Patents by Inventor Minghua Qu
Minghua Qu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12254841Abstract: A display substrate a driving method therefor, and a display apparatus. The display substrate comprises: M rows and N columns of sub-pixels, N data signal lines and a data reset circuit, wherein at least one sub-pixel comprises a pixel circuit; an ith data signal line is connected to pixel circuits in an ith column, where M?1, N?1, and 1?i?N; and the data reset circuit is electrically connected to a data reset control end, a data initial signal end and the N data signal lines, and is configured to provide a signal of the data initial signal end to the N data signal lines under the control of the data reset control end.Type: GrantFiled: December 20, 2021Date of Patent: March 18, 2025Assignee: BOE Technology Group Co., Ltd.Inventors: Haoliang Zheng, Yan Qu, Dongni Liu, Li Xiao, Jiao Zhao, Xiaorong Cui, Seungwoo Han, Minghua Xuan
-
Publication number: 20250081610Abstract: Disclosed are a display substrate and a preparation method therefor, and a display apparatus. The display substrate includes a plurality of first circuit regions and a plurality of second circuit regions alternately disposed along a second direction, a first circuit region includes a plurality of repeat units (RU) and a plurality of blank units (KB) alternately disposed along a first direction, a repeat unit (RU) includes a plurality of circuit units (Q), a circuit unit (Q) includes a pixel drive circuit and a data signal line (DataI) connected with the pixel drive circuit, a second circuit region includes at least one gate unit (G), the gate unit includes at least one gate drive circuit, and an orthographic projection of the gate drive circuit on a plane of the display substrate is not overlapped with an orthographic projection of the data signal line (DataI) on the plane of the display substrate.Type: ApplicationFiled: December 22, 2022Publication date: March 6, 2025Inventors: Li XIAO, Yan QU, Haoliang ZHENG, Jiao ZHAO, Yuzhen GUO, Xiaorong CUI, Chenyang ZHANG, Minghua XUAN
-
Patent number: 8983064Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: September 15, 2012Date of Patent: March 17, 2015Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Patent number: 8953787Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: June 20, 2012Date of Patent: February 10, 2015Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20140229730Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding with ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: ApplicationFiled: April 21, 2014Publication date: August 14, 2014Inventors: Minghua Qu, Scott A. Vanstone
-
Patent number: 8732467Abstract: A method for creating and authenticating a digital signature is provided, including selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system, a recovered second signature component s? is computed by combining a third signature component with the second signature component to derive signature components (s?, r) as an unmasked digital signature.Type: GrantFiled: December 28, 2012Date of Patent: May 20, 2014Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Donald B. Johnson, Minghua Qu
-
Patent number: 8712042Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information f and generates a value kA by binding f with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: GrantFiled: June 19, 2012Date of Patent: April 29, 2014Assignee: Certicom Corp.Inventors: Minghua Qu, Scott A. Vanstone
-
Patent number: 8705735Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: GrantFiled: June 19, 2012Date of Patent: April 22, 2014Assignee: Certicom Corp.Inventors: Minghua Qu, Scott A. Vanstone
-
Patent number: 8359468Abstract: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system.Type: GrantFiled: June 29, 2011Date of Patent: January 22, 2013Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Donald B. Johnson, Minghua Qu
-
Publication number: 20130019099Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: ApplicationFiled: September 15, 2012Publication date: January 17, 2013Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20120303950Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: ApplicationFiled: June 19, 2012Publication date: November 29, 2012Inventors: Minghua Qu, Scott A. Vanstone
-
Publication number: 20120300924Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity distinguishing each entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information f and generates a value kA by binding f with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: ApplicationFiled: June 19, 2012Publication date: November 29, 2012Inventors: Minghua Qu, Scott A. Vanstone
-
Publication number: 20120257758Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: ApplicationFiled: June 20, 2012Publication date: October 11, 2012Inventors: Scott A. VANSTONE, Alfred John MENEZES, Minghua QU, Donald B. JOHNSON
-
Patent number: 8270601Abstract: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data of the entity A by mathematically combining public values obtained from respective private values of the trusted entity and the entity A. The unique identity and public key reconstruction public data of the entity A serve as A's implicit certificate. The trusted entity combines the implicit certificate information with a mathematical function to derive an entity information ƒ and generates a value kA by binding with ƒ with private values of the trusted entity. The trusted entity transmits the value kA to the entity to permit A to generate a private key from kA, A's private value and A's implicit certificate.Type: GrantFiled: November 30, 2009Date of Patent: September 18, 2012Assignee: Certicom Corp.Inventors: Minghua Qu, Scott A. Vanstone
-
Patent number: 8229113Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.Type: GrantFiled: July 13, 2009Date of Patent: July 24, 2012Assignee: Certicom Corp.Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
-
Publication number: 20120079274Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: ApplicationFiled: December 2, 2011Publication date: March 29, 2012Applicant: CERTICOM CORP.Inventors: Scott Vanstone, Alfred John Menezes, Minghua Qu
-
Patent number: 8090947Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: GrantFiled: July 15, 2010Date of Patent: January 3, 2012Assignee: Certicom Corp.Inventors: Scott Alexander Vanstone, Alfred John Menezes, Minghua Qu
-
Publication number: 20110258455Abstract: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system.Type: ApplicationFiled: June 29, 2011Publication date: October 20, 2011Applicant: RESEARCH IN MOTION LIMITEDInventors: Donald B. Johnson, Scott A. Vanstone, Minghua Qu
-
Patent number: 7996676Abstract: The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system.Type: GrantFiled: June 22, 2009Date of Patent: August 9, 2011Assignee: Certicom Corp.Inventors: Donald B. Johnson, Scott A. Vanstone, Minghua Qu
-
Publication number: 20100281259Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the public and private information of respective ones of the correspondents.Type: ApplicationFiled: July 15, 2010Publication date: November 4, 2010Applicant: CERTICOM CORP.Inventors: Scott Vanstone, Alfred John Menezes, Minghua Qu