Patents by Inventor WenBo Mao
WenBo Mao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20050091128Abstract: A system used to query real-time inventory data for distributed storage locations includes a web server (11), an application server (12), a central database (13) and branch databases (16). Each branch database is located at a storage location, and stores inventory data for the storage location. The central database is used to store integrated inventory data. The web server includes a parameter receiving module (21) for receiving query parameters set by clients, a query sentence generating module (23) for generating query sentences according to the query parameters, and a statement generating module (25) for generating query result statements. The application server includes an inventory data searching module (33) for searching inventory data and update times of the inventory data from the central database, an update record searching module (35) for searching update records in the branch databases, and a data maintaining module (31) for updating the central database.Type: ApplicationFiled: August 17, 2004Publication date: April 28, 2005Inventors: Sheng-Chi Luo, Wenbo Mao, Qiong Shuai Chen
-
Publication number: 20040267635Abstract: A system for logistics quotation management includes a plurality of user computers (10), a web site (12), a server (13), a database (15) and a plurality of client computers (16). The server includes a basic information maintaining module (130), a client information maintaining module (131), a quotation retrieving module (132), an abnormity criterion setting module (133), an abnormality controlling module (134), and a sorting module (135). The quotation retrieving module is for retrieving quotations. The abnormality criterion setting module sets an abnormality criterion. The abnormality controlling module determines whether a client quotation is abnormal, and updates the quotation. The sorting module is for sorting updated quotations. The database stores all kinds of data used and generated in the above-described processes. A related method is also disclosed.Type: ApplicationFiled: June 28, 2004Publication date: December 30, 2004Inventors: Wei-Shing Yang, Wenbo Mao, Sheng-Chi Luo
-
Patent number: 6836843Abstract: A security system based on a tamper resistant badge that becomes deactivated if the badge is removed from the person authorized to wear the badge. The badge has a volatile memory for storing the security clearance information associated with the wearer and a processor having sufficient power to perform encrypted communications. The badge also has an attachment sensor that resets the security clearance information if the badge is removed from the wearer. A secure data processing system utilizing the badges includes an administrative computer, A, and a client computer, C. Computer A has an identity verification system for authenticating the identity of individuals having badges and loading the clearance information into the volatile memory after the badge is attached to the wearer. The C computers access the information in the badge's volatile memory to provide access to the wearer at the access level specified in the volatile memory.Type: GrantFiled: June 29, 2001Date of Patent: December 28, 2004Assignee: Hewlett-Packard Development Company, L.P.Inventors: Gadiel Seroussi, Kenneth Graham Paterson, Wenbo Mao, Mark T. Smith
-
Publication number: 20040254826Abstract: A logistics management system includes a number of client computers (10), a provider application server (12), a number of business unit application server (16) and a database (14). The client computers provide interfaces for users to initialize the system and maintain information. The provider application server receives and handles input information, generates a production request and transmits the request to the business unit application server. The provider application server includes a document managing module (21), an in transit products monitoring module (22), a data analyzing module (23), a warehouse monitoring module (24), a data enquiring module (25), and a costs managing module (26). The database inventory data, shipment data, and supply and demand data. The business unit application server receives the production request transmitted by the provider application server, and transmits feedback on the request and enquiring requests to the provider application server. A related method is also disclosed.Type: ApplicationFiled: June 1, 2004Publication date: December 16, 2004Inventors: Wen-Xin Yang, Wenbo Mao, Sheng-Chi Luo
-
Publication number: 20040230454Abstract: A system for settling logistics expenses includes a plurality of client computers (10), a first host (12), a second host (16) and a database (14). The first host comprises an authority controlling module (21), a data maintaining module (22), an expense carrying forward module (23), an expense apportionment module (24), an expense auditing module (25), an expense analyzing module (26), and a statement generating module (27). The expense carrying forward module is for carrying forward expenses to corresponding accounts according to predefined account segments. The expense apportionment module is for apportioning expenses. The expense auditing module is for auditing expenses. The expense analyzing module is for analyzing expenses. The statement generating module is for generating statements according to terms set by a user. The second host is for retrieving account comparison results and statements from the first host.Type: ApplicationFiled: May 17, 2004Publication date: November 18, 2004Inventors: Rien Yang, Wenbo Mao, Sheng Chi Luo
-
Publication number: 20040208313Abstract: A method by which a first computing entity can verify to a second computing entity that a value a(t) provided by the first computing entity to the second computing entity is a member of the language, L(a,t,n) where L(a,t,n)=(a,t,a2t)(modn)|t<n,gcd(a,n)=1), where n is an odd composite integer having two distinct prime factors, (a&Sgr;Zn*n) of the full order and t<n, the method comprising: the first computing entity sends a set of values to the second computing entity during a run of a procedure of a plurality of rounds, each round being carried out by the first and second computing entities with respect to three of said series of values, denoted a,x,y and in which round the first computing entity proves to the second computing entity by way of a proof that there exists a k for which x=a2k (modn) and y=a(2k)2 (modn), and which proof defines a new set of three values of the series by defining y=x if k in the current round is even or (y={square root}x) (modn)Type: ApplicationFiled: June 8, 2004Publication date: October 21, 2004Inventor: Wenbo Mao
-
Publication number: 20040205337Abstract: Signcryption methods and apparatus are provided that combine the functions of signing and encrypting data to obtain private and authenticated communications. The signcryption methods are based on RSA and permit compact ciphertexts to be produced and non-repudiation to be provided in a straightforward manner.Type: ApplicationFiled: December 5, 2003Publication date: October 14, 2004Inventors: Wenbo Mao, John Malone-Lee
-
Publication number: 20040068447Abstract: &Lgr; data processing system is described wherein use of resources in the system is metered. Metering evidence is generated which is difficult to forge and is, thus, relavely resitant to tampering. Such a system finds application, for example, in the field of metering the amount of time a person spends reading advertisement that are published on the World Wide Web. If reliable, such metering evidence may be used by the owner of the web server that contains the adverstisement to bill the originator of the advertissement.Type: ApplicationFiled: October 24, 2003Publication date: April 8, 2004Inventors: Wenbo Mao, Liqun Chen
-
Publication number: 20040010699Abstract: A method of providing to an individual (28) selected personal data (136) relating to an entity (26) is described. The method comprises: encrypting a plurality of fields (132) of personal data, each data field being encrypted with a unique cryptographic key; storing each of the encrypted data fields (134) in a data record (130) at a central location such as a data storage service provided by an Internet Service Provider; and supplying a specific cryptographic decryption key associated with a respective one of the unique cryptographic keys which relates to a selected field (132) of the entity's personal data to the individual, such that the individual is only able to decrypt the selected field of the entity's personal data by accessing the stored data record (130).Type: ApplicationFiled: February 6, 2003Publication date: January 15, 2004Inventors: Zhimin Shao, Wenbo Mao
-
Publication number: 20030187684Abstract: A method and associated apparatus for negotiating automatically involve the following. A committing and undeniable negotiation proposal is submitted anonymously by a participant to a central server prior to agreement formation. The server matches a compatible proposal to the participant's committing and undeniable negotiation proposal to form an agreement. The server verifies, with the participant's collaboration, that the matched committing and undeniable proposal forming the agreement belongs to the participant.Type: ApplicationFiled: March 17, 2003Publication date: October 2, 2003Inventors: Claudio Bartolini, Wenbo Mao, Christopher William Preist
-
Publication number: 20030088486Abstract: A system and method for managing inspection of cargo according to cargo information integrated in a unified communications network. The system comprises a plurality of operation terminals (8) for inputting cargo information. A central management unit (1) is connected with the operation terminals via a communications network (13) for receiving and storing the cargo information. A gate management system (2) is connected to the central management unit via the communications network for controlling passage of the cargo according to the cargo information. An inspection management system (3) is connected to the central management unit via the communications network for controlling inspection of the cargo according to the cargo information. The central management unit obtains cargo inspection requirements from an external system (5) of an external organization via the communications network.Type: ApplicationFiled: February 14, 2002Publication date: May 8, 2003Inventors: Alex Lee, David Luo, Wenzhen Ma, Ying Tang, Wenbo Mao
-
Publication number: 20030066024Abstract: A system and method for automatically registering new articles on a database (110). The system automatically produces in the database a code for each article registered in the database. The system includes the database storing data on articles; at least one terminal unit (2) for exchanging data with the database via an electronic communications network (3); a searching module (160) for searching for data on articles in the database; a registering module (120) for registering new articles on the database; a checking module (130) for checking whether the data input on the database are valid; a coding rule setting module (140) for setting rules of coding articles registered in the database; and a coding module (150) for coding the new articles. The articles recorded in the database are classified into different classes of at least one level. The coding rules are set according to the classes of the new articles.Type: ApplicationFiled: February 1, 2002Publication date: April 3, 2003Inventor: WenBo Mao
-
Publication number: 20030046195Abstract: An expense management method for controlling a budget of each department in an organization is provided in an operational environment which includes a plurality of terminal units electrically connected to a host via an electronic communications network. Firstly, a user stores a total budget of a department in the host. Secondly, a user sends a purchase requisition of the department from a terminal unit of that department to the host via the network. Thirdly, the host calculates a budget balance of the department according to the total budget and a history of expenses of the department that is stored in the host. Finally, the host determines if a total cost of the purchase requisition exceeds the budget balance of the department. If the total cost is within the budget balance, the host sends purchase order to an appointed supplier. Otherwise, the host sends an alarm to the user.Type: ApplicationFiled: October 11, 2001Publication date: March 6, 2003Inventor: Wenbo Mao
-
Publication number: 20030036982Abstract: A system (1) and method for checking import and export cargo by performing electronic data exchange with an external system (3) via a communications network (2). The system comprises a server (10) and a plurality of platform computers (20) electrically connected to the server (10). The server (10) has a database (101) and an interactive interface (203) for facilitating inspectors checking cargo. The database stores accounts and passwords of the inspectors, information obtained from the external system, and check records and inspection records of cargo. Each platform computer (20) is installed with the interactive interface (203) for guiding an inspector to check cargo. A card reader (202) is electrically connected to each platform computer (20) for identifying the inspectors. A display board (40) is electrically connected to each platform computer (20) via a corresponding serial communication device (30) for displaying loading and unloading information on cargo.Type: ApplicationFiled: February 19, 2002Publication date: February 20, 2003Inventors: Ying Tang, Chun-Chih Lee, Sheng-Chi Luo, Wenbo Mao
-
Publication number: 20030023469Abstract: A system and method for controlling receipt and dispatch of cargo collects information on vehicles (5a, 5b) and cargo being inspected and checks the collected information against database delivery schedules via an electronic communications network (10) in real time. The system comprises a database (6) for storing incoming delivery schedules (62) and outgoing delivery schedules (64), a server (8) for storing records of receipt and dispatch of cargo, weighbridges (3a, 3b) for weighing vehicles loaded with cargo, barriers (15a, 15b) for controlling passage of vehicles through an inspection gate), and control computers (2) for checking data of vehicles and cargo being inspected against corresponding data in the database and the server via the network. Records stored in the server include inspection records (82), vehicle records (84) and inspector records (86). Operation computers (4) are provided to search for and update data in the database and the server via the network.Type: ApplicationFiled: September 21, 2001Publication date: January 30, 2003Inventors: Chun-chih Lee, Sheng-chi Luo, Vei Zhang, Wenbo Mao, Vun Zhang
-
Publication number: 20030005193Abstract: A security system based on a tamper resistant badge that becomes deactivated if the badge is removed from the person authorized to wear the badge. The badge has a volatile memory for storing the security clearance information associated with the wearer and a processor having sufficient power to perform encrypted communications. The badge also has an attachment sensor that resets the security clearance information if the badge is removed from the wearer. A secure data processing system utilizing the badges includes an administrative computer, A, and a client computer, C. Computer A has an identity verification system for authenticating the identity of individuals having badges and loading the clearance information into the volatile memory after the badge is attached to the wearer. The C computers access the information in the badge's volatile memory to provide access to the wearer at the access level specified in the volatile memory.Type: ApplicationFiled: June 29, 2001Publication date: January 2, 2003Inventors: Gadiel Seroussi, Kenneth Graham Paterson, Wenbo Mao, Mark T. Smith
-
Patent number: 6438691Abstract: A method of transmitting a message over a network from a sender to a receiver, comprises the steps of: taking a message (Coin) to be signed by the sender; signing the message into a digital signature (e, y) of the sender (steps 56,58), the digital signature being generated as a function of that message using public and secret signature generators (x, r) of the sender, a private key (s) of the sender, and other publicly known values (a, p, q); and transmitting the signed message over the network to the receiver (step 60); characterised in that: the message to be signed by the sender incorporates a first value (f(x)) which is a first predetermined function (such as a secure one-way hash function) of the sender's public signature generator (x) (step 48).Type: GrantFiled: October 1, 1998Date of Patent: August 20, 2002Assignee: Hewlett-Packard CompanyInventor: Wenbo Mao
-
Patent number: 6119227Abstract: Authentication by an intermediary F (e.g. a bank) of an originator C of a message (e.g. a client sending an instruction to pay a merchant M) is accomplished using a protocol which does not require the intermediary to possess passwords used by the originator C and the merchant M to protect the contents of the message. Furthermore, the protocol does not require any party to the transaction to decrypt any value previously encrypted by any other party, so a reversible encryption algorithm is not required.Type: GrantFiled: October 20, 1997Date of Patent: September 12, 2000Assignee: Hewlett-Packard CompanyInventor: Wenbo Mao