Patents by Inventor Ke Zeng
Ke Zeng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130072393Abstract: The present invention provides microRNAs for assessing the status of pancreatic cancer in a subject, and provides methods, kits, and biochips for detecting said microRNAs.Type: ApplicationFiled: December 24, 2009Publication date: March 21, 2013Applicant: MICROMEDMARK BIOTECH CO., LTD.Inventors: Chenyu Zhang, Rui Liu, Cheng Wang, Yi Ba, Chunni Zhang, Ke Zeng
-
Publication number: 20120330968Abstract: Methods and comment association systems for associating one or more comments with one or more primary electronic documents are described. In one aspect, the method comprises: identifying, at a comment association system, one or more key terms from at least a portion of the one or more primary electronic documents; identifying, at the comment association system, one or more comments associated with the identified key terms; determining, at the comment association system, whether an identified comment is sufficiently related to the one or more primary electronic documents by calculating one or more relation score for that identified comment and comparing the relation score to one or more threshold; and if the identified comment is sufficiently related to the one or more primary electronic documents, then associating the identified comment with the one or more primary electronic documents at the comment association system.Type: ApplicationFiled: October 5, 2011Publication date: December 27, 2012Applicant: ROGERS COMMUNICATIONS INC.Inventors: Hyun Chul LEE, Liqin XU, Ke ZENG
-
Patent number: 8327423Abstract: A method and apparatus for distributed authorization by anonymous flexible credential are provided. Pseudonym authority issues a root pseudonym to a user. The user may generate large amount of derived pseudonym from the root pseudonym. The user may obtain resource credentials from resource protectors by using derived pseudonyms. The user may select a set of resource credentials, generate a flexible credential from this set of resource credentials and request access to the resource corresponding to the set of resource credentials to a resource protector by using the flexible credential and a derived pseudonym. Revocation list for each resource may be maintained in the system such that any one of resource credentials of any user may be revoked without affecting other resource credentials of that user.Type: GrantFiled: June 26, 2008Date of Patent: December 4, 2012Assignee: NEC (China) Co., Ltd.Inventor: Ke Zeng
-
Publication number: 20120252694Abstract: This invention provides markers, methods, biochips and kits for milk quality detection. The present invention particularly provides a method for milk quality detection by means of detecting the particular microRNAs in milk, so as to establish the standard of raw milk content.Type: ApplicationFiled: May 27, 2010Publication date: October 4, 2012Applicant: JIANGSU MICROMEDMARK BIOTECH CO., LTD.Inventors: Chengyu Zhang, Ke Zeng, Junfeng Zhang, Chunliang Tian, Haijin Li
-
Patent number: 8266137Abstract: The present invention provides a method and apparatus for generating index as well as a search method and a search apparatus. Index entry comprises at least a search item identifier corresponding to a search item, one or a plurality of index items generated from one or plural pieces of search information, and an accumulator for the search information. The accumulator is generated by accumulating the search information, or accumulating ciphertext of information containing the search information, or accumulating data mapped from information containing the search information. At the time of searching, the index items and the accumulator are provided to a searcher. The searcher extracts search information from the index items and checks whether the extracted search information is complete by using the accumulator. In one embodiment, the accumulator is incorporated in an encrypted inverted index.Type: GrantFiled: November 11, 2009Date of Patent: September 11, 2012Assignee: NEC (China) Co., Ltd.Inventors: Hao Lei, Ye Tian, Ke Zeng, Liming Wang, Toshikazu Fukushima
-
Patent number: 8254569Abstract: The present invention proposes a Provable Data Integrity (PDI) verifying method, in which data are firstly fingerprinted at a client, and the fingerprints are sent to an archive along with the data; when necessary, the client sends a “challenge” to the archive so as to determine the integrity of the data, and the archive proves the integrity of the data by using the received fingerprints; and finally, the client verifies the integrity of the data based on the output from the archive in response to the “challenge”.Type: GrantFiled: December 29, 2008Date of Patent: August 28, 2012Assignee: NEC (China) Co., Ltd.Inventor: Ke Zeng
-
Patent number: 8219120Abstract: An information management method and an information management system are provided. The method mainly includes the following steps. A first message is sent to a foreign agent (FA) of a mobile station (MS) after a paging controller (PC) is redirected. The first message includes information of a new PC after redirection. The FA stores the information of the new PC and sends a response message to the first message to the PC. The following technical effects are achieved by the present invention through the above technical solutions. An anchor PC before redirection or a new anchor PC after redirection reports an ID of the new anchor PC to the FA, so the FA gets to know an address of the new anchor PC when paging and thus implements the paging process successfully.Type: GrantFiled: October 23, 2008Date of Patent: July 10, 2012Assignee: Huawei Technologies Co., Ltd.Inventors: Hanmei Du, Ke Zeng, Hongcheng Zhuang
-
Patent number: 8058973Abstract: A radio frequency identification system, including: a radio frequency identification tag having an identification code and a set of verifiable data stored therein; and a radio frequency identification reader which sends a reading request to the radio frequency identification tag, requesting to read a first portion of the set of verifiable data, wherein the radio frequency identification tag further comprising control means, which, when the radio frequency identification tag receives the reading request from the radio frequency identification reader, in case of that the set of verifiable data has not been performed a locking operation, performs the locking operation on the set of verifiable data, so that from then on any data of a second portion of the set of verifiable data cannot be read.Type: GrantFiled: September 12, 2006Date of Patent: November 15, 2011Assignee: NEC (China) Co., Ltd.Inventors: Ke Zeng, Tomoyuki Fujita, Min-yu Hsueh
-
Patent number: 8060914Abstract: The present invention provides an anonymous selectable credential system and method therefor. In the system, a credential authority issues root credentials to a user for certain user rights. The user generates an anonymous selectable credential from the root credentials that correspond to a selected set of user rights, and presents the anonymous selectable credential to a service. Using the anonymous selectable credential, the user can prove to the service through a knowledge proof that the selected set of user rights was granted by the credential authority. Then the service may provide service to the user according to the verified user rights. By generating and presenting different anonymous selectable credentials, the user could remain anonymous no matter how many times he/she accessed one or more services. The user can selectively prove any portion of his/her full set of rights, and no matter how many rights is to be proved, the computational cost is basically the same as that for proving only one right.Type: GrantFiled: September 24, 2007Date of Patent: November 15, 2011Assignee: NEC (China) Co., Ltd.Inventor: Ke Zeng
-
Publication number: 20110117565Abstract: The present invention provides non-small cell lung cancer markers and the use thereof. The non-small cell lung cancer markers in the present invention include at least one of the 26 selected detectable mature microRNAs existing stably in human serum or plasma. The invention also provides a probe combination, kit and biochip for detecting the non-small cell lung cancer markers. The invention further provides a method for detecting microRNAs in the serum of lung cancer patients. By detecting the variations of microRNAs in the serum of lung cancer patients, the disease can be diagnosed in vitro; the progression course of the disease can be predicted; the occurrence of complications, the rate of relapse and the prognosis of the disease can be monitored; the drug efficacy and therapeutic effects can be analyzed. The method in the present invention enables extensive detection spectrum, high sensitivity, low cost, convenient sample taking and preservation.Type: ApplicationFiled: December 14, 2009Publication date: May 19, 2011Applicant: Micromedmark Biotech Co., Ltd.Inventors: Chenyu Zhang, Ke Zeng, Junfeng Zhang, Yi Ba, Xi Chen, Haijin Li
-
Patent number: 7873169Abstract: Methods, devices and systems for generating a plurality of public keys from one private key with the same generator of a group are described. A public key cryptosystem is also disclosed for generating a plurality of anonymous public keys all of which relate to the same party used for secure communications. Those anonymous public keys are generated using the same generator from one single private key. With the invention, computation is reduced, memory can be saved and security level can be improved.Type: GrantFiled: November 9, 2005Date of Patent: January 18, 2011Assignee: NEC (China) Co., Ltd.Inventors: Ke Zeng, Tomoyuki Fujita
-
Publication number: 20100232748Abstract: An optoelectronic transceiver includes a base, a printed circuit board (PCB) fixed to the base, and a cover. The base includes a bottom plate, a pair of sidewalls and a spacer defining a fastener hole and extending perpendicularly from the bottom plate. Each of the pair of sidewalls defines a notch. The cover includes a pair of latch blocks engageable with the notches and defines a hole opposite the fastener hole of the base. The cover is fixed to the base via the pair of latch blocks engaging the notches of the base and a fastener engaging the fastener hole by way of the hole.Type: ApplicationFiled: October 30, 2009Publication date: September 16, 2010Applicants: HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD., HON HAI PRECISION INDUSTRY CO., LTD.Inventor: Ke ZENG
-
Publication number: 20100173288Abstract: This invention provides a combination of microRNAs for evaluating the physiological and/or pathological condition of a subject, wherein the combination comprises all detectable microRNAs stably existing in the serum/plasma of a subject; and a method for evaluating the physiological and/or pathological condition of a subject, wherein the method includes determining all detectable microRNAs stably existing in the serum/plasma of a subject; and a kit for evaluating the physiological and/or pathological condition of a subject, wherein the kit contains the tools for determining all detectable microRNAs that stably existing in the serum/plasma of a subject; and a biochip for evaluating the physiological and/or pathological condition of a subject, wherein the biochip contains the components for determining all detectable microRNAs stably existing in the serum/plasma of a subject.Type: ApplicationFiled: December 6, 2007Publication date: July 8, 2010Inventors: Chenyu Zhang, Junfeng Zhang, Xi Chen, Yi Ba, Jiangning Chen, Jin Wang, Ke Zeng, Hongjie Zhang
-
Publication number: 20100169321Abstract: The present invention provides a method and apparatus for ciphertext indexing and searching. Indices of multiple levels are created for the encrypted files. Each item in the primary index includes a primary index item identifier and the ciphertext of the primary indexing information of the related file. The primary indexing information each includes an identifier(s) of the related secondary index item identifier(s) and the corresponding decryption information. Each item in the secondary index includes a secondary index item identifier and the ciphertext of the secondary indexing information. Information necessary for obtaining a file is included in the corresponding secondary indexing information. With the decryption information of the secondary indexing information in the decrypted primary indexing information, the ciphertext of the related secondary indexing information is decrypted so as to obtain information such as the decryption key of the file.Type: ApplicationFiled: December 11, 2009Publication date: July 1, 2010Applicant: NEC (China)Co., Ltd.Inventors: Liming Wang, Ye Tian, Toshikazu Fukushima, Hao Lei, Ke Zeng
-
Publication number: 20100121856Abstract: The present invention provides a method and apparatus for generating index as well as a search method and a search apparatus. Index entry comprises at least a search item identifier corresponding to a search item, one or a plurality of index items generated from one or plural pieces of search information, and an accumulator for the search information. The accumulator is generated by accumulating the search information, or accumulating ciphertext of information containing the search information, or accumulating data mapped from information containing the search information. At the time of searching, the index items and the accumulator are provided to a searcher. The searcher extracts search information from the index items and checks whether the extracted search information is complete by using the accumulator. In one embodiment, the accumulator is incorporated in an encrypted inverted index.Type: ApplicationFiled: November 11, 2009Publication date: May 13, 2010Applicant: NEC (CHINA) CO., LTD.Inventors: Hao LEI, Ye TIAN, Ke ZENG, Liming WANG, Toshikazu FUKUSHIMA
-
Publication number: 20090300351Abstract: The present invention provides a method, apparatus and system for fast searchable encryption. The data owner encrypts files and stores the ciphertext to the server. The data owner generates an encrypted index according to each keyword of the files, and stores the encrypted index to the server. The index is composed of keyword item sets each being identified by a keyword item set locator and containing at least one or more file locators of the files associated with the corresponding keyword. Each file locator contains ciphertext of information for retrieval of an encrypted file and only with the correct file locator decryption key can the ciphertext be decrypted. Data owner issues a keyword item set locator as well as file locator decryption key to a searcher to enable the searcher to search on the encrypted index and retrieve files related to a certain keyword.Type: ApplicationFiled: May 29, 2009Publication date: December 3, 2009Applicant: NEC (China) Co., Ltd.Inventors: Hao Lei, Ye Tian, Ke Zeng, Liming Wang, Toshikaza Fukushima
-
Publication number: 20090171878Abstract: The present invention proposes a Provable Data Integrity (PDI) verifying method, in which data are firstly fingerprinted at a client, and the fingerprints are sent to an archive along with the data; when necessary, the client sends a “challenge” to the archive so as to determine the integrity of the data, and the archive proves the integrity of the data by using the received fingerprints; and finally, the client verifies the integrity of the data based on the output from the archive in response to the “challenge”.Type: ApplicationFiled: December 29, 2008Publication date: July 2, 2009Applicant: NEC (CHINA) CO., LTD.Inventor: Ke ZENG
-
Publication number: 20090046619Abstract: An information management method and an information management system are provided. The method mainly includes the following steps. A first message is sent to a foreign agent (FA) of a mobile station (MS) after a paging controller (PC) is redirected. The first message includes information of a new PC after redirection. The FA stores the information of the new PC and sends a response message to the first message to the PC. The following technical effects are achieved by the present invention through the above technical solutions. An anchor PC before redirection or a new anchor PC after redirection reports an ID of the new anchor PC to the FA, so the FA gets to know an address of the new anchor PC when paging and thus implements the paging process successfully.Type: ApplicationFiled: October 23, 2008Publication date: February 19, 2009Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Hanmei DU, Ke ZENG, Hongcheng ZHUANG
-
Publication number: 20090037990Abstract: A method and apparatus for distributed authorization by anonymous flexible credential are provided. Pseudonym authority issues a root pseudonym to a user. The user may generate large amount of derived pseudonym from the root pseudonym. The user may obtain resource credentials from resource protectors by using derived pseudonyms. The user may select a set of resource credentials, generate a flexible credential from this set of resource credentials and request access to the resource corresponding to the set of resource credentials to a resource protector by using the flexible credential and a derived pseudonym. Revocation list for each resource may be maintained in the system such that any one of resource credentials of any user may be revoked without affecting other resource credentials of that user.Type: ApplicationFiled: June 26, 2008Publication date: February 5, 2009Applicant: NEC (CHINA) CO., LTDInventor: Ke ZENG
-
Publication number: 20080075281Abstract: The present invention provides an anonymous selectable credential system and method therefor. In the system, a credential authority issues root credentials to a user for certain user rights. The user generates an anonymous selectable credential from the root credentials that correspond to a selected set of user rights, and presents the anonymous selectable credential to a service. Using the anonymous selectable credential, the user can prove to the service through a knowledge proof that the selected set of user rights was granted by the credential authority. Then the service may provide service to the user according to the verified user rights. By generating and presenting different anonymous selectable credentials, the user could remain anonymous no matter how many times he/she accessed one or more services. The user can selectively prove any portion of his/her full set of rights, and no matter how many rights is to be proved, the computational cost is basically the same as that for proving only one right.Type: ApplicationFiled: September 24, 2007Publication date: March 27, 2008Applicant: NEC (CHINA) CO., LTD.Inventor: Ke Zeng