Patents by Inventor Minghua Qu
Minghua Qu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11955075Abstract: An array substrate has a display area and a non-display area including a first bonding region. The array substrate includes: a plurality of pixel columns disposed in the display area, each of the plurality of pixel columns including a plurality of light-emitting units that are arranged in a second direction, the second direction being perpendicular to a direction in which an edge of the display area proximate to the first bonding region extends; and at least three first power supply input terminals disposed in the first bonding region, each first power supply input terminal being connected to at least one pixel column of the plurality of pixel columns, so as to provide a first power supply signal to the at least one pixel column.Type: GrantFiled: January 15, 2021Date of Patent: April 9, 2024Assignee: BOE TECHNOLOGY GROUP CO., LTD.Inventors: Dongni Liu, Qi Ql, Feng Qu, Minghua Xuan, Haoliang Zheng, Jiao Zhao
-
Publication number: 20240105736Abstract: An array substrate includes a base substrate including a first surface and a second surface, scanning signal lines disposed on the first surface, at least two groups of shift register circuits disposed in a display area of the first surface, and at least one fan-out structure disposed on the second surface. Each scanning signal line extends along a first direction. Each group of shift register circuits includes a plurality of shift register circuits along a second direction. Each shift register circuit is coupled to a scanning signal line. The fan-out structure is coupled to the shift register circuits. At least one group of shift register circuits is disposed in a non-edge region of the display area. The shift register circuit disposed in the non-edge region is configured to transmit a scanning signal to the scanning signal line at both sides of the shift register circuit along the first direction.Type: ApplicationFiled: November 30, 2023Publication date: March 28, 2024Applicant: BOE TECHNOLOGY GROUP CO., LTD.Inventors: Dongni LIU, Minghua XUAN, Feng QU, Qi QI
-
Publication number: 20240096288Abstract: A display substrate a driving method therefor, and a display apparatus. The display substrate comprises: M rows and N columns of sub-pixels, N data signal lines and a data reset circuit, wherein at least one sub-pixel comprises a pixel circuit; an ith data signal line is connected to pixel circuits in an ith column, where M?1, N?1, and 1?i?N; and the data reset circuit is electrically connected to a data reset control end, a data initial signal end and the N data signal lines, and is configured to provide a signal of the data initial signal end to the N data signal lines under the control of the data reset control end.Type: ApplicationFiled: December 20, 2021Publication date: March 21, 2024Inventors: Haoliang ZHENG, Yan QU, Dongni LIU, Li XIAO, Jiao ZHAO, Xiaorong CUI, Seungwoo HAN, Minghua XUAN
-
Patent number: 8983064Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: September 15, 2012Date of Patent: March 17, 2015Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Patent number: 8953787Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: June 20, 2012Date of Patent: February 10, 2015Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20140229730Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding with ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: ApplicationFiled: April 21, 2014Publication date: August 14, 2014Inventors: Minghua Qu, Scott A. Vanstone
-
Patent number: 8732467Abstract: A method for creating and authenticating a digital signature is provided, including selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system, a recovered second signature component s? is computed by combining a third signature component with the second signature component to derive signature components (s?, r) as an unmasked digital signature.Type: GrantFiled: December 28, 2012Date of Patent: May 20, 2014Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Donald B. Johnson, Minghua Qu
-
Patent number: 8712042Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information f and generates a value kA by binding f with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: GrantFiled: June 19, 2012Date of Patent: April 29, 2014Assignee: Certicom Corp.Inventors: Minghua Qu, Scott A. Vanstone
-
Patent number: 8705735Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: GrantFiled: June 19, 2012Date of Patent: April 22, 2014Assignee: Certicom Corp.Inventors: Minghua Qu, Scott A. Vanstone
-
Patent number: 8359468Abstract: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system.Type: GrantFiled: June 29, 2011Date of Patent: January 22, 2013Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Donald B. Johnson, Minghua Qu
-
Publication number: 20130019099Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: ApplicationFiled: September 15, 2012Publication date: January 17, 2013Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20120300924Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information f and generates a value kA by binding f with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: ApplicationFiled: June 19, 2012Publication date: November 29, 2012Inventors: Minghua Qu, Scott A. Vanstone
-
Publication number: 20120303950Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: ApplicationFiled: June 19, 2012Publication date: November 29, 2012Inventors: Minghua Qu, Scott A. Vanstone
-
Publication number: 20120257758Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: ApplicationFiled: June 20, 2012Publication date: October 11, 2012Inventors: Scott A. VANSTONE, Alfred John MENEZES, Minghua QU, Donald B. JOHNSON
-
Patent number: 8270601Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding with ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: GrantFiled: November 30, 2009Date of Patent: September 18, 2012Assignee: Certicom Corp.Inventors: Minghua Qu, Scott A. Vanstone
-
Patent number: 8229113Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: July 13, 2009Date of Patent: July 24, 2012Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20120079274Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: ApplicationFiled: December 2, 2011Publication date: March 29, 2012Applicant: CERTICOM CORP.Inventors: Scott Vanstone, Alfred John Menezes, Minghua Qu
-
Patent number: 8090947Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: GrantFiled: July 15, 2010Date of Patent: January 3, 2012Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Alfred John Menezes, Minghua Qu
-
Publication number: 20110258455Abstract: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system.Type: ApplicationFiled: June 29, 2011Publication date: October 20, 2011Applicant: RESEARCH IN MOTION LIMITEDInventors: Donald B. Johnson, Scott A. Vanstone, Minghua Qu
-
Patent number: 7996676Abstract: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system.Type: GrantFiled: June 22, 2009Date of Patent: August 9, 2011Assignee: Certicom Corp.Inventors: Donald B. Johnson, Scott A. Vanstone, Minghua Qu