Patents by Inventor Yuhao Zheng

Yuhao Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240406517
    Abstract: A video generation method and apparatus, a computer device, and a storage medium are provided in the present disclosure. The method includes: displaying a video creation page in response to a request to generate a recommendation video for a target book list, the video creation page including editing instructions respectively corresponding to video forming dimensions, and the editing instructions being used to guide to add target video materials in the video forming dimensions; and in response to receiving the target video materials in the video forming dimensions, integrating the target video materials by using a target video script, to generate the recommendation video corresponding to the target book list, the target video script indicating a target video frame associated with a video forming dimension in the recommendation video, and a display position of a target video material corresponding to the video forming dimension in the target video frame.
    Type: Application
    Filed: May 30, 2024
    Publication date: December 5, 2024
    Inventors: Xiaojie LI, Jiancheng LIU, Liangjie XIE, Yuhao ZHENG, Haoyuan LI
  • Patent number: 11232364
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for rule generation and interaction. A rules engine is provided that does not require manual effort to generate or maintain high-quality rules over time for detecting malicious accounts or events. Rules no longer need to be manually added, tuned, or removed from the system. The system is able to determine the health of each rule and automatically add, tune, and remove rules to maintain a consistent, effective rule set.
    Type: Grant
    Filed: April 3, 2018
    Date of Patent: January 25, 2022
    Assignee: DataVisor, Inc.
    Inventors: Catherine Lu, Patrick Glenn Murray, Ming Qi, Shuo Shan, Yinglian Xie, Fang Yu, Yuhao Zheng
  • Publication number: 20180285745
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for rule generation and interaction. A rules engine is provided that does not require manual effort to generate or maintain high-quality rules over time for detecting malicious accounts or events. Rules no longer need to be manually added, tuned, or removed from the system. The system is able to determine the health of each rule and automatically add, tune, and remove rules to maintain a consistent, effective rule set.
    Type: Application
    Filed: April 3, 2018
    Publication date: October 4, 2018
    Inventors: Catherine Lu, Patrick Glenn Murray, Ming Qi, Shuo Shan, Yinglian Xie, Fang Yu, Yuhao Zheng
  • Publication number: 20170279845
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for displaying information about computer network resources identified as engaging in malicious activities. One of the systems includes one or more computers including one or more processors and one or more memory devices, the one or more computers configured to: identify resources associated with an attack, and provide an attach resource dashboard user interface that displays information related to attack resources, wherein the user interface presents resource information comparing behavior of a particular resource at a single online service with behavior of the resource at other online services, and comparing the behavior of that resource with behavior of other resources.
    Type: Application
    Filed: March 23, 2017
    Publication date: September 28, 2017
    Applicant: DataVisor Inc.
    Inventors: Yang-hua Chu, Patrick Glenn Murray, Shuo Shan, Yinglian Xie, Ting-Fang Yen, Fang Yu, Yuhao Zheng, Zilong Zhou
  • Patent number: 8767695
    Abstract: In one implementation, a computer-implemented method includes transmitting data over a first wireless connection by a computing device and with a first wireless access point; detecting a wireless signal from a second wireless access point; identifying, at the mobile computing device, a received signal strength of the wireless signal from the second wireless access point; determining, by the computing device and having transmitted less than a threshold number of data packets to the second wireless access point after detecting the wireless signal, an estimated level of data packet loss for the second wireless access point based on the signal strength for the second wireless access point; determining, based on the estimated level of data packet loss for the second wireless access point, to switch to a second wireless connection with the second wireless access point; and establishing the second wireless connection as a result of the determining.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: July 1, 2014
    Assignee: Google Inc.
    Inventors: Irfan Sheriff, Yuhao Zheng