Patents by Inventor Huaqian Cai

Huaqian Cai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11522953
    Abstract: A human-cyber-physical resource-oriented adaptive construction method and apparatus for a structured peer-to-peer (P2P) network are provided. The structured P2P network is a point-to-point network with physical perception information and can be effectively used in a human-cyber-physical fusion scenario. The method includes: using a grid aggregation algorithm to calculate the latitude and longitude coordinates of a new node to acquire a position hash value of the new node; determining, according to the position hash value, a registration node of the new node from the existing nodes of the structured P2P network; and completing, according to the information returned by the registration node to the new node, registration of the new node, thereby resulting adding of the registered new node into the structured P2P network.
    Type: Grant
    Filed: May 24, 2022
    Date of Patent: December 6, 2022
    Assignee: PEKING UNIVERSITY
    Inventors: Gang Huang, Huaqian Cai, Xuanzhe Liu, Yun Ma
  • Patent number: 11042524
    Abstract: A self-adaptive execution method for realizing data trustworthiness includes: starting a smart contract, executing the smart contract and verifying an execution result of the smart contract. A random execution mode based on redundant calculation is employed, and multiple nodes in a network are randomly selected to jointly execute a data analysis logic, thereby realizing trusted computing of an execution result in a relatively distrusted environment and improving an execution efficiency of the smart contract. Meanwhile, by recording the execution of the contract in a process of synchronously calling the multiple nodes, a needed execution record of contract calling is acquired from the node in a latest state and replayed locally when synchronization is needed, so that the random multiple nodes can be quickly recovered when states of the random multiple nodes are not synchronized, realizing high availability of data and satisfying a data analysis scenario with low response time.
    Type: Grant
    Filed: January 13, 2021
    Date of Patent: June 22, 2021
    Assignee: PEKING UNIVERSITY
    Inventors: Gang Huang, Ying Zhang, Huaqian Cai, Xuanzhe Liu
  • Patent number: 11036614
    Abstract: A data-control-oriented program static analysis method includes: compiling and interpreting a code of a smart contract to generate a bytecode of the code of the smart contract; resolving a control-flow relation between instructions of the bytecode, and building and printing a control-flow graph according to the control-flow relation; adding a taint source in the smart contract to an analysis result of a starting block of the control-flow graph, traversing the control-flow graph, performing a data dependence analysis based on a taint analysis technique, continuously updating an analysis result of a basic block in the control-flow graph; predefining an expression form of an analysis result and a basic operation related to the analysis result for the static analysis, controlling an updating of the analysis result according to a definition, and returning a final analysis result; and according to the final analysis result, generating and returning an analysis report.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: June 15, 2021
    Assignee: PEKING UNIVERSITY
    Inventors: Gang Huang, Huaqian Cai, Yun Ma, Jiamei Huang
  • Patent number: 11018980
    Abstract: A data-interoperability-oriented trusted processing method and system applied to a P2P network system are provided. The P2P network system includes a plurality of nodes. The trusted processing method includes a storage method and a query method. Firstly, a directed acyclic graph ledger structure is employed to be matched with an nRW consensus mechanism during a storage process, so that a supervision problem in a large-scale sharing exchange process is solved. Secondly, in a query process, a P2P network system is optimized by maintaining a tree structure with high fault tolerance and load balance through a hop optimization method to construct the P2P network system with a relatively balanced network, so that a query delay is not greatly influenced on the premise of ensuring the load balance, and an expandability of the system is ensured.
    Type: Grant
    Filed: October 28, 2020
    Date of Patent: May 25, 2021
    Assignee: PEKING UNIVERSITY
    Inventors: Gang Huang, Huaqian Cai, Ying Zhang, Xuanzhe Liu, Yun Ma
  • Publication number: 20210126867
    Abstract: A data-interoperability-oriented trusted processing method and system applied to a P2P network system are provided. The P2P network system includes a plurality of nodes. The trusted processing method includes a storage method and a query method. Firstly, a directed acyclic graph ledger structure is employed to be matched with an nRW consensus mechanism during a storage process, so that a supervision problem in a large-scale sharing exchange process is solved. Secondly, in a query process, a P2P network system is optimized by maintaining a tree structure with high fault tolerance and load balance through a hop optimization method to construct the P2P network system with a relatively balanced network, so that a query delay is not greatly influenced on the premise of ensuring the load balance, and an expandability of the system is ensured.
    Type: Application
    Filed: October 28, 2020
    Publication date: April 29, 2021
    Applicant: PEKING UNIVERSITY
    Inventors: Gang HUANG, Huaqian CAI, Ying ZHANG, Xuanzhe LIU, Yun MA
  • Patent number: 10986080
    Abstract: A permission management method for a trustworthiness mechanism of a big-data blockchain includes: dividing system resources into user-role resources, data resources and node resources; acquiring a current role of a user based on a RBAC module in a R-TBAC model, and acquiring an operating-permission-value range of the current role; monitoring an operating behavior of the user in an operating system, and, based on the RBAC module and according to the operating-permission-value range of the current role, detecting whether the current role of the user has a role-operating permission for the operation; detecting a task-operating permission of the contract instance or task instance based on a TBAC module in the R-TBAC model during running of the contract instance or task instance; and completing, by the user, the operation in an authorized operating permission range based on the R-TBAC model.
    Type: Grant
    Filed: January 13, 2021
    Date of Patent: April 20, 2021
    Assignee: PEKING UNIVERSITY
    Inventors: Gang Huang, Xuanzhe Liu, Huaqian Cai, Lingxuan Hu, Hai'ou Jiang
  • Patent number: 10496423
    Abstract: The invention discloses a method for opening up data and functions of device applications based on reconstruction technology. The method modifies the runtime environment of the application to obtain control flow information when the application function and data are used, to reconstruct the original control flow. This method conducts program analysis of run-time control flow and application static code, removes application function and data that are unrelated to sub-control flows, and retains a set of sub-control flows and contexts directly related to application functions and data. In certain context environment, the sub-set of the control flows are reconstructed to achieve respective application functions and to acquire the application data. The disclosed method can be used to open functions and data of applications based on Java, C++, and JavaScript, etc. on different types of devices.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: December 3, 2019
    Assignee: Peking University
    Inventors: Ying Zhang, Huaqian Cai, Gang Huang, Wei Yao
  • Publication number: 20190155628
    Abstract: The invention discloses a method for opening up data and functions of device applications based on reconstruction technology. The method modifies the runtime environment of the application to obtain control flow information when the application function and data are used, to reconstruct the original control flow. This method conducts program analysis of run-time control flow and application static code, removes application function and data that are unrelated to sub-control flows, and retains a set of sub-control flows and contexts directly related to application functions and data. In certain context environment, the sub-set of the control flows are reconstructed to achieve respective application functions and to acquire the application data. The disclosed method can be used to open functions and data of applications based on Java, C++, and JavaScript, etc. on different types of devices.
    Type: Application
    Filed: September 23, 2016
    Publication date: May 23, 2019
    Inventors: Ying Zhang, Huaqian Cai, Gang Huang, Wei Yao
  • Publication number: 20180218165
    Abstract: A method for cloud locking sensitive data based on refactoring technology is disclosed. Binary byte codes of a mobile application are modified and refactored, and an application program interface related to the file operation used by the mobile application is replaced, so that a sub-file system specified in the cloud is fused with the file system in the client. The refactored application is capable of transparently reading and writing cloud data and cloud locking sensitive data. The method includes: carrying out programmed analysis on the existing mobile application; finding a computational logic related to the file operation and carrying out corresponding refactoring; and re-generating an application with direct cloud data reading/writing capability. The invention method is conducive to improving the security of sensitive data on mobile phones, and has particular significance for users that want to protect sensitive data without storing them on their clients.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 2, 2018
    Inventors: Hong Mei, Gang Huang, Ying Zhang, Huaqian Cai