Patents by Inventor Jin Meng

Jin Meng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11970755
    Abstract: The present disclosure discloses an application of cuprous sulfide in a recovery of Au (III) from aqueous solutions, which relates to the fields of hydrometallurgy and precious metal recovery. The method of the present disclosure uses cuprous sulfide nanoparticles to recover Au (III) from aqueous solution, and undergoes gold adsorption under mechanical stirring. The method described in the present disclosure can efficiently recover Au (III) from aqueous solutions, has good recovery effects on Au (III) from acidic waste liquid, and has the advantages of energy conservation, environmental protection, and low cost.
    Type: Grant
    Filed: October 16, 2023
    Date of Patent: April 30, 2024
    Assignee: Kunming University of Science and Technology
    Inventors: Yunlong Chen, Jin Wu, Futing Zi, Xianzhi Hu, Fengru Meng, Yongmao Zeng, Zhongying Wang, Yihuai Yang
  • Publication number: 20240132996
    Abstract: The present disclosure discloses an application of cuprous sulfide in a recovery of Au (III) from aqueous solutions, which relates to the fields of hydrometallurgy and precious metal recovery. The method of the present disclosure uses cuprous sulfide nanoparticles to recover Au (III) from aquesous solution, and undergoes gold adsorption under mechanical stirring. The method described in the present disclosure can efficiently recover Au (III) from aqueous solutions, has good recovery effects on Au (III) from acidic waste liquid, and has the advantages of energy conservation, environmental protection, and low cost.
    Type: Application
    Filed: October 15, 2023
    Publication date: April 25, 2024
    Inventors: Yunlong Chen, Jin Wu, Futing Zi, Xianzhi Hu, Fengru Meng, Yongmao Zeng, Zhongying Wang, Yihuai Yang
  • Publication number: 20240106630
    Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.
    Type: Application
    Filed: December 8, 2023
    Publication date: March 28, 2024
    Inventors: Jin-Meng HO, Eric PEETERS
  • Patent number: 11909863
    Abstract: An electronic device, in disclosed embodiments, includes an antenna, transceiver circuitry coupled to the antenna, a memory configured to store a first operation key and instructions, and a processor coupled to the transceiver and to the memory. The processor is configured to execute the instructions stored in the memory to cause the electronic device to, in response to receiving a first transmission containing an encrypted version of a second operation key that is encrypted by the first operation key, decrypt the encrypted version of the second operation key using the first operation key to recover the second operation key, store the second operation key in the memory, transmitting, by a transmitter of the electronic device, a second transmission that contains the first operation key and a command.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: February 20, 2024
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Eric Peeters, Jin-Meng Ho
  • Patent number: 11876896
    Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.
    Type: Grant
    Filed: February 28, 2023
    Date of Patent: January 16, 2024
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Jin-Meng Ho, Eric Peeters
  • Patent number: 11822643
    Abstract: Method, device and computer program product for providing quarantined workspaces. A virtualization application operates on a host to simulate a virtual guest. A management application operates within the virtual guest. The management application controls transmission between guest applications and locations external to the virtual guest. The management application stores encryption keys inaccessible to the host. The management application intercepts attempted transmissions from guest applications to locations outside the virtual guest. Secure data files are identified in the attempted transmissions and encrypted before leaving the virtual guest using the encryption keys. The management application also prevents any unencrypted data from being provided to non-kernel host processes that have not been previously identified as permitted host processes while allowing unencrypted data transmission from the non-kernel host processes to any of the guest application processes.
    Type: Grant
    Filed: February 3, 2021
    Date of Patent: November 21, 2023
    Assignee: BICDROID INC.
    Inventors: En-Hui Yang, Rodney M. Ruddock, Jin Meng, Xiang Yu
  • Patent number: 11693981
    Abstract: Systems and method are provided for data self-protection. The systems and methods may involve installing a sentry on a computer system, the sentry including a file system filter installed on a kernel of that computer system; providing a central sentry platform in communication with the sentry, operating the central sentry platform to send a data self-protection policy to the sentry, the data self-protection policy being encrypted so that it can only be modified by the central sentry platform; operating the file system filter to control access to encrypted data stored on the computer system, by, for each process making a file access request to the encrypted data, the file system filter receiving and handling that file access request according to the data self-protection policy; and, operating the central sentry platform to monitor the sentry and to receive information from the sentry regarding access to the encrypted data.
    Type: Grant
    Filed: September 8, 2020
    Date of Patent: July 4, 2023
    Assignee: BICDROID INC.
    Inventors: Xiang Yu, En-hui Yang, Jin Meng
  • Publication number: 20230208620
    Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.
    Type: Application
    Filed: February 28, 2023
    Publication date: June 29, 2023
    Inventors: Jin-Meng HO, Eric PEETERS
  • Patent number: 11528142
    Abstract: The described embodiments relate to data protection methods, systems, and computer program products. A process-based encrypted data access policing system is proposed based on methods of encrypted data file management, process authentication and authorization, Trojan detection for authorized processes, encryption key generation and caching, and encrypted-file cache management. The process-based encrypted data access policing system may be implemented as a kernel level file system filter and a user-mode filter companion application, which polices the reading/writing of encrypted data in either a server system or an endpoint computer and protects data from data breaches and known or unknown attacks including ransomware and/or phishing attacks.
    Type: Grant
    Filed: October 10, 2017
    Date of Patent: December 13, 2022
    Assignee: BICDROID INC.
    Inventors: En-Hui Yang, Xiang Yu, Jin Meng
  • Publication number: 20220368542
    Abstract: An electronic key fob device, in one embodiment, includes a transmitter, a counter configured to provide a current counter value indicated by a plurality of bits, a memory configured to store an operation key, and a processor coupled to the transmitter and memory. The processor is configured to encrypt the current counter value using the operation key to produce an encrypted counter value, select a subset of the plurality of bits of the current counter value, transmit a message the includes the encrypted counter value and the subset of plurality of bits of the current counter value.
    Type: Application
    Filed: August 1, 2022
    Publication date: November 17, 2022
    Inventor: Jin-Meng HO
  • Patent number: 11405221
    Abstract: An electronic key fob device, in one embodiment, includes a transmitter, a counter configured to provide a current counter value indicated by a plurality of bits, a memory configured to store an operation key, and a processor coupled to the transmitter and memory. The processor is configured to encrypt the current counter value using the operation key to produce an encrypted counter value, select a subset of the plurality of bits of the current counter value, transmit a message the includes the encrypted counter value and the subset of plurality of bits of the current counter value.
    Type: Grant
    Filed: October 1, 2019
    Date of Patent: August 2, 2022
    Assignee: Texas Instmments Incorporated
    Inventor: Jin-Meng Ho
  • Publication number: 20220009444
    Abstract: An electronic device, in disclosed embodiments, includes an antenna, transceiver circuitry coupled to the antenna, a memory configured to store a first operation key and instructions, and a processor coupled to the transceiver and to the memory. The processor is configured to execute the instructions stored in the memory to cause the electronic device to, in response to receiving a first transmission containing an encrypted version of a second operation key that is encrypted by the first operation key, decrypt the encrypted version of the second operation key using the first operation key to recover the second operation key, store the second operation key in the memory, transmitting, by a transmitter of the electronic device, a second transmission that contains the first operation key and a command.
    Type: Application
    Filed: May 21, 2019
    Publication date: January 13, 2022
    Inventors: Eric PEETERS, Jin-Meng HO
  • Patent number: 11126754
    Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. A plurality of protected data files are stored in non-volatile memory. When a process requests access to a protected data file, the computer system can permit the requesting process to access the requested data file only if a validated application token is present that corresponds to the requesting process. An application token is generated for the associated application by: detecting initiation of a first process associated with the associated application; determining that a valid user code is available within the trusted execution environment; and generating the application token using the valid user code upon determining that the valid user code is available within the trusted execution environment.
    Type: Grant
    Filed: November 26, 2019
    Date of Patent: September 21, 2021
    Assignee: BICDROID INC.
    Inventors: Xiang Yu, Jin Meng, En-hui Yang
  • Patent number: 11093604
    Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. An access monitoring module operates within the kernel of the rich OS and a trusted application operates in the trusted OS. The access monitoring module intercepts file requests directed at the file systems of the rich OS, and forwards the file requests to the trusted application. The trusted application then evaluates whether the file request is permitted and provides the access monitoring module with a response. The access monitoring module forwards the request to the file system only if the trusted application approves the request.
    Type: Grant
    Filed: July 25, 2019
    Date of Patent: August 17, 2021
    Assignee: BicDroid Inc.
    Inventors: En-hui Yang, Jin Meng, Xiang Yu, Hongtao Zhang, Tomas Szuchewycz
  • Publication number: 20210248227
    Abstract: Method, device and computer program product for providing quarantined workspaces. A virtualization application operates on a host to simulate a virtual guest. A management application operates within the virtual guest. The management application controls transmission between guest applications and locations external to the virtual guest. The management application stores encryption keys inaccessible to the host. The management application intercepts attempted transmissions from guest applications to locations outside the virtual guest. Secure data files are identified in the attempted transmissions and encrypted before leaving the virtual guest using the encryption keys. The management application also prevents any unencrypted data from being provided to non-kernel host processes that have not been previously identified as permitted host processes while allowing unencrypted data transmission from the non-kernel host processes to any of the guest application processes.
    Type: Application
    Filed: February 3, 2021
    Publication date: August 12, 2021
    Inventors: En-Hui Yang, Rodney M. Ruddock, Jin Meng, Xiang Yu
  • Publication number: 20210114556
    Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.
    Type: Application
    Filed: December 7, 2020
    Publication date: April 22, 2021
    Inventors: Jin-Meng HO, Eric PEETERS
  • Publication number: 20210073407
    Abstract: Systems and method are provided for data self-protection. The systems and methods may involve installing a sentry on a computer system, the sentry including a file system filter installed on a kernel of that computer system; providing a central sentry platform in communication with the sentry, operating the central sentry platform to send a data self-protection policy to the sentry, the data self-protection policy being encrypted so that it can only be modified by the central sentry platform; operating the file system filter to control access to encrypted data stored on the computer system, by, for each process making a file access request to the encrypted data, the file system filter receiving and handling that file access request according to the data self-protection policy; and, operating the central sentry platform to monitor the sentry and to receive information from the sentry regarding access to the encrypted data.
    Type: Application
    Filed: September 8, 2020
    Publication date: March 11, 2021
    Applicant: BicDroid Inc.
    Inventors: Xiang Yu, En-hui Yang, Jin Meng
  • Patent number: 10857975
    Abstract: A method for pairing a key fob with a control unit is provided. The key fob executes an ID authenticated key agreement protocol with a pairing device based on a key fob identification to authenticate one another and to generate a first encryption key. The pairing device encrypts a control unit identification using the first encryption key. The key fob receives the encrypted control unit identification transmitted from the pairing device. The key fob then executes an ID authenticated key agreement protocol with the control unit based on the control unit identification to authenticate one another and to generate a second encryption key. The key fob then receives an operational key transmitted from the control unit that is encrypted with the second encryption key.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: December 8, 2020
    Assignee: Texas Instruments Incorporated
    Inventors: Jin-Meng Ho, Eric Peeters
  • Publication number: 20200175208
    Abstract: An access control system includes a processor configured to provide a trusted execution environment isolated from a rich execution environment. A rich OS operates in the rich execution environment while a trusted OS operates in the trusted execution environment. A plurality of protected data files are stored in non-volatile memory. When a process requests access to a protected data file, the computer system can permit the requesting process to access the requested data file only if a validated application token is present that corresponds to the requesting process. An application token is generated for the associated application by: detecting initiation of a first process associated with the associated application; determining that a valid user code is available within the trusted execution environment; and generating the application token using the valid user code upon determining that the valid user code is available within the trusted execution environment.
    Type: Application
    Filed: November 26, 2019
    Publication date: June 4, 2020
    Inventors: Xiang Yu, Jin Meng, En-hui Yang
  • Publication number: 20200052910
    Abstract: An electronic key fob device, in one embodiment, includes a transmitter, a counter configured to provide a current counter value indicated by a plurality of bits, a memory configured to store an operation key, and a processor coupled to the transmitter and memory. The processor is configured to encrypt the current counter value using the operation key to produce an encrypted counter value, select a subset of the plurality of bits of the current counter value, transmit a message the includes the encrypted counter value and the subset of plurality of bits of the current counter value.
    Type: Application
    Filed: October 1, 2019
    Publication date: February 13, 2020
    Inventor: Jin-Meng HO