Patents by Inventor Changting Li

Changting Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250254516
    Abstract: Example communication methods and apparatus are described. One example method includes determining, by a first electronic device when communicating with a second electronic device through a first application installed on the first electronic device, whether the second electronic device is authenticated by the first electronic device. If the second electronic device is not authenticated by the first electronic device, the first electronic device authenticates the second electronic device in a first authentication manner. If the second electronic device has been authenticated by the first electronic device, the first electronic device authenticates the second electronic device in a second authentication manner.
    Type: Application
    Filed: April 23, 2025
    Publication date: August 7, 2025
    Inventors: Xiwen FANG, Shiran PAN, Changting LI
  • Publication number: 20250097017
    Abstract: One example method includes binding a controlling device and an accessory device to negotiate a first credential and a second credential, the first credential is non-distributable and is used to authenticate the controlling device, and the second credential is distributable and is used to authenticate an authorized device. The controlling device sends, in response to a sharing operation for the second credential, the second credential to the authorized device when an attribute of the second credential is distributable. The authorized device sends an authentication request, first information, and verification information to the accessory device, where the verification information is obtained by processing the first information based on the second credential stored in the controlling device. The accessory device verifies the verification information based on the local second credential. When the verification succeeds, the authorized device is successfully authenticated.
    Type: Application
    Filed: December 5, 2024
    Publication date: March 20, 2025
    Inventors: Chongyang HU, Changting LI, Siying MA, Yue ZHANG
  • Publication number: 20250083522
    Abstract: This application provides privacy protection methods and related apparatuses. An example method includes, when a vehicle detects that there is only one user in the vehicle, the vehicle displays first information in a first display area in a first form. The method further includes, when the vehicle detects that there are a plurality of users in the vehicle, the vehicle displays the first information in the first display area in a second form. An information amount of the first information displayed in the second form is less than an information amount of the first information displayed in the first form.
    Type: Application
    Filed: November 26, 2024
    Publication date: March 13, 2025
    Inventors: Xiaoshuang MA, Ameng MENG, Xiwen FANG, Dongxue PAN, Changting LI
  • Publication number: 20240385595
    Abstract: A central control device identifies an identity of a user, and determines, based on the identity of the user, a smart home linkage solution associated with the identity of the user. Then, the central control device controls, based on the smart home linkage solution associated with the identity of the user, a public smart home device to enter a corresponding operating mode. When receiving a first operation of the user, the central control device controls, based on the smart home linkage solution associated with the identity of the user, the public smart home device to enter the corresponding operating mode.
    Type: Application
    Filed: September 13, 2022
    Publication date: November 21, 2024
    Inventors: Dongxue Pan, Xiwen Fang, Xiaoshuang Ma, Changting Li
  • Publication number: 20240386083
    Abstract: An identity authentication method and a vehicle provide authentication of a user identity in a first authentication manner enabling permission to use a first function of the vehicle when the first authentication succeeds. The first authentication manner may include at least one of vehicle key authentication, password authentication, biological feature authentication, or connected device authentication. First driving data is collected and a second authentication is performed based on the first driving data. Permission to use the first function is disabled when the second authentication fails and is continued when the second authentication succeeds.
    Type: Application
    Filed: August 15, 2022
    Publication date: November 21, 2024
    Inventors: Changting Li, Muyang Wang, Xiwen Fang, Xiaoshuang Ma, Dongxue Pan
  • Publication number: 20240283864
    Abstract: A method includes: when a first electronic device is in a locked state, detecting whether the first electronic device establishes a short-range wireless communication connection to a second electronic device, and whether an intelligent unlocking use condition is met; if the first electronic device establishes the short-range wireless communication connection to the second electronic device, and the intelligent unlocking use condition is met, unlocking the first electronic device by using the second electronic device; detecting whether an intelligent locking use condition is met; and if the intelligent locking use condition is met, locking the first electronic device.
    Type: Application
    Filed: July 27, 2022
    Publication date: August 22, 2024
    Inventors: Xiaodong Chen, Xiaozhen Ye, Changting Li, Zili Dai, Lijian Liu
  • Publication number: 20240126897
    Abstract: After an electronic device in a locked state obtains an operation instruction and identity authentication information that does not meet an unlocking requirement, the electronic device may determine whether to allow access to a resource that the operation instruction requests to access, and if yes, access the corresponding resource in response to the operation instruction.
    Type: Application
    Filed: December 28, 2023
    Publication date: April 18, 2024
    Inventors: Xiaodong Chen, Changting Li, Shengtao Zhang, Guojian Zhao