresponding service party devices. The plurality of service party devices create container groups based on the respectively received first container group description files, and execute the federated learning task by using the created container groups.Type: ApplicationFiled: July 12, 2022Publication date: August 29, 2024Inventors: Yufei LU, Xingyu CHEN, Lei WANG, Li WANG
-
Publication number: 20240031145Abstract: Some embodiments of this specification disclose data encryption and data preprocessing. In an implementation, a method includes for online data encryption: generating, based on plaintext data, a second component of ciphertext data. From a data set and as a selected first component of ciphertext data, a first component of ciphertext data is selected. Based on the first component of ciphertext data and the second component of ciphertext data, ciphertext data of plaintext data is calculated. For offline data preprocessing, the first component of ciphertext data is generated and plaintext encryption uses the first component of ciphertext data and the second component of ciphertext data. Alternatively, a data acquisition request is received, the first component of ciphertext data is generated, and fed back, and stored for use in plaintext encryption.Type: ApplicationFiled: July 25, 2023Publication date: January 25, 2024Applicant: ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD.Inventor: Yufei Lu
-
Publication number: 20230367902Abstract: Methods, apparatuses, and systems for protecting privacy are described. In an example, a first party encrypts a first data set, and sends a single-encrypted full data set to a second party. The second party re-encrypts the single-encrypted full data set to obtain a double-encrypted full data set, obtains a single-encrypted sampling data set, and sends the single-encrypted sampling data set to the first party. The first party encrypts the single-encrypted sampling data set to obtain a double-encrypted sampling data set, determines an intersection of the double-encrypted full data set and the double-encrypted sampling data set, performs upsampling on a complement other than the intersection in the double-encrypted sampling data set to obtain a noise-added intersection, and sends an element index of the noise-added intersection to the second party. The second party determines related information of common data based on the element index.Type: ApplicationFiled: May 10, 2023Publication date: November 16, 2023Applicant: ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD.Inventors: Jian Du, Jinming Cui, Lei Zhang, Yufei Lu, Pu Duan
-
Publication number: 20230336327Abstract: Embodiments of this specification disclose computer-implemented methods, apparatuses, systems, mediums, and program products related to batch encryption. In an example computer-implemented method, N first plaintexts are obtained. The N first plaintexts are spliced based on a first predetermined rule to obtain a first target plaintext. The first target plaintext are encrypted by using a predetermined encryption algorithm to obtain a first target ciphertext. N is a positive integer greater than or equal to 2.Type: ApplicationFiled: April 11, 2023Publication date: October 19, 2023Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Yufei Lu, Chaofan Yu, Lei Wang, Jingren Zhou
-
Publication number: 20230336344Abstract: Implementations disclose data processing methods, apparatuses, and computer devices for privacy protection in secure multi-party computation, including encoding private data to a coefficient of a first polynomial function. A plurality of function values of the first polynomial function are obtained as a plurality of fragments obtained after the private data is split, where the fragments of the private data are used for computation by using a secret sharing algorithm to obtain fragments of target data.Type: ApplicationFiled: April 12, 2023Publication date: October 19, 2023Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Yufei Lu, Pu Duan, Lei Wang, Chaofan Yu
-
Publication number: 20230327851Abstract: Embodiments of this specification provide computer-implemented methods, apparatuses, computer-readable media and systems for secure multi-party computation. According to an example computer-implemented method, a first party performs a first mapping operation and homomorphic encryption on first plaintext data to obtain a first converted ciphertext in a Montgomery state, where the first mapping operation converts data from an integer ring to the Montgomery state. The first party sends the first converted ciphertext to a second party. Then, the second party performs a first homomorphic operation in the Montgomery state based on the first converted ciphertext to obtain a first result ciphertext in the Montgomery state, where the first homomorphic operation includes a modular multiplication operation.Type: ApplicationFiled: April 11, 2023Publication date: October 12, 2023Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Yufei Lu, Lei WANG, Lei Zhang, Jinming Cui
-
Publication number: 20230327856Abstract: Embodiments of this specification provide computer-implemented methods, apparatuses, computer-readable media, and systems for secure multi-party computation. In an example secure multi-party computation method, a first party encrypts a first plaintext segment of target data by using a homomorphic encryption algorithm based on a public key held by the first party in a first key pair to obtain a first ciphertext segment. A second plaintext segment of the target data is owned by a second party. The first party sends the first ciphertext segment to the second party. The second party performs a homomorphic addition operation in the homomorphic encryption algorithm on the first ciphertext segment and the second plaintext segment of the target data to obtain ciphertext data of the target data. The ciphertext data is decrypted based on a private key in the first key pair.Type: ApplicationFiled: April 10, 2023Publication date: October 12, 2023Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Yufei Lu, Lei WANG, Chaofan Yu, Jin Tan
-
Patent number: 11781068Abstract: A corrosion inhibitor for a soft water circulation heating and cooling system, wherein the corrosion inhibitor is pentapentanol core hyperbranched macromolecule functionalized by isothiourea and carboxyl, which has a chemical formula of C5H7O5{COC(CH3)[CH2OCOCH2CH(COOH)SC(NH)NH2]2}5. The corrosion inhibitor provided by the present invention is non-phosphorus, biodegradable, non-toxic, low in cost and has good corrosion inhibition effect. Moreover, it has excellent corrosion inhibition performance for circulating heating and cooling systems using soft water as the water source, and can significantly improve the reuse rate of circulating water. The present invention also provides a preparation method of the corrosion inhibitor, which is simple, easy to obtain raw materials and easy to industrialize.Type: GrantFiled: August 28, 2020Date of Patent: October 10, 2023Assignees: Shanghai CEO Environmental Protection Technology Co., Ltd., Tongji UniversityInventors: Fengting Li, Yufei Lu, Bingru Zhang, Xianwei Qu, Chunjiang Li
-
Publication number: 20220243515Abstract: A cable-operated drive mechanism for a powered motor vehicle sliding closure panel and method of construction of the cable-operated drive mechanism is provided. The cable-operated drive mechanism includes a cable drum mechanism having a first cable drum supported for rotation about a first drum axis and a second cable drum supported for rotation about a second drum axis. A first cable winds and unwinds about the first cable drum in response to rotation of the first cable drum in opposite directions and a second cable unwinds and winds about the second cable drum in response to rotation of the second cable drum in opposite directions. A drive member is operably coupled to at least one of the first cable drum and second cable drum to drive the first and second cable drums in unison with one another.Type: ApplicationFiled: July 27, 2020Publication date: August 4, 2022Inventors: Michael BAYLEY, Steven J. LIU, Yufei LU
-
Publication number: 20200392407Abstract: A corrosion inhibitor for a soft water circulation heating and cooling system, wherein the corrosion inhibitor is pentapentanol core hyperbranched macromolecule functionalized by isothiourea and carboxyl, which has a chemical formula of C5H7O5{COC(CH3)[CH2OCOCH2CH(COOH)SC(NH)NH2]2}5. The corrosion inhibitor provided by the present invention is non-phosphorus, biodegradable, non-toxic, low in cost and has good corrosion inhibition effect. Moreover, it has excellent corrosion inhibition performance for circulating heating and cooling systems using soft water as the water source, and can significantly improve the reuse rate of circulating water. The present invention also provides a preparation method of the corrosion inhibitor, which is simple, easy to obtain raw materials and easy to industrialize.Type: ApplicationFiled: August 28, 2020Publication date: December 17, 2020Inventors: Fengting Li, Yufei Lu, Bingru Zhang, Taiming Xu, Chunjiang Li
-
Publication number: 20190078366Abstract: A carrier module including a pair of carrier members operably coupled to one another via at least one cable is provided. The carrier members are configured for substantially free movement relative to one another to facilitate installation of the carrier members into an internal door cavity through an opening formed in the inner panel, wherein at least one of the carrier members is adjustable along at least one of cross-vehicle, aft/forward, and up/down directions.Type: ApplicationFiled: September 5, 2018Publication date: March 14, 2019Inventors: Yufei LU, Milos PAVLOVIC, Eugene KIM
-
Publication number: 20160325070Abstract: A double-lumen breathing circuit assembly with separate breathing circuit conduit lengths can be joined together by differently arranged connectors or adapters. The connectors may each have different shapes and associated accessories that serve different functions. The breathing circuit conduit lengths may have an inner septum that extends both diametrically and axially for segregating inspiratory and expiratory lumens. Each septum may terminate at opposite distal ends of the conduit lengths and form a pair of semi-circular lumen openings. One of the bi-lumen breathing circuits may be connected to a patient-side connector, and the other bi-lumen breathing circuit may be connected to, or integrally moulded with, a gas collection plug of an anaesthetic gas machine. The latter bi-lumen breathing circuit may also be further connected to, or integrally moulded with, a carbon dioxide sampling connector, a temperature probe, and/or a pressure sensor probe.Type: ApplicationFiled: May 6, 2016Publication date: November 10, 2016Inventor: Yufei Lu