Patents by Inventor Zhan Cui

Zhan Cui has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240127228
    Abstract: Disclosed are a method, apparatus and system for exporting and recharging a digital currency, which mainly relate to the technical field of computers. The method includes: receiving a generation request of a digital currency sent by a digital currency terminal, wherein the generation request indicates a first denomination of the requested digital currency and user information corresponding to the digital currency terminal (S101); determining, according to the user information, an available currency corresponding to the user information and a second denomination of the available currency (S102); generating, according to the available currency and the second denomination of the available currency, the digital currency corresponding to the user information and the first denomination, and recording a status of the digital currency as an export status (S103), and notifying the digital currency terminal of the digital currency in the export status (S104).
    Type: Application
    Filed: April 15, 2022
    Publication date: April 18, 2024
    Inventors: Gang DI, Changchun MU, Xinyu ZHAO, Peidong CUI, Jinli DU, Zhan SHI
  • Publication number: 20240076559
    Abstract: The present invention belongs to the field of petrochemical industry, and discloses a method for selective hydrogenation of butadiene extraction tail gas and a selective hydrogenation apparatus thereof.
    Type: Application
    Filed: October 19, 2021
    Publication date: March 7, 2024
    Inventors: Yan LI, Jun TIAN, Dongfeng LI, Liang GUO, Chunfang LI, Yi YUE, Zhou DU, Zhan SHU, Shujuan LUO, Jieming YE, Ting CUI
  • Publication number: 20230239304
    Abstract: A method of configuring a user device. The method includes sending, from the user device to a node of a distributed ledger network (DLN), the node configured to store a distributed ledger of the DLN, a request for characteristic data indicative of a characteristic associated with a service provider, receiving, at the user device, a response from the node of the DLN in response to the request, and configuring a functionality of the user device accessible to the service provider, based at least in part on the response from the node of the DLN. Further aspects relate to a data processing system, a network, and a method of operating a network.
    Type: Application
    Filed: June 15, 2021
    Publication date: July 27, 2023
    Inventors: Gery DUCATEL, Mamun ABU-TAIR, Zhan CUI, Joseph RAFFERTY, Hanif ULLAH, Aftab ALI, Philip MORROW
  • Publication number: 20230239154
    Abstract: A method for facilitating secure communication between a user device and a network device. Encrypted data from a user device is received at the network device. The encrypted data is encrypted based on first physiological data captured by a first sensor of the user device. The first physiological data is representative of a physiological characteristic of a user of the user device. A second sensor of the network device captures second physiological data representative of the physiological characteristic of the user. A common key for encrypting further data transferred between the user device and the network device is determined, based on the encrypted data and the second physiological data. Further aspects relate to other methods for facilitating secure communication between a user and network device, a network, and a method of operating a network.
    Type: Application
    Filed: June 15, 2021
    Publication date: July 27, 2023
    Inventors: Aftab ALI, Gery DUCATEL, Zhan CUI, Mamun ABU-TAIR, Joseph RAFFERTY, Hanif ULLAH, Philip MORROW
  • Publication number: 20230189003
    Abstract: A method of pairing a user device with a remote system. The user device communicates with an intermediary device via a secure communication channel to cause a secret key generated by the remote system to be received by the user device, from the intermediary device. The secret key is thereby assigned to the user device. The user device establishes communication with the remote system to pair the user device with the remote system using the secret key, such that data sent from the user device to the remote system is encrypted using the secret key and data received by the user device from the remote system is decrypted using the secret key.
    Type: Application
    Filed: May 14, 2021
    Publication date: June 15, 2023
    Inventors: Gabriele GELARDI, Gery DUCATEL, Zhan CUI
  • Patent number: 11533333
    Abstract: A computer implemented method of protecting a target subnet, including a set of network connected devices in a hierarchy of subnets of a computer network, from malware attack. The method includes generating a dynamical system for each subnet in the network, each dynamical system modelling a rate of change of a number of network connected devices in the subnet that are: susceptible to infection by the malware; infected by the malware; protected against infection by the malware; and remediated of infection by the malware. The dynamical systems are based on rates of transmission of the malware between pairs of subnets; evaluating a measure of risk of infection of the target subnet at a predetermined point in time based on the dynamical system for the target subnet; and responsive to the measure of risk meeting a predetermined threshold, deploying malware protection measures to devices in the target subnet.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: December 20, 2022
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Xiao-Si Wang, Zhan Cui, Ian Herwono
  • Patent number: 11470109
    Abstract: A computer implemented method of protecting a portion of a computer network from malware attack, the computer network including a network connected devices organized into hierarchical subnets modelled by a tree data structure in which each subnet is represented as a node in the tree, each node having a connection to parent node save for a root node, the method including performing protective actions on devices in subnets associated with a first subset of nodes to provide protection against the malware, prioritizing devices in the subnets associated with a second subset of nodes so as to provide a barrier of subnets protected against the malware to impede the propagation of the malware to devices in subnets associated with each of the first subset of nodes.
    Type: Grant
    Filed: March 19, 2019
    Date of Patent: October 11, 2022
    Assignee: British Telecommunications Public Limited Company
    Inventors: Xiao-Si Wang, Zhan Cui, Ian Herwono
  • Publication number: 20220272107
    Abstract: A computer implemented method to block malware propagation in a network of computer systems, each computer system in the network having associated location information indicating a physical location, by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a physical location at which one or more computer systems are involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems; colocation of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the physical location so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: August 25, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Publication number: 20220247759
    Abstract: A computer implemented method to block malware propagation in a network of computer systems by receiving, for each of a plurality of time periods, a model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; identifying a common resource in the network involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems and the communications therebetween identified in the models; and implementing protective measures in respect to the common resource so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: August 4, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Publication number: 20220239671
    Abstract: A computer implemented method to block malware propagation in a network of computer systems by receiving, for each of a plurality of time periods, a historical model of the network of computer systems identifying communications therebetween and a malware infection state of each computer system; generating, for each of a plurality of subsequent time periods, a forecast model of the network of computer systems in which each forecast model identifies communications between computer systems and malware infection state of computer systems being determined based on an extrapolation of the set of historical models; identifying a common resource in the network involved in propagation of the malware, the identification being based on changes to malware infection states of computer systems and the communications therebetween identified in the forecast models; and implementing protective measures in respect to the common resource so as to block propagation of the malware through the network.
    Type: Application
    Filed: June 24, 2020
    Publication date: July 28, 2022
    Inventors: Xiao-Si WANG, Zhan cui, Jonathan TATE
  • Publication number: 20220060485
    Abstract: A computer implemented method of protecting a network of computer systems, the method comprising: receiving security data for the network, the security data comprising threat event data for threat events detected within the network over a period of time; extracting, from the received security data, one or more features indicative of a computer system being compromised by a particular threat; generating a forecast of a number of computer systems in the network compromised by the particular threat at a future point in time based on the one or more features; determining whether action should be taken to mitigate the particular threat based on the forecast; and in response to determining that action should be taken, causing one or more predetermined actions to be taken to mitigate the particular threat.
    Type: Application
    Filed: December 11, 2019
    Publication date: February 24, 2022
    Inventors: Xiao-Si WANG, Zhan CUI
  • Publication number: 20210014241
    Abstract: A computer implemented method of protecting a portion of a computer network from malware attack, the computer network including a network connected devices organized into hierarchical subnets modelled by a tree data structure in which each subnet is represented as a node in the tree, each node having a connection to parent node save for a root node, the method including performing protective actions on devices in subnets associated with a first subset of nodes to provide protection against the malware, prioritizing devices in the subnets associated with a second subset of nodes so as to provide a barrier of subnets protected against the malware to impede the propagation of the malware to devices in subnets associated with each of the first subset of nodes.
    Type: Application
    Filed: March 19, 2019
    Publication date: January 14, 2021
    Applicant: British Telecommunications Public Limited Company
    Inventors: Xiao-Si WANG, Zhan CUI, Ian HERWONO
  • Publication number: 20210014240
    Abstract: A computer implemented method of protecting a target subnet in a hierarchy of subnets of a computer network from malware attack, the subnet including a set of network connected devices, the method including generating a dynamical system for each subnet in the network, each dynamical system modelling a rate of change of a number of network connected devices in the subnet that are: susceptible to infection by the malware; infected by the malware; protected against infection by the malware; and remediated of infection by the malware, the dynamical systems being based on rates of transmission of the malware between pairs of subnets; evaluating a measure of risk of infection of the target subnet at a predetermined point in time based on the dynamical system for the target subnet; and responsive to the measure of risk meeting a predetermined threshold, deploying malware protection measures to devices in the target subnet.
    Type: Application
    Filed: March 19, 2019
    Publication date: January 14, 2021
    Inventors: Xiao-Si WANG, Zhan CUI, Ian HERWONO
  • Patent number: 9870470
    Abstract: A multi-stage event detector for monitoring a system to detect the occurrence of multistage events in the monitored system, the multi-stage event detector includes: one or more event detecting detector units (142, 144) for detecting observable events occurring on the monitored system; one or more parameter generating detector units (152, 154) for generating parameter values which vary over time dependent on the behavior of the monitored system; a hidden state determiner (120) for determining a likely sequence of states of interest of the system based on the outputs of the one or more event detecting detector units; and a transition determiner (130) for determining a likely transition occurrence based on a comparison of a set of values of a parameter or set of parameters generated by one or more of the one or more parameter generating detector units with a plurality of pre-specified functions or sets of values of a corresponding parameter or set of parameters associated with different transition occurrences.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: January 16, 2018
    Assignee: British Telecommunications PLC
    Inventors: Ian Herwono, Zhan Cui, Ben Azvine, Martin Brown, Karl Smith
  • Patent number: 9836600
    Abstract: A multi-stage event detector for monitoring a system, the multi-stage event detector including: a process generator operable to generate main and sub-processes, each main and sub-process being operable to generate and initiate a detection agent each of which is operable to be triggered by detecting the occurrence of a trigger event and to report back to its generating process or sub-process upon being so triggered. Each process or sub-process is operable to respond to receipt of a report from a triggered detection agent by reporting the detection of a multi-stage event to an overall controller.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: December 5, 2017
    Assignee: British Telecommunications PLC
    Inventors: Ian Herwono, Zhan Cui
  • Patent number: 9804910
    Abstract: A method of detecting loss of data connection in a plurality of links between an exchange and one or more of a plurality of network terminals arising during presence of a user at an intervention point node on the links between the exchange and the network terminals, comprising: receiving connection information about a loss of data connection on any one of the links; receiving duration information about a duration of the user presence at the intervention point node; determining if the loss of data connection occurred within the user presence duration; causing line tests to be conducted on each of the links for which loss of data connection is determined to have occurred within the user presence duration; receiving results of the line tests including a number of links being determined, by the line test, to exhibit a fault; and determining if the number of links determined to exhibit a fault exceeds a predetermined threshold number.
    Type: Grant
    Filed: December 6, 2013
    Date of Patent: October 31, 2017
    Assignee: BRITISH TELECOMMUNICATIONS public limited company
    Inventors: Martin Wanyonyi Koyabe, Zhan Cui
  • Patent number: 9773053
    Abstract: A system (100) for generating a computer readable data file representative of a mapping between a first representation of a set of concepts or of a data structure (e.g. a database schema) and a second representation of a set of concepts or of a data structure (e.g. an ontology), each representation comprising a plurality of complex representational elements (e.g. tables in a database schema and concepts in an ontology) each of which may itself include a number of associated subordinate representational elements (e.g. columns/fields of a table in a database schema and attributes of a concept in an ontology).
    Type: Grant
    Filed: December 23, 2011
    Date of Patent: September 26, 2017
    Assignee: BRITISH TELECOMMUNICATIONS public limited company
    Inventors: Beum Seuk Lee, Zhan Cui
  • Patent number: 9674342
    Abstract: A system for monitoring connection status of a cable in a network comprising a detector operationally connected to the cable, a metal line test module, and a processor for receiving from the detector one or more connection status reports about connection of the cable to a network node, and configured to cause, upon a connection status report threshold being reached, a test of the cable by the metal line test module to confirm the connection status of the cable. Related apparatus and methods are also disclosed.
    Type: Grant
    Filed: March 21, 2013
    Date of Patent: June 6, 2017
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Martin Wanyonyi Koyabe, Zhan Cui
  • Patent number: 9275145
    Abstract: An electronic document retrieval system is disclosed. It has particular utility to World-Wide Web searching. The system requires webmasters to put forward categories into which the pages on their web-site might sensibly be divided, and to provide a list of those categories together with a list of popular keywords associated with those categories to a global search engine. The global search engine is then able to augment one or more of its search results with links to category-heading pages which most closely relate to the query provided by the user. In this way, a user is able to find the page most relevant to his query more rapidly than has hitherto been possible.
    Type: Grant
    Filed: March 26, 2008
    Date of Patent: March 1, 2016
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Gery M. Ducatel, Nader Azarmi, Zhan Cui
  • Publication number: 20160055334
    Abstract: A multi-stage event detector for monitoring a system, the multi-stage event detector including: a process generator operable to generate main and sub-processes, each main and sub-process being operable to generate and initiate a detection agent each of which is operable to be triggered by detecting the occurrence of a trigger event and to report back to its generating process or sub-process upon being so triggered. Each process or sub-process is operable to respond to receipt of a report from a triggered detection agent by reporting the detection of a multi-stage event to an overall controller.
    Type: Application
    Filed: March 31, 2014
    Publication date: February 25, 2016
    Inventors: Ian HERWONO, Zhan CUI