Patents by Inventor Tsz Hon YUEN

Tsz Hon YUEN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12141796
    Abstract: Embodiments of this application provide a blockchain-based data processing method, a device, and a medium. The method includes: sending a first channel closing message on a chain-off channel; receiving a second signature in a second state and a second channel closing message that are sent on the off-chain channel, where the second signature is obtained by signing the second channel closing message; and signing a third channel closing message to obtain a first signature in the second state, and sending the first signature. This application can ensure transaction security and improve a transaction processing capability.
    Type: Grant
    Filed: July 2, 2021
    Date of Patent: November 12, 2024
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Wei He, Shuang Wu, Tsz Hon Yuen
  • Patent number: 12058253
    Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.
    Type: Grant
    Filed: December 20, 2022
    Date of Patent: August 6, 2024
    Assignee: Huawei Technologies Co., Ltd
    Inventors: Ruifeng Hu, Feihu Jiang, Tsz Hon Yuen, Yaoguo Jiang, Haojun Zhou
  • Publication number: 20230119065
    Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.
    Type: Application
    Filed: December 20, 2022
    Publication date: April 20, 2023
    Inventors: Ruifeng Hu, Feihu Jiang, Tsz Hon Yuen, Yaoguo Jiang, Haojun Zhou
  • Patent number: 11563569
    Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.
    Type: Grant
    Filed: September 18, 2020
    Date of Patent: January 24, 2023
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Ruifeng Hu, Feihu Jiang, Tsz Hon Yuen, Yaoguo Jiang, Haojun Zhou
  • Publication number: 20210334796
    Abstract: Embodiments of this application provide a blockchain-based data processing method, a device, and a medium. The method includes: sending a first channel closing message on a chain-off channel; receiving a second signature in a second state and a second channel closing message that are sent on the off-chain channel, where the second signature is obtained by signing the second channel closing message; and signing a third channel closing message to obtain a first signature in the second state, and sending the first signature. This application can ensure transaction security and improve a transaction processing capability.
    Type: Application
    Filed: July 2, 2021
    Publication date: October 28, 2021
    Inventors: Wei HE, Shuang WU, Tsz Hon YUEN
  • Patent number: 11039308
    Abstract: Embodiments relate to a wireless communication device of a group of wireless communication devices configured to communicate with a base station, the wireless communication device comprising a transceiver configured to receive a token from the base station and a processor configured to generate a first data structure on the basis of a function of the token and of a key ki of the wireless communication device and a second data structure comprising an identity idi of the wireless communication device, wherein the transceiver is further configured to broadcast the first data structure and the second data structure to the group of wireless communication devices and the base station.
    Type: Grant
    Filed: September 20, 2019
    Date of Patent: June 15, 2021
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Elizabeth Quaglia, Benjamin Smyth, Tsz Hon Yuen
  • Publication number: 20210006400
    Abstract: A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security.
    Type: Application
    Filed: September 18, 2020
    Publication date: January 7, 2021
    Inventors: Ruifeng HU, Feihu JIANG, Tsz Hon YUEN, Yaoguo JIANG, Haojun ZHOU
  • Patent number: 10868670
    Abstract: A data processing method and apparatus include: generating, by a terminal device, a first public key and a first private key; sending the first public key to a key generation center (KGC), where the first public key is used by the KGC or a server to generate a transform key, and the transform key is used by the server to transform data that is encrypted based on an attribute structure of the terminal device into data that is encrypted based on the first public key; receiving second data sent by the server, where the second data is data that is generated after the server processes first data according to the transform key; and decrypting the second data according to the first private key. In the data processing, main work is completed by the server with no need to use a secure channel to transmit a key.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: December 15, 2020
    Assignees: Huawei International Pte. Ltd., Singapore Management University
    Inventors: Hui Cui, Robert H. Deng, Yingjiu Li, Guilin Wang, Tsz Hon Yuen
  • Publication number: 20200382949
    Abstract: Embodiments relate to a wireless communication device of a group of wireless communication devices configured to communicate with a base station, the wireless communication device comprising a transceiver configured to receive a token from the base station and a processor configured to generate a first data structure on the basis of a function of the token and of a key ki of the wireless communication device and a second data structure comprising an identity idi of the wireless communication device, wherein the transceiver is further configured to broadcast the first data structure and the second data structure to the group of wireless communication devices and the base station.
    Type: Application
    Filed: September 20, 2019
    Publication date: December 3, 2020
    Inventors: Elizabeth QUAGLIA, Benjamin SMYTH, Tsz Hon YUEN
  • Publication number: 20200015073
    Abstract: Embodiments relate to a wireless communication device of a group of wireless communication devices configured to communicate with a base station, the wireless communication device comprising a transceiver configured to receive a token from the base station and a processor configured to generate a first data structure on the basis of a function of the token and of a key ki of the wireless communication device and a second data structure comprising an identity idi of the wireless communication device, wherein the transceiver is further configured to broadcast the first data structure and the second data structure to the group of wireless communication devices and the base station.
    Type: Application
    Filed: September 20, 2019
    Publication date: January 9, 2020
    Inventors: Elizabeth QUAGLIA, Benjamin SMYTH, Tsz Hon YUEN
  • Patent number: 10360406
    Abstract: A system and method for obfuscating data includes random numbers generated by applying a one-way compression function to auxiliary inputs which may at least include a secret key and a data partner identifier. For each row of data to be obfuscated, the following is performed: a plurality of data blocks is constructed from the each row of data to be obfuscated, wherein the number (n) of the data blocks is predetermined; a dot product is generated which is obtained by: generating a plurality of products by multiplying each of the plurality of data blocks with an exclusive one of the plurality of random numbers and summing the plurality of products; and an obfuscated form of the each row of data to be obfuscated is generated by determining a remainder of a modulo operation which is performed using the dot product as dividend and a predetermined integer value as divisor.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: July 23, 2019
    Assignee: Huawei International Pte. Ltd.
    Inventors: Tsz Hon Yuen, Shuang Wu
  • Publication number: 20190173668
    Abstract: A data processing method and apparatus include: generating, by a terminal device, a first public key and a first private key; sending the first public key to a key generation center (KGC), where the first public key is used by the KGC or a server to generate a transform key, and the transform key is used by the server to transform data that is encrypted based on an attribute structure of the terminal device into data that is encrypted based on the first public key; receiving second data sent by the server, where the second data is data that is generated after the server processes first data according to the transform key; and decrypting the second data according to the first private key. In the data processing, main work is completed by the server with no need to use a secure channel to transmit a key.
    Type: Application
    Filed: January 30, 2019
    Publication date: June 6, 2019
    Inventors: Hui CUI, Robert H. DENG, Yingjiu LI, Guilin WANG, Tsz Hon YUEN
  • Patent number: 10282448
    Abstract: A system and method for searching a symmetrically encrypted database for conjunctive keywords is provided. More particularly, the system and method provides means for searching a symmetrically encrypted database for conjunctive keywords by utilizing an encrypted index table and a Bloom filter. The encrypted index table contains encrypted keywords and their associated index pairs while the Bloom filter contains elements that represent encrypted identity-keyword pairs of the database.
    Type: Grant
    Filed: October 23, 2015
    Date of Patent: May 7, 2019
    Assignee: HUAWEI INTERNATIONAL PTE. LTD.
    Inventor: Tsz Hon Yuen
  • Publication number: 20170091485
    Abstract: A system and method for obfuscating data includes random numbers generated by applying a one-way compression function to auxiliary inputs which may at least include a secret key and a data partner identifier. For each row of data to be obfuscated, the following is performed: a plurality of data blocks is constructed from the each row of data to be obfuscated, wherein the number (n) of the data blocks is predetermined; a dot product is generated which is obtained by: generating a plurality of products by multiplying each of the plurality of data blocks with an exclusive one of the plurality of random numbers and summing the plurality of products; and an obfuscated form of the each row of data to be obfuscated is generated by determining a remainder of a modulo operation which is performed using the dot product as dividend and a predetermined integer value as divisor.
    Type: Application
    Filed: December 7, 2016
    Publication date: March 30, 2017
    Inventors: Tsz Hon YUEN, Shuang WU
  • Publication number: 20160140179
    Abstract: A system and method for searching a symmetrically encrypted database for conjunctive keywords is provided. More particularly, the system and method provides means for searching a symmetrically encrypted database for conjunctive keywords by utilizing an encrypted index table and a Bloom filter. The encrypted index table contains encrypted keywords and their associated index pairs while the Bloom filter contains elements that represent encrypted identity-keyword pairs of the database.
    Type: Application
    Filed: October 23, 2015
    Publication date: May 19, 2016
    Applicant: HUAWEI INTERNATIONAL PTE. LTD.
    Inventor: Tsz Hon YUEN