Patents by Inventor Feihu Jiang
Feihu Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230119065Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.Type: ApplicationFiled: December 20, 2022Publication date: April 20, 2023Inventors: Ruifeng Hu, Feihu Jiang, Tsz Hon Yuen, Yaoguo Jiang, Haojun Zhou
-
Patent number: 11610019Abstract: An information management method includes: receiving an information import request sent by a first agent node, where the information import request includes a first identifier of a user; obtaining a second identifier of the user based on the information import request, and obtaining to-be-imported personal information corresponding to the second identifier of the user; and sending metadata of the user to a block chain node, to store the metadata of the user into the block chain system. In this way, personal information of the user is registered in the block chain system, so that security of the personal information can be effectively ensured, and the user can perform management of and provide external authorized access to the personal information of the user in a unified manner.Type: GrantFiled: May 7, 2020Date of Patent: March 21, 2023Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Haojun Zhou, Yaoguo Jiang, Ruifeng Hu, Feihu Jiang
-
Patent number: 11563569Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.Type: GrantFiled: September 18, 2020Date of Patent: January 24, 2023Assignee: Huawei Technologies Co., Ltd.Inventors: Ruifeng Hu, Feihu Jiang, Tsz Hon Yuen, Yaoguo Jiang, Haojun Zhou
-
Patent number: 11347726Abstract: A cross-chain transaction method and apparatus. For any node on a first blockchain of blockchains on which a plurality of associated transactions occur, after receiving an association transaction from a consensus node, the node needs to determine, based on an identifier of an anchor transaction included in the association transaction, whether the anchor transaction is a valid transaction. If the anchor transaction is a valid transaction, the node writes a transaction that occurs in the first blockchain into the first blockchain based on identifiers of the blockchains on which the plurality of transactions occur, to ensure that the plurality of associated transactions on the plurality of blockchains are successfully submitted simultaneously.Type: GrantFiled: February 11, 2020Date of Patent: May 31, 2022Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yaoguo Jiang, Feihu Jiang, Ruifeng Hu, Haiyang Ding
-
Patent number: 11003480Abstract: A container deployment method increases access speed between isolated containers on a same host. The method includes: receiving a container deployment message including container image information and association information of a container; creating a container for a first service, and a first network namespace and a first IPC namespace corresponding to the container for the first service; creating a first load balancing container corresponding to the container for the first service, and setting a running parameter of the first load balancing container to a parameter of the first network namespace; creating a loopback interface in the first network namespace; determining that the network device has a container that is for a second service and that is associated with the container for the first service; and setting a starting parameter of the first load balancing container to a parameter of a second IPC namespace.Type: GrantFiled: May 16, 2019Date of Patent: May 11, 2021Assignee: Huawei Technologies Co., Ltd.Inventors: Yaoguo Jiang, Feihu Jiang, Junan Xie, Ruifeng Hu, Haiyang Ding
-
Publication number: 20210006400Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.Type: ApplicationFiled: September 18, 2020Publication date: January 7, 2021Inventors: Ruifeng HU, Feihu JIANG, Tsz Hon YUEN, Yaoguo JIANG, Haojun ZHOU
-
Publication number: 20200320222Abstract: An information management method includes: receiving an information import request sent by a first agent node, where the information import request includes a first identifier of a user; obtaining a second identifier of the user based on the information import request, and obtaining to-be-imported personal information corresponding to the second identifier of the user; and sending metadata of the user to a block chain node, to store the metadata of the user into the block chain system. In this way, personal information of the user is registered in the block chain system, so that security of the personal information can be effectively ensured, and the user can perform management of and provide external authorized access to the personal information of the user in a unified manner.Type: ApplicationFiled: May 7, 2020Publication date: October 8, 2020Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Haojun ZHOU, Yaoguo JIANG, Ruifeng HU, Feihu JIANG
-
Publication number: 20200175003Abstract: A cross-chain transaction method and apparatus. For any node on a first blockchain of blockchains on which a plurality of associated transactions occur, after receiving an association transaction from a consensus node, the node needs to determine, based on an identifier of an anchor transaction included in the association transaction, whether the anchor transaction is a valid transaction. If the anchor transaction is a valid transaction, the node writes a transaction that occurs in the first blockchain into the first blockchain based on identifiers of the blockchains on which the plurality of transactions occur, to ensure that the plurality of associated transactions on the plurality of blockchains are successfully submitted simultaneously.Type: ApplicationFiled: February 11, 2020Publication date: June 4, 2020Inventors: Yaoguo Jiang, Feihu Jiang, Ruifeng Hu, Haiyang Ding
-
Patent number: 10664314Abstract: A container deployment method and apparatus are disclosed. The method includes receiving a first container creation request that carries a required resource capacity and a required image identifier, where the required image identifier is an identifier of an image corresponding to an application that needs to be run. From a cluster of working nodes, at least two first working nodes whose unused resource capacity is greater than the required resource capacity are selected. A target working node is determined from the at least two working nodes according to images stored on the at least two first working nodes and the required image identifier. A second container creation request is sent to the target working node carrying the required resource capacity and the required image identifier.Type: GrantFiled: February 2, 2018Date of Patent: May 26, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Feihu Jiang, Junan Xie, Ruifeng Hu, Haiyang Ding, Yaoguo Jiang
-
Publication number: 20200134613Abstract: A method for running a smart contract, performed by a processing node, is applied to a distributed network, and includes receiving a transaction sent by a consensus service node, where the transaction includes a plurality of running results generated in an endorsement process of the smart contract, checking whether the plurality of running results meet a verification policy, where the checking includes checking version numbers and data that are in the plurality of running results and that are generated by a program other than a restrictive condition in the smart contract, when the plurality of running results meet the verification policy, identifying the restrictive condition in the smart contract, and determining whether local ledger data meets the restrictive condition, and when the local ledger data meets the restrictive condition, accepting the transaction.Type: ApplicationFiled: December 26, 2019Publication date: April 30, 2020Inventors: Yaoguo Jiang, Feihu Jiang, Junan Xie, Ruifeng Hu, Haiyang Ding
-
Publication number: 20190272205Abstract: A container deployment method increases access speed between isolated containers on a same host. The method includes: receiving a container deployment message including container image information and association information of a container; creating a container for a first service, and a first network namespace and a first IPC namespace corresponding to the container for the first service; creating a first load balancing container corresponding to the container for the first service, and setting a running parameter of the first load balancing container to a parameter of the first network namespace; creating a loopback interface in the first network namespace; determining that the network device has a container that is for a second service and that is associated with the container for the first service; and setting a starting parameter of the first load balancing container to a parameter of a second IPC namespace.Type: ApplicationFiled: May 16, 2019Publication date: September 5, 2019Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yaoguo JIANG, Feihu Jiang, Junan Xie, Ruifeng Hu, Haiyang Ding
-
Publication number: 20180157536Abstract: A container deployment method and apparatus are disclosed. The method includes receiving a first container creation request that carries a required resource capacity and a required image identifier, where the required image identifier is an identifier of an image corresponding to an application that needs to be run. From a cluster of working nodes, at least two first working nodes whose unused resource capacity is greater than the required resource capacity are selected. A target working node is determined from the at least two working nodes according to images stored on the at least two first working nodes and the required image identifier. A second container creation request is sent to the target working node carrying the required resource capacity and the required image identifier.Type: ApplicationFiled: February 2, 2018Publication date: June 7, 2018Inventors: Feihu JIANG, Junan XIE, Ruifeng HU, Haiyang DING, Yaoguo JIANG
-
Publication number: 20120098862Abstract: A method for processing graphics includes: receiving a graphic stream that carries a graphic type identifier; and obtaining the graphic type identifier, and displaying corresponding graphic content of the graphic stream if a graphic type is identifiable, or discarding the graphic stream if the graphic type is not identifiable. Because the graphic stream carries a graphic type identifier, when obtaining the graphic type identifier, the terminal judges whether the graphic type is identifiable, and displays the graphic content if the graphic type is identifiable or discards the graphic stream if the graphic type is not identifiable. In this way, if the terminal does not support the graphic type, the terminal can discard the graphic stream automatically, which enhances the terminal capability of processing graphics.Type: ApplicationFiled: December 27, 2011Publication date: April 26, 2012Applicant: Huawei Technologies Co., Ltd.Inventors: Yu Hui, Jie Zhang, Teng Shi, Peiyu Yue, Feihu Jiang, Dawei Wang
-
Publication number: 20120011549Abstract: A method for finding a visited Service Provider (SP) disclosed herein includes: after accessing a network, a terminal obtains current network information; and obtains the visited SP information through the home SP information preset on the terminal and the current network information. A method for finding a visited SP disclosed herein includes: after receiving a visited SP information request sent by a terminal, an SP server searches for the current network information, obtains the visited SP information, and sends the visited SP information to the terminal. Accordingly, a terminal for finding a visited SP and an SP server are disclosed. Through the present invention, a roaming terminal may find the visited SP conveniently.Type: ApplicationFiled: September 28, 2011Publication date: January 12, 2012Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Feihu Jiang, Teng Shi, Yuanyuan Zhang, Peiyu Yue, Ruinan Sun, Jie Zhang
-
Publication number: 20100146561Abstract: A method for finding a visited Service Provider (SP) disclosed herein includes: after accessing a network, a terminal obtains current network information; and obtains the visited SP information through the home SP information preset on the terminal and the current network information. A method for finding a visited SP disclosed herein includes: after receiving a visited SP information request sent by a terminal, an SP server searches for the current network information, obtains the visited SP information, and sends the visited SP information to the terminal. Accordingly, a terminal for finding a visited SP and an SP server are disclosed. Through the present invention, a roaming terminal may find the visited SP conveniently.Type: ApplicationFiled: February 9, 2010Publication date: June 10, 2010Inventors: Feihu Jiang, Teng Shi, Yuanyuan Zhang, Peiyu Yue, Ruinan Sun, Jie Zhang
-
Publication number: 20090264109Abstract: A method and apparatus for acquiring service guides (SGs) are provided. The method includes sending an SG request that carries information about a current area and receiving an SG corresponding to the current area. The SG corresponding to the current area of the mobile terminal is differentiated in the SG server, and the SG request sent by the mobile terminal to the SG server carries the information about the current area where the mobile terminal resides. Therefore, the mobile terminal may directly receive the SG delivered by the SG server and corresponding to the current area.Type: ApplicationFiled: June 29, 2009Publication date: October 22, 2009Inventors: Feihu Jiang, Teng Shi, Yuanyuan Zhang, Peiyu Le, Jie Zhang