Patents by Inventor Yuliang Zheng

Yuliang Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240083575
    Abstract: An amphibious robot includes a housing including a first shell and a second shell and having a first configuration and a second configuration, a rack disposed in an inner cavity of the housing, a telescopic assembly disposed on the rack and connected between the first shell and the second shell, and a rotary wing assembly disposed on the rack and having a folded configuration and a flight configuration. The rotary wing assembly includes: a folding arm with one end rotatably connected to the rack, a rotary wing, and a tilting arm connected between the rotary wing and the folding arm, the tilting arm and the rotary wing are extended to an outside of the housing to be adapted to drive the robot to fly in the flight configuration, and the tilting arm is rotatable relative to the folding arm to adjust a rotation direction of the rotary wing.
    Type: Application
    Filed: July 26, 2023
    Publication date: March 14, 2024
    Inventors: Long Ma, Wenzhen Wu, Weizhen Zhang, Qingyong Meng, Ying Feng, Desheng Zhang, Weijian Xu, Qingfeng Rong, Yuliang Ma, Jie Zheng
  • Publication number: 20200093212
    Abstract: A band holder is provided. The band holder includes: a holding unit having a holding unit body; a rotating unit including an arm pivotally connected to the holding unit body and a fixed hanging portion disposed at the arm pivotal end, wherein the rotating unit is rotated and fixed in place relative to the holding unit; and a spacing adjustment mechanism disposed at the arm and having a movable hanging portion, the movable hanging portion undergoing linear displacement in a lengthwise direction of the arm and being positioned, so as to adjust its distance from the fixed hanging portion. Therefore, not only is a mask comfortable to wear, but the human head and ear also perceive no sense of compression.
    Type: Application
    Filed: May 18, 2018
    Publication date: March 26, 2020
    Applicant: CENTER HEALTHCARE TECHNOLOGY CO.
    Inventors: Yongzhu ZHENG, Qianfeng ZHENG, Yuliang ZHENG
  • Publication number: 20160029715
    Abstract: A mask structure includes a mask body having at least one edge side; at least one subsidiary part connecting with and corresponding to the edge side, wherein an angle is formed between the subsidiary part and the mask body; and a band set fixing at the two sides of the mask body.
    Type: Application
    Filed: April 11, 2014
    Publication date: February 4, 2016
    Applicant: CENTER HEALTHCARE TECHNOLOGY CO., LTD.
    Inventors: Yongzhu ZHENG, Qianfeng ZHENG, Yuliang ZHENG
  • Patent number: 8630421
    Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.
    Type: Grant
    Filed: March 14, 2012
    Date of Patent: January 14, 2014
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Yuliang Zheng, Neil Kevin Kauer, David Victor Badia
  • Patent number: 8437474
    Abstract: A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.
    Type: Grant
    Filed: November 16, 2010
    Date of Patent: May 7, 2013
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Yuliang Zheng, Luis Antonio Suarez
  • Publication number: 20120179911
    Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.
    Type: Application
    Filed: March 14, 2012
    Publication date: July 12, 2012
    Applicant: Wells Fargo Bank, N.A.
    Inventors: Yuliang Zheng, Neil Kevin Kauer, David Victor Badia
  • Patent number: 8139770
    Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.
    Type: Grant
    Filed: December 21, 2004
    Date of Patent: March 20, 2012
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Yuliang Zheng, Neil Kevin Kauer, David Victor Badia
  • Patent number: 8065725
    Abstract: Systems and methods for an information system security infrastructure are described. One embodiment of the present invention comprises global Internet-scale defense infrastructure, referred to as the Intrusion Detection Force (IDF). The IDF comprises a virtual infrastructure implemented on top of an existing network, such as the Internet. The IDF enables secure information sharing and intelligent data analysis and response. The node (e.g. 102 of FIG. 1) is the most primitive entity in the IDF architecture, and may be a switch, router, server, or workstation. The IDF may be implemented in small networks of computers or may be utilized by millions of hosts throughout the Internet, spanning different organizations, countries, and continents.
    Type: Grant
    Filed: May 30, 2003
    Date of Patent: November 22, 2011
    Inventors: Yuliang Zheng, Lawrence Chin Shiun Teo
  • Publication number: 20110058673
    Abstract: A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.
    Type: Application
    Filed: November 16, 2010
    Publication date: March 10, 2011
    Applicant: Wells Fargo Bank, N.A.
    Inventors: Yuliang Zheng, Luis Antonio Suarez
  • Patent number: 7860243
    Abstract: A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: December 28, 2010
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Yuliang Zheng, Luis Antonio Suarez
  • Patent number: 7725710
    Abstract: A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.
    Type: Grant
    Filed: April 7, 2006
    Date of Patent: May 25, 2010
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Edward R. Kelly, Christopher Wayne Howser, Jonathan Francis Savage, Yuliang Zheng
  • Publication number: 20100017859
    Abstract: A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.
    Type: Application
    Filed: September 14, 2009
    Publication date: January 21, 2010
    Applicant: Wells Fargo Bank, N.A.
    Inventors: Edward R. Kelly, Christopher Wayne Howser, Jonathan Francis Savage, Yuliang Zheng
  • Patent number: 7610617
    Abstract: A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: October 27, 2009
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Edward R. Kelly, Christopher Wayne Howser, Jonathan Francis Savage, Yuliang Zheng
  • Patent number: 7546327
    Abstract: A random number generator includes one or more pseudorandom data sources that generate pseudorandom data, a randomness accumulation facility that receives pseudorandom data from the one or more pseudorandom data sources, a storage facility that stores a random value generated by the randomness accumulation facility, and an application programming interface (“API”), operating independently from the operation of the randomness accumulation facility, that retrieves, upon request by a software application, the random value currently stored in the storage facility and provides a random number to the software application. The pseudorandom data is hashed with a previously-stored random value and a first counter value and may be encrypted before storing in the storage facility. Likewise, the API hashes the current random value with a second counter value before outputting the random number thus generated, decrypting the current value first if necessary.
    Type: Grant
    Filed: December 21, 2004
    Date of Patent: June 9, 2009
    Assignee: Wells Fargo Bank, N.A.
    Inventor: Yuliang Zheng
  • Publication number: 20070094491
    Abstract: Systems and methods for dynamically learning network environments to achieve adaptive security are described. One described method for setting an adaptive threshold for a node includes: monitoring a data stream associated with the node to identify a characteristic of the node; monitoring an environmental factor capable of affecting the node; and determining the adaptive threshold based on at least one of the characteristic or the environmental factor. Another described method for dynamically assessing a risk associated with network traffic includes: identifying a communication directed at the node; determining a risk level associated with the communication; and comparing the risk level to the adaptive threshold.
    Type: Application
    Filed: August 3, 2006
    Publication date: April 26, 2007
    Inventors: Lawrence Teo, Yuliang Zheng
  • Publication number: 20060206615
    Abstract: Systems and methods for dynamic and risk-aware network security are described. In one embodiment, a system dynamically assesses whether a connection over a communications medium (102) is anomalous (suspicious, malicious, deviating from normal behavior, fits a certain profile or pattern, or has the potential to be any one of these) and generates an appropriate response depending on whether the connection is deemed to be normal or anomalous for a specified period of time. The types of responses include, but are not limited to, blocking the source of the connection from connecting to its intended destination, altering the destination of the connection, auditing the connection, or any combination of these.
    Type: Application
    Filed: May 30, 2003
    Publication date: September 14, 2006
    Inventors: Yuliang Zheng, Lawrence Teo, Gail-Joon Ahn
  • Publication number: 20060179312
    Abstract: A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.
    Type: Application
    Filed: April 7, 2006
    Publication date: August 10, 2006
    Applicant: Wachovia Corporation
    Inventors: Edward Kelly, Christopher Howser, Jonathan Savage, Yuliang Zheng
  • Publication number: 20060069912
    Abstract: Systems and methods for an information system security infrastructure are described. One embodiment of the present invention comprises global Internet-scale defense infrastructure, referred to as the Intrusion Detection Force (IDF). The IDF comprises a virtual infrastructure implemented on top of an existing network, such as the Internet. The IDF enables secure information sharing and intelligent data analysis and response. The node (e.g. 102 of FIG. 1) is the most primitive entity in the IDF architecture, and may be a switch, router, server, or workstation. The IDF may be implemented in small networks of computers or may be utilized by millions of hosts throughout the Internet, spanning different organizations, countries, and continents.
    Type: Application
    Filed: May 30, 2003
    Publication date: March 30, 2006
    Inventors: Yuliang Zheng, Lawrence Teo
  • Publication number: 20050152542
    Abstract: A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.
    Type: Application
    Filed: December 22, 2004
    Publication date: July 14, 2005
    Applicant: Wachovia Corporation
    Inventors: Yuliang Zheng, Luis Suarez
  • Publication number: 20050138374
    Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.
    Type: Application
    Filed: December 21, 2004
    Publication date: June 23, 2005
    Applicant: Wachovia Corporation
    Inventors: Yuliang Zheng, Neil Kauer, David Badia