Patents by Inventor Lu Gan

Lu Gan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250233749
    Abstract: An authentication method includes: receiving, by a first device, a downlink signal; the downlink signal is used to carry first information, and the first information is generated by a second device based on a first key; authenticating, by a first device, the first information carried in the downlink signal that is received based on a first sequence to obtain an authentication result; the first sequence is generated based on a second key.
    Type: Application
    Filed: December 27, 2024
    Publication date: July 17, 2025
    Inventors: Lu GAN, Huiming WANG, Xuan WEI, Weijie XU, Cong SHI
  • Publication number: 20250219830
    Abstract: A verification device receives first information. The first information includes a key negotiation parameter of a first terminal, ciphertext information and zero-knowledge proof information. The ciphertext information is derived based on a public key of a supervisory device, a communication key determined by negotiation between the first terminal and a second terminal, and a first random number generated by the first terminal. The zero-knowledge proof information includes first proof information and/or second proof information, the first proof information is determined based on the ciphertext information, and the second proof information is determined based on the ciphertext information and/or the key negotiation parameter. The first proof information is used for verifying whether a private key of the supervisory device is capable of decrypting the ciphertext information, and the second proof information is used for verifying whether a key decrypted in the ciphertext information is the communication key.
    Type: Application
    Filed: March 17, 2025
    Publication date: July 3, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU, Cong SHI, Ning YANG
  • Publication number: 20250219822
    Abstract: A device control method and apparatus are provided so that when a second terminal does not have control permission for an IoT device, the IoT device cannot be hijacked by the second terminal. A first device sends first information to a second device. If the first device determines that the second device does not obtain a first control key, the first device disconnects from the second device. The first device is bound to a third device, the first information is used to notify the second device to obtain a first control key, and the first control key is used by the second device to establish a session with the first device.
    Type: Application
    Filed: March 30, 2022
    Publication date: July 3, 2025
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Lu Gan, RUI SHI, Shiran Pan
  • Publication number: 20250220433
    Abstract: A model generation method, an information processing method, devices, and a computer-readable storage medium are provided. The model generation method includes the following. A first device receives one or more k-th layer sub-models, where k is a positive integer. The first device determines a target model based on the one or more k-th layer sub-models, where the target model is used for detecting whether communication data from a mobile network is intrusion-type data. The first device sends the target model.
    Type: Application
    Filed: March 18, 2025
    Publication date: July 3, 2025
    Inventors: Lu GAN, Yulong FU, Lulu LIU, Tenglong WEI, Cong SHI
  • Publication number: 20250171658
    Abstract: The present Chemical Mechanical Planarization (CMP) polishing compositions, methods, and systems have low conductivity, high stability, and offer high removal rates of silicon dioxide for achieving a topographically corrected wafer surface with low defects. The CMP polishing compositions use a unique combination of silica particles, and an amino acid having at least one carboxyl group, preferably at least one amino group —NH2, and preferably at least one imidazole group, and a silicate.
    Type: Application
    Filed: March 8, 2023
    Publication date: May 29, 2025
    Inventors: Maitland Graham, Lu Gan, Ramon Bernasconi, Maxwell Warneke
  • Publication number: 20250132928
    Abstract: A method for security implementation is provided. In the method, a first committee node receives first request information for requesting an authorization certificate for a first issuing node; and the first committee node generates a first digital signature jointly with at least one second committee node. The first digital signature is used to generate the authorization certificate for the first issuing node; and the authorization certificate is used to prove that the first issuing node has a first permission, which refers to a permission to issue certificates for a plurality of user nodes managed by the first issuing node. Provided is also a method of security implementation performed by a proxy server, and an apparatus of security implementation applied to a proxy server.
    Type: Application
    Filed: December 19, 2024
    Publication date: April 24, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU, Cong SHI
  • Publication number: 20250132926
    Abstract: A security implementation method, includes: receiving, by an issuing node, first request information sent by a first user node, the first request information being used to request a first credential, where the first credential is used to verify an identity of the first user node; and generating, by the issuing node, the first credential in response to the first request information in a case where the issuing node has a first authority, where the first authority refers to an authority capable of generating a credential, and the first authority is jointly granted to the issuing node by multiple committee nodes.
    Type: Application
    Filed: December 24, 2024
    Publication date: April 24, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU, Cong SHI
  • Patent number: 12284521
    Abstract: An Internet of Things (IoT) device authorization method includes an IoT device that wirelessly communicates with a first electronic device and a second electronic device. The IoT device includes a processor, a memory, a first antenna, and a second antenna. A transmit distance of the second antenna is less than a transmit distance of the first antenna. When instructions stored in the memory are executed by the processor, the IoT device is configured to receive a first message indicating to add a shared control device for the IoT device; send, through the second antenna, a second message including device information of the IoT device; receive, in response to the second message, a third message including device information of the second electronic device; and send, through the first antenna, a fourth message including the device information of the second electronic device to the first electronic device.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: April 22, 2025
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Lu Gan
  • Publication number: 20250097065
    Abstract: This application can be applicable to the field of the internet of things, and relates to a device registration method, a hub device, and an apparatus. In an example device registration method provided in this application, a hub device may register a target device with the hub device with assistance of first user equipment, and the hub device may register the hub device with a server with assistance of second user equipment. The hub device may register a registered device (which may include the target device that is registered with the hub device) with the server after the hub device registers the hub device with the server.
    Type: Application
    Filed: November 15, 2022
    Publication date: March 20, 2025
    Inventors: Dehai WANG, Lu GAN
  • Publication number: 20250068798
    Abstract: The present disclosure belongs to the field of geophysical exploration, and discloses a method, a system, a medium, a device and a terminal for predicting the probing depth of transient electromagnetic. Based on the existing published resistivity model database, the transient electromagnetic field in layered medium is calculated, and the probing depth is calculated based on Jacobian matrix to establish a training data set. The simulated induced electromotive force is used as the input of the neural network, and the calculated probing depth is used as the output of the network. A rapid mapping between observation data and probing depth is established by using residual neural network.
    Type: Application
    Filed: October 24, 2023
    Publication date: February 27, 2025
    Inventors: Rongjiang Tang, Lu Gan, Fusheng Li, Fengli Shen
  • Publication number: 20250067897
    Abstract: Provided herein is a tunnel electromagnetic joint scanning detection method and a system thereof. It introduces a new tunnel electromagnetic detection system called TEJS, realizes three-dimensional joint inversion of multi-component, time domain and frequency domain signals, and forms tunnel joint scanning imaging. This method adopts the mode of surface transmission, underground reception, multi-source transmission and multi-component reception. Based on an observation system, a large number of stochastic models are constructed and numerically simulated, and a large number of training data sets are constructed by using the simulated data to complete the training of UNet model. This model can realize real-time and fast imaging of the position of the low-resistance anomalous body in three-dimensional space. An algorithm forms a dual checking mechanism through surface imaging and underground imaging, which constrains the three-dimensional spatial position of anomalous body together to prevent misjudgment.
    Type: Application
    Filed: October 2, 2023
    Publication date: February 27, 2025
    Applicant: Yangtze Delta Region Institute (Huzhou), University of Electronic Science and Technology of China
    Inventors: Lu GAN, Rongjiang TANG
  • Publication number: 20250055685
    Abstract: Embodiments of this application provide a security implementation method and apparatus, a device, and a network element. The method includes: receiving, by a first network element, first information, where the first information includes a device authentication code DAC and/or a service authentication code SAC; and the DAC is used to authenticate an association relationship between a first device and at least one second device, and the SAC is used to authenticate whether the first device and/or the at least one second device support/supports a service type indicated by service identifier information, and/or whether the first device and/or the at least one second device support/supports a data type indicated by data identifier information.
    Type: Application
    Filed: September 24, 2024
    Publication date: February 13, 2025
    Applicant: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU
  • Publication number: 20250037363
    Abstract: The present disclosure discloses a three-dimensional inversion method of airborne transient electromagnetics based on deep learning. The method of the present disclosure proposes two strategies that focus on training datasets, to improve the performance of deep learning models, including divide and conquer strategy and random models generating. Through a large of reasonable structural models, appropriate network setups, a more generalized result can be obtained through our proposed U-Net framework, which has been demonstrated to be effective on both synthetic and field data. This scheme can realize the rapid prospecting of three-dimensional resistivity structure in large-area target region, and solve the problem of low efficiency of traditional three-dimensional inversion calculation of ATEM and poor migration ability of three-dimensional inversion based on deep learning developed by predecessors.
    Type: Application
    Filed: November 1, 2023
    Publication date: January 30, 2025
    Applicant: Yangtze Delta Region Institute (Huzhou), University of Electronic Science and Technology of China
    Inventors: Lu Gan, Rongjiang Tang
  • Patent number: 12205061
    Abstract: A method for developing or improving a process for producing a product from a material comprising steps of acquiring the composition for at least two slurries as raw material data (17) for the CMP based manufacturing process and its relevant parameters (2) by using a Data Collecting computer (9); physically performing specific method steps of a CMP process; measuring relevant parameters of the used slurries and the physically performed CMP process to determine the CMP process performance by using the Data Collecting computer (9); analyzing the measured data about the relevant parameters with a specific software performed on an Analyzing computer (11) by creating for the software and applying with it a predictive model using Machine Learning to understand the intercorrelation of the different parameters and using the results to improve the CMP process performance and the resulting product quality of the CMP based manufacturing process.
    Type: Grant
    Filed: May 18, 2022
    Date of Patent: January 21, 2025
    Assignee: Versum Materials US, LLC
    Inventors: Cesar Clavero, Vid Gopal, Ryan Clarke, Esmeralda Yitamben, Hieu Pham, Anupama Mallikarjunan, Rung-Je Yang, Shirley Lin, Hongjun Zhou, Joseph Rose, Krishna Murella, Lu Gan
  • Publication number: 20250016005
    Abstract: The method for implementing security, applicable to a first device, includes: acquiring an authorization certification of a first network element, wherein the authorization certification is used to verify whether the first network element is authorized to receive data, the data being originated from at least one second device associated with the first device; and the authorization certification comprises a first digital signature; and determining that the first network element is authorized to receive the data from the at least one second device based on a successful verification on the authorization certification based on the first digital signature.
    Type: Application
    Filed: September 24, 2024
    Publication date: January 9, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU
  • Publication number: 20250016006
    Abstract: A terminal device includes a processor and a memory. The memory is configured to store a computer program, the processor is configured to invoke and execute the computer program stored in the memory, to cause the terminal device to perform: acquiring an authorization credential of a first network element, where the authorization credential is used by the terminal device to verify whether a transmission of sensing data is authorized, and the authorization credential comprises a first digital signature; and authorizing the transmission of the sensing data, in a case where the authorization credential is verified successfully based on the first digital signature.
    Type: Application
    Filed: September 20, 2024
    Publication date: January 9, 2025
    Inventors: Lu GAN, Xuefeng LIU, Jipeng ZOU
  • Publication number: 20240414528
    Abstract: This application relates to a key generation method, an information check method, a device, a computer-readable storage medium, a computer program product, and a computer program. The method includes: transmitting, by a first device, a first wireless signal, and receiving a first reflected signal, where the first reflected signal is transmitted by a second device based on the first wireless signal; and generating, by the first device, a first key based on received strength of the first reflected signal.
    Type: Application
    Filed: August 19, 2024
    Publication date: December 12, 2024
    Inventors: Huiming WANG, Lu GAN, Xuan WEI, Cong SHI, Weijie XU
  • Publication number: 20240411889
    Abstract: Provided is a method for implementing security, applicable to a terminal device. The method includes: receiving first request information, wherein the first request information is configured to request an authorization from the terminal device for transmission of sensing data, and the first request information comprises an authorization certification for a first network element; and authorizing the transmission of the sensing data in response to a successful verification on the authorization certification.
    Type: Application
    Filed: August 23, 2024
    Publication date: December 12, 2024
    Inventor: Lu GAN
  • Patent number: 12155755
    Abstract: A key negotiation method and an electronic device are provided, and relate to the field of communications technologies. Specifically, the method includes: An IoT control device multicasts, in a first local area network, a discovery message that carries a first public key, and sends a second ciphertext to a first IoT device after receiving a first ciphertext and a second public key. After receiving a third ciphertext from the first IoT device, the IoT control device decrypts the third ciphertext based on a first session key, to obtain a second signature and second session information; verifies the second signature based on a long-term public key of the first IoT device; and performs encrypted communication with the first IoT device based on the first session key after the second signature is successfully verified.
    Type: Grant
    Filed: November 26, 2020
    Date of Patent: November 26, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Lu Gan, Jianhao Huang, Xiaoshuang Ma, Chong Zhou
  • Publication number: 20240333700
    Abstract: Provided are a method and an apparatus for establishing a transport layer security protocol. The method includes: receiving, by an edge configuration server ECS, first negotiation request information from an edge enabler client EEC, where the first negotiation request information is used to indicate that the EEC supports a first authentication mode; and in a case that the ECS supports the first authentication mode, sending, by the ECS, first negotiation response information to the EEC, where the first negotiation response information is used to indicate that the ECS supports the first authentication mode.
    Type: Application
    Filed: June 12, 2024
    Publication date: October 3, 2024
    Applicant: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., LTD.
    Inventors: Lihui XIONG, Lu GAN, Jin CAO, Chao SHANG, Xiongpeng REN, Ruhui MA, Hui LI