Patents by Inventor Yuhao Zheng

Yuhao Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11941047
    Abstract: Embodiments of the present disclosure provide a music playing method and device, where the method includes: receiving a first operation instruction in a first application with a function of video playing; and invoking a music player to play music in the first application in response to the first operation instruction. According to the embodiments of the present disclosure, music can be played in a first application through a first operation instruction of a user, avoiding that the user exits from the first application and then enters the music application to play music, and reducing an operation complexity of the user.
    Type: Grant
    Filed: July 2, 2021
    Date of Patent: March 26, 2024
    Assignee: BEIJING ZITIAO NETWORK TECHNOLOGY CO., LTD.
    Inventors: Yuhao Yang, Peng Chen, Hai Ning, Lei Sun, Niwen Zheng, Yanjingjing Gao
  • Patent number: 11232364
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for rule generation and interaction. A rules engine is provided that does not require manual effort to generate or maintain high-quality rules over time for detecting malicious accounts or events. Rules no longer need to be manually added, tuned, or removed from the system. The system is able to determine the health of each rule and automatically add, tune, and remove rules to maintain a consistent, effective rule set.
    Type: Grant
    Filed: April 3, 2018
    Date of Patent: January 25, 2022
    Assignee: DataVisor, Inc.
    Inventors: Catherine Lu, Patrick Glenn Murray, Ming Qi, Shuo Shan, Yinglian Xie, Fang Yu, Yuhao Zheng
  • Publication number: 20180285745
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for rule generation and interaction. A rules engine is provided that does not require manual effort to generate or maintain high-quality rules over time for detecting malicious accounts or events. Rules no longer need to be manually added, tuned, or removed from the system. The system is able to determine the health of each rule and automatically add, tune, and remove rules to maintain a consistent, effective rule set.
    Type: Application
    Filed: April 3, 2018
    Publication date: October 4, 2018
    Inventors: Catherine Lu, Patrick Glenn Murray, Ming Qi, Shuo Shan, Yinglian Xie, Fang Yu, Yuhao Zheng
  • Publication number: 20170279845
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for displaying information about computer network resources identified as engaging in malicious activities. One of the systems includes one or more computers including one or more processors and one or more memory devices, the one or more computers configured to: identify resources associated with an attack, and provide an attach resource dashboard user interface that displays information related to attack resources, wherein the user interface presents resource information comparing behavior of a particular resource at a single online service with behavior of the resource at other online services, and comparing the behavior of that resource with behavior of other resources.
    Type: Application
    Filed: March 23, 2017
    Publication date: September 28, 2017
    Applicant: DataVisor Inc.
    Inventors: Yang-hua Chu, Patrick Glenn Murray, Shuo Shan, Yinglian Xie, Ting-Fang Yen, Fang Yu, Yuhao Zheng, Zilong Zhou
  • Patent number: 8767695
    Abstract: In one implementation, a computer-implemented method includes transmitting data over a first wireless connection by a computing device and with a first wireless access point; detecting a wireless signal from a second wireless access point; identifying, at the mobile computing device, a received signal strength of the wireless signal from the second wireless access point; determining, by the computing device and having transmitted less than a threshold number of data packets to the second wireless access point after detecting the wireless signal, an estimated level of data packet loss for the second wireless access point based on the signal strength for the second wireless access point; determining, based on the estimated level of data packet loss for the second wireless access point, to switch to a second wireless connection with the second wireless access point; and establishing the second wireless connection as a result of the determining.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: July 1, 2014
    Assignee: Google Inc.
    Inventors: Irfan Sheriff, Yuhao Zheng