Patents by Inventor Jin Meng
Jin Meng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11970755Abstract: The present disclosure discloses an application of cuprous sulfide in a recovery of Au (III) from aqueous solutions, which relates to the fields of hydrometallurgy and precious metal recovery. The method of the present disclosure uses cuprous sulfide nanoparticles to recover Au (III) from aqueous solution, and undergoes gold adsorption under mechanical stirring. The method described in the present disclosure can efficiently recover Au (III) from aqueous solutions, has good recovery effects on Au (III) from acidic waste liquid, and has the advantages of energy conservation, environmental protection, and low cost.Type: GrantFiled: October 16, 2023Date of Patent: April 30, 2024Assignee: Kunming University of Science and TechnologyInventors: Yunlong Chen, Jin Wu, Futing Zi, Xianzhi Hu, Fengru Meng, Yongmao Zeng, Zhongying Wang, Yihuai Yang
-
Publication number: 20240132996Abstract: The present disclosure discloses an application of cuprous sulfide in a recovery of Au (III) from aqueous solutions, which relates to the fields of hydrometallurgy and precious metal recovery. The method of the present disclosure uses cuprous sulfide nanoparticles to recover Au (III) from aquesous solution, and undergoes gold adsorption under mechanical stirring. The method described in the present disclosure can efficiently recover Au (III) from aqueous solutions, has good recovery effects on Au (III) from acidic waste liquid, and has the advantages of energy conservation, environmental protection, and low cost.Type: ApplicationFiled: October 15, 2023Publication date: April 25, 2024Inventors: Yunlong Chen, Jin Wu, Futing Zi, Xianzhi Hu, Fengru Meng, Yongmao Zeng, Zhongying Wang, Yihuai Yang
-
Publication number: 20240106630Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.Type: ApplicationFiled: December 8, 2023Publication date: March 28, 2024Inventors: Jin-Meng HO, Eric PEETERS
-
Patent number: 11909863Abstract: An electronic device, in disclosed embodiments, includes an antenna, transceiver circuitry coupled to the antenna, a memory configured to store a first operation key and instructions, and a processor coupled to the transceiver and to the memory. The processor is configured to execute the instructions stored in the memory to cause the electronic device to, in response to receiving a first transmission containing an encrypted version of a second operation key that is encrypted by the first operation key, decrypt the encrypted version of the second operation key using the first operation key to recover the second operation key, store the second operation key in the memory, transmitting, by a transmitter of the electronic device, a second transmission that contains the first operation key and a command.Type: GrantFiled: May 21, 2019Date of Patent: February 20, 2024Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Eric Peeters, Jin-Meng Ho
-
Patent number: 11876896Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.Type: GrantFiled: February 28, 2023Date of Patent: January 16, 2024Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Jin-Meng Ho, Eric Peeters
-
Patent number: 11822643Abstract: Method, device and computer program product for providing quarantined workspaces. A virtualization application operates on a host to simulate a virtual guest. A management application operates within the virtual guest. The management application controls transmission between guest applications and locations external to the virtual guest. The management application stores encryption keys inaccessible to the host. The management application intercepts attempted transmissions from guest applications to locations outside the virtual guest. Secure data files are identified in the attempted transmissions and encrypted before leaving the virtual guest using the encryption keys. The management application also prevents any unencrypted data from being provided to non-kernel host processes that have not been previously identified as permitted host processes while allowing unencrypted data transmission from the non-kernel host processes to any of the guest application processes.Type: GrantFiled: February 3, 2021Date of Patent: November 21, 2023Assignee: BICDROID INC.Inventors: En-Hui Yang, Rodney M. Ruddock, Jin Meng, Xiang Yu
-
Patent number: 11693981Abstract: Systems and method are provided for data self-protection. The systems and methods may involve installing a sentry on a computer system, the sentry including a file system filter installed on a kernel of that computer system; providing a central sentry platform in communication with the sentry, operating the central sentry platform to send a data self-protection policy to the sentry, the data self-protection policy being encrypted so that it can only be modified by the central sentry platform; operating the file system filter to control access to encrypted data stored on the computer system, by, for each process making a file access request to the encrypted data, the file system filter receiving and handling that file access request according to the data self-protection policy; and, operating the central sentry platform to monitor the sentry and to receive information from the sentry regarding access to the encrypted data.Type: GrantFiled: September 8, 2020Date of Patent: July 4, 2023Assignee: BICDROID INC.Inventors: Xiang Yu, En-hui Yang, Jin Meng
-
Publication number: 20230208620Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.Type: ApplicationFiled: February 28, 2023Publication date: June 29, 2023Inventors: Jin-Meng HO, Eric PEETERS
-
Patent number: 11528142Abstract: The described embodiments relate to data protection methods, systems, and computer program products. A process-based encrypted data access policing system is proposed based on methods of encrypted data file management, process authentication and authorization, Trojan detection for authorized processes, encryption key generation and caching, and encrypted-file cache management. The process-based encrypted data access policing system may be implemented as a kernel level file system filter and a user-mode filter companion application, which polices the reading/writing of encrypted data in either a server system or an endpoint computer and protects data from data breaches and known or unknown attacks including ransomware and/or phishing attacks.Type: GrantFiled: October 10, 2017Date of Patent: December 13, 2022Assignee: BICDROID INC.Inventors: En-Hui Yang, Xiang Yu, Jin Meng
-
Publication number: 20220368542Abstract: An electronic key fob device, in one embodiment, includes a transmitter, a counter configured to provide a current counter value indicated by a plurality of bits, a memory configured to store an operation key, and a processor coupled to the transmitter and memory. The processor is configured to encrypt the current counter value using the operation key to produce an encrypted counter value, select a subset of the plurality of bits of the current counter value, transmit a message the includes the encrypted counter value and the subset of plurality of bits of the current counter value.Type: ApplicationFiled: August 1, 2022Publication date: November 17, 2022Inventor: Jin-Meng HO
-
Patent number: 11405221Abstract: An electronic key fob device, in one embodiment, includes a transmitter, a counter configured to provide a current counter value indicated by a plurality of bits, a memory configured to store an operation key, and a processor coupled to the transmitter and memory. The processor is configured to encrypt the current counter value using the operation key to produce an encrypted counter value, select a subset of the plurality of bits of the current counter value, transmit a message the includes the encrypted counter value and the subset of plurality of bits of the current counter value.Type: GrantFiled: October 1, 2019Date of Patent: August 2, 2022Assignee: Texas Instmments IncorporatedInventor: Jin-Meng Ho
-
Publication number: 20220009444Abstract: An electronic device, in disclosed embodiments, includes an antenna, transceiver circuitry coupled to the antenna, a memory configured to store a first operation key and instructions, and a processor coupled to the transceiver and to the memory. The processor is configured to execute the instructions stored in the memory to cause the electronic device to, in response to receiving a first transmission containing an encrypted version of a second operation key that is encrypted by the first operation key, decrypt the encrypted version of the second operation key using the first operation key to recover the second operation key, store the second operation key in the memory, transmitting, by a transmitter of the electronic device, a second transmission that contains the first operation key and a command.Type: ApplicationFiled: May 21, 2019Publication date: January 13, 2022Inventors: Eric PEETERS, Jin-Meng HO
-
Patent number: 11126754Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. A plurality of protected data files are stored in non-volatile memory. When a process requests access to a protected data file, the computer system can permit the requesting process to access the requested data file only if a validated application token is present that corresponds to the requesting process. An application token is generated for the associated application by: detecting initiation of a first process associated with the associated application; determining that a valid user code is available within the trusted execution environment; and generating the application token using the valid user code upon determining that the valid user code is available within the trusted execution environment.Type: GrantFiled: November 26, 2019Date of Patent: September 21, 2021Assignee: BICDROID INC.Inventors: Xiang Yu, Jin Meng, En-hui Yang
-
Patent number: 11093604Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. An access monitoring module operates within the kernel of the rich OS and a trusted application operates in the trusted OS. The access monitoring module intercepts file requests directed at the file systems of the rich OS, and forwards the file requests to the trusted application. The trusted application then evaluates whether the file request is permitted and provides the access monitoring module with a response. The access monitoring module forwards the request to the file system only if the trusted application approves the request.Type: GrantFiled: July 25, 2019Date of Patent: August 17, 2021Assignee: BicDroid Inc.Inventors: En-hui Yang, Jin Meng, Xiang Yu, Hongtao Zhang, Tomas Szuchewycz
-
Publication number: 20210248227Abstract: Method, device and computer program product for providing quarantined workspaces. A virtualization application operates on a host to simulate a virtual guest. A management application operates within the virtual guest. The management application controls transmission between guest applications and locations external to the virtual guest. The management application stores encryption keys inaccessible to the host. The management application intercepts attempted transmissions from guest applications to locations outside the virtual guest. Secure data files are identified in the attempted transmissions and encrypted before leaving the virtual guest using the encryption keys. The management application also prevents any unencrypted data from being provided to non-kernel host processes that have not been previously identified as permitted host processes while allowing unencrypted data transmission from the non-kernel host processes to any of the guest application processes.Type: ApplicationFiled: February 3, 2021Publication date: August 12, 2021Inventors: En-Hui Yang, Rodney M. Ruddock, Jin Meng, Xiang Yu
-
Publication number: 20210114556Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.Type: ApplicationFiled: December 7, 2020Publication date: April 22, 2021Inventors: Jin-Meng HO, Eric PEETERS
-
Publication number: 20210073407Abstract: Systems and method are provided for data self-protection. The systems and methods may involve installing a sentry on a computer system, the sentry including a file system filter installed on a kernel of that computer system; providing a central sentry platform in communication with the sentry, operating the central sentry platform to send a data self-protection policy to the sentry, the data self-protection policy being encrypted so that it can only be modified by the central sentry platform; operating the file system filter to control access to encrypted data stored on the computer system, by, for each process making a file access request to the encrypted data, the file system filter receiving and handling that file access request according to the data self-protection policy; and, operating the central sentry platform to monitor the sentry and to receive information from the sentry regarding access to the encrypted data.Type: ApplicationFiled: September 8, 2020Publication date: March 11, 2021Applicant: BicDroid Inc.Inventors: Xiang Yu, En-hui Yang, Jin Meng
-
Patent number: 10857975Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.Type: GrantFiled: July 23, 2019Date of Patent: December 8, 2020Assignee: Texas Instruments IncorporatedInventors: Jin-Meng Ho, Eric Peeters
-
Publication number: 20200175208Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. A plurality of protected data files are stored in non-volatile memory. When a process requests access to a protected data file, the computer system can permit the requesting process to access the requested data file only if a validated application token is present that corresponds to the requesting process. An application token is generated for the associated application by: detecting initiation of a first process associated with the associated application; determining that a valid user code is available within the trusted execution environment; and generating the application token using the valid user code upon determining that the valid user code is available within the trusted execution environment.Type: ApplicationFiled: November 26, 2019Publication date: June 4, 2020Inventors: Xiang Yu, Jin Meng, En-hui Yang
-
Publication number: 20200052910Abstract: An electronic key fob device, in one embodiment, includes a transmitter, a counter configured to provide a current counter value indicated by a plurality of bits, a memory configured to store an operation key, and a processor coupled to the transmitter and memory. The processor is configured to encrypt the current counter value using the operation key to produce an encrypted counter value, select a subset of the plurality of bits of the current counter value, transmit a message the includes the encrypted counter value and the subset of plurality of bits of the current counter value.Type: ApplicationFiled: October 1, 2019Publication date: February 13, 2020Inventor: Jin-Meng HO