Patents by Inventor Yuhao Dong

Yuhao Dong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240331898
    Abstract: A corrosion-resistant and high-performance sintered neodymium-iron-boron magnet, a preparation method therefor, and a use thereof are provided. The sintered neodymium-iron-boron magnet is prepared by pulverizing, forming, and sintering. The sintered neodymium-iron-boron magnet contains: 28.5 wt % to 32.5 wt % of R; 0.88 wt % to 0.94 wt % of B; 0.1 wt % to 0.3 wt % of Ga; 1.0 wt % to 3.0 wt % of Co; and 400 ppm to 1000 ppm of O. The sintered neodymium-iron-boron magnet capable of inhibiting reduction of coercive force and improving the coercive force can be obtained by means of an oxygen adding operation, and meanwhile, the corrosion resistance of the magnet can be improved.
    Type: Application
    Filed: July 7, 2022
    Publication date: October 3, 2024
    Inventors: Zhiqiang LI, Yunying JIANG, Lei LIU, Zhongxin AN, Yuhao DONG
  • Publication number: 20240194379
    Abstract: An R-T-B based permanent magnet material, a preparation method therefor and use thereof are provided. The M compound is adhered to or coats the R-T-B based alloy powders to form a uniform coating layer on the surface of the neodymium-iron-boron powders, so that the rounding transformation of the R-T-B based alloy powders can be achieved, and further the wettability of the R-T-B based alloy powders is improved under the condition of significantly reducing the amount of heavy rare earth metals in the substrate. In addition, the grain boundary phases of M-R and/or M-T-R are present in the grain boundary of the R-T-B based permanent magnet material, the physicochemical properties of the grain boundary phases can be significantly improved, the distribution of the grain boundary phases is improved, and the grain boundary is strengthened.
    Type: Application
    Filed: December 12, 2023
    Publication date: June 13, 2024
    Inventors: Buzhuang PENG, Yunying JIANG, Meng LI, Yuhao DONG, Lei LIU
  • Patent number: 11914712
    Abstract: A secure update is provided from a server to an end-point device. The server registers digital information, such as a name or a software package, and a verifiable key, such as a cryptographic hash, derived from the digital information. A publicly accessible transaction log stores the verifiable key in a block and provides an identifier of the block to the server. An end-point device receives the digital information and the identifier, and computes a separate verifiable key. The end-point device retrieves the verifiable key from the block of the publicly accessible transaction log, and compares the retrieved verifiable key to the separate verifiable key to determine whether the digital information has been compromised.
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: February 27, 2024
    Inventors: Raouf Boutaba, Woojung Kim, Yuhao Dong
  • Patent number: 11438139
    Abstract: A secure update is provided from a server to an end-point device. The server registers digital information, such as a name or a software package, and a verifiable key, such as a cryptographic hash, derived from the digital information. A publicly accessible transaction log stores the verifiable key in a block and provides an identifier of the block to the server. An end-point device receives the digital information and the identifier, and computes a separate verifiable key. The end-point device retrieves the verifiable key from the block of the publicly accessible transaction log, and compares the retrieved verifiable key to the separate verifiable key to determine whether the digital information has been compromised.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: September 6, 2022
    Inventors: Raouf Boutaba, Woojung Kim, Yuhao Dong
  • Publication number: 20190245680
    Abstract: A secure update is provided from a server to an end-point device. The server registers digital information, such as a name or a software package, and a verifiable key, such as a cryptographic hash, derived from the digital information. A publicly accessible transaction log stores the verifiable key in a block and provides an identifier of the block to the server. An end-point device receives the digital information and the identifier, and computes a separate verifiable key. The end-point device retrieves the verifiable key from the block of the publicly accessible transaction log, and compares the retrieved verifiable key to the separate verifiable key to determine whether the digital information has been compromised.
    Type: Application
    Filed: February 7, 2019
    Publication date: August 8, 2019
    Inventors: Raouf Boutaba, Woojung Kim, Yuhao Dong