Patents by Inventor Lu Gan

Lu Gan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250132928
    Abstract: A method for security implementation is provided. In the method, a first committee node receives first request information for requesting an authorization certificate for a first issuing node; and the first committee node generates a first digital signature jointly with at least one second committee node. The first digital signature is used to generate the authorization certificate for the first issuing node; and the authorization certificate is used to prove that the first issuing node has a first permission, which refers to a permission to issue certificates for a plurality of user nodes managed by the first issuing node. Provided is also a method of security implementation performed by a proxy server, and an apparatus of security implementation applied to a proxy server.
    Type: Application
    Filed: December 19, 2024
    Publication date: April 24, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU, Cong SHI
  • Publication number: 20250132926
    Abstract: A security implementation method, includes: receiving, by an issuing node, first request information sent by a first user node, the first request information being used to request a first credential, where the first credential is used to verify an identity of the first user node; and generating, by the issuing node, the first credential in response to the first request information in a case where the issuing node has a first authority, where the first authority refers to an authority capable of generating a credential, and the first authority is jointly granted to the issuing node by multiple committee nodes.
    Type: Application
    Filed: December 24, 2024
    Publication date: April 24, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU, Cong SHI
  • Patent number: 12284521
    Abstract: An Internet of Things (IoT) device authorization method includes an IoT device that wirelessly communicates with a first electronic device and a second electronic device. The IoT device includes a processor, a memory, a first antenna, and a second antenna. A transmit distance of the second antenna is less than a transmit distance of the first antenna. When instructions stored in the memory are executed by the processor, the IoT device is configured to receive a first message indicating to add a shared control device for the IoT device; send, through the second antenna, a second message including device information of the IoT device; receive, in response to the second message, a third message including device information of the second electronic device; and send, through the first antenna, a fourth message including the device information of the second electronic device to the first electronic device.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: April 22, 2025
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Lu Gan
  • Publication number: 20250097065
    Abstract: This application can be applicable to the field of the internet of things, and relates to a device registration method, a hub device, and an apparatus. In an example device registration method provided in this application, a hub device may register a target device with the hub device with assistance of first user equipment, and the hub device may register the hub device with a server with assistance of second user equipment. The hub device may register a registered device (which may include the target device that is registered with the hub device) with the server after the hub device registers the hub device with the server.
    Type: Application
    Filed: November 15, 2022
    Publication date: March 20, 2025
    Inventors: Dehai WANG, Lu GAN
  • Publication number: 20250068798
    Abstract: The present disclosure belongs to the field of geophysical exploration, and discloses a method, a system, a medium, a device and a terminal for predicting the probing depth of transient electromagnetic. Based on the existing published resistivity model database, the transient electromagnetic field in layered medium is calculated, and the probing depth is calculated based on Jacobian matrix to establish a training data set. The simulated induced electromotive force is used as the input of the neural network, and the calculated probing depth is used as the output of the network. A rapid mapping between observation data and probing depth is established by using residual neural network.
    Type: Application
    Filed: October 24, 2023
    Publication date: February 27, 2025
    Inventors: Rongjiang Tang, Lu Gan, Fusheng Li, Fengli Shen
  • Publication number: 20250067897
    Abstract: Provided herein is a tunnel electromagnetic joint scanning detection method and a system thereof. It introduces a new tunnel electromagnetic detection system called TEJS, realizes three-dimensional joint inversion of multi-component, time domain and frequency domain signals, and forms tunnel joint scanning imaging. This method adopts the mode of surface transmission, underground reception, multi-source transmission and multi-component reception. Based on an observation system, a large number of stochastic models are constructed and numerically simulated, and a large number of training data sets are constructed by using the simulated data to complete the training of UNet model. This model can realize real-time and fast imaging of the position of the low-resistance anomalous body in three-dimensional space. An algorithm forms a dual checking mechanism through surface imaging and underground imaging, which constrains the three-dimensional spatial position of anomalous body together to prevent misjudgment.
    Type: Application
    Filed: October 2, 2023
    Publication date: February 27, 2025
    Applicant: Yangtze Delta Region Institute (Huzhou), University of Electronic Science and Technology of China
    Inventors: Lu GAN, Rongjiang TANG
  • Publication number: 20250055685
    Abstract: Embodiments of this application provide a security implementation method and apparatus, a device, and a network element. The method includes: receiving, by a first network element, first information, where the first information includes a device authentication code DAC and/or a service authentication code SAC; and the DAC is used to authenticate an association relationship between a first device and at least one second device, and the SAC is used to authenticate whether the first device and/or the at least one second device support/supports a service type indicated by service identifier information, and/or whether the first device and/or the at least one second device support/supports a data type indicated by data identifier information.
    Type: Application
    Filed: September 24, 2024
    Publication date: February 13, 2025
    Applicant: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU
  • Publication number: 20250037363
    Abstract: The present disclosure discloses a three-dimensional inversion method of airborne transient electromagnetics based on deep learning. The method of the present disclosure proposes two strategies that focus on training datasets, to improve the performance of deep learning models, including divide and conquer strategy and random models generating. Through a large of reasonable structural models, appropriate network setups, a more generalized result can be obtained through our proposed U-Net framework, which has been demonstrated to be effective on both synthetic and field data. This scheme can realize the rapid prospecting of three-dimensional resistivity structure in large-area target region, and solve the problem of low efficiency of traditional three-dimensional inversion calculation of ATEM and poor migration ability of three-dimensional inversion based on deep learning developed by predecessors.
    Type: Application
    Filed: November 1, 2023
    Publication date: January 30, 2025
    Applicant: Yangtze Delta Region Institute (Huzhou), University of Electronic Science and Technology of China
    Inventors: Lu Gan, Rongjiang Tang
  • Patent number: 12205061
    Abstract: A method for developing or improving a process for producing a product from a material comprising steps of acquiring the composition for at least two slurries as raw material data (17) for the CMP based manufacturing process and its relevant parameters (2) by using a Data Collecting computer (9); physically performing specific method steps of a CMP process; measuring relevant parameters of the used slurries and the physically performed CMP process to determine the CMP process performance by using the Data Collecting computer (9); analyzing the measured data about the relevant parameters with a specific software performed on an Analyzing computer (11) by creating for the software and applying with it a predictive model using Machine Learning to understand the intercorrelation of the different parameters and using the results to improve the CMP process performance and the resulting product quality of the CMP based manufacturing process.
    Type: Grant
    Filed: May 18, 2022
    Date of Patent: January 21, 2025
    Assignee: Versum Materials US, LLC
    Inventors: Cesar Clavero, Vid Gopal, Ryan Clarke, Esmeralda Yitamben, Hieu Pham, Anupama Mallikarjunan, Rung-Je Yang, Shirley Lin, Hongjun Zhou, Joseph Rose, Krishna Murella, Lu Gan
  • Publication number: 20250016006
    Abstract: A terminal device includes a processor and a memory. The memory is configured to store a computer program, the processor is configured to invoke and execute the computer program stored in the memory, to cause the terminal device to perform: acquiring an authorization credential of a first network element, where the authorization credential is used by the terminal device to verify whether a transmission of sensing data is authorized, and the authorization credential comprises a first digital signature; and authorizing the transmission of the sensing data, in a case where the authorization credential is verified successfully based on the first digital signature.
    Type: Application
    Filed: September 20, 2024
    Publication date: January 9, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU
  • Publication number: 20250016005
    Abstract: The method for implementing security, applicable to a first device, includes: acquiring an authorization certification of a first network element, wherein the authorization certification is used to verify whether the first network element is authorized to receive data, the data being originated from at least one second device associated with the first device; and the authorization certification comprises a first digital signature; and determining that the first network element is authorized to receive the data from the at least one second device based on a successful verification on the authorization certification based on the first digital signature.
    Type: Application
    Filed: September 24, 2024
    Publication date: January 9, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU
  • Publication number: 20240414528
    Abstract: This application relates to a key generation method, an information check method, a device, a computer-readable storage medium, a computer program product, and a computer program. The method includes: transmitting, by a first device, a first wireless signal, and receiving a first reflected signal, where the first reflected signal is transmitted by a second device based on the first wireless signal; and generating, by the first device, a first key based on received strength of the first reflected signal.
    Type: Application
    Filed: August 19, 2024
    Publication date: December 12, 2024
    Inventors: Huiming WANG, Lu GAN, Xuan WEI, Cong SHI, Weijie XU
  • Publication number: 20240411889
    Abstract: Provided is a method for implementing security, applicable to a terminal device. The method includes: receiving first request information, wherein the first request information is configured to request an authorization from the terminal device for transmission of sensing data, and the first request information comprises an authorization certification for a first network element; and authorizing the transmission of the sensing data in response to a successful verification on the authorization certification.
    Type: Application
    Filed: August 23, 2024
    Publication date: December 12, 2024
    Inventor: Lu GAN
  • Patent number: 12155755
    Abstract: A key negotiation method and an electronic device are provided, and relate to the field of communications technologies. Specifically, the method includes: An IoT control device multicasts, in a first local area network, a discovery message that carries a first public key, and sends a second ciphertext to a first IoT device after receiving a first ciphertext and a second public key. After receiving a third ciphertext from the first IoT device, the IoT control device decrypts the third ciphertext based on a first session key, to obtain a second signature and second session information; verifies the second signature based on a long-term public key of the first IoT device; and performs encrypted communication with the first IoT device based on the first session key after the second signature is successfully verified.
    Type: Grant
    Filed: November 26, 2020
    Date of Patent: November 26, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Lu Gan, Jianhao Huang, Xiaoshuang Ma, Chong Zhou
  • Publication number: 20240333700
    Abstract: Provided are a method and an apparatus for establishing a transport layer security protocol. The method includes: receiving, by an edge configuration server ECS, first negotiation request information from an edge enabler client EEC, where the first negotiation request information is used to indicate that the EEC supports a first authentication mode; and in a case that the ECS supports the first authentication mode, sending, by the ECS, first negotiation response information to the EEC, where the first negotiation response information is used to indicate that the ECS supports the first authentication mode.
    Type: Application
    Filed: June 12, 2024
    Publication date: October 3, 2024
    Applicant: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventors: Lihui XIONG, Lu GAN, Jin CAO, Chao SHANG, Xiongpeng REN, Ruhui MA, Hui LI
  • Publication number: 20240294623
    Abstract: The present disclosure provides TGF? inhibitor therapy for treating immunosuppressive conditions, cancer, and fibrosis, either as a monotherapy or combination/adjunct therapy. Selection of suitable therapy and patients who are likely to benefit from such therapy are also disclosed, as well as methods of treating cancer and fibrosis and methods of predicting and monitoring therapeutic response. Related compositions, methods and therapeutic use are also disclosed.
    Type: Application
    Filed: June 3, 2022
    Publication date: September 5, 2024
    Inventors: Lu GAN, Thomas SCHURPF, George CORICOR, Justin William JACKSON, Si Tuen LEE-HOEFLICH, Christopher BRUECKNER, Constance MARTIN, Ryan FAUCETTE
  • Patent number: 12010105
    Abstract: A first device and a home hub have a same TEE platform, and a second device and the home hub have different TEE platforms. A control method includes the home hub receiving an identity credential of the second device and public key information of the first device from the second device. The home hub controls an IoT device based on the identity credential of the second device. The home hub receives private key information that is of the first device and that is from the first device. The home hub forms an identity credential of the first device based on the public key information of the first device and the private key information of the first device to control the IoT device.
    Type: Grant
    Filed: March 2, 2022
    Date of Patent: June 11, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Lu Gan, Xiaoshuang Ma, Jianhao Huang, Chao He
  • Patent number: 11956361
    Abstract: A network function service invocation method includes sending, by a first network function network element, a first request message to an authorization network element, wherein the first request message is used to request permission to invoke a first network function service provided by a second network function network element, performing, by the authorization network element, identity authentication on the first network function network element, generating, by the authorization network element, a token when determining that the identity authentication succeeds, wherein the token is used to indicate that the first network function network element has the permission to invoke the first network function service of the second network function network element, and sending, by the authorization network element, a token to the first network function network element.
    Type: Grant
    Filed: December 2, 2021
    Date of Patent: April 9, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Shuaishuai Tan, Lu Gan, Bo Zhang, Rong Wu
  • Patent number: 11924629
    Abstract: An anchor key generation method, device, and system, where the method includes generating, by a unified data management network element (UDM), an intermediate key based on a cipher key (CK), an integrity key (IK), and indication information regarding an operator; sending, by the UDM, the intermediate key to an authentication server function (AUSF); receiving, by the AUSF, the intermediate key; generating, by the AUSF, an anchor key based on the intermediate key; sending, by the AUSF, the anchor key to a security anchor function (SEAF); and generating, by the SEAF, a key (Kamf) based on the anchor key, where the Kamf is used to derive a 3rd Generation Partnership Project (3GPP) key.
    Type: Grant
    Filed: April 30, 2021
    Date of Patent: March 5, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Rong Wu, Bo Zhang, Lu Gan
  • Patent number: D1025176
    Type: Grant
    Filed: January 25, 2022
    Date of Patent: April 30, 2024
    Assignee: REMO TECH Co., Ltd.
    Inventors: Lu Gan, Zhiqiang Liu, Ye Zhang