Patents by Inventor Shek Duncan Wong

Shek Duncan Wong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9460435
    Abstract: Transaction systems and methods for advancing a committed time in the future are described herein. In the present transaction systems and methods, the first end can be permitted to pre-hatch a time capsule signature before the committed time. The time capsule signature scheme here is conducted based on an identity-based trapdoor relation (IDTR). Moreover, an extended time capsule signature scheme is conducted based on an extended identity-based trapdoor relation (IDTR). By using an extended IDTR primitive, the present transaction systems and methods can distinguish the time capsule signature is validated before or after the committed time t.
    Type: Grant
    Filed: April 22, 2009
    Date of Patent: October 4, 2016
    Assignee: CITY UNIVERSITY OF HONG KONG
    Inventors: Chunyan Hu, Shek Duncan Wong, Xiaotie Deng, Qiong Huang, Guomin Yang
  • Patent number: 8988187
    Abstract: Systems and methods which provide identification of a user in combination with mutual authentication between a user and identification host are shown. Embodiments further provide mutual authentication between the identification host and a resource for which access is controlled, thereby providing three-party authentication (e.g., user, identification host, resource). Although utilizing biometric data for user identification, embodiments store such biometric information within devices which remain in the control of users. Protocols implemented according to embodiments facilitate a decentralized approach to user identification and authentication to allow a user to interact with any of a number of identification hosts for user identification and authorization. Auditing and tracing of user identification and authentication and/or resource access is provided according to embodiments.
    Type: Grant
    Filed: January 13, 2011
    Date of Patent: March 24, 2015
    Assignee: Hong Kong Applied Science and Technology Research Institute Co., Ltd.
    Inventors: Shek Duncan Wong, Jack Sik Ching Poon, Tak Shing Peter Yum
  • Patent number: 8499156
    Abstract: The invention discloses a method for implementing encryption and transmission of information and system thereof. The method comprises the following steps when a sender sends information to a receiver: a client of the sender encrypts the information by using a unique identifier of a receiver identity as a public key; the sender sends the encrypted information to the receiver; the receiver receives the encrypted information, and a client of the receiver performs decryption by using a user private key; wherein the client of the receiver obtains the user private key by one-off registration and the user private key matches with the unique identifier of the receiver identity. The system comprises an information transmission platform, a sender and a receiver connected to each other by the information transmission platform, clients provided in the sender and the receiver, and a registration component.
    Type: Grant
    Filed: May 20, 2009
    Date of Patent: July 30, 2013
    Assignee: City University of Hong Kong
    Inventors: Shek Duncan Wong, Xiaokang Xiong
  • Publication number: 20120249292
    Abstract: Systems and methods which provide identification of a user in combination with mutual authentication between a user and identification host are shown. Embodiments further provide mutual authentication between the identification host and a resource for which access is controlled, thereby providing three-party authentication (e.g., user, identification host, resource). Although utilizing biometric data for user identification, embodiments store such biometric information within devices which remain in the control of users. Protocols implemented according to embodiments facilitate a decentralized approach to user identification and authentication to allow a user to interact with any of a number of identification hosts for user identification and authorization. Auditing and tracing of user identification and authentication and/or resource access is provided according to embodiments.
    Type: Application
    Filed: January 13, 2011
    Publication date: October 4, 2012
    Applicant: Hong Kong Applied Science and Technology Research Institute Co., Ltd.
    Inventors: Shek Duncan Wong, Jack Sik Ching Poon, Tak Shing Peter Yum
  • Publication number: 20110154036
    Abstract: The invention discloses a method for implementing encryption and tranmission information and system thereof. The method comprises the following steps when a sender sends information to a receiver: a client of the sender encrypts the information by using a unique identifier of a receiver identity as a public key; the sender sends the encrypted information to the receiver; the receiver receives the encrypted information, and a client of the receiver performs decryption by using a user private key; wherein the client of the receiver obtains the user private key by one-off registration and the user private key matches with the unique identifier of the receiver identity. The system comprises an information transmission platform, a sender and a receiver connected to each other by the information transmission platform, clients provided in the sender and the receiver, and a registration component.
    Type: Application
    Filed: May 20, 2009
    Publication date: June 23, 2011
    Applicant: CITY UNIVERSITY OF HONG KONG
    Inventors: Shek Duncan Wong, Xiaokang Xiong
  • Publication number: 20090276361
    Abstract: Transaction systems and methods for advancing a committed time in the future are described herein. In the present transaction systems and methods, the first end can be permitted to pre-hatch a time capsule signature before the committed time. The time capsule signature scheme here is conducted based on an identity-based trapdoor relation (IDTR). Moreover, an extended time capsule signature scheme is conducted based on an extended identity-based trapdoor relation (IDTR). By using an extended IDTR primitive, the present transaction systems and methods can distinguish the time capsule signature is validated before or after the committed time t.
    Type: Application
    Filed: April 22, 2009
    Publication date: November 5, 2009
    Inventors: Chunyan Hu, Shek Duncan Wong, Xiaotie Deng, Qiong Huang, Guomin Yang