Patents by Inventor Yuliang Zheng
Yuliang Zheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240083575Abstract: An amphibious robot includes a housing including a first shell and a second shell and having a first configuration and a second configuration, a rack disposed in an inner cavity of the housing, a telescopic assembly disposed on the rack and connected between the first shell and the second shell, and a rotary wing assembly disposed on the rack and having a folded configuration and a flight configuration. The rotary wing assembly includes: a folding arm with one end rotatably connected to the rack, a rotary wing, and a tilting arm connected between the rotary wing and the folding arm, the tilting arm and the rotary wing are extended to an outside of the housing to be adapted to drive the robot to fly in the flight configuration, and the tilting arm is rotatable relative to the folding arm to adjust a rotation direction of the rotary wing.Type: ApplicationFiled: July 26, 2023Publication date: March 14, 2024Inventors: Long Ma, Wenzhen Wu, Weizhen Zhang, Qingyong Meng, Ying Feng, Desheng Zhang, Weijian Xu, Qingfeng Rong, Yuliang Ma, Jie Zheng
-
Publication number: 20200093212Abstract: A band holder is provided. The band holder includes: a holding unit having a holding unit body; a rotating unit including an arm pivotally connected to the holding unit body and a fixed hanging portion disposed at the arm pivotal end, wherein the rotating unit is rotated and fixed in place relative to the holding unit; and a spacing adjustment mechanism disposed at the arm and having a movable hanging portion, the movable hanging portion undergoing linear displacement in a lengthwise direction of the arm and being positioned, so as to adjust its distance from the fixed hanging portion. Therefore, not only is a mask comfortable to wear, but the human head and ear also perceive no sense of compression.Type: ApplicationFiled: May 18, 2018Publication date: March 26, 2020Applicant: CENTER HEALTHCARE TECHNOLOGY CO.Inventors: Yongzhu ZHENG, Qianfeng ZHENG, Yuliang ZHENG
-
Publication number: 20160029715Abstract: A mask structure includes a mask body having at least one edge side; at least one subsidiary part connecting with and corresponding to the edge side, wherein an angle is formed between the subsidiary part and the mask body; and a band set fixing at the two sides of the mask body.Type: ApplicationFiled: April 11, 2014Publication date: February 4, 2016Applicant: CENTER HEALTHCARE TECHNOLOGY CO., LTD.Inventors: Yongzhu ZHENG, Qianfeng ZHENG, Yuliang ZHENG
-
Patent number: 8630421Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.Type: GrantFiled: March 14, 2012Date of Patent: January 14, 2014Assignee: Wells Fargo Bank, N.A.Inventors: Yuliang Zheng, Neil Kevin Kauer, David Victor Badia
-
Patent number: 8437474Abstract: A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.Type: GrantFiled: November 16, 2010Date of Patent: May 7, 2013Assignee: Wells Fargo Bank, N.A.Inventors: Yuliang Zheng, Luis Antonio Suarez
-
Publication number: 20120179911Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.Type: ApplicationFiled: March 14, 2012Publication date: July 12, 2012Applicant: Wells Fargo Bank, N.A.Inventors: Yuliang Zheng, Neil Kevin Kauer, David Victor Badia
-
Patent number: 8139770Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.Type: GrantFiled: December 21, 2004Date of Patent: March 20, 2012Assignee: Wells Fargo Bank, N.A.Inventors: Yuliang Zheng, Neil Kevin Kauer, David Victor Badia
-
Patent number: 8065725Abstract: Systems and methods for an information system security infrastructure are described. One embodiment of the present invention comprises global Internet-scale defense infrastructure, referred to as the Intrusion Detection Force (IDF). The IDF comprises a virtual infrastructure implemented on top of an existing network, such as the Internet. The IDF enables secure information sharing and intelligent data analysis and response. The node (e.g. 102 of FIG. 1) is the most primitive entity in the IDF architecture, and may be a switch, router, server, or workstation. The IDF may be implemented in small networks of computers or may be utilized by millions of hosts throughout the Internet, spanning different organizations, countries, and continents.Type: GrantFiled: May 30, 2003Date of Patent: November 22, 2011Inventors: Yuliang Zheng, Lawrence Chin Shiun Teo
-
Publication number: 20110058673Abstract: A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.Type: ApplicationFiled: November 16, 2010Publication date: March 10, 2011Applicant: Wells Fargo Bank, N.A.Inventors: Yuliang Zheng, Luis Antonio Suarez
-
Patent number: 7860243Abstract: A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.Type: GrantFiled: December 22, 2004Date of Patent: December 28, 2010Assignee: Wells Fargo Bank, N.A.Inventors: Yuliang Zheng, Luis Antonio Suarez
-
Patent number: 7725710Abstract: A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.Type: GrantFiled: April 7, 2006Date of Patent: May 25, 2010Assignee: Wells Fargo Bank, N.A.Inventors: Edward R. Kelly, Christopher Wayne Howser, Jonathan Francis Savage, Yuliang Zheng
-
Publication number: 20100017859Abstract: A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.Type: ApplicationFiled: September 14, 2009Publication date: January 21, 2010Applicant: Wells Fargo Bank, N.A.Inventors: Edward R. Kelly, Christopher Wayne Howser, Jonathan Francis Savage, Yuliang Zheng
-
Patent number: 7610617Abstract: A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.Type: GrantFiled: December 22, 2004Date of Patent: October 27, 2009Assignee: Wells Fargo Bank, N.A.Inventors: Edward R. Kelly, Christopher Wayne Howser, Jonathan Francis Savage, Yuliang Zheng
-
Patent number: 7546327Abstract: A random number generator includes one or more pseudorandom data sources that generate pseudorandom data, a randomness accumulation facility that receives pseudorandom data from the one or more pseudorandom data sources, a storage facility that stores a random value generated by the randomness accumulation facility, and an application programming interface (“API”), operating independently from the operation of the randomness accumulation facility, that retrieves, upon request by a software application, the random value currently stored in the storage facility and provides a random number to the software application. The pseudorandom data is hashed with a previously-stored random value and a first counter value and may be encrypted before storing in the storage facility. Likewise, the API hashes the current random value with a second counter value before outputting the random number thus generated, decrypting the current value first if necessary.Type: GrantFiled: December 21, 2004Date of Patent: June 9, 2009Assignee: Wells Fargo Bank, N.A.Inventor: Yuliang Zheng
-
Publication number: 20070094491Abstract: Systems and methods for dynamically learning network environments to achieve adaptive security are described. One described method for setting an adaptive threshold for a node includes: monitoring a data stream associated with the node to identify a characteristic of the node; monitoring an environmental factor capable of affecting the node; and determining the adaptive threshold based on at least one of the characteristic or the environmental factor. Another described method for dynamically assessing a risk associated with network traffic includes: identifying a communication directed at the node; determining a risk level associated with the communication; and comparing the risk level to the adaptive threshold.Type: ApplicationFiled: August 3, 2006Publication date: April 26, 2007Inventors: Lawrence Teo, Yuliang Zheng
-
Publication number: 20060206615Abstract: Systems and methods for dynamic and risk-aware network security are described. In one embodiment, a system dynamically assesses whether a connection over a communications medium (102) is anomalous (suspicious, malicious, deviating from normal behavior, fits a certain profile or pattern, or has the potential to be any one of these) and generates an appropriate response depending on whether the connection is deemed to be normal or anomalous for a specified period of time. The types of responses include, but are not limited to, blocking the source of the connection from connecting to its intended destination, altering the destination of the connection, auditing the connection, or any combination of these.Type: ApplicationFiled: May 30, 2003Publication date: September 14, 2006Inventors: Yuliang Zheng, Lawrence Teo, Gail-Joon Ahn
-
Publication number: 20060179312Abstract: A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.Type: ApplicationFiled: April 7, 2006Publication date: August 10, 2006Applicant: Wachovia CorporationInventors: Edward Kelly, Christopher Howser, Jonathan Savage, Yuliang Zheng
-
Publication number: 20060069912Abstract: Systems and methods for an information system security infrastructure are described. One embodiment of the present invention comprises global Internet-scale defense infrastructure, referred to as the Intrusion Detection Force (IDF). The IDF comprises a virtual infrastructure implemented on top of an existing network, such as the Internet. The IDF enables secure information sharing and intelligent data analysis and response. The node (e.g. 102 of FIG. 1) is the most primitive entity in the IDF architecture, and may be a switch, router, server, or workstation. The IDF may be implemented in small networks of computers or may be utilized by millions of hosts throughout the Internet, spanning different organizations, countries, and continents.Type: ApplicationFiled: May 30, 2003Publication date: March 30, 2006Inventors: Yuliang Zheng, Lawrence Teo
-
Publication number: 20050152542Abstract: A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.Type: ApplicationFiled: December 22, 2004Publication date: July 14, 2005Applicant: Wachovia CorporationInventors: Yuliang Zheng, Luis Suarez
-
Publication number: 20050138374Abstract: A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.Type: ApplicationFiled: December 21, 2004Publication date: June 23, 2005Applicant: Wachovia CorporationInventors: Yuliang Zheng, Neil Kauer, David Badia