Patents by Inventor Jigang Wang
Jigang Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250119732Abstract: This disclosure generally relates to transferring encryption key to a VPLMN in wireless communication. Performed by first network element, the method includes: transmitting a query message to a second network element, to request an identification of a NF entity, wherein the query message comprises an identifier of a wireless device, and wherein the network function is an entity in the VPLMN for storing encryption keys; receiving, from the second network element, a response to the query message, the response comprising the identification of the NF entity; and transmitting, to the NF entity based on the identification of the NF entity, a first message comprising an encryption key, wherein the AF entity is located in the HPLMN or a DN external to the HPLMN and the VPLMN.Type: ApplicationFiled: December 17, 2024Publication date: April 10, 2025Applicant: ZTE CorporationInventors: Jigang WANG, Shilin YOU, Zhen XING, Yuze LIU, Peilin LIU
-
Patent number: 12264079Abstract: A soda ash and sodium bicarbonate production method is provided, in which solution mining, pretreatment, stripping, concentration, sodium carbonate decahydrate crystallization, separation, dissolution, sodium carbonate monohydrate crystallization, separation and drying are performed to obtain dense soda ash. A dissolved sodium carbonate decahydrate solution or a concentrated brine 3 is subjected to crystallization, separation and drying to produce sodium bicarbonate. A discharge liquid 1 generated in the sodium carbonate decahydrate crystallization and separation is subjected to causticization and evaporation to recycle sodium carbonate. Causticized sludge generated in causticization is calcined and then recycled for causticization. The process provided herein maximizes the resource utilization.Type: GrantFiled: December 5, 2022Date of Patent: April 1, 2025Assignee: CHINA TIANCHEN ENGINEERING CORPORATIONInventors: Jigang Wang, Lixiang Lu, Qingtian Feng
-
Patent number: 12149945Abstract: Provided are a subscription data update method and apparatus, a node, and a storage medium, where the method includes: in a case where a first network function node determines that authentication and key management for applications (AKMA) subscription data of a user is updated, determining, by the first network function node, a second network function node storing an AKMA context of the user; sending, by the first network function node, a subscription data management notification message to the second network function node; and receiving, by the first network function node, a subscription data management notification response message sent by the second network function node; where the subscription data management notification response message is sent after the second network function node deletes the AKMA context of the user according to the subscription data management notification message.Type: GrantFiled: November 16, 2022Date of Patent: November 19, 2024Assignee: ZTE CORPORATIONInventors: Shilin You, Jiyan Cai, Zhaoji Lin, Jin Peng, Yuze Liu, Zhen Xing, Jigang Wang, Min Liu
-
Publication number: 20240373215Abstract: This disclosure generally relates to updating and synchronizing security configuration in communication networks. Performed by a wireless device in a wireless network, the method includes receiving, from a first network element hosting an application function, a first message comprising at least one of: an Authentication and Key Management for Applications (AKMA) anchor key identifier associated with the wireless device; an authentication method indicator indicating an authentication method; or a set of parameters associated with the authentication method.Type: ApplicationFiled: April 29, 2024Publication date: November 7, 2024Applicant: ZTE CorporationInventors: Zhen XING, Shilin You, Jigang Wang, Yuze Liu, Jin Peng, Zhaoji Lin
-
Publication number: 20240334186Abstract: Method, device and computer program product for wireless communication are provided. A method includes: receiving, by a proximity service anchor function from a remote wireless communication terminal, a request for a key used for a communication between the remote wireless communication terminal and a relay wireless communication terminal, and the request comprising at least one of: a Proximity Remote User Key, PRUK, identifier, an identifier of the remote wireless communication terminal, a relay service code, or a first nonce; and transmitting, by the proximity service anchor function to the remote wireless communication terminal, a request for the identity of the remote wireless communication terminal or a reject message in response to the proximity service anchor node not being able to find a PRUK stored locally corresponding to the PURK identifier or the proximity service anchor node determining to authenticate the remote wireless communication terminal.Type: ApplicationFiled: April 3, 2024Publication date: October 3, 2024Applicant: ZTE CORPORATIONInventors: Yuze LIU, Shilin YOU, Zhen XING, Zhaoji LIN, Jigang WANG
-
Publication number: 20240323683Abstract: Disclosed are techniques for refreshing and updating user keys and user key lifetimes in a wireless communication system. In one aspect, a method of wireless communication is disclosed. The method includes generating, by an authentication node, a remote user key and a remote user key lifetime. The method further includes sending, from the authentication node to an anchor function node, the remote user key and the remote user key lifetime, and sending the remote user key lifetime to a remote wireless device via a relay wireless device.Type: ApplicationFiled: May 31, 2024Publication date: September 26, 2024Inventors: Yuze LIU, Shilin YOU, Zhen XING, Zhaoji LIN, Jigang WANG
-
Publication number: 20230413047Abstract: Techniques are described to perform network relay security. An example wireless communication method includes receiving, by a network device, a request message that includes an identifier associated with a first communication device; determining, by the network device in response to the receiving, that the first communication device is authenticated based on a local policy of the network device; and sending, by the network device in response to the determining, a message to a second communication device to relay to the first communication device, where the message indicates that the identifier is rejected by the network device for communication with the first communication device, or where the message indicates that the first communication device is triggered to send another identifier.Type: ApplicationFiled: August 30, 2023Publication date: December 21, 2023Inventors: Yuze LIU, Shilin YOU, Zhen XING, Zhaoji LIN, Jigang WANG
-
Publication number: 20230336535Abstract: This disclosure generally relates to UE authentication and authorization with an edge data network in communication networks. Such authentication and authorization may be based on the generation and application of an edge computing key for a UE. Such edge computing key may be used for bi-directional authentication and may be dynamically updated during various stages of the authentication and authorization process. The authentication and authorization supports a UE connected to multiple AMFs belonging to different PLMNs.Type: ApplicationFiled: June 16, 2023Publication date: October 19, 2023Applicant: ZTE CorporationInventors: Shilin YOU, Jiyan Cai, Qing Wang, Jigang Wang, Yuze Liu, Jin Peng, Zhen Xing, Zhaoji Lin
-
Publication number: 20230232240Abstract: Provided are a subscription data update method and apparatus, a node, and a storage medium, where the method includes: in a case where a first network function node determines that authentication and key management for applications (AKMA) subscription data of a user is updated, determining, by the first network function node, a second network function node storing an AKMA context of the user; sending, by the first network function node, a subscription data management notification message to the second network function node; and receiving, by the first network function node, a subscription data management notification response message sent by the second network function node; where the subscription data management notification response message is sent after the second network function node deletes the AKMA context of the user according to the subscription data management notification message.Type: ApplicationFiled: November 16, 2022Publication date: July 20, 2023Applicant: ZTE CorporationInventors: Shilin YOU, Jiyan CAI, Zhaoji LIN, Jin PENG, Yuze LIU, Zhen XING, Jigang WANG, Min LIU
-
Publication number: 20230103792Abstract: A soda ash and sodium bicarbonate production method is provided, in which solution mining, pretreatment, stripping, concentration, sodium carbonate decahydrate crystallization, separation, dissolution, sodium carbonate monohydrate crystallization, separation and drying are performed to obtain dense soda ash. A dissolved sodium carbonate decahydrate solution or a concentrated brine 3 is subjected to crystallization, separation and drying to produce sodium bicarbonate. A discharge liquid 1 generated in the sodium carbonate decahydrate crystallization and separation is subjected to causticization and evaporation to recycle sodium carbonate. Causticized sludge generated in causticization is calcined and then recycled for causticization. The process provided herein maximizes the resource utilization.Type: ApplicationFiled: December 5, 2022Publication date: April 6, 2023Inventors: Jigang WANG, Lixiang LU, Qingtian FENG
-
Publication number: 20220368684Abstract: This disclosure generally relates to encrypted communication between terminal devices and service applications via a communication network. Such encrypted communication may be based on various hierarchical levels of encryption keys that are generated and managed by the communication network. Such encrypted communication and key management may be provided by the communication network to the terminal devices as a service that can be subscribed to. The various levels of encryption keys may be managed to improve flexibility of the communication network and to reduce potential security breaches.Type: ApplicationFiled: July 6, 2022Publication date: November 17, 2022Applicant: ZTE CorporationInventors: Shilin YOU, Jiyan CAI, Jin PENG, Wantao YU, Yuze LIU, Zhaoji LIN, Yuxin MAO, Jigang WANG
-
Publication number: 20220295272Abstract: The present document relates to methods, systems, and devices related to digital communication, and more specifically, to techniques related to AUSF selection in the case of dual registrations in AKMA. One example data communication method includes receiving, by a first network function, a request to retrieve an identifier of a second network function that authenticated a terminal from a third function, the request including a parameter. The method also includes transmitting, by the first network function, a response to the third network function that includes the identifier of the second network function that authenticated the terminal that is identified based on the parameter.Type: ApplicationFiled: May 26, 2022Publication date: September 15, 2022Inventors: Jin PENG, Shilin YOU, Yuze LIU, Wantao YU, Zhaoji LIN, Yuxin MAO, Jigang WANG, Chen LU
-
Patent number: 11070559Abstract: In accordance with an embodiment, described herein is a system and method for supporting object-based security features for use with messaging services in an application server environment. Credentials can be associated with a JNDI initial context or a JMS connection instead of a thread. For JNDI operations, a lookup call from the initial context can use a security subject in an initial context regardless of a security subject attached to a current thread of the lookup call. For JMS operations, the object-based security model can be enabled on a JMS connection factory, which is used to create a JMS connection associated a security subject based on credentials supplied to create the JMS connection. The JMS connection performs a plurality of JMS operations on different threads using the security subject. The object-based security model is automatically enabled for JMS connection operations once the JMS is accessed using an OBS-enabled JNDI context.Type: GrantFiled: July 5, 2018Date of Patent: July 20, 2021Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Dongbo Xiao, Lily He, Thomas Barnes, Simon Meng, Jigang Wang
-
Patent number: 10474998Abstract: In accordance with an embodiment, a system and method provides a messaging service in a multitenant application server environment. Deployable resources are usable within the multitenant application server environment and groupings of resources are defined by resource group templates within a domain. One or more partitions are provided, with each partition providing an administrative and runtime subdivision of the domain that can be associated with a tenant. Java message service (JMS) resources are defined within a resource group template or a resource group, and instantiated within a partition from the one or more partitions to enable messaging for applications deployed within the partition and between the one or more partition.Type: GrantFiled: September 25, 2015Date of Patent: November 12, 2019Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Dongbo Xiao, Thomas Barnes, Lily He, Amy Kang, Rich T. Lee, David Zhao, Padmanabha Bhat, Jigang Wang, Simon Meng, Sal Gambino
-
Publication number: 20190068606Abstract: In accordance with an embodiment, described herein is a system and method for supporting object-based security features for use with messaging services in an application server environment. Credentials can be associated with a JNDI initial context or a JMS connection instead of a thread. For JNDI operations, a lookup call from the initial context can use a security subject in an initial context regardless of a security subject attached to a current thread of the lookup call. For JMS operations, the object-based security model can be enabled on a JMS connection factory, which is used to create a JMS connection associated a security subject based on credentials supplied to create the JMS connection. The JMS connection performs a plurality of JMS operations on different threads using the security subject. The object-based security model is automatically enabled for JMS connection operations once the JMS is accessed using an OBS-enabled JNDI context.Type: ApplicationFiled: July 5, 2018Publication date: February 28, 2019Inventors: DONGBO XIAO, LILY HE, THOMAS BARNES, SIMON MENG, JIGANG WANG
-
Patent number: 10103946Abstract: In accordance with an embodiment, a system and method provides a messaging service in a multitenant application server environment. Deployable resources are usable within the multitenant application server environment and groupings of resources are defined by resource group templates within a domain. One or more partitions are provided, with each partition providing an administrative and runtime subdivision of the domain that can be associated with a tenant. Java message service (JMS) resources are defined within a resource group template or a resource group, and instantiated within a partition to enable messaging for applications deployed within the partition and between partitions. Integrating JMS in a multitenant application server environment further includes a foreign JMS server feature which maps remotely hosted JMS connection factories and JMS destinations into a local partition's JNDI, so that bridges and applications in turn gain access to these resources by looking them up in this name-space.Type: GrantFiled: September 25, 2015Date of Patent: October 16, 2018Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Dongbo Xiao, Thomas Barnes, David Zhao, Jigang Wang, Lily He, Padmanabha Bhat
-
Publication number: 20180292256Abstract: A portable intrinsically-safe device for acquiring vibration signal comprises a vibration signal acquisition unit, a signal processing unit, a signal storage unit and an intrinsically-safe power source, wherein the vibration signal acquisition unit is connected to the signal storage unit through the signal processing unit; the intrinsically-safe power source supplies power for all the units; the signal processing unit and the signal storage unit are integrally packaged in an intrinsically safe manner. The device solves the vibration signal acquisition from a large portable electromechanical equipment, providing a powerful data information for equipment status monitoring and failure analysis. Particularly, intrinsically safe design satisfies the test requirements when the portable equipment is under a complex and harsh environment of a coal mine well. The device is easy to mount, low in power consumption, easy to control, flexible to use and wide in range of application.Type: ApplicationFiled: June 11, 2018Publication date: October 11, 2018Inventors: Liang WANG, Jie GAO, Lirong WAN, Guangyu ZHOU, Yuanjun WANG, Yi LIU, Shilong MA, Long GAO, Yalin WANG, Jigang WANG, Hang REN
-
Patent number: 9710383Abstract: Described are techniques for cache management that may include determining whether to flush dirty cached data included in a flash disk cache. Caching layer may include the flash disk cache as a secondary cache and another cache as a primary cache. Responsive to determining to flush dirty cache data from the flash disk cache, first processing may be performed that includes flushing dirty cached pages from the flash disk cache to one or more physical storage devices. The dirty cached pages may include data from a plurality of logical addresses of a first device. The logical address may be sorted and included in a sorted list. Flushing may include writing the plurality of dirty cached pages in an ordering in accordance with the sorted list.Type: GrantFiled: September 29, 2015Date of Patent: July 18, 2017Assignee: EMC IP Holding Company LLCInventors: Xinlei Xu, Liam Xiongcheng Li, Jian Gao, Vamsi Vankamamidi, Jigang Wang
-
Patent number: 9684221Abstract: Provided are systems and methods to generate single-cycle THz pulses from a few tens of nanometers thin layer of split ring resonators (SRRs) via optical rectification of femtosecond laser pulses. The emitted THz radiation, with a spectrum ranging from about 0.1 to 4 THz, arises exclusively from pumping the magnetic-dipole resonance of SRRs around 200 THz. This resonant enhancement, together with pump polarization dependence and power scaling of the THz emission, underpins the nonlinearity from optically induced circulating currents in SRRs, with a huge effective nonlinear susceptibility of 0.8×10?16 m2/V that far exceeds surface nonlinearities of both thin films and bulk organic/inorganic crystals and sheet nonlinearities of non-centrosymmetric materials such as ZnTe.Type: GrantFiled: January 6, 2016Date of Patent: June 20, 2017Assignees: Iowa State University Research Foundation, Inc.Inventors: Liang Luo, Jigang Wang, Thomas Koschny, Martin Wegener, Costas M. Soukoulis
-
Patent number: D1065094Type: GrantFiled: November 8, 2024Date of Patent: March 4, 2025Assignee: SUNKEAN Cable Co., Ltd.Inventor: Jigang Wang