Patents by Inventor Zheng Yan

Zheng Yan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210075787
    Abstract: A voiceprint authentication apparatus is provided, comprising: a voice receiving module configured to receive a user's voices in different speaking modes; a feature extraction module configured to extract respective sets of voice features from the user's voices in different speaking modes; a synthesis module configured to generate a first voiceprint template by synthesizing the respective sets of voice features; and a first communication module configured to send the first voiceprint template to a server to authenticate the user, wherein the user's voices and the respective sets of voice features are not sent to the server. A corresponding voice authentication method, as well as a computer readable medium, are also provided.
    Type: Application
    Filed: January 22, 2018
    Publication date: March 11, 2021
    Inventors: Rui Zhang, Zheng Yan
  • Patent number: 10944551
    Abstract: A method for securing D2D communications may comprise: encrypting communication data based at least in part on a security policy associated with at least one of a general trust evaluation and a local trust evaluation; and sending the encrypted communication data from a first user equipment to one or more second user equipments, wherein the second user equipment of which at least one of a general trust evaluation result and a local trust evaluation result satisfies the security policy set by the first user equipment is eligible to access the encrypted communication data.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: March 9, 2021
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Publication number: 20210057737
    Abstract: An electrode for use in a battery includes a silicon-carbon composite with graphite. The silicon-carbon composite structure is microporous. The silicon-carbon composite can be made by dry spraying and magnesiothermically reducing silicon, followed by deposition of carbon.
    Type: Application
    Filed: February 27, 2019
    Publication date: February 25, 2021
    Inventors: Juchen Guo, Zheng Yan
  • Patent number: 10897362
    Abstract: According to an example aspect of the invention, there is provided an apparatus comprising at least one processing core and at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to receive, from a first user, a ciphertext, a first hash value and a first ciphered encryption key, receive, from a second user, a second hash value, responsive to a determination the first hash value is the same as the second hash value, obtain a re-encryption key, and apply the re-encryption key to the first ciphered encryption key to obtain a re-encrypted encryption key, the re-encrypted encryption key being decryptable with a secret key of the second user.
    Type: Grant
    Filed: December 18, 2014
    Date of Patent: January 19, 2021
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Patent number: 10887332
    Abstract: According to embodiments of the present invention, trust evaluation is performed on network entities including a host and a network node with privacy preservation to determine an unwanted traffic source. The trust evaluation is based on detection reports from the hosts and monitoring reports from the network nodes. The network nodes do not know contents of the detection reports, and an entity which executes the trust evaluation does not know real identifiers of the hosts and network nodes.
    Type: Grant
    Filed: June 15, 2015
    Date of Patent: January 5, 2021
    Assignee: NOKIA TECHNOLOGIES OY
    Inventor: Zheng Yan
  • Patent number: 10884863
    Abstract: The technology disclosed herein that may enable a client of a distributed storage system to recover a storage session after a failure occurs. An example method may include: identifying a storage session of a distributed storage service, the storage session comprising session data that corresponds to a storage object of the distributed storage service; providing, by a processing device of a client, an indication that the client is recovering the storage session; and obtaining, by the client, the session data of the storage session from one or more devices that accessed the storage object of the distributed storage service.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: January 5, 2021
    Assignee: Red Hat, Inc.
    Inventors: Gregory Allan Farnum, Jeffrey Thomas Layton, Patrick Joseph Donnelly, Zheng Yan
  • Publication number: 20200412755
    Abstract: Various example embodiments relate generally to providing security for a communication network based on detection and mitigation of an attack in the communication network. Various example embodiments supporting attack detection and mitigation may be configured to support detection and mitigation of an attack in a communication network based on distributed collection of network traffic information at network elements and analysis of aggregated network traffic information at a network controller for determining whether a traffic anomaly indicative of an attack on the communication network is detected. Various example embodiments supporting attack detection and mitigation may be configured to support detection and mitigation of an attack in a communication network based on use of traffic records for supporting the collection, aggregation, and analysis of network traffic information.
    Type: Application
    Filed: February 23, 2018
    Publication date: December 31, 2020
    Inventors: Xuyang Jing, Zheng Yan
  • Patent number: 10841784
    Abstract: A method for authentication and key agreement in a communication network is disclosed. In the method, a network node generates a common public key and a master secret key, assigns to a first user equipment a first set of one or more pseudonym identifications corresponding to a real identity of the first user equipment, the common public key and a first private key specific to the first user equipment, and assigns to a second user equipment a second set of one or more pseudonym identifications corresponding to a real identity of the second user equipment, the common public key and a second private key specific to the second user equipment.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: November 17, 2020
    Assignee: Nokia Technologies Oy
    Inventors: Mingjun Wang, Zheng Yan
  • Publication number: 20200292388
    Abstract: A data set is stored in memory circuitry that is indicative of a state of a semiconductor fabrication process or of semiconductor structure fabricated thereby. Features in the data set are discernable to an extent limited by a data resolution. A machine-learning model comprising parameters having respective values assigned thereto as constrained by a model training process is also stored in the memory circuitry. Processor circuitry communicatively coupled to the memory circuitry generates an output data set from the data set in accordance with the machine-learning model such that features in the output data set are discernable to an extent limited by an output data resolution that is finer than the data resolution of the data set.
    Type: Application
    Filed: March 16, 2020
    Publication date: September 17, 2020
    Applicant: Tokyo Electron Limited
    Inventors: Yan CHEN, Xinkang Tian, Zheng Yan
  • Patent number: 10778657
    Abstract: Method and apparatus are disclosed for homomorphic re-encryption schemes in a system comprising a cloud service provider (CSP), a third authorized party (TAP), a data requestor (DR) and a plurality of data providers (DPs). According to an embodiment, a method implemented at a CSP comprises: in response to a request from a TAP, obtaining from a plurality of DPs cipher texts of their respective data, based on the request, wherein each DP is able to homomorphically encrypt its data; analyzing the cipher texts; and sending the analyzing result to the TAP, wherein the TAP is able to re-encrypt the analyzing result, such that a DR can decrypt the re-encrypted analyzing result with the DR's secret key.
    Type: Grant
    Filed: December 10, 2015
    Date of Patent: September 15, 2020
    Assignee: Nokia Technologies Oy
    Inventors: Wenxiu Ding, Zheng Yan
  • Publication number: 20200280858
    Abstract: According to an example embodiment, a technique for operating a trust manager entity that is arranged to serve a virtual base station pool that manages usage of radio access for a baseband unit of a cloud radio access network within a trust management arrangement that comprises one or more further trust manager entities, each arranged to serve a respective virtual base station pool that manages usage of radio access for a respective further baseband unit of the cloud radio access network is provided.
    Type: Application
    Filed: December 29, 2015
    Publication date: September 3, 2020
    Inventor: Zheng YAN
  • Patent number: 10764037
    Abstract: An approach is provided for managing data duplication in cloud computing. A method comprising, sending from a first device to a data center, data encrypted with a data encryption key for storing the encrypted data at the data center; encrypting the data encryption key according to an attribute-based encryption (ABE) scheme by using identity as an attribute in a deduplication policy for the data; issuing to a second device, a personalized secret attribute key which is derived from a public key of the second device according to the attribute-based encryption (ABE) scheme, wherein the personalized secret attribute key is to be used for decrypting the encrypted data encryption key at the second device, in combination with the policy.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: September 1, 2020
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Patent number: 10757569
    Abstract: A method is disclosed, comprising obtaining, by a first apparatus, a first identifier associated with the first apparatus, wherein the first identifier is different from a second identifier associated with the first apparatus, providing, by the first apparatus, at least one message to at least one further apparatus of at least one further apparatus, wherein each of the at least one message comprises a key information of the first apparatus and is associated with the first identifier associated with the first apparatus, and determining, by the first apparatus, a session key of a communication session associated with the first apparatus and the at least one further apparatus, based on at least one message received, by the first apparatus, provided by at least one further apparatus of the at least one further apparatus, wherein each of the at least one message comprises a key information of the respective further apparatus and is associated with a first identifier associated with the respective further apparatus
    Type: Grant
    Filed: August 5, 2016
    Date of Patent: August 25, 2020
    Assignee: Nokia Technologies Oy
    Inventors: Mingjun Wang, Zheng Yan
  • Patent number: 10735578
    Abstract: Methods for unlocking a mobile terminal can include capturing a face image of a user through a front-facing camera of the mobile terminal in response to a sliding action applied to a sliding module on the mobile terminal; and unlocking the mobile terminal by using the captured face image as a key.
    Type: Grant
    Filed: July 22, 2019
    Date of Patent: August 4, 2020
    Assignee: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.
    Inventors: Zhaoqin Lin, Zheng Yan, Yudong Chang, Yuning Li, Chengxing Gao
  • Patent number: 10692705
    Abstract: An advanced optical sensor and method for detection of optical events in a plasma processing system. The method includes detecting at least one light emission signal in a plasma processing chamber. The at least one detected light emission signal including light emissions from an optical event. The method further includes processing the at least one light emission signal and detecting a signature of the optical event from the processed light emission signal.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: June 23, 2020
    Assignee: Tokyo Electron Limited
    Inventors: Mihail Mihaylov, Xinkang Tian, Ching-Ling Meng, Jason Ferns, Joel Ng, Badru D. Hyatt, Zheng Yan, Vi Vuong
  • Patent number: 10693657
    Abstract: A method, comprising: obtaining, at a trustworthy party, a data processing result from a requesting party or a processing party in response to receiving a request for verifying correctness of the data processing result from the requesting party, wherein the data processing result is obtained by the requesting party from the processing party; obtaining, at a trustworthy party, the data used to getting the data processing result and a corresponding algorithm from the processing party, wherein the processing party uses the corresponding algorithm to process the data and gets the data processing result; processing, at the trustworthy party, the obtained data with the corresponding algorithm and comparing the processed result with the received data processing result, and if the two results are the same, the data processing result verified by the trustworthy party is correct.
    Type: Grant
    Filed: March 7, 2014
    Date of Patent: June 23, 2020
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Publication number: 20200136797
    Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code configured to cause the apparatus to receive an identifier of a function, encrypted input data, an encrypted computation result, encrypted random data and an encrypted output of the function, when nm with the random data, obtain a homomorphic polynomial factorization of the function, comprising obtaining a decomposed representation of the function, the representation comprising a sum of polynomials, and verify that the computation result is correct by checking, whether a difference between the encrypted output and the encrypted computation result equals a value of the decomposed representation, wherein the encrypted random data and the encrypted input data are used as parameter values in the sum of polynomials.
    Type: Application
    Filed: June 20, 2017
    Publication date: April 30, 2020
    Inventors: Xixun Yu, Zheng Yan
  • Publication number: 20200128124
    Abstract: Methods for unlocking a mobile terminal can include capturing a face image of a user through a front-facing camera of the mobile terminal in response to a sliding action applied to a sliding module on the mobile terminal; and unlocking the mobile terminal by using the captured face image as a key.
    Type: Application
    Filed: July 22, 2019
    Publication date: April 23, 2020
    Applicant: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.
    Inventors: Zhaoqin LIN, Zheng YAN, Yudong CHANG, Yuning LI, Chengxing GAO
  • Publication number: 20200119992
    Abstract: Methods, apparatus, computer program product and computer readable medium are disclosed for trust management in software defined networking. A method comprises: collecting network performance results after a network policy issued by an application is applied; collecting a feedback for the network policy; and calculating a trust value of the application based at least partly on the network performance results and the feedback.
    Type: Application
    Filed: April 13, 2017
    Publication date: April 16, 2020
    Inventors: Zheng Yan, Shanshan Bian
  • Patent number: 10581856
    Abstract: Method and apparatus are disclosed for heterogeneous data storage management in cloud computing.
    Type: Grant
    Filed: January 19, 2015
    Date of Patent: March 3, 2020
    Assignee: NOKIA TECHNOLOGIES OY
    Inventor: Zheng Yan