Patents by Inventor Lijia Zhang

Lijia Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140105383
    Abstract: Disclosed is a method for negotiating machine type communication (MTC) device group algorithms, including: selecting a negotiated group encryption algorithm and a negotiated group integrity algorithm from group encryption algorithms and group integrity algorithms supported by an MTC device; sending a security mode command message or a radio resource control (RRC) connection reconfiguration message to the MTC device, wherein the security mode command message or the RRC connection reconfiguration message carries the negotiated group encryption algorithm and the negotiated group integrity algorithm. The method disclosed in this invention enables the MTC devices to realize the encryption and the integrity protection of communication contents when performing group communication.
    Type: Application
    Filed: December 17, 2013
    Publication date: April 17, 2014
    Applicant: Huawei Technologies Co., Ltd.
    Inventors: Lijia ZHANG, Yixian XU
  • Publication number: 20140023101
    Abstract: A single-cavity dual-electrode discharge cavity and an excimer laser including such a discharge cavity are disclosed. The discharge cavity may comprise a cavity body and two sets of main discharge electrodes. The cavity body may comprise a left chamber and a right chamber arranged to form a symmetric dual-chamber cavity. The left and right chambers can interface and communicate with each other at a plane of symmetry of the entire discharge cavity. The two sets of main discharge electrodes can be disposed in the left and right chambers on the upper side, respectively. According to the present disclosure, the single-cavity configuration can be used to achieve functions of dual-cavity configurations, such as MOPA, MOPO, and MOPRA. Thus, it is possible to reduce system complexities and also ensure synchronization of discharging in the discharge cavity.
    Type: Application
    Filed: September 27, 2013
    Publication date: January 23, 2014
    Applicant: Academy of Opto-Electronics, Chinese Academy of Sciences
    Inventors: Yu Wang, Yi Zhou, Jinbin Ding, Bin Liu, Lijia Zhang, Jiangshan Zhao, Pengfei Sha
  • Publication number: 20130310006
    Abstract: A method and a device for key generation are disclosed in embodiments of the present invention. The method for key generation is applied to a UMTS-LTE resource convergence scenario that has a base station as an anchor point, and includes: deriving, according to a root key and a count value of an LTE system, or according to a random number and an LTE system root key, a UMTS integrity key and cipher key, and sending the UMTS integrity key and cipher key to a UMTS control node. The embodiments of the present invention enable the derivation of the UMTS integrity key and cipher key in a UMTS-LTE resource convergence scenario that has a base station as an anchor point, enable a user equipment to communicate securely through a UMTS, and further improve security of data transmitted in the UMTS.
    Type: Application
    Filed: July 29, 2013
    Publication date: November 21, 2013
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Xinyi CHEN, Dongmei Zhang, Lijia Zhang, Xiaohan Liu
  • Publication number: 20130305386
    Abstract: The present invention relates to communication technologies and discloses a method and an apparatus for protecting security of data, so as to solve the problem of the prior art in which the security of data transmission between a communication terminal which has a characteristic of small data transmission and the network cannot be guaranteed. Information relevant to security context is stored if a communication terminal has a characteristic of small data transmission; current security context is obtained according to the information relevant to security context; and security protection of communication data is performed by employing the current security context. The embodiments of the present invention may be applied to a communication system having a characteristic of small data transmission, such as an MTC and the like.
    Type: Application
    Filed: July 16, 2013
    Publication date: November 14, 2013
    Inventors: Lijia ZHANG, Yixian XU, Jing CHEN
  • Publication number: 20130236016
    Abstract: A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are defined over the Un interface: signaling radio bearers (SRBs) for carrying control plane signaling data, signaling-data radio bearers (s-DRBs) for carrying control plane signaling date; and data-data radio bearers (d-DRBs) for carrying user plane data. An integrity protection algorithm and an encryption algorithm are negotiated for control plane signaling data on an SRB, control plane signaling data carried on an s-DRB, and user plane data carried on a d-DRB. With the respective integrity protection algorithm and encryption algorithm, the data over the Un interface can be protected respectively. Therefore, the security protection on the Un interface is more comprehensive, and the security protection requirements of data borne over different RBs can be met.
    Type: Application
    Filed: April 26, 2013
    Publication date: September 12, 2013
    Applicant: Huawei Technologies Co., Ltd.
    Inventors: Dongmei ZHANG, Jing CHEN, Lijia ZHANG, Zhuo CHEN
  • Publication number: 20120331298
    Abstract: Embodiments of the present invention provide a security authentication method, apparatus, and system, where the method includes: verifying a feature identifier for identifying terminal equipment, where the terminal equipment is machine-to-machine equipment; and obtaining a key corresponding to the feature identifier, so as to perform secure communication with the terminal equipment according to the key. In the embodiments of the present invention, after terminal equipment, a mobility management entity, and a home subscriber system successfully perform authentication and key agreement, it is verified whether a feature identifier of the terminal is legal, and when the feature identifier of the terminal is a legal identifier, a key is obtained according to the feature identifier, so that the mobility management entity and the terminal equipment perform secure communication according to the key, thereby implementing secure communication between M2M equipment and a network side.
    Type: Application
    Filed: September 7, 2012
    Publication date: December 27, 2012
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Yixian Xu, Xiaohan Liu, Yingxin Huang, Lijia Zhang
  • Publication number: 20120297193
    Abstract: Embodiments of the present invention provide an MTC device authentication method, an MTC gateway, and a related device, which are used to solve a problem that direct interaction between a large quantity of MTC devices and a network side brings a heavy load to a network when the MTC devices are authenticated in the prior art. The method includes: performing, by an MTC gateway, mutual authentication with a core network node; performing, by the MTC gateway, mutual authentication with an MTC device; reporting, by the MTC gateway, a result of the mutual authentication with the MTC device to the core network node; and providing, by the MTC gateway, a non access stratum link protection key K between the MTC device and the core network node according to a key K1 or a key K2.
    Type: Application
    Filed: July 27, 2012
    Publication date: November 22, 2012
    Inventors: Xiaohan LIU, Yixian Xu, Yingxin Huang, Lijia Zhang