Patents by Inventor Lu Gan

Lu Gan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220372332
    Abstract: Present invention provides Chemical Mechanical Planarization (CMP) polishing compositions for barrier layer applications, specifically for improving With-In Die Non-Uniformities (WID-NU). The CMP polishing compositions contain abrasive at a concentration equal and/or greater than (ยท) 2.0 wt. %; a planarization agent selected from the group consisting of ethylene oxide, propylene oxide, butylene oxide, polymers thereof, derivatives thereof, and combinations thereof, wherein the polymers have a molecular weight between 10 Dalton to 5 million Dalton, preferably 50 Dalton to 1 million Dalton; corrosion inhibitor; water soluble solvent; and optionally, rate boosting agent, pH adjusting agent, oxidizing agent, and chelator.
    Type: Application
    Filed: September 22, 2020
    Publication date: November 24, 2022
    Applicant: Versum Materials US, LLC
    Inventors: LU GAN, JAMES ALLEN SCHLUETER, DNYANESH CHANDRAKANT TAMBOLI
  • Patent number: 11496320
    Abstract: Embodiments of this application provide a registration method and apparatus based on a service-based architecture. In this method, a management network element determines configuration information of a function network element, where the configuration information includes a security parameter; and the management network element sends the configuration information to the function network element. The function network element receives the configuration information sent by the management network element; and the function network element sends a registration request to a control network element based on the configuration information, where the registration request includes the security parameter.
    Type: Grant
    Filed: February 27, 2020
    Date of Patent: November 8, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Bo Zhang, Lu Gan, Rong Wu, Shuaishuai Tan
  • Patent number: 11453114
    Abstract: A full-state control method for a master-slave robot system with flexible joints and time-varying delays is provided. In a teleoperation system formed by connecting a master robot and a slave robot through network, a proportional damping controller based on a position error and velocities, and a full-state feedback controller based on backstepping are designed for the master robot and the slave robot, respectively. High-dimension uniform accurate differentiators are designed to realize an exact difference to the virtual controllers. Delay-dependent stability criteria are established by constructing Lyapunov functions. Therefore, the criteria for selecting controller parameters are presented such that the global stability of the master-slave robot system with flexible joints and time-varying delays is realized.
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: September 27, 2022
    Assignee: YANSHAN UNIVERSITY
    Inventors: Yana Yang, Changchun Hua, Junpeng Li, Lu Gan, Yilu Wang
  • Publication number: 20220295271
    Abstract: An anchor key generation method, device, and system, where the method includes generating, by a unified data management network element (UDM), an intermediate key based on a cipher key (CK), an integrity key (IK), and indication information regarding an operator; sending, by the UDM, the intermediate key to an authentication server function (AUSF); receiving, by the AUSF, the intermediate key; generating, by the AUSF, an anchor key based on the intermediate key; sending, by the AUSF, the anchor key to a security anchor function (SEAF); and generating, by the SEAF, a key (Kamf) based on the anchor key, where the Kamf is used to derive a 3rd Generation Partnership Project (3GPP) key.
    Type: Application
    Filed: April 30, 2021
    Publication date: September 15, 2022
    Inventors: Rong Wu, Bo Zhang, Lu Gan
  • Patent number: 11445411
    Abstract: A source mobile edge computing (MEC) platform sends first indication information to an application server (AS) when determining that a target application is to stop processing service data of user equipment (UE), wherein the first indication information indicates that the service data of the UE is to be processed in the AS. The target application is deployed on the source MEC platform to process the service data of the UE. The AS is configured to respond to the first indication information and send a first response message to the source MEC platform, wherein the first response message indicates that the AS is ready to process the service data of the UE.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: September 13, 2022
    Assignee: HUAWEI CLOUD COMPUTING TECHNOLOGIES CO., LTD.
    Inventor: Lu Gan
  • Publication number: 20220286442
    Abstract: The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.
    Type: Application
    Filed: March 21, 2022
    Publication date: September 8, 2022
    Inventors: Lu Gan, Bo Zhang
  • Publication number: 20220278831
    Abstract: A discovery method and apparatus based on a service-based architecture, where the method includes a control network element sending a discovery response to a first functional network element, where the discovery response includes a determined security parameter and an access address or an identifier of a second functional network element. The first functional network element receives the discovery response from the control network element, and sends an access request to the second functional network element based on the address or the identifier of the second functional network element, where the access request includes the received security parameter. The second functional network element receives the access request from the first functional network element, verifies correctness of the security parameter, and determines, based on the correctness of the security parameter, whether the access request is authorized by the first functional network element.
    Type: Application
    Filed: March 16, 2022
    Publication date: September 1, 2022
    Inventors: Bo Zhang, Lu Gan, Rong Wu, Shuaishuai Tan
  • Patent number: 11431695
    Abstract: An authorization method and a network element are disclosed, to implement a third-party authorization function based on a 5G service-based network architecture. The method is: receiving, by a resource control network element, a resource usage request message sent by a terminal device; replacing a first user identifier in the resource usage request message with a second user identifier; sending an authorization request message carrying the second user identifier to an authorization server by using an NEF; receiving, by using the NEF, an authorization response message sent by the authorization server, where the authorization response message includes an authorization result that is obtained by performing authorization based on the second user identifier and the resource usage request message; and allocating a network resource to the terminal device based on the authorization result, and sending a resource allocation response message to the terminal device.
    Type: Grant
    Filed: March 10, 2020
    Date of Patent: August 30, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Shuaishuai Tan, Lu Gan, Bo Zhang, Rong Wu
  • Publication number: 20220272077
    Abstract: A first device and a home hub have a same TEE platform, and a second device and the home hub have different TEE platforms. A control method includes the home hub receiving an identity credential of the second device and public key information of the first device from the second device. The home hub controls an IoT device based on the identity credential of the second device. The home hub receives private key information that is of the first device and that is from the first device. The home hub forms an identity credential of the first device based on the public key information of the first device and the private key information of the first device to control the IoT device.
    Type: Application
    Filed: March 2, 2022
    Publication date: August 25, 2022
    Inventors: Lu Gan, Xiaoshuang Ma, Jianhao Huang, Chao He
  • Publication number: 20220242898
    Abstract: Compounds as SGLT2/DPP4 dual inhibitors, and application in preparation of medicines as the SGLT2/DPP4 dual inhibitors. A compound represented by formula (I), and an isomer or pharmaceutically acceptable salt thereof are specifically involved.
    Type: Application
    Filed: July 24, 2020
    Publication date: August 4, 2022
    Inventors: Qinghua MAO, Tao YU, Lu GAN, Yi LI, Chengde WU, Shuhui CHEN
  • Publication number: 20220216049
    Abstract: A method for forming a semiconductor structure is provided. In one form, a method includes: providing a to-be-processed base structure, where the to-be-processed base structure includes a base layer and pattern structures protruding from the base layer, and a surface of the base structure has adsorption groups; performing plasma treatment on the surface of the base structure by using a reaction gas, where the reaction gas chemically reacts with the adsorption group to cause quantities of precursor adsorption nucleation points on the surface of the base structure to tend to be same; and after the plasma treatment, forming, by using an atomic layer deposition (ALD) process, a target layer conformally covering the surface of the base structure.
    Type: Application
    Filed: December 6, 2021
    Publication date: July 7, 2022
    Applicants: Semiconductor Manufacturing International (Beijing) Corporation, Semiconductor Manufacturing International (Shanghai) Corporation
    Inventors: Lanfang SHI, Lu GAN, WeiWei WU, Wenguang ZHANG, Chunsheng ZHENG
  • Publication number: 20220186216
    Abstract: Compositions and methods for treating excising trinucleotide repeats, as well as for treating diseases and disorders associated with trinucleotide repeats are encompassed.
    Type: Application
    Filed: February 25, 2022
    Publication date: June 16, 2022
    Applicant: Vertex Pharmaceuticals Incorporated
    Inventors: Gregoriy Aleksandrovich Dokshin, Matthias Heidenreich, Norzehan Abdul-Manan, Lu Gan, Jianming Liu, Guoxiang Ruan, Jesper Gromada, John Patrick Leonard, Zachary Michael Detwiler, Peter Thomas Hallock, David Esopi, Giselle Dominguez Gutierrez
  • Publication number: 20220166622
    Abstract: A network function service invocation method includes sending, by a first network function network element, a first request message to an authorization network element, wherein the first request message is used to request permission to invoke a first network function service provided by a second network function network element, performing, by the authorization network element, identity authentication on the first network function network element, generating, by the authorization network element, a token when determining that the identity authentication succeeds, wherein the token is used to indicate that the first network function network element has the permission to invoke the first network function service of the second network function network element, and sending, by the authorization network element, a token to the first network function network element.
    Type: Application
    Filed: December 2, 2021
    Publication date: May 26, 2022
    Inventors: Shuaishuai Tan, Lu Gan, Bo Zhang, Rong Wu
  • Publication number: 20220135588
    Abstract: A novel five-membered heteroaromatic imidazole compound and use thereof is disclosed herein. Specifically, disclosed is a compound as shown in formula (III) or a pharmaceutically acceptable salt thereof. Also disclosed is a method for treating a disease related to GLP-1 receptor such as type II diabetes.
    Type: Application
    Filed: January 13, 2022
    Publication date: May 5, 2022
    Inventors: Tao YU, Lu GAN, Chengde WU, Shuhui CHEN
  • Patent number: 11303622
    Abstract: An embodiment method includes: obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: April 12, 2022
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Lu Gan, Bo Zhang
  • Patent number: 11296877
    Abstract: A discovery method and apparatus based on a service-based architecture, where the method includes a control network element sending a discovery response to a first functional network element, where the discovery response includes a determined security parameter and an access address or an identifier of a second functional network element. The first functional network element receives the discovery response from the control network element, and sends an access request to the second functional network element based on the address or the identifier of the second functional network element, where the access request includes the received security parameter. The second functional network element receives the access request from the first functional network element, verifies correctness of the security parameter, and determines, based on the correctness of the security parameter, whether the access request is authorized by the first functional network element.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: April 5, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Bo Zhang, Lu Gan, Rong Wu, Shuaishuai Tan
  • Patent number: 11240218
    Abstract: This application provides a key distribution and authentication method, system, and an apparatus. The method includes: a service center server distributes different keys to terminal devices, and then the terminal devices perform mutual authentication with the network authentication server based on respective keys and finally obtain communication keys for communication between the terminal devices and a functional network element. This provides a method for establishing a secure communication channel for the terminal device, having a broad application range.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: February 1, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Rong Wu, Bo Zhang, Lu Gan, Haiguang Wang
  • Patent number: 11228908
    Abstract: Embodiments of the present invention disclose a data transmission method and a related device and system. The system includes an access network device AN and user equipment UE. The AN is configured to receive a base key sent by a key management device in a core network, where the base key is a key generated from two-way authentication between the UE and the core; the AN and the UE are configured to process the base key according to a preset rule to generate an air interface protection key; the UE is configured to: protect a target field in an uplink protocol data unit PDU by using the air interface protection key; and the AN is configured to parse the target field in the uplink protocol data unit by using the air interface protection key.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: January 18, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Bo Zhang, Lu Gan, Rong Wu
  • Patent number: 11228905
    Abstract: A security implementation method, a related apparatus, and a system, where the method includes receiving, by a first network element, a request for handing over a user equipment from a source access network device to a target access network device to perform communication. The method further includes: obtaining, by the first network element, a security key, where the security key is used for protecting the communication between the user equipment and the target access network device after the user equipment is handed over from the source access network device to the target access network device; and sending, by the first network element, the security key to the target access network device.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: January 18, 2022
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Rong Wu, Lu Gan, Bo Zhang, Shuaishuai Tan
  • Patent number: D943037
    Type: Grant
    Filed: December 9, 2020
    Date of Patent: February 8, 2022
    Inventor: Lu Gan