Patents by Inventor Zheng Yan

Zheng Yan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210240760
    Abstract: A method including bit-operation and sub-code/substring filtering for image searching using a full-text search engine. The method can include determining a first binary vector of first binary substrings for a first image. The method also can include obtaining a respective second binary vector comprising second binary substrings for each of second images from a database. The method additionally can include determining a respective sub string distance for each of the binary substring for each of the second images. The respective substring distance can be between at least a pair of a first binary sub string of the first binary sub strings of the first binary vector and a respective corresponding second binary sub string of the second binary sub strings of the respective second binary vector for each of the second images.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Applicant: Walmart Apollo, LLC
    Inventors: Binwei Yang, Omer Ovenc, Behzad Ahmadi, Cun Mu, Zheng Yan, Guang Yang, Jun Zhao
  • Publication number: 20210224708
    Abstract: The present invention relates to a real-time economic dispatch method of a power system comprising the following steps: determining system initial data, and describing the power system in forms of nodes, branches, and parameters; determining an optimization objective and a constraint condition according to a problem, to construct a real-time economic dispatch model; setting a topology structure between the nodes; constructing a neural network for each node, and setting a parameter; setting an initial variable of the neural network; performing optimization by means of the neural network; determining whether a termination condition is satisfied, and outputting a result when the termination condition is satisfied, or repeating the neural network optimization when the termination condition is not satisfied.
    Type: Application
    Filed: March 6, 2018
    Publication date: July 22, 2021
    Inventors: Xinyi LE, Sijie CHEN, Xiaomeng FANG, Zheng YAN, Juntong XI
  • Patent number: 11061864
    Abstract: A system includes a plurality of clustered servers, a plurality of clients communicating with the plurality of clustered servers, and a grace database. Each of the plurality of clustered servers maintains a respective client recovery list. A client of the plurality of clients is configured to send a reclaim request to a server of the plurality of clustered servers. The grace database is configured to maintain an epoch value and a reclaim value. The epoch value indicates the current epoch, and the reclaim value indicates from which epoch reclaim is allowed. The server of the plurality of clustered servers is configured to maintain a client list and receive the reclaim request from the client. The client list indicates each client currently holding state on the server.
    Type: Grant
    Filed: July 26, 2018
    Date of Patent: July 13, 2021
    Assignee: Red Hat, Inc.
    Inventors: Jeffrey Thomas Layton, Gregory Allan Farnum, Zheng Yan, Patrick Joseph Donnelly
  • Publication number: 20210165463
    Abstract: An electronic device includes a casing, a driven component, a magnetic component and an electromagnetic component. The casing has an outer surface, an inner surface, and an accommodating groove penetrating through the outer surface and the inner surface. The driven component is movably disposed in the accommodating groove. The magnetic component is connected to the driven component. The electromagnetic component is aligned with the magnetic component, and the magnetic component and the electromagnetic component are located at the same side of the inner surface. When the electromagnetic component isn't powered, the magnetic component and the electromagnetic component are attracted to each other, and the driven component is positioned at a first position. When the electromagnetic component is powered, the magnetic component and the electromagnetic component are repulsed to each other so as to drive the driven component to move from the first position to the second position.
    Type: Application
    Filed: February 9, 2021
    Publication date: June 3, 2021
    Applicant: Acer Incorporated
    Inventors: Hung-Chi Chen, Ming-Feng Hsieh, Ju-Hsien Weng, Tzu-Hsiang Chang, Zheng-Yan Lee, Yu-Ming Lin, Huei-Ting Chuang, Shun-Bin Chen
  • Publication number: 20210160056
    Abstract: A method and apparatus for decentralized trust evaluation in a distributed network. A method for decentralized trust evaluation in a distributed network comprises obtaining a current block of a blockchain, wherein the current block of the blockchain comprises the hash value of the previous block of the blockchain, a timestamp of creation of the current block, a token issued to a node that creates the previous block of the blockchain, a trust value list indicating current trust values of each of the plurality of nodes, and information indicating evidence based on which the trust values in the trust value list were derived, the evidence was derived after the previous block of the blockchain was created; and extracting current trust values for at least one node of the plurality of nodes from the current block.
    Type: Application
    Filed: June 1, 2018
    Publication date: May 27, 2021
    Inventor: Zheng Yan
  • Patent number: 11012313
    Abstract: Methods, apparatus, computer program product and computer readable medium are disclosed for trust management in software defined networking. A method comprises: collecting network performance results after a network policy issued by an application is applied; collecting a feedback for the network policy; and calculating a trust value of the application based at least partly on the network performance results and the feedback.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: May 18, 2021
    Assignee: Nokia Technologies Oy
    Inventors: Zheng Yan, Shanshan Bian
  • Patent number: 10963017
    Abstract: An electronic device includes a casing, a driven component, a magnetic component and an electromagnetic component. The casing has an outer surface, an inner surface, and an accommodating groove penetrating through the outer surface and the inner surface. The driven component is movably disposed in the accommodating groove. The magnetic component is connected to the driven component. The electromagnetic component is aligned with the magnetic component, and the magnetic component and the electromagnetic component are located at the same side of the inner surface. When the electromagnetic component isn't powered, the magnetic component and the electromagnetic component are attracted to each other, and the driven component is positioned at a first position. When the electromagnetic component is powered, the magnetic component and the electromagnetic component are repulsed to each other so as to drive the driven component to move from the first position to the second position.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: March 30, 2021
    Assignee: Acer Incorporated
    Inventors: Hung-Chi Chen, Ming-Feng Hsieh, Ju-Hsien Weng, Tzu-Hsiang Chang, Zheng-Yan Lee, Yu-Ming Lin, Huei-Ting Chuang, Shun-Bin Chen
  • Publication number: 20210075787
    Abstract: A voiceprint authentication apparatus is provided, comprising: a voice receiving module configured to receive a user's voices in different speaking modes; a feature extraction module configured to extract respective sets of voice features from the user's voices in different speaking modes; a synthesis module configured to generate a first voiceprint template by synthesizing the respective sets of voice features; and a first communication module configured to send the first voiceprint template to a server to authenticate the user, wherein the user's voices and the respective sets of voice features are not sent to the server. A corresponding voice authentication method, as well as a computer readable medium, are also provided.
    Type: Application
    Filed: January 22, 2018
    Publication date: March 11, 2021
    Inventors: Rui Zhang, Zheng Yan
  • Patent number: 10944551
    Abstract: A method for securing D2D communications may comprise: encrypting communication data based at least in part on a security policy associated with at least one of a general trust evaluation and a local trust evaluation; and sending the encrypted communication data from a first user equipment to one or more second user equipments, wherein the second user equipment of which at least one of a general trust evaluation result and a local trust evaluation result satisfies the security policy set by the first user equipment is eligible to access the encrypted communication data.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: March 9, 2021
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Publication number: 20210057737
    Abstract: An electrode for use in a battery includes a silicon-carbon composite with graphite. The silicon-carbon composite structure is microporous. The silicon-carbon composite can be made by dry spraying and magnesiothermically reducing silicon, followed by deposition of carbon.
    Type: Application
    Filed: February 27, 2019
    Publication date: February 25, 2021
    Inventors: Juchen Guo, Zheng Yan
  • Patent number: 10897362
    Abstract: According to an example aspect of the invention, there is provided an apparatus comprising at least one processing core and at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to receive, from a first user, a ciphertext, a first hash value and a first ciphered encryption key, receive, from a second user, a second hash value, responsive to a determination the first hash value is the same as the second hash value, obtain a re-encryption key, and apply the re-encryption key to the first ciphered encryption key to obtain a re-encrypted encryption key, the re-encrypted encryption key being decryptable with a secret key of the second user.
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: January 19, 2021
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Patent number: 10884863
    Abstract: The technology disclosed herein that may enable a client of a distributed storage system to recover a storage session after a failure occurs. An example method may include: identifying a storage session of a distributed storage service, the storage session comprising session data that corresponds to a storage object of the distributed storage service; providing, by a processing device of a client, an indication that the client is recovering the storage session; and obtaining, by the client, the session data of the storage session from one or more devices that accessed the storage object of the distributed storage service.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: January 5, 2021
    Assignee: Red Hat, Inc.
    Inventors: Gregory Allan Farnum, Jeffrey Thomas Layton, Patrick Joseph Donnelly, Zheng Yan
  • Patent number: 10887332
    Abstract: According to embodiments of the present invention, trust evaluation is performed on network entities including a host and a network node with privacy preservation to determine an unwanted traffic source. The trust evaluation is based on detection reports from the hosts and monitoring reports from the network nodes. The network nodes do not know contents of the detection reports, and an entity which executes the trust evaluation does not know real identifiers of the hosts and network nodes.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: January 5, 2021
    Assignee: NOKIA TECHNOLOGIES OY
    Inventor: Zheng Yan
  • Publication number: 20200412755
    Abstract: Various example embodiments relate generally to providing security for a communication network based on detection and mitigation of an attack in the communication network. Various example embodiments supporting attack detection and mitigation may be configured to support detection and mitigation of an attack in a communication network based on distributed collection of network traffic information at network elements and analysis of aggregated network traffic information at a network controller for determining whether a traffic anomaly indicative of an attack on the communication network is detected. Various example embodiments supporting attack detection and mitigation may be configured to support detection and mitigation of an attack in a communication network based on use of traffic records for supporting the collection, aggregation, and analysis of network traffic information.
    Type: Application
    Filed: February 23, 2018
    Publication date: December 31, 2020
    Inventors: Xuyang Jing, Zheng Yan
  • Patent number: 10841784
    Abstract: A method for authentication and key agreement in a communication network is disclosed. In the method, a network node generates a common public key and a master secret key, assigns to a first user equipment a first set of one or more pseudonym identifications corresponding to a real identity of the first user equipment, the common public key and a first private key specific to the first user equipment, and assigns to a second user equipment a second set of one or more pseudonym identifications corresponding to a real identity of the second user equipment, the common public key and a second private key specific to the second user equipment.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: November 17, 2020
    Assignee: Nokia Technologies Oy
    Inventors: Mingjun Wang, Zheng Yan
  • Publication number: 20200292388
    Abstract: A data set is stored in memory circuitry that is indicative of a state of a semiconductor fabrication process or of semiconductor structure fabricated thereby. Features in the data set are discernable to an extent limited by a data resolution. A machine-learning model comprising parameters having respective values assigned thereto as constrained by a model training process is also stored in the memory circuitry. Processor circuitry communicatively coupled to the memory circuitry generates an output data set from the data set in accordance with the machine-learning model such that features in the output data set are discernable to an extent limited by an output data resolution that is finer than the data resolution of the data set.
    Type: Application
    Filed: March 16, 2020
    Publication date: September 17, 2020
    Applicant: Tokyo Electron Limited
    Inventors: Yan CHEN, Xinkang Tian, Zheng Yan
  • Patent number: 10778657
    Abstract: Method and apparatus are disclosed for homomorphic re-encryption schemes in a system comprising a cloud service provider (CSP), a third authorized party (TAP), a data requestor (DR) and a plurality of data providers (DPs). According to an embodiment, a method implemented at a CSP comprises: in response to a request from a TAP, obtaining from a plurality of DPs cipher texts of their respective data, based on the request, wherein each DP is able to homomorphically encrypt its data; analyzing the cipher texts; and sending the analyzing result to the TAP, wherein the TAP is able to re-encrypt the analyzing result, such that a DR can decrypt the re-encrypted analyzing result with the DR's secret key.
    Type: Grant
    Filed: December 10, 2015
    Date of Patent: September 15, 2020
    Assignee: Nokia Technologies Oy
    Inventors: Wenxiu Ding, Zheng Yan
  • Publication number: 20200280858
    Abstract: According to an example embodiment, a technique for operating a trust manager entity that is arranged to serve a virtual base station pool that manages usage of radio access for a baseband unit of a cloud radio access network within a trust management arrangement that comprises one or more further trust manager entities, each arranged to serve a respective virtual base station pool that manages usage of radio access for a respective further baseband unit of the cloud radio access network is provided.
    Type: Application
    Filed: December 29, 2015
    Publication date: September 3, 2020
    Inventor: Zheng YAN
  • Patent number: 10764037
    Abstract: An approach is provided for managing data duplication in cloud computing. A method comprising, sending from a first device to a data center, data encrypted with a data encryption key for storing the encrypted data at the data center; encrypting the data encryption key according to an attribute-based encryption (ABE) scheme by using identity as an attribute in a deduplication policy for the data; issuing to a second device, a personalized secret attribute key which is derived from a public key of the second device according to the attribute-based encryption (ABE) scheme, wherein the personalized secret attribute key is to be used for decrypting the encrypted data encryption key at the second device, in combination with the policy.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: September 1, 2020
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Patent number: 10757569
    Abstract: A method is disclosed, comprising obtaining, by a first apparatus, a first identifier associated with the first apparatus, wherein the first identifier is different from a second identifier associated with the first apparatus, providing, by the first apparatus, at least one message to at least one further apparatus of at least one further apparatus, wherein each of the at least one message comprises a key information of the first apparatus and is associated with the first identifier associated with the first apparatus, and determining, by the first apparatus, a session key of a communication session associated with the first apparatus and the at least one further apparatus, based on at least one message received, by the first apparatus, provided by at least one further apparatus of the at least one further apparatus, wherein each of the at least one message comprises a key information of the respective further apparatus and is associated with a first identifier associated with the respective further apparatus
    Type: Grant
    Filed: August 5, 2016
    Date of Patent: August 25, 2020
    Assignee: Nokia Technologies Oy
    Inventors: Mingjun Wang, Zheng Yan