Patents by Inventor Yufei Lu

Yufei Lu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250129654
    Abstract: A powered actuator includes a leadscrew as an extensible member connected to a closure, such as a vehicle side door and is configured to move linearly for opening or closing the closure. The first powered actuator also includes a gearbox configured apply a force to the extensible member for causing the extensible member to move linearly. An adapter is configured to mount the gearbox to the vehicle body. The adapter allows the powered actuator to replace a non-powered door check device. The adapter also allows some relative rotation between the gearbox and the vehicle body for fitment of the powered actuator. An electromagnetic (EM) brake is coupled to the gearbox on an opposite side from the electric motor. A high-resolution position sensor is coupled to a driven shaft to measure a position of the actuator, the position sensor is spaced apart from the EM brake to prevent electromagnetic interference therefrom.
    Type: Application
    Filed: October 4, 2024
    Publication date: April 24, 2025
    Inventors: Francesco CUMBO, Sandro BERTINI, Yufei LU
  • Publication number: 20250047462
    Abstract: This specification provides a data security detection method and device for privacy-preserving computing. The privacy-preserving computing includes a homomorphic encryption operation, a public key of the homomorphic encryption operation is in a public state, a private key is held by a first party, the private key includes a first private key value, and a decryption process of the homomorphic encryption is completed based on a modulo operation performed on the first private key value. The first party decrypts the second encrypted value by using the private key, to obtain a target plaintext value. The first party determines whether the target plaintext value is greater than a preset value, and if the target plaintext value is greater than the preset value, determines that there is a risk of a plaintext overflow attack, and ends current computing.
    Type: Application
    Filed: July 12, 2024
    Publication date: February 6, 2025
    Inventor: Yufei LU
  • Publication number: 20240301741
    Abstract: A powered actuator assembly for a closure member of a motor vehicle includes an electric actuator, a leadscrew extending along a leadscrew axis between opposite leadscrew ends, the leadscrew being configured in operable communication with the electric motor for rotation in opposite directions about the leadscrew axis in response to the electric motor being energized, and a nut assembly configured for translation along the leadscrew in response to rotation of the leadscrew. The nut assembly has a nut with a through opening in threaded engagement with the leadscrew and a housing disposed about the nut. A push/pull rod has a first end coupled to the housing of the nut assembly and a second end configured to be coupled to a body of the motor vehicle, wherein the housing and the nut of the nut assembly can move relative to one another.
    Type: Application
    Filed: March 1, 2024
    Publication date: September 12, 2024
    Inventors: Li WANG, Jiagui TAN, Yufei LU
  • Publication number: 20240289166
    Abstract: Embodiments of this specification provide a method and an apparatus for deploying a federated learning task based on a container. In the method, a federated learning task is deployed to a plurality of service party devices by using a container management platform, and the federated learning task is executed by using the plurality of service party devices. In the method, when receiving a task description file for the federated learning task, the container management platform can respectively generate first container group description files for the plurality of service party devices based on the task description file, and respectively send the plurality of generated first container group description files to the corresponding service party devices. The plurality of service party devices create container groups based on the respectively received first container group description files, and execute the federated learning task by using the created container groups.
    Type: Application
    Filed: July 12, 2022
    Publication date: August 29, 2024
    Inventors: Yufei LU, Xingyu CHEN, Lei WANG, Li WANG
  • Publication number: 20240031145
    Abstract: Some embodiments of this specification disclose data encryption and data preprocessing. In an implementation, a method includes for online data encryption: generating, based on plaintext data, a second component of ciphertext data. From a data set and as a selected first component of ciphertext data, a first component of ciphertext data is selected. Based on the first component of ciphertext data and the second component of ciphertext data, ciphertext data of plaintext data is calculated. For offline data preprocessing, the first component of ciphertext data is generated and plaintext encryption uses the first component of ciphertext data and the second component of ciphertext data. Alternatively, a data acquisition request is received, the first component of ciphertext data is generated, and fed back, and stored for use in plaintext encryption.
    Type: Application
    Filed: July 25, 2023
    Publication date: January 25, 2024
    Applicant: ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD.
    Inventor: Yufei Lu
  • Publication number: 20230367902
    Abstract: Methods, apparatuses, and systems for protecting privacy are described. In an example, a first party encrypts a first data set, and sends a single-encrypted full data set to a second party. The second party re-encrypts the single-encrypted full data set to obtain a double-encrypted full data set, obtains a single-encrypted sampling data set, and sends the single-encrypted sampling data set to the first party. The first party encrypts the single-encrypted sampling data set to obtain a double-encrypted sampling data set, determines an intersection of the double-encrypted full data set and the double-encrypted sampling data set, performs upsampling on a complement other than the intersection in the double-encrypted sampling data set to obtain a noise-added intersection, and sends an element index of the noise-added intersection to the second party. The second party determines related information of common data based on the element index.
    Type: Application
    Filed: May 10, 2023
    Publication date: November 16, 2023
    Applicant: ALIPAY (HANGZHOU) INFORMATION TECHNOLOGY CO., LTD.
    Inventors: Jian Du, Jinming Cui, Lei Zhang, Yufei Lu, Pu Duan
  • Publication number: 20230336327
    Abstract: Embodiments of this specification disclose computer-implemented methods, apparatuses, systems, mediums, and program products related to batch encryption. In an example computer-implemented method, N first plaintexts are obtained. The N first plaintexts are spliced based on a first predetermined rule to obtain a first target plaintext. The first target plaintext are encrypted by using a predetermined encryption algorithm to obtain a first target ciphertext. N is a positive integer greater than or equal to 2.
    Type: Application
    Filed: April 11, 2023
    Publication date: October 19, 2023
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Yufei Lu, Chaofan Yu, Lei Wang, Jingren Zhou
  • Publication number: 20230336344
    Abstract: Implementations disclose data processing methods, apparatuses, and computer devices for privacy protection in secure multi-party computation, including encoding private data to a coefficient of a first polynomial function. A plurality of function values of the first polynomial function are obtained as a plurality of fragments obtained after the private data is split, where the fragments of the private data are used for computation by using a secret sharing algorithm to obtain fragments of target data.
    Type: Application
    Filed: April 12, 2023
    Publication date: October 19, 2023
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Yufei Lu, Pu Duan, Lei Wang, Chaofan Yu
  • Publication number: 20230327851
    Abstract: Embodiments of this specification provide computer-implemented methods, apparatuses, computer-readable media and systems for secure multi-party computation. According to an example computer-implemented method, a first party performs a first mapping operation and homomorphic encryption on first plaintext data to obtain a first converted ciphertext in a Montgomery state, where the first mapping operation converts data from an integer ring to the Montgomery state. The first party sends the first converted ciphertext to a second party. Then, the second party performs a first homomorphic operation in the Montgomery state based on the first converted ciphertext to obtain a first result ciphertext in the Montgomery state, where the first homomorphic operation includes a modular multiplication operation.
    Type: Application
    Filed: April 11, 2023
    Publication date: October 12, 2023
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Yufei Lu, Lei WANG, Lei Zhang, Jinming Cui
  • Publication number: 20230327856
    Abstract: Embodiments of this specification provide computer-implemented methods, apparatuses, computer-readable media, and systems for secure multi-party computation. In an example secure multi-party computation method, a first party encrypts a first plaintext segment of target data by using a homomorphic encryption algorithm based on a public key held by the first party in a first key pair to obtain a first ciphertext segment. A second plaintext segment of the target data is owned by a second party. The first party sends the first ciphertext segment to the second party. The second party performs a homomorphic addition operation in the homomorphic encryption algorithm on the first ciphertext segment and the second plaintext segment of the target data to obtain ciphertext data of the target data. The ciphertext data is decrypted based on a private key in the first key pair.
    Type: Application
    Filed: April 10, 2023
    Publication date: October 12, 2023
    Applicant: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Yufei Lu, Lei WANG, Chaofan Yu, Jin Tan
  • Patent number: 11781068
    Abstract: A corrosion inhibitor for a soft water circulation heating and cooling system, wherein the corrosion inhibitor is pentapentanol core hyperbranched macromolecule functionalized by isothiourea and carboxyl, which has a chemical formula of C5H7O5{COC(CH3)[CH2OCOCH2CH(COOH)SC(NH)NH2]2}5. The corrosion inhibitor provided by the present invention is non-phosphorus, biodegradable, non-toxic, low in cost and has good corrosion inhibition effect. Moreover, it has excellent corrosion inhibition performance for circulating heating and cooling systems using soft water as the water source, and can significantly improve the reuse rate of circulating water. The present invention also provides a preparation method of the corrosion inhibitor, which is simple, easy to obtain raw materials and easy to industrialize.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: October 10, 2023
    Assignees: Shanghai CEO Environmental Protection Technology Co., Ltd., Tongji University
    Inventors: Fengting Li, Yufei Lu, Bingru Zhang, Xianwei Qu, Chunjiang Li
  • Publication number: 20220243515
    Abstract: A cable-operated drive mechanism for a powered motor vehicle sliding closure panel and method of construction of the cable-operated drive mechanism is provided. The cable-operated drive mechanism includes a cable drum mechanism having a first cable drum supported for rotation about a first drum axis and a second cable drum supported for rotation about a second drum axis. A first cable winds and unwinds about the first cable drum in response to rotation of the first cable drum in opposite directions and a second cable unwinds and winds about the second cable drum in response to rotation of the second cable drum in opposite directions. A drive member is operably coupled to at least one of the first cable drum and second cable drum to drive the first and second cable drums in unison with one another.
    Type: Application
    Filed: July 27, 2020
    Publication date: August 4, 2022
    Inventors: Michael BAYLEY, Steven J. LIU, Yufei LU
  • Publication number: 20200392407
    Abstract: A corrosion inhibitor for a soft water circulation heating and cooling system, wherein the corrosion inhibitor is pentapentanol core hyperbranched macromolecule functionalized by isothiourea and carboxyl, which has a chemical formula of C5H7O5{COC(CH3)[CH2OCOCH2CH(COOH)SC(NH)NH2]2}5. The corrosion inhibitor provided by the present invention is non-phosphorus, biodegradable, non-toxic, low in cost and has good corrosion inhibition effect. Moreover, it has excellent corrosion inhibition performance for circulating heating and cooling systems using soft water as the water source, and can significantly improve the reuse rate of circulating water. The present invention also provides a preparation method of the corrosion inhibitor, which is simple, easy to obtain raw materials and easy to industrialize.
    Type: Application
    Filed: August 28, 2020
    Publication date: December 17, 2020
    Inventors: Fengting Li, Yufei Lu, Bingru Zhang, Taiming Xu, Chunjiang Li
  • Publication number: 20190078366
    Abstract: A carrier module including a pair of carrier members operably coupled to one another via at least one cable is provided. The carrier members are configured for substantially free movement relative to one another to facilitate installation of the carrier members into an internal door cavity through an opening formed in the inner panel, wherein at least one of the carrier members is adjustable along at least one of cross-vehicle, aft/forward, and up/down directions.
    Type: Application
    Filed: September 5, 2018
    Publication date: March 14, 2019
    Inventors: Yufei LU, Milos PAVLOVIC, Eugene KIM
  • Publication number: 20160325070
    Abstract: A double-lumen breathing circuit assembly with separate breathing circuit conduit lengths can be joined together by differently arranged connectors or adapters. The connectors may each have different shapes and associated accessories that serve different functions. The breathing circuit conduit lengths may have an inner septum that extends both diametrically and axially for segregating inspiratory and expiratory lumens. Each septum may terminate at opposite distal ends of the conduit lengths and form a pair of semi-circular lumen openings. One of the bi-lumen breathing circuits may be connected to a patient-side connector, and the other bi-lumen breathing circuit may be connected to, or integrally moulded with, a gas collection plug of an anaesthetic gas machine. The latter bi-lumen breathing circuit may also be further connected to, or integrally moulded with, a carbon dioxide sampling connector, a temperature probe, and/or a pressure sensor probe.
    Type: Application
    Filed: May 6, 2016
    Publication date: November 10, 2016
    Inventor: Yufei Lu