Patents by Inventor Bianling Zhang
Bianling Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240097887Abstract: An identity authentication method is disclosed in embodiments of the present application. When a requester and an authentication access controller perform identity authentication using an authentication mechanism of a pre-shared key, the identity information of entities is transmitted in the form of ciphertext, thereby preventing the identity information of the entities from being exposed during the transmission, so that attackers cannot obtain private or sensitive information. The mutual or unilateral identity authentication between the authentication access controller and the requester is achieved while ensuring the confidentiality of the entity identity and related information, thereby laying a foundation for ensuring that the user accessing the network is legitimate and/or the network accessed by the user is legitimate.Type: ApplicationFiled: December 21, 2021Publication date: March 21, 2024Inventors: Xiaolong LAI, Jun CAO, Manxia TIE, Qin LI, Xiaorong ZHAO, Bianling ZHANG, Zhenhai HUANG, Chaofan SHAO
-
Publication number: 20240064027Abstract: Disclosed is an identity authentication method. By means of the method, confidentiality processing is performed on identity information of a requesting device, to prevent the identity information of the requesting device from being exposed during a transmission process, thereby ensuring that an attacker cannot obtain private information of the requesting device. Moreover, by means of introducing an authentication server, identity authentication performed on the requesting device by an authentication access controller is realized while ensuring the confidentiality of information related to an entity identity, so as to ensure that only legitimate users can access a network. Further disclosed are an identity authentication apparatus, a storage medium, a program, and a program product.Type: ApplicationFiled: December 21, 2021Publication date: February 22, 2024Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Yuehui WANG, Dandan MA
-
Publication number: 20240064025Abstract: An identity authentication method and apparatus, a device, a chip, a storage medium, and a program. Confidentiality processing is performed on identity information of a requesting device and an authentication access controller, such that the identity information of the requesting device and the authentication access controller is prevented from being exposed during a transmission process, thereby ensuring that an attacker cannot obtain private and sensitive information of the requesting device and the authentication access controller. In addition, by means of involving an authentication server, mutual identity authentication of the requesting device and the authentication access controller is realized while the confidentiality of information related to an entity identity is ensured.Type: ApplicationFiled: December 21, 2021Publication date: February 22, 2024Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Yuehui WANG
-
Publication number: 20240064024Abstract: Disclosed in the present application are an identity authentication method and apparatus, and a device, a chip, a storage medium and a program. The identity information of a requesting device is confidentially processed to prevent the identity information of the requesting device from being exposed during transmission, thereby ensuring that an attacker cannot obtain the private information of the requesting device. In addition, by introducing an authentication server, real-time two-way identity authentication between the requesting device and an authentication access controller is achieved while ensuring the confidentiality of entity identity-related information.Type: ApplicationFiled: December 21, 2021Publication date: February 22, 2024Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Xiang YAN
-
Publication number: 20240064006Abstract: Disclosed is an identity authentication method. During the process of a requesting device authenticating the identity of an authentication access controller, confidentiality processing is performed on identity information that carries private and sensitive information, and identity authentication result information, thus private and sensitive information can be prevented from being exposed, such that an attacker cannot acquire private and sensitive information in a first authentication response message or an authentication result message even if they have intercepted same, thereby preventing an attack of an attacker on a legitimate authentication access controller, and ensuring the security of the authentication access controller, the requesting device and even a network. Further disclosed are an identity authentication apparatus, a storage medium, a program, and a program product.Type: ApplicationFiled: December 21, 2021Publication date: February 22, 2024Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Zhenhai HUANG, Xiang YAN
-
Publication number: 20240064011Abstract: Disclosed in embodiments of the present application are an identity authentication method and apparatus, a device, a chip, a storage medium, and a program. Identify information of a requesting device and an authentication access controller is subjected to confidential processing to prevent the identify information of the requesting device and the authentication access controller from being exposed in a transmission process, so as to ensure that an attacker cannot obtain the private and sensitive information. Moreover, an authentication server is introduced, such that real-time authentication of bidirectional identity between the requesting device and the authentication access controller is achieved while the confidentiality of entity identity related information is guaranteed.Type: ApplicationFiled: December 21, 2021Publication date: February 22, 2024Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Zhenhai HUANG
-
Publication number: 20240056433Abstract: Disclosed is an identity authentication method. When a request device and an authentication access controller perform identity verification on the basis of an authentication mechanism of a pre-shared key, identity information of a verified party is transmitted in the form of a ciphertext, thereby preventing the identity information of the verified party from being directly exposed during transmission, and ensuring that an attacker cannot obtain private and sensitive information. Two-way or one-way identity authentication between the authentication access controller and the request device is realized, while the confidentiality of entity identity related information is ensured, thereby laying the foundation for ensuring that a user accessing a network is legitimate and/or the network accessed by the user is legitimate.Type: ApplicationFiled: December 21, 2021Publication date: February 15, 2024Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Liang LU
-
Publication number: 20240056296Abstract: Disclosed in embodiments of the present application are an identity authentication method. Bidirectional or unidirectional identity authentication between an authentication access controller and a requesting device is implemented by using a pre-shared key, thereby laying a foundation for ensuring that a user accessing a network is legitimate and/or a network accessed by a user is legitimate, so as to implement secret communication between the requesting device and the authentication access controller. In addition, in an identity authentication process, a verified party performs calculation on information comprising the pre-shared key of two parties and random numbers respectively generated by the two parties to obtain an identity authentication key, and performs calculation on specified content by using the identity authentication key to obtain an identity authentication code of the verified party.Type: ApplicationFiled: December 21, 2021Publication date: February 15, 2024Inventors: Manxia TIE, Jun CAO, Xiaorong ZHAO, Xiaolong LAI, Qin LI, Bianling ZHANG, Xiang YAN, Dandan MA
-
Publication number: 20220417750Abstract: A wireless network switching method. In the method, a station and a target access device directly generate a message integrity check key by means of a domain key, and verify an integrity code on the basis of the message integrity check key, so as to realize the authentication of two parties; and when the authentication of the opposite party is successful, session keys are generated by means of the domain key and in conjunction with random numbers of the two parties, thereby simplifying a switching process and realizing secure and efficient network switching. Further disclosed are a corresponding station and a corresponding access device.Type: ApplicationFiled: November 2, 2020Publication date: December 29, 2022Inventors: Bianling ZHANG, Xiaolong LAI, Manxia TIE, Yuehui WANG, Xiaorong ZHAO, Qin LI, Guoqiang ZHANG, Zhiqiang DU
-
Patent number: 11363010Abstract: A method and device for managing a digital certificate are provided. A digital certificate requesting device negotiates with a digital certificate issuing device by using an acquired authorization code, to establish a security data channel and generate a security key, and messages can be encrypted with the generated data communication key during a process of message interaction between the digital certificate requesting device and the digital certificate issuing device, thereby effectively increasing the security in data transmission. The method and device are applicable for automatically requesting for, querying, updating, revoking a digital certificate and acquiring a digital certificate revocation list in various scenarios.Type: GrantFiled: February 13, 2018Date of Patent: June 14, 2022Assignee: CHINA IWNCOMM CO., LTD.Inventors: Yuehui Wang, Bianling Zhang, Manxia Tie, Xiaolong Lai, Qin Li, Weigang Tong, Guoqiang Zhang, Zhiqiang Du, Xiang Yan
-
Patent number: 11323433Abstract: Provided in the present invention are a digital credential management method and a device, the method comprising: a digital credential application device negotiating establishment of a secure data channel with a digital credential issuing device, and sending to the digital credential issuing device a digital credential management request message; the digital credential issuing device receiving the message, and sending to the digital credential application device a digital credential management verification request message; the digital credential application device receiving the verification request message, and sending to the digital credential issuing device a digital credential management verification response message; the digital credential issuing device receiving the digital credential management verification response message, and sending to the digital credential application device a digital credential management response message; the digital credential application device receiving the digital credentiaType: GrantFiled: September 7, 2018Date of Patent: May 3, 2022Assignee: CHINA IWNCOMM CO., LTD.Inventors: Yuehui Wang, Bianling Zhang, Manxia Tie, Xiaolong Lai, Qin Li, Weigang Tong, Guoqiang Zhang, Zhiqiang Du, Xiang Yan
-
Publication number: 20210314170Abstract: A method and device for managing a digital certificate are provided. A digital certificate requesting device negotiates with a digital certificate issuing device by using an acquired authorization code, to establish a security data channel and generate a security key, and messages can be encrypted with the generated data communication key during a process of message interaction between the digital certificate requesting device and the digital certificate issuing device, thereby effectively increasing the security in data transmission.Type: ApplicationFiled: February 13, 2018Publication date: October 7, 2021Inventors: Yuehui WANG, Bianling ZHANG, Manxia TIE, Xiaolong LAI, Qin LI, Weigang TONG, Guoqiang ZHANG, Zhiqiang DU, Xiang YAN
-
Patent number: 10812480Abstract: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide identity validity verification services for mutual identity validity verification between the entities, to complete the identity validity verification between the entities.Type: GrantFiled: August 16, 2016Date of Patent: October 20, 2020Assignee: China IWNCOMM Co., LTD.Inventors: Bianling Zhang, Zhiqiang Du, Qin Li, Xiaolong Lai, Weigang Tong
-
Publication number: 20200328902Abstract: Provided in the present invention are a digital credential management method and a device, the method comprising: a digital credential application device negotiating establishment of a secure data channel with a digital credential issuing device, and sending to the digital credential issuing device a digital credential management request message; the digital credential issuing device receiving the message, and sending to the digital credential application device a digital credential management verification request message; the digital credential application device receiving the verification request message, and sending to the digital credential issuing device a digital credential management verification response message; the digital credential issuing device receiving the digital credential management verification response message, and sending to the digital credential application device a digital credential management response message; the digital credential application device receiving the digital credentiaType: ApplicationFiled: September 7, 2018Publication date: October 15, 2020Inventors: Yuehui WANG, Bianling ZHANG, Manxia TIE, Xiaolong LAI, Qin LI, Weigang TONG, Guoqiang ZHANG, Zhiqiang DU, Xiang YAN
-
Patent number: 10681045Abstract: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide services for mutual identity validity verification between the entities, to complete the identity validity verification between the entities.Type: GrantFiled: August 26, 2016Date of Patent: June 9, 2020Assignee: China IWNCOMM Co., LTD.Inventors: Zhiqiang Du, Bianling Zhang, Qin Li, Zhenhai Huang, Qiang Zhang
-
Patent number: 10652029Abstract: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide services for mutual identity validity verification between the entities, to complete the identity validity verification between the entities.Type: GrantFiled: August 23, 2016Date of Patent: May 12, 2020Assignee: China IWNCOMM Co., LTD.Inventors: Zhiqiang Du, Bianling Zhang, Qin Li, Xiang Yan, Guoqiang Zhang
-
Patent number: 10615978Abstract: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide services for verifying validity of an identity of one entity by the other entity, to complete identity validity verification between the entities.Type: GrantFiled: August 11, 2016Date of Patent: April 7, 2020Assignee: China IWNCOMM Co., LTD.Inventors: Zhiqiang Du, Bianling Zhang, Qin Li, Xiang Yan, Guoqiang Zhang
-
Patent number: 10554431Abstract: A method for a WLAN-enabled device to access to a network is provided, including the following steps. An intelligent terminal device acquires a key KEY1, encrypts, by using the KEY 1, access information of a wireless access device that is known by the intelligent terminal device, and then transmits the access information as well as the unique identification information. WLAN-enabled device sniffs and acquires the unique identification information and the encrypted access information, generates the KEY1 based on the unique identification information and a preset key material, and decrypts the encrypted access information by using the KEY1 to obtain the access information. The present invention further relates to a WLAN-enabled device for implementing the method and an intelligent terminal device.Type: GrantFiled: October 26, 2015Date of Patent: February 4, 2020Assignee: China IWNCOMM Co., LTD.Inventors: Yanan Hu, Bianling Zhang, Yuehui Wang, Weigang Tong, Manxia Tie, Zhiqiang Du
-
Patent number: 10243829Abstract: A communication protocol testing method, a tested device and a testing platform. The method includes: the tested device and the reference device execute a communication protocol, a message sent and/or received during execution of the communication protocol serving as a first message, and the first message being encapsulated in a data encapsulation format of the communication protocol; the tested device encapsulates a part of data or all the data in the first message and/or known data of the tested device according to a unified data encapsulation format to generate a second message; and the testing platform acquires the second message, parses the acquired second message according to the unified data encapsulation format to obtain a part of data or all the data in the second message, executes testing items, and outputs testing results, thereby completing the test.Type: GrantFiled: April 17, 2015Date of Patent: March 26, 2019Assignee: China IWNCOMM Co., LTD.Inventors: Jun Cao, Qin Li, Yuehui Wang, Yanan Hu, Qi Pan, Bianling Zhang
-
Publication number: 20180331831Abstract: Provided are an entity identity validity verification method and device with multiple trusted third parties being involved. In the application, validity of identities of entities performing mutual identity validity verification can only be verified by different trusted third parties. During the verification process, the trusted third parties that are respectively trusted by the two entities interact with each other, and provide services for verifying validity of an identity of one entity by the other entity, to complete identity validity verification between the entities.Type: ApplicationFiled: August 11, 2016Publication date: November 15, 2018Applicant: China IWNCOMM Co., LTD.Inventors: Zhiqiang Du, Bianling Zhang, Qin Li, Xiang Yan, Guoqiang Zhang