Patents by Inventor Feihu Jiang

Feihu Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230119065
    Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.
    Type: Application
    Filed: December 20, 2022
    Publication date: April 20, 2023
    Inventors: Ruifeng Hu, Feihu Jiang, Tsz Hon Yuen, Yaoguo Jiang, Haojun Zhou
  • Patent number: 11610019
    Abstract: An information management method includes: receiving an information import request sent by a first agent node, where the information import request includes a first identifier of a user; obtaining a second identifier of the user based on the information import request, and obtaining to-be-imported personal information corresponding to the second identifier of the user; and sending metadata of the user to a block chain node, to store the metadata of the user into the block chain system. In this way, personal information of the user is registered in the block chain system, so that security of the personal information can be effectively ensured, and the user can perform management of and provide external authorized access to the personal information of the user in a unified manner.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: March 21, 2023
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Haojun Zhou, Yaoguo Jiang, Ruifeng Hu, Feihu Jiang
  • Patent number: 11563569
    Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.
    Type: Grant
    Filed: September 18, 2020
    Date of Patent: January 24, 2023
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Ruifeng Hu, Feihu Jiang, Tsz Hon Yuen, Yaoguo Jiang, Haojun Zhou
  • Patent number: 11347726
    Abstract: A cross-chain transaction method and apparatus. For any node on a first blockchain of blockchains on which a plurality of associated transactions occur, after receiving an association transaction from a consensus node, the node needs to determine, based on an identifier of an anchor transaction included in the association transaction, whether the anchor transaction is a valid transaction. If the anchor transaction is a valid transaction, the node writes a transaction that occurs in the first blockchain into the first blockchain based on identifiers of the blockchains on which the plurality of transactions occur, to ensure that the plurality of associated transactions on the plurality of blockchains are successfully submitted simultaneously.
    Type: Grant
    Filed: February 11, 2020
    Date of Patent: May 31, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yaoguo Jiang, Feihu Jiang, Ruifeng Hu, Haiyang Ding
  • Patent number: 11003480
    Abstract: A container deployment method increases access speed between isolated containers on a same host. The method includes: receiving a container deployment message including container image information and association information of a container; creating a container for a first service, and a first network namespace and a first IPC namespace corresponding to the container for the first service; creating a first load balancing container corresponding to the container for the first service, and setting a running parameter of the first load balancing container to a parameter of the first network namespace; creating a loopback interface in the first network namespace; determining that the network device has a container that is for a second service and that is associated with the container for the first service; and setting a starting parameter of the first load balancing container to a parameter of a second IPC namespace.
    Type: Grant
    Filed: May 16, 2019
    Date of Patent: May 11, 2021
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Yaoguo Jiang, Feihu Jiang, Junan Xie, Ruifeng Hu, Haiyang Ding
  • Publication number: 20210006400
    Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.
    Type: Application
    Filed: September 18, 2020
    Publication date: January 7, 2021
    Inventors: Ruifeng HU, Feihu JIANG, Tsz Hon YUEN, Yaoguo JIANG, Haojun ZHOU
  • Publication number: 20200320222
    Abstract: An information management method includes: receiving an information import request sent by a first agent node, where the information import request includes a first identifier of a user; obtaining a second identifier of the user based on the information import request, and obtaining to-be-imported personal information corresponding to the second identifier of the user; and sending metadata of the user to a block chain node, to store the metadata of the user into the block chain system. In this way, personal information of the user is registered in the block chain system, so that security of the personal information can be effectively ensured, and the user can perform management of and provide external authorized access to the personal information of the user in a unified manner.
    Type: Application
    Filed: May 7, 2020
    Publication date: October 8, 2020
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Haojun ZHOU, Yaoguo JIANG, Ruifeng HU, Feihu JIANG
  • Publication number: 20200175003
    Abstract: A cross-chain transaction method and apparatus. For any node on a first blockchain of blockchains on which a plurality of associated transactions occur, after receiving an association transaction from a consensus node, the node needs to determine, based on an identifier of an anchor transaction included in the association transaction, whether the anchor transaction is a valid transaction. If the anchor transaction is a valid transaction, the node writes a transaction that occurs in the first blockchain into the first blockchain based on identifiers of the blockchains on which the plurality of transactions occur, to ensure that the plurality of associated transactions on the plurality of blockchains are successfully submitted simultaneously.
    Type: Application
    Filed: February 11, 2020
    Publication date: June 4, 2020
    Inventors: Yaoguo Jiang, Feihu Jiang, Ruifeng Hu, Haiyang Ding
  • Patent number: 10664314
    Abstract: A container deployment method and apparatus are disclosed. The method includes receiving a first container creation request that carries a required resource capacity and a required image identifier, where the required image identifier is an identifier of an image corresponding to an application that needs to be run. From a cluster of working nodes, at least two first working nodes whose unused resource capacity is greater than the required resource capacity are selected. A target working node is determined from the at least two working nodes according to images stored on the at least two first working nodes and the required image identifier. A second container creation request is sent to the target working node carrying the required resource capacity and the required image identifier.
    Type: Grant
    Filed: February 2, 2018
    Date of Patent: May 26, 2020
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Feihu Jiang, Junan Xie, Ruifeng Hu, Haiyang Ding, Yaoguo Jiang
  • Publication number: 20200134613
    Abstract: A method for running a smart contract, performed by a processing node, is applied to a distributed network, and includes receiving a transaction sent by a consensus service node, where the transaction includes a plurality of running results generated in an endorsement process of the smart contract, checking whether the plurality of running results meet a verification policy, where the checking includes checking version numbers and data that are in the plurality of running results and that are generated by a program other than a restrictive condition in the smart contract, when the plurality of running results meet the verification policy, identifying the restrictive condition in the smart contract, and determining whether local ledger data meets the restrictive condition, and when the local ledger data meets the restrictive condition, accepting the transaction.
    Type: Application
    Filed: December 26, 2019
    Publication date: April 30, 2020
    Inventors: Yaoguo Jiang, Feihu Jiang, Junan Xie, Ruifeng Hu, Haiyang Ding
  • Publication number: 20190272205
    Abstract: A container deployment method increases access speed between isolated containers on a same host. The method includes: receiving a container deployment message including container image information and association information of a container; creating a container for a first service, and a first network namespace and a first IPC namespace corresponding to the container for the first service; creating a first load balancing container corresponding to the container for the first service, and setting a running parameter of the first load balancing container to a parameter of the first network namespace; creating a loopback interface in the first network namespace; determining that the network device has a container that is for a second service and that is associated with the container for the first service; and setting a starting parameter of the first load balancing container to a parameter of a second IPC namespace.
    Type: Application
    Filed: May 16, 2019
    Publication date: September 5, 2019
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yaoguo JIANG, Feihu Jiang, Junan Xie, Ruifeng Hu, Haiyang Ding
  • Publication number: 20180157536
    Abstract: A container deployment method and apparatus are disclosed. The method includes receiving a first container creation request that carries a required resource capacity and a required image identifier, where the required image identifier is an identifier of an image corresponding to an application that needs to be run. From a cluster of working nodes, at least two first working nodes whose unused resource capacity is greater than the required resource capacity are selected. A target working node is determined from the at least two working nodes according to images stored on the at least two first working nodes and the required image identifier. A second container creation request is sent to the target working node carrying the required resource capacity and the required image identifier.
    Type: Application
    Filed: February 2, 2018
    Publication date: June 7, 2018
    Inventors: Feihu JIANG, Junan XIE, Ruifeng HU, Haiyang DING, Yaoguo JIANG
  • Publication number: 20120098862
    Abstract: A method for processing graphics includes: receiving a graphic stream that carries a graphic type identifier; and obtaining the graphic type identifier, and displaying corresponding graphic content of the graphic stream if a graphic type is identifiable, or discarding the graphic stream if the graphic type is not identifiable. Because the graphic stream carries a graphic type identifier, when obtaining the graphic type identifier, the terminal judges whether the graphic type is identifiable, and displays the graphic content if the graphic type is identifiable or discards the graphic stream if the graphic type is not identifiable. In this way, if the terminal does not support the graphic type, the terminal can discard the graphic stream automatically, which enhances the terminal capability of processing graphics.
    Type: Application
    Filed: December 27, 2011
    Publication date: April 26, 2012
    Applicant: Huawei Technologies Co., Ltd.
    Inventors: Yu Hui, Jie Zhang, Teng Shi, Peiyu Yue, Feihu Jiang, Dawei Wang
  • Publication number: 20120011549
    Abstract: A method for finding a visited Service Provider (SP) disclosed herein includes: after accessing a network, a terminal obtains current network information; and obtains the visited SP information through the home SP information preset on the terminal and the current network information. A method for finding a visited SP disclosed herein includes: after receiving a visited SP information request sent by a terminal, an SP server searches for the current network information, obtains the visited SP information, and sends the visited SP information to the terminal. Accordingly, a terminal for finding a visited SP and an SP server are disclosed. Through the present invention, a roaming terminal may find the visited SP conveniently.
    Type: Application
    Filed: September 28, 2011
    Publication date: January 12, 2012
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Feihu Jiang, Teng Shi, Yuanyuan Zhang, Peiyu Yue, Ruinan Sun, Jie Zhang
  • Publication number: 20100146561
    Abstract: A method for finding a visited Service Provider (SP) disclosed herein includes: after accessing a network, a terminal obtains current network information; and obtains the visited SP information through the home SP information preset on the terminal and the current network information. A method for finding a visited SP disclosed herein includes: after receiving a visited SP information request sent by a terminal, an SP server searches for the current network information, obtains the visited SP information, and sends the visited SP information to the terminal. Accordingly, a terminal for finding a visited SP and an SP server are disclosed. Through the present invention, a roaming terminal may find the visited SP conveniently.
    Type: Application
    Filed: February 9, 2010
    Publication date: June 10, 2010
    Inventors: Feihu Jiang, Teng Shi, Yuanyuan Zhang, Peiyu Yue, Ruinan Sun, Jie Zhang
  • Publication number: 20090264109
    Abstract: A method and apparatus for acquiring service guides (SGs) are provided. The method includes sending an SG request that carries information about a current area and receiving an SG corresponding to the current area. The SG corresponding to the current area of the mobile terminal is differentiated in the SG server, and the SG request sent by the mobile terminal to the SG server carries the information about the current area where the mobile terminal resides. Therefore, the mobile terminal may directly receive the SG delivered by the SG server and corresponding to the current area.
    Type: Application
    Filed: June 29, 2009
    Publication date: October 22, 2009
    Inventors: Feihu Jiang, Teng Shi, Yuanyuan Zhang, Peiyu Le, Jie Zhang