Patents by Inventor Zhiwen Zhang

Zhiwen Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11957025
    Abstract: Provided is a touch display panel. The touch display panel includes a drive back plate; a light-emitting device, disposed on the drive back plate; an encapsulation layer, disposed on a side of the light-emitting device distal from the drive back plate; and a touch layer, disposed on a side of the encapsulation layer distal from the light-emitting device, wherein the touch layer includes a first touch electrode layer and a second touch electrode layer laminated in sequence, and the touch layer further includes a touch insulating layer.
    Type: Grant
    Filed: May 6, 2021
    Date of Patent: April 9, 2024
    Assignees: Chengdu BOE Optoelectronics Technology Co., Ltd., BOE Technology Group Co., Ltd.
    Inventors: Zhiwen Chu, Bo Zhang, Hongwei Ma, Qian Ma, Tingliang Liu
  • Publication number: 20240106847
    Abstract: In one aspect, a computerized method for detecting reconnaissance and infiltration in data lakes and cloud warehouses, comprising: monitoring a SaaS data store or a cloud-native data store from inside the data store; examining the attack and automatically identifies how far the attack has progressed in the attack lifecycle; identifying the target and scope of the attack evaluates how far the attackers have penetrated the system and what is their target; and establishing the value of the asset subject to the attackers' attack and maps the impact of the attack on the CIA (confidentiality, integrity and availability) triad.
    Type: Application
    Filed: June 27, 2023
    Publication date: March 28, 2024
    Inventors: NAVINDRA YADAV, SUPREETH HOSUR NAGESH RAO, RAVI SANKURATRI, DANESH IRANI, ALOK LALIT WADHWA, VASIL DOCHKOV YORDANOV, VENKATESHU CHERUKUPALLI, VENKATESHU CHERUKUPALLI, YIWEI WANG, YIWEI WANG, ZHIWEN ZHANG, ZHIWEN ZHANG, ZHIWEN ZHANG, UDAYAN JOSHI
  • Patent number: 11941023
    Abstract: Provided are a system and method for implementing an incremental data comparison. The system includes: a synchronization T environment, a simulation F environment, a simulation tool, a memory database, a comparison tool and a result database. The T environment includes a synchronization environment core application, a traditional commercial database, an incremental synchronization tool and a synchronization environment distributed database. The F environment includes a simulation environment core application and a simulation environment distributed database. The simulation tool is configured to play back a T environment service and an F environment service. The memory database is configured to store a mapping relationship between message values of the T and F environment. The comparison tool is configured to compare data in the T and F environment according to the mapping relationship between the message values.
    Type: Grant
    Filed: May 22, 2020
    Date of Patent: March 26, 2024
    Assignee: ZTE CORPORATION
    Inventors: Jianhua Mai, Zhiwen Liu, Yan Ding, Longbo Guo, Peng Zhang, Zhenhua Xu
  • Publication number: 20240056460
    Abstract: In one aspect, a computerized method for detecting data abuse and data exfiltration in a data store or a data lakes cloud warehouse, comprising: identifying a plurality of Command and control (CnC) channels in an enterprise data cloud infrastructure; identifying and detecting malicious compressed data transfers and encrypted data transfers; implementing a destination analysis from within the data store; and implementing data abuse detection and prevention operations.
    Type: Application
    Filed: August 18, 2023
    Publication date: February 15, 2024
    Inventors: NAVINDRA Ross YADAV, SUPREETH HOSUR NAGESH RAO, RAVI SANKURATRI, DANESH IRANI, ALOK LALIT WADHWA, VASIL DOCHKOV YORDANOV, VENKATESHU CHERUKUPALLI, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI
  • Publication number: 20240028572
    Abstract: In one aspect, a computerized system for securing data cloning and sharing options on data warehouses, comprising: a clone determiner engine that determines that a data asset is a primary data asset or a clone data asset, wherein the clone determiner engine comprises: a log data analyzer that obtains and analyzes a set of logs of the data asset from a specified log source, and wherein set of logs are used to determine that the data asset is the primary data asset or the clone data asset, a timestamp analyzer engine that obtains a timestamp data of the data asset and reviews the timestamp data to analyze ordering of the data asset, and wherein the timestamp analyzer engine determines the data asset is a primary asset or a secondary asset, and a fingerprints analyzer that obtains and reviews the data asset and any metadata of data asset, and wherein the fingerprints analyzer creates a fingerprint based on a content of the data asset and the metadata of the data asset, and wherein the fingerprints analyzer then
    Type: Application
    Filed: January 24, 2023
    Publication date: January 25, 2024
    Inventors: NAVINDRA YADAV, SUPREETH HOSUR NAGESH Rao, RAVI SANKURATRI, DANESH IRANI, ALOK LALIT WADHWA, VASIL DOCHKOV YORDANOV, VENKATESHU CHERUKUPALLI, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI
  • Patent number: 11811956
    Abstract: A blockchain-based supervision system of hazardous chemical production includes: a collection layer, for collecting production data information, wherein a collection device in the collection layer sets a TEE to encrypt or hash the collected production data information; a data layer, for uplinking a hash certificate of the production data information through an alliance chain, wherein the collection layer communicates with the data layer; a blockchain, for deploying a file uplink contract and encrypting and storing a file on a privacy computing server after the file is connected to the trusted environment; and a privacy computing system, for forming a metadata market of the data from file description information, recording the metadata information of the collected data. A data user applies for the right of use to a production enterprise that produces the data, and after obtaining authorization, the data user performs various applications on the privacy computing system.
    Type: Grant
    Filed: September 22, 2022
    Date of Patent: November 7, 2023
    Assignee: HANGZHOU VASTCHAIN TECHNOLOGY CO., LTD
    Inventors: Xiao Luo, Xiji Cheng, Jian Zhao, Zhiwen Zhang, Saiwei Song
  • Publication number: 20230334162
    Abstract: In one aspect, a computerized method for minimizing a data governance in order to improve data security, comprising: providing and imposing a set of access rules to a set of data, wherein the set of data is stored in a data warehouse; measuring a level of over provisioning of the set of data; measuring a level of data abuse susceptibility of the set of data; implementing a dark data governance operation on the set of data; and identifying a set of infrequently used roles in the set of data.
    Type: Application
    Filed: February 9, 2023
    Publication date: October 19, 2023
    Inventors: NAVINDRA YADAV, SUPREETH HOSUR NAGESH RAO, RAVI SANKURATRI, DANESH IRANI, ALOK LALIT WADHWA, VASIL DOCHKOV YORDANOV, VENKATESHU CHERUKUPALLI, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI
  • Publication number: 20230125955
    Abstract: A blockchain-based supervision system of hazardous chemical production includes: a collection layer, for collecting production data information, wherein a collection device in the collection layer sets a TEE to encrypt or hash the collected production data information; a data layer, for uplinking a hash certificate of the production data information through an alliance chain, wherein the collection layer communicates with the data layer; a blockchain, for deploying a file uplink contract and encrypting and storing a file on a privacy computing server after the file is connected to the trusted environment; and a privacy computing system, for forming a metadata market of the data from file description information, recording the metadata information of the collected data. A data user applies for the right of use to a production enterprise that produces the data, and after obtaining authorization, the data user performs various applications on the privacy computing system.
    Type: Application
    Filed: September 22, 2022
    Publication date: April 27, 2023
    Inventors: Xiao LUO, Xiji CHENG, Jian ZHAO, Zhiwen ZHANG, Saiwei SONG
  • Publication number: 20230098491
    Abstract: The invention provide an assessment method and device for infectious disease transmission, computer equipment and storage medium. The method comprises: obtaining respective target track data corresponding to assessment objects within a preset area in a first time slice; determining a matching subarea to which each assessment object matches in the first time slice based on the target track data; taking at least one of the plurality of subareas as a target subarea, and assessing an assessment object within the target subarea based on an infectious disease model to determine a transmission trend of an infectious disease for the assessment object within the preset area in the first time slice; and taking a next time slice as the first time slice, and re-performing the above steps until end of the target time period to determine a transmission trend of the infectious disease among the assessment objects during the target time period.
    Type: Application
    Filed: September 29, 2021
    Publication date: March 30, 2023
    Applicant: SOUTHERN UNIVERSITY OF SCIENCE AND TECHNOLOGY
    Inventors: Xuan SONG, Zipei FAN, Renhe JIANG, Chuang YANG, Zhiwen ZHANG, Quanjun CHEN, Ryosuke SHIBASAKI
  • Publication number: 20230018068
    Abstract: In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.
    Type: Application
    Filed: June 1, 2022
    Publication date: January 19, 2023
    Inventors: SUPREETH HOSUR NAGESH RAO, NAVINDRA YADAV, RAVI SANKURATRI, ALOK LALIT WADHWA, ARIA RAHADIAN, BRADY SCHULMAN, RAVI SHANKER PRASAD, VASIL DOCHKOV YORDANOV, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI, SOUMYADEEP CHOUDHURY, MUHAMMADA FURQAN, DANESH IRANI
  • Publication number: 20220407883
    Abstract: In one aspect, a computerized method for locating one or more shadow vulnerable datastores for cloud-platform datastores includes the step of identifying a cloned data store of an original datastore in a cloud database instance. It includes the step of determining that the cloned datastore comprises a shadow vulnerable datastore. It includes the step of defining a security posture of the cloned datastore. It includes the step of publishing a digitized data clone security differential report comprising the security posture and one or more remediations to fix security posture issues.
    Type: Application
    Filed: April 1, 2022
    Publication date: December 22, 2022
    Inventors: SUPREETH HOSUR NAGESH RAO, NAVINDRA YADAV, RAVI SANKURATRI, ALOK LALIT WADHWA, ARIA RAHADIAN, BRADY SCHULMAN, RAVI SHANKER PRASAD, VASIL DOCHKOV YORDANOV, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI, SOUMYADEEP CHOUDHURY, MUHAMMADA FURQAN, DANESH IRANI
  • Patent number: 11470159
    Abstract: The present disclosure provides systems, methods, and computer-readable media for determining an objective measure of breach exposure of Application Programming Interface (API) infrastructure for microservices. In one aspect, a method includes analyzing header information of Application Programming Interface (API) call stacks between microservices; determining, for each API call stack, corresponding security key information based on the header information; determining location information of each of the microservices; and determining a vulnerability score for each of the microservices based on the corresponding security key information and corresponding location information of each of the microservices.
    Type: Grant
    Filed: January 25, 2021
    Date of Patent: October 11, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jackson Ngoc Ki Pang, Ashutosh Kulshreshtha, Preethi Narayan, Vishal Jaswant Thakkar, Aria Rahadian, Zhiwen Zhang
  • Publication number: 20220269792
    Abstract: A computerized method for implementing risk discovery with a set of unified security and privacy policies, includes the step of discovering a set of data and a set of data accesses within an enterprise computing system. The method includes the step of classifying the set of discovered data and the set of data accesses with an identification that shows which of the data assets are important or critical for the enterprise. The method includes the step of determining which of the set of discovered data and the set of data accesses have or are associated with sensitive information. The method includes the step of placing the set of discovered data and the set of data accesses that are associated with sensitive information into a set of discovered information about the infrastructure. The method includes the step of determining which of the set of discovered data and the set of data accesses are relevant in the context of a specified governmental data privacy regulation.
    Type: Application
    Filed: March 18, 2021
    Publication date: August 25, 2022
    Inventors: SUPREETH HOSUR NAGESH RAO, NAVINDRA YADAV, RAVI SANKURATRI, ALOK LALIT WADHWA, ARIA RAHADIAN, BHARATHWAJ SANKARA VISWANATHAN, BRADY SCHULMAN, MATTHEW FINN, PAUL JOHN LESIAK, RAVI SHANKER PRASAD, VASIL DOCHKOV YORDANOV, YIWEI WANG, ZHIWEN ZHANG
  • Publication number: 20220269815
    Abstract: In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly.
    Type: Application
    Filed: June 1, 2021
    Publication date: August 25, 2022
    Inventors: SUPREETH HOSUR NAGESH RAO, Navindra Yadav, Ravi Sankuratri, Alok Lalit Wadhwa, Aria Rahadian, Bharathwaj Sankara Viswanathan, Brady Schulman, Matthew Finn, Ravi Shanker Prasad, Vasil Dochkov Yordanov, Yiwei Wang, Zhiwen Zhang
  • Publication number: 20220272111
    Abstract: In one aspect, a method for implementing a cloud-platform push for one or more known data breaches includes the step of, for each data breach of the one or more known data breaches, providing a functionality that maps one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes generating a security rule for each mapped kill chain or TTP based on the functionality that maps the one or more kill chains or Tactics, Techniques, and Procedures (TTPs) for a specified set of security dimensions. A step includes pushing the security rule to an enterprise so that the enterprise is aware of a vulnerability in the data breach. A step includes generating a customized posture for a Virtual private cloud (VPC) in the enterprise's cloud-based network. A step includes determining that the data breach can occur within the enterprise's cloud-based network.
    Type: Application
    Filed: November 16, 2021
    Publication date: August 25, 2022
    Inventors: SUPREETH HOSUR NAGESH RAO, NAVINDRA YADAV, RAVI SANKURATRI, ALOK LALIT WADHWA, ARIA RAHADIAN, BHARATHWAJ SANKARA VISWANATHAN, BRADY SCHULMAN, MATTHEW FINN, PAUL JOHN LESIAK, RAVI SHANKER PRASAD, VASIL DOCHKOV YORDANOV, YIWEI WANG, ZHIWEN ZHANG, UDAYAN JOSHI, SOUMYADEEP CHOUDHURY, MUHAMMADA FURQAN, MANISH ARIGALA
  • Publication number: 20220070279
    Abstract: The present disclosure provides systems, methods, and computer-readable media for determining an objective measure of breach exposure of Application Programming Interface (API) infrastructure for microservices. In one aspect, a method includes analyzing header information of Application Programming Interface (API) call stacks between microservices; determining, for each API call stack, corresponding security key information based on the header information; determining location information of each of the microservices; and determining a vulnerability score for each of the microservices based on the corresponding security key information and corresponding location information of each of the microservices.
    Type: Application
    Filed: January 25, 2021
    Publication date: March 3, 2022
    Inventors: Jackson Ngoc Ki Pang, Ashutosh Kulshreshtha, Preethi Narayan, Vishal Jaswant Thakkar, Aria Rahadian, Zhiwen Zhang
  • Publication number: 20210304900
    Abstract: A method and apparatus for predicting transmission of an infectious disease, a computer apparatus, and a storage medium. The method includes determining one or more objects to be predicted, matching in a historical travel path database for a corresponding predicted path of each of the one or more objects to be predicted, and determining a transmission trend of the infectious disease in the one or more objects to be predicted based on the predicted travel paths. The predicted travel path of each object to be predicted is matched in the historical travel path database thus achieving the effect of reducing the computation amount of obtaining the predicted travel path.
    Type: Application
    Filed: July 14, 2020
    Publication date: September 30, 2021
    Inventors: Xuan Song, Zipei Fan, Zhiwen Zhang, Chuang Yang, Yinghao Liu, Renhe Jiang, Quanjun Chen, Ryosuke Shibasaki
  • Patent number: 11049679
    Abstract: A contactor including a pedestal. The pedestal is of a step structure having notches in two ends. The step structure includes a first step and a second step from bottom to top and is covered with a cover body having a matched shape. A part, which protrudes out of the second step, at each of two ends of the first step, is provided with a first mounting groove in which a control terminal and a power terminal that are spaced apart from each other are mounted, and the cover body is provided with a first wiring port corresponding to the control terminal and a second wiring port corresponding to the power terminal. Each of two ends of the second step is provided with a second mounting groove in which an auxiliary terminal is mounted, and the cover body is provided with a third wiring port which corresponds to the auxiliary terminal mounted in the second mounting groove. The contactor has a simple structure, and wiring areas can be distinguished.
    Type: Grant
    Filed: October 24, 2016
    Date of Patent: June 29, 2021
    Assignee: ZHEJIANG CHINT ELECTRICS CO., LTD.
    Inventors: Jing Lu, Qianjun Zheng, Ping Xu, Zhiwen Zhang, Tifeng Xiao
  • Patent number: D965617
    Type: Grant
    Filed: September 4, 2020
    Date of Patent: October 4, 2022
    Assignee: SOUTH UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA
    Inventors: Xuan Song, Zipei Fan, Zhiwen Zhang, Chuang Yang, Quanjun Chen, Renhe Jiang, Ryosuke Shibasaki
  • Patent number: D1004603
    Type: Grant
    Filed: October 20, 2021
    Date of Patent: November 14, 2023
    Assignee: Southern University of Science and Technology
    Inventors: Xuan Song, Chuang Yang, Zipei Fan, Renhe Jiang, Zhiwen Zhang, Quanjun Chen, Ryosuke Shibasaki