Patents by Inventor Lijia Zhang

Lijia Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240163560
    Abstract: In the technical field of display devices, there is a problem of low efficiency in image appearance inspection during the processing process of a display panel. In view of this, provided is an image acquisition system, comprising: a control device, an object loading device and an image acquisition apparatus. The control device is used for obtaining a target value of displacement between the object loading apparatus and the image acquisition apparatus according to an image signal, generating a control command, which carries the target displacement value, and then sending the control command to at least one of the object loading device and the image acquisition apparatus; and at least one of the object loading apparatus and the image acquisition apparatus moves according to the control command, until the definition of the image signal received by the control device in real time is greater than a preset definition threshold value.
    Type: Application
    Filed: January 4, 2023
    Publication date: May 16, 2024
    Applicant: BOE Technology Group Co., Ltd.
    Inventors: Quanguo Zhou, Xuehui Zhu, Lirong Xu, Zhidong Wang, Hao Tang, Qing Zhang, Lijia Zhou
  • Publication number: 20240070848
    Abstract: Provided is a method of training an image recognition model, the model is configured to detect a defect region in an image of a display substrate, the display substrate includes a display area and a connection area, and the method includes: acquiring a first training sample including images of n display substrates; dividing each of the images of n display substrates into a first sub image and a second sub image, the first sub image is an image of a display area, and the second sub image is an image of a connection area; inputting the first training sample into the image recognition model, the first training sample includes the first sub image and the second sub image; and adjusting at least one feature parameter of the image recognition model to reduce a difference between an output value of the model and a training value of the first training sample.
    Type: Application
    Filed: September 21, 2022
    Publication date: February 29, 2024
    Applicant: BOE Technology Group Co., Ltd.
    Inventors: Qing ZHANG, Quanguo ZHOU, Jiuyang CHENG, Lijia ZHOU, Zhidong WANG, Hao TANG, Meng GUO
  • Publication number: 20240064003
    Abstract: A method, and related apparatuses are provided. The method comprises receiving an initial layer-3 message, wherein the initial layer-3 message comprises an indication indicating that a part of the initial layer-3 message is encrypted, and generating a keystream, wherein the keystream is used to decrypt the encrypted part of the initial layer-3 message.
    Type: Application
    Filed: August 22, 2023
    Publication date: February 22, 2024
    Inventors: Lijia Zhang, Jing Chen
  • Patent number: 11895495
    Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.
    Type: Grant
    Filed: June 22, 2018
    Date of Patent: February 6, 2024
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Elliot S. Briggs, Samuel D. Post, Yannick L. Sierra, Fangli Xu, Dawei Zhang, Haijing Hu, Huarui Liang, Li Li, Lijia Zhang, Shu Guo, Yuqin Chen
  • Patent number: 11863982
    Abstract: Techniques to protect a subscriber identity, by encrypting a subscription permanent identifier (SUPI) to form one-time use subscription concealed identifiers (SUCIs) using a set of one-time ephemeral asymmetric keys, generated by a user equipment (UE), and network provided keys are disclosed. Encryption of the SUPI to form the SUCIs can mitigate snooping by rogue network entities, such as fake base stations. The UE is restricted from providing the unencrypted SUPI over an unauthenticated connection to a network entity. In some instances, the UE uses a trusted symmetric fallback encryption key KFB or trusted asymmetric fallback public key PKFB to verify messages from an unauthenticated network entity and/or to encrypt the SUPI to form a fallback SUCIFB for communication of messages with the unauthenticated network entity.
    Type: Grant
    Filed: January 5, 2023
    Date of Patent: January 2, 2024
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Huarui Liang, Lijia Zhang, Shu Guo, Haijing Hu, Fangli Xu, Yuqin Chen, Dawei Zhang, Li Li
  • Patent number: 11856402
    Abstract: Techniques for identity-based message integrity protection and verification between a user equipment (UE) and a wireless network entity, include use of signatures derived from identity-based keys. To protect against attacks from rogue network entities before activation of a security context with a network entity, the UE verifies integrity of messages by checking a signature using an identity-based public key PKID derived by the UE based on (i) an identity value (ID) of the network entity and (ii) a separate public key PKPKG of a private key generator (PKG) server. The network entity generates signatures for messages using an identity-based private key SKID obtained from the PKG server, which generates the identity-based private key SKID using (i) the ID value of the network entity and (ii) a private key SKPKG that is known only by the PKG server and corresponds to the public key PKPKG.
    Type: Grant
    Filed: November 15, 2021
    Date of Patent: December 26, 2023
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Shu Guo, Lijia Zhang, Qian Sun, Huarui Liang, Fangli Xu, Yuqin Chen, Haijing Hu, Dawei Zhang, Hao Duo, Lanpeng Chen
  • Patent number: 11757623
    Abstract: This application pertains to encryption/decryption methods and related apparatuses. A communication device receives an initial layer-3 message. The initial layer-3 message includes an indication indicating that a part of the initial layer-3 message is encrypted. The communication device generates a keystream, and decrypts the encrypted part of the initial layer-3 message by performing an exclusive OR operation on the keystream and the initial layer-3 message.
    Type: Grant
    Filed: September 6, 2020
    Date of Patent: September 12, 2023
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Lijia Zhang, Jing Chen
  • Patent number: 11589228
    Abstract: Techniques to protect a subscriber identity, by encrypting a subscription permanent identifier (SUPI) to form one-time use subscription concealed identifiers (SUCIs) using a set of one-time ephemeral asymmetric keys, generated by a user equipment (UE), and network provided keys are disclosed. Encryption of the SUPI to form the SUCIs can mitigate snooping by rogue network entities, such as fake base stations. The UE is restricted from providing the unencrypted SUPI over an unauthenticated connection to a network entity. In some instances, the UE uses a trusted symmetric fallback encryption key KFB or trusted asymmetric fallback public key PKFB to verify messages from an unauthenticated network entity and/or to encrypt the SUPI to form a fallback SUCIFB for communication of messages with the unauthenticated network entity.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: February 21, 2023
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Huarui Liang, Lijia Zhang, Shu Guo, Haijing Hu, Fangli Xu, Yuqin Chen, Dawei Zhang, Li Li
  • Patent number: 11405788
    Abstract: A device level lock policy, which applies to all smart secure platform (SSP) applications of a mobile device, is used to determine whether a particular SSP application can be activated. A tamper resistant hardware secure element (SE) includes a primary platform with a low level operating system (OS) and one or more SSP applications within one or more secondary platform bundles that include secondary platforms with high level OSs specific to the secondary platform bundles. The low level OS enforces the device level lock policy for all secondary platform bundles by verifying whether a lock policy for the SSP application is consistent with the device level lock policy. When verification succeeds, activation is allowed, and when verification fails, activation is disallowed. Subscription identifiers are not provided in unencrypted form to processing circuitry of the mobile device external to the tamper resistant hardware SE to provide subscriber identity privacy protection.
    Type: Grant
    Filed: May 2, 2018
    Date of Patent: August 2, 2022
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Lijia Zhang, Huarui Liang, Dawei Zhang
  • Patent number: 11329801
    Abstract: Apparatuses, systems, and methods for generating and utilizing improved initialization vectors (IVs) when performing encryption and authentication in wireless communications. In some scenarios, a wireless communication device may generate one or more pseudorandom multi-bit values, e.g., using a respective plurality of key derivation functions (KDFs). A first portion of each value may be used as a respective key for encryption or authentication of traffic on the user plane or the control plane. A second portion of each value may be used as a nonce value in a respective IV for use with a respective key for encryption or authentication of traffic on the user plane or the control plane. In some scenarios, the nonce values may instead be generated as part of an additional pseudorandom value (e.g., by executing an additional KDF), from which all of the IVs may be drawn.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: May 10, 2022
    Assignee: Apple Inc.
    Inventors: Dawei Zhang, Fangli Xu, Haijing Hu, Huarui Liang, Lijia Zhang, Robert K. Kitchens, Samuel D. Post, Shu Guo, Xiangying Yang, Yannick L. Sierra, Yuqin Chen
  • Patent number: 11297492
    Abstract: Techniques to protect subscriber identity in messages communicated between a user equipment (UE) and a cellular wireless network entity by using multiple ephemeral asymmetric keys are disclosed. The UE determines multiple ephemeral UE public and secret key pairs, while the cellular wireless network entity provides a network public key to the UE. The network public key may be updated over time. Multiple encryption keys based on the multiple ephemeral UE secret keys and the public network key are derived and used to encrypt a subscription permanent identifier (SUPI) to generate multiple subscription concealed identifiers (SUCIs). Each SUCI is used only once for messages communicated to a cellular wireless network and discarded after use. New SUCI are generated when the network public key is updated.
    Type: Grant
    Filed: March 27, 2018
    Date of Patent: April 5, 2022
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Lijia Zhang, Dawei Zhang, Huarui Liang, Shu Guo, Rohan C. Malthankar, Krisztian Kiss
  • Publication number: 20220086642
    Abstract: Techniques for identity-based message integrity protection and verification between a user equipment (UE) and a wireless network entity, include use of signatures derived from identity-based keys. To protect against attacks from rogue network entities before activation of a security context with a network entity, the UE verifies integrity of messages by checking a signature using an identity-based public key PKID derived by the UE based on (i) an identity value (ID) of the network entity and (ii) a separate public key PKPKG of a private key generator (PKG) server. The network entity generates signatures for messages using an identity-based private key SKID obtained from the PKG server, which generates the identity-based private key SKID using (i) the ID value of the network entity and (ii) a private key SKPKG that is known only by the PKG server and corresponds to the public key PKPKG.
    Type: Application
    Filed: November 15, 2021
    Publication date: March 17, 2022
    Inventors: Xiangying YANG, Shu GUO, Lijia ZHANG, Qian SUN, Huarui LIANG, Fangli XU, Yuqin CHEN, Haijing HU, Dawei ZHANG, Hao DUO, Lanpeng CHEN
  • Patent number: 11178547
    Abstract: Techniques for identity-based message integrity protection and verification between a user equipment (UE) and a wireless network entity, include use of signatures derived from identity-based keys. To protect against attacks from rogue network entities before activation of a security context with a network entity, the UE verifies integrity of messages by checking a signature using an identity-based public key PKID derived by the UE based on (i) an identity value (ID) of the network entity and (ii) a separate public key PKPKG of a private key generator (PKG) server. The network entity generates signatures for messages using an identity-based private key SKID obtained from the PKG server, which generates the identity-based private key SKID using (i) the ID value of the network entity and (ii) a private key SKPKG that is known only by the PKG server and corresponds to the public key PKPKG.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: November 16, 2021
    Assignee: Apple Inc.
    Inventors: Xiangying Yang, Shu Guo, Lijia Zhang, Qian Sun, Huarui Liang, Fangli Xu, Yuqin Chen, Haijing Hu, Dawei Zhang, Hao Duo, Lanpeng Chen
  • Patent number: 11149344
    Abstract: A preparation device has a chamber, molten metal containers, a rotatable base in the chamber and having a deposition substrate, laser sets generating a dual-pulse laser, a base controller and a data collection control unit. The containers communicate with the chamber and each has a pulse pressurization apparatus pressing the molten metal into the chamber. The laser sets correspond to the containers such that beams of an emitted dual-pulse laser bombard the pulsed droplets, plasmas are generated and are sputtered and deposited on the substrate forming a multi-element alloy thin film. The unit collects base temperature and displacement information, and controls the pressurization frequency of the pulse pressurization apparatus, and the emission frequency and energy of the dual-pulse laser of the laser sets controlling the frequency and energy of the dual-pulse laser bombarding the corresponding pulsed droplets. The base controller controls the base temperature, rotation and movement.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: October 19, 2021
    Assignee: THE ACADEMY OF OPTO-ELECTRONICS, CHINESE ACADEMY OF SCIENCES
    Inventors: Xiaobin Wu, Yan Luo, Yu Wang, Kuibo Wang, Wanlu Xie, Luosha Zhang, Lijia Zhang
  • Publication number: 20210204129
    Abstract: This disclosure relates to techniques, base stations, and user equipment devices (UEs) for performing base station authentication through access stratum signaling transmissions. The UE may operate in idle mode and may receive an authentication message from a base station through the wireless interface while operating in idle mode. The UE may determine whether a signature comprised within the authentication message is valid, and the UE may continue a connection procedure with the base station based on a determination that the signature is valid. If it is determined that the signature is invalid, the UE may designate the base station as a barred base station and may perform cell re-selection. The authentication message may be one of a radio resource control (RRC) connection setup message, a special RRC message, a media access control (MAC) message, or a random access channel (RACH) message comprising a random access response (RAR) message.
    Type: Application
    Filed: June 22, 2018
    Publication date: July 1, 2021
    Inventors: Xiangying Yang, Elliot S. Briggs, Samuel D. Post, Yannick L. Sierra, Fangli Xu, Dawei Zhang, Haijing Hu, Huarui Liang, Li Li, Lijia Zhang, Shu Guo, Yuqin Chen
  • Patent number: D942998
    Type: Grant
    Filed: November 19, 2020
    Date of Patent: February 8, 2022
    Assignee: AUTEL INTELLIGENT TECHNOLOGY CORP., LTD.
    Inventor: Lijia Zhang
  • Patent number: D957452
    Type: Grant
    Filed: November 19, 2020
    Date of Patent: July 12, 2022
    Assignee: AUTEL INTELLIGENT TECHNOLOGY CORP., LTD.
    Inventor: Lijia Zhang
  • Patent number: D957453
    Type: Grant
    Filed: November 19, 2020
    Date of Patent: July 12, 2022
    Assignee: AUTEL INTELLIGENT TECHNOLOGY CORP., LTD.
    Inventor: Lijia Zhang
  • Patent number: D965622
    Type: Grant
    Filed: November 19, 2020
    Date of Patent: October 4, 2022
    Assignee: AUTEL INTELLIGENT TECHNOLOGY CORP., LTD.
    Inventor: Lijia Zhang
  • Patent number: D982612
    Type: Grant
    Filed: November 19, 2020
    Date of Patent: April 4, 2023
    Assignee: AUTEL INTELLIGENT TECHNOLOGY CORP., LTD.
    Inventor: Lijia Zhang