Patents by Inventor Zhang Chao
Zhang Chao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240349812Abstract: A housing (10) for an aerosol provision device (1) comprises an outer body (11) having a first end (12) and an opposing second end (13) spaced from the first end along a longitudinal axis and connected to the first end by a side wall (14). The housing further comprises a power source receiving compartment (15) within the outer body. An aperture (17) is located in the side wall and a panel (18) is located in the aperture in a first position in which the panel is configured to seal closed the aperture such that the power source receiving compartment is fluidly isolated from the atmosphere. The panel is moveable from the first position to a second position in which the panel is at least partially removed from the aperture, when the internal pressure in the power source receiving compartment exceeds a predefined threshold.Type: ApplicationFiled: June 29, 2022Publication date: October 24, 2024Inventors: Xu Xiaofeng, Joseph Sutton, Li Guanghui, Zhang Chao
-
Patent number: 10791947Abstract: A method to update reference verification information used for electrocardiogram (ECG) signal verification includes: identifying a first ECG signal measured from a user; verifying the first ECG signal by comparing a second ECG signal included in a reference ECG signal set with the first ECG signal; in response to the first ECG signal being successfully verified, setting the successfully verified first ECG signal to be a third ECG signal, and adding the third ECG signal to a verified ECG signal set; and updating the reference ECG signal set by setting the third ECG signal added to the verified ECG signal set to be an additional second ECG signal, based on the reference ECG signal set and the verified ECG signal set.Type: GrantFiled: January 11, 2018Date of Patent: October 6, 2020Assignee: Samsung Electronics Co., Ltd.Inventors: Zhang Chao, Liu Yang, Chisung Bae, Sang Joon Kim, Liu Haixiao
-
Publication number: 20180192903Abstract: A method to update reference verification information used for electrocardiogram (ECG) signal verification includes: identifying a first ECG signal measured from a user; verifying the first ECG signal by comparing a second ECG signal included in a reference ECG signal set with the first ECG signal; in response to the first ECG signal being successfully verified, setting the successfully verified first ECG signal to be a third ECG signal, and adding the third ECG signal to a verified ECG signal set; and updating the reference ECG signal set by setting the third ECG signal added to the verified ECG signal set to be an additional second ECG signal, based on the reference ECG signal set and the verified ECG signal set.Type: ApplicationFiled: January 11, 2018Publication date: July 12, 2018Applicant: Samsung Electronics Co., Ltd.Inventors: Zhang CHAO, Liu YANG, Chisung BAE, Sang Joon KIM, Liu HAIXIAO
-
Patent number: 9654934Abstract: In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broadcast transmission from one or more devices. The computer creates a state trajectory map based on the received detection information, wherein the state trajectory map identifies connections between at least the computing device and a first device of the one or more devices and the computing device and a second device of the one or more devices. The computer one or more anomalies within the created state trajectory map. The computer determines an unauthorized device based on the determined one or more anomalies.Type: GrantFiled: August 11, 2015Date of Patent: May 16, 2017Assignee: International Business Machines CorporationInventors: Zhang Chao, Qiang Guan, Li Li, Chun hua Tian, Fengjuan Wang, Zhi Jun Wang
-
Patent number: 9628937Abstract: In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broadcast transmission from one or more devices. The computer creates a state trajectory map based on the received detection information, wherein the state trajectory map identifies connections between at least the computing device and a first device of the one or more devices and the computing device and a second device of the one or more devices. The computer one or more anomalies within the created state trajectory map. The computer determines an unauthorized device based on the determined one or more anomalies.Type: GrantFiled: November 18, 2016Date of Patent: April 18, 2017Assignee: International Business Machines CorporationInventors: Zhang Chao, Qiang Guan, Li Li, Chun hua Tian, Fengjuan Wang, Zhi Jun Wang
-
Publication number: 20170070891Abstract: In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broadcast transmission from one or more devices. The computer creates a state trajectory map based on the received detection information, wherein the state trajectory map identifies connections between at least the computing device and a first device of the one or more devices and the computing device and a second device of the one or more devices. The computer one or more anomalies within the created state trajectory map. The computer determines an unauthorized device based on the determined one or more anomalies.Type: ApplicationFiled: November 18, 2016Publication date: March 9, 2017Inventors: Zhang Chao, Qiang Guan, Li Li, Chun hua Tian, Fengjuan Wang, Zhi Jun Wang
-
Publication number: 20170048679Abstract: In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broadcast transmission from one or more devices. The computer creates a state trajectory map based on the received detection information, wherein the state trajectory map identifies connections between at least the computing device and a first device of the one or more devices and the computing device and a second device of the one or more devices. The computer one or more anomalies within the created state trajectory map. The computer determines an unauthorized device based on the determined one or more anomalies.Type: ApplicationFiled: August 11, 2015Publication date: February 16, 2017Inventors: Zhang Chao, Qiang Guan, Li Li, Chun hua Tian, Fengjuan Wang, Zhi Jun Wang
-
Patent number: 9503864Abstract: In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broadcast transmission from one or more devices. The computer creates a state trajectory map based on the received detection information, wherein the state trajectory map identifies connections between at least the computing device and a first device of the one or more devices and the computing device and a second device of the one or more devices. The computer one or more anomalies within the created state trajectory map. The computer determines an unauthorized device based on the determined one or more anomalies.Type: GrantFiled: June 1, 2016Date of Patent: November 22, 2016Assignee: International Business Machines CorporationInventors: Zhang Chao, Qiang Guan, Li Li, Chun hua Tian, Fengjuan Wang, Zhi Jun Wang
-
Patent number: 9374672Abstract: In an approach for determining an unauthorized device, a computer receives detection information from a computing device, wherein the detection information includes a broadcast transmission from one or more devices. The computer creates a state trajectory map based on the received detection information, wherein the state trajectory map identifies connections between at least the computing device and a first device of the one or more devices and the computing device and a second device of the one or more devices. The computer one or more anomalies within the created state trajectory map. The computer determines an unauthorized device based on the determined one or more anomalies.Type: GrantFiled: December 21, 2015Date of Patent: June 21, 2016Assignee: International Business Machines CorporationInventors: Zhang Chao, Qiang Guan, Li Li, Chun hua Tian, Fengjuan Wang, Zhi Jun Wang
-
Publication number: 20060071350Abstract: A structure and method for an improved a bond pad structure. We provide a top wiring layer and a top dielectric (IMD) layer over a semiconductor structure. The buffer dielectric layer is formed over the top wiring layer and the top dielectric (IMD) layer. We form a buffer opening in the buffer dielectric layer exposing at least of portion of the top wiring layer. We form a barrier layer over the buffer dielectric layer, and the top wiring layer in the buffer opening. A conductive buffer layer is formed over the barrier layer. We planarize the conductive buffer layer to form a buffer pad in the buffer opening. We form a passivation layer over the buffer pad and the buffer dielectric layer. We form a bond pad opening in the passivation layer over at least a portion of the buffer pad. We form a bond pad support layer over the buffer pad and the buffer dielectric layer. We form a bond pad layer over the a bond pad support layer.Type: ApplicationFiled: November 21, 2005Publication date: April 6, 2006Inventors: Zhang Fan, Zhang Chao, Liu Wuping, Chok Liep, Hsia Choo, Lim Kheng, Alan Cuthbertson, Tan Boon
-
Publication number: 20050127530Abstract: A structure and method for an improved a bond pad structure. We provide a top wiring layer and a top dielectric (IMD) layer over a semiconductor structure. The buffer dielectric layer is formed over the top wiring layer and the top dielectric (IMD) layer. We form a buffer opening in the buffer dielectric layer exposing at least of portion of the top wiring layer. We form a barrier layer over the buffer dielectric layer, and the top wiring layer in the buffer opening. A conductive buffer layer is formed over the barrier layer. We planarize the conductive buffer layer to form a buffer pad in the buffer opening. We form a passivation layer over the buffer pad and the buffer dielectric layer. We form a bond pad opening in the passivation layer over at least a portion of the buffer pad. We form a bond pad support layer over the buffer pad and the buffer dielectric layer. We form a bond pad layer over the a bond pad support layer.Type: ApplicationFiled: December 13, 2003Publication date: June 16, 2005Inventors: Zhang Fan, Zhang Chao, Liu Wuping, Chok Liep, Hsia Choo, Lim Kheng, Alan Cuthbertson, Tan Boom