Patents by Inventor Chi-kwong Hui

Chi-kwong Hui has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11379838
    Abstract: The present invention includes systems and method for generating Virtual IDs (VIDs) and corresponding Virtual ID Chains (VICs) to anonymize and represent transactions between users, data sources, Virtual ID Management Platforms (VMP), and Third-Party Service Providers (TSPs). VIDs of embodiments are virtualized identifiers that may be used to anonymously and uniquely identify transaction participants. VIDs may be generated in a distributed manner as a party receiving transaction-related information generates a VID corresponding to the sending party. VICs of embodiments are virtualized arrays of VIDs that represent the sequence of interactions between parties to a transaction. VICs are preferably stored in association with transaction logs descriptive of the transaction represented by each VIC to facilitate subsequent processing. A VIC may be iteratively resolved to obtain one or more non-virtualized identifier corresponding to transaction participants represented by the VIC.
    Type: Grant
    Filed: February 5, 2020
    Date of Patent: July 5, 2022
    Assignee: Hong Kong Applied Science and Technology Research Institute Co., Ltd.
    Inventors: Kam Hong Shum, Chi-Kwong Hui
  • Publication number: 20210241274
    Abstract: The present invention includes systems and method for generating Virtual IDs (VIDs) and corresponding Virtual ID Chains (VICs) to anonymize and represent transactions between users, data sources, Virtual ID Management Platforms (VMP), and Third-Party Service Providers (TSPs). VIDs of embodiments are virtualized identifiers that may be used to anonymously and uniquely identify transaction participants. VIDs may be generated in a distributed manner as a party receiving transaction-related information generates a VID corresponding to the sending party. VICs of embodiments are virtualized arrays of VIDs that represent the sequence of interactions between parties to a transaction. VICs are preferably stored in association with transaction logs descriptive of the transaction represented by each VIC to facilitate subsequent processing. A VIC may be iteratively resolved to obtain one or more non-virtualized identifier corresponding to transaction participants represented by the VIC.
    Type: Application
    Filed: February 5, 2020
    Publication date: August 5, 2021
    Inventors: Kam Hong Shum, Chi-Kwong Hui
  • Publication number: 20050235140
    Abstract: A method and system for long term electronic document archiving. The system collects a certificate revocation information for a certificate from a certificate authority that indicates the validity of the certificate used in an electronic document. The certificates are collected from a certificate authority. The system then generates at least two layers of signature and timestamp from the electronic document, certificate revocation information collected, and the collected certificate. Cryptographic primitives of different strength are used, and the two layers of signature and timestamp generated have different cryptographic strengths. The signature is generated using a system signing key whereas the timestamp is generated by an external entity. A digital aging token is then formed by combining the original electronic document, certificate revocation information, and certificate collected to the layers generated.
    Type: Application
    Filed: March 11, 2005
    Publication date: October 20, 2005
    Inventors: Chi-kwong Hui, Kam-pui Chow, Chan-fung Chong, Kwok-hung Pun, Wai-wan Tsang, Hak-wai Chan, Kin-ying Yu
  • Publication number: 20030161472
    Abstract: A server-assisted computational method for computing the RSA cryptography is delineated in this document. The method enables public-key functions on the resource-constrained devices, such as a mobile phone or a PDA, by leveraging the rich computing resources provided by the server-grade computers on the network. Public-key processing, which is computationally intensive as commonly known, if loaded solely on the constrained device, would easily overwhelm the processor capacity and electrical power supply. The server-assisted method enables such device to drive a powerful server computer on the Internet to carry out the public-key number-crunching job for its sake. Some near-completion results are communicated back to the device. From that, the final public-key cryptograph is derived. Privacy and security are the utmost important considerations in public-key systems. The present invention ensures the privacy of the device by blinding the server of the secret message and the crypto keys of the device.
    Type: Application
    Filed: February 27, 2002
    Publication date: August 28, 2003
    Inventors: Chi Hung Tong, Chi Kwong Hui, Ada Wai Chee Fu, Francis Chi Moon Lau