Patents by Inventor HUANGUO ZHANG

HUANGUO ZHANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10637653
    Abstract: A system for establishing a shared key in a computing-resource-asymmetric field. The system includes: a first communicating unit configured to transmit an interaction request and interaction information of a first user to a second user, and receive interaction information from the second user; a first random number generator configured to generate a random number; a first memory configured to store private key information and public key information of the first user and the interaction information; a first processor configured to complete a computing demand of the first user; a second communicating unit configured to receive the interaction request and the interaction information from the first user, and transmit the interaction information to the first user; a second random number generator configured to generate a random number; a second memory configured to store private key information of the second user and the interaction information; and a second processor.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: April 28, 2020
    Assignee: WUHAN UNIVERSITY
    Inventors: Houzhen Wang, Huanguo Zhang
  • Patent number: 10339284
    Abstract: A measurement method, an electronic device, and a measurement system where the electronic device reads, from a hardware storage device, running code and running data that are in a running process of a virtual machine manager (VMM), and generates first verification information according to the running code and the running data, and the electronic device stores the first verification information, and transmits, to a trusted data center, log information generated in a process that is from reading, by the electronic device, the running code and the running data to storing, by the electronic device, the first verification information such that the trusted data center measures the electronic device using the first verification information acquired from the electronic device and second verification information generated according to the log information.
    Type: Grant
    Filed: March 16, 2016
    Date of Patent: July 2, 2019
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Jianfeng Liu, Xun Shi, Huanguo Zhang, Fei Yan
  • Publication number: 20190197261
    Abstract: A method for protecting the credibility of a server's hardware, the method including: setting reference values of credible components, encrypting the reference values, and writing the encrypted reference values to available record regions in the Field Replaceable Unit (FRU) of a server; obtaining information of target components of the server, and parsing and extracting needed data fields; and reading the encrypted reference values from the FRU, performing decryption operations, and determining whether the obtained component information is matched with the reference value; if they are not matched, one hardware component of the server is incredible, and a power-off operation is performed, otherwise the hardware of the server is credible, and the server is allowed to continue to run.
    Type: Application
    Filed: June 21, 2018
    Publication date: June 27, 2019
    Inventors: Fajiang YU, Jiuding HU, Huanguo ZHANG
  • Publication number: 20190132121
    Abstract: A system for establishing a shared key in a computing-resource-asymmetric field. The system includes: a first communicating unit configured to transmit an interaction request and interaction information of a first user to a second user, and receive interaction information from the second user; a first random number generator configured to generate a random number; a first memory configured to store private key information and public key information of the first user and the interaction information; a first processor configured to complete a computing demand of the first user; a second communicating unit configured to receive the interaction request and the interaction information from the first user, and transmit the interaction information to the first user; a second random number generator configured to generate a random number; a second memory configured to store private key information of the second user and the interaction information; and a second processor.
    Type: Application
    Filed: January 12, 2018
    Publication date: May 2, 2019
    Inventors: Houzhen WANG, Huanguo ZHANG
  • Patent number: 9548860
    Abstract: An asymmetric-computing type shared key establishing method suitable for cloud computing and IoT has the following advantages. The realization efficiency and the security level are high, and a cryptographic algorithm coprocessor is not needed. The method can be applied to occasions in which the computing capabilities are asymmetric, and attacks from quantum computers can be resisted. Compared with a conventional key exchange protocol such as the Diffie-Hellman key exchange protocol, the method can be more effective between servers and mobile equipment in the security fields as the IoT and cloud computing, and the method can be used in both the electronic environment and the quantum environment. Thus, the asymmetric-computing type shared key establishing method suitable for cloud computing and IoT provided by the invention can be widely applied to the field of information security systems such as network security and e-commerce.
    Type: Grant
    Filed: May 29, 2015
    Date of Patent: January 17, 2017
    Assignee: Wuhan University
    Inventors: Huanguo Zhang, Shaowu Mao, Houzhen Wang, Wanqing Wu, Jinhui Liu, Jianwei Jia
  • Publication number: 20160196415
    Abstract: A measurement method, an electronic device, and a measurement system where the electronic device reads, from a hardware storage device, running code and running data that are in a running process of a virtual machine manager (VMM), and generates first verification information according to the running code and the running data, and the electronic device stores the first verification information, and transmits, to a trusted data center, log information generated in a process that is from reading, by the electronic device, the running code and the running data to storing, by the electronic device, the first verification information such that the trusted data center measures the electronic device using the first verification information acquired from the electronic device and second verification information generated according to the log information.
    Type: Application
    Filed: March 16, 2016
    Publication date: July 7, 2016
    Inventors: Jianfeng Liu, Xun Shi, Huanguo Zhang, Fei Yan
  • Publication number: 20150358157
    Abstract: An asymmetric-computing type shared key establishing method suitable for cloud computing and IoT has the following advantages. The realization efficiency and the security level are high, and a cryptographic algorithm coprocessor is not needed. The method can be applied to occasions in which the computing capabilities are asymmetric, and attacks from quantum computers can be resisted. Compared with a conventional key exchange protocol such as the Diffie-Hellman key exchange protocol, the method can be more effective between servers and mobile equipment in the security fields as the IoT and cloud computing, and the method can be used in both the electronic environment and the quantum environment. Thus, the asymmetric-computing type shared key establishing method suitable for cloud computing and IoT provided by the invention can be widely applied to the field of information security systems such as network security and e-commerce.
    Type: Application
    Filed: May 29, 2015
    Publication date: December 10, 2015
    Inventors: HUANGUO ZHANG, SHAOWU MAO, HOUZHEN WANG, WANQING WU, JINHUI LIU, JIANWEI JIA