Patents by Inventor Weiqi Dai
Weiqi Dai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12373590Abstract: The present invention relates to a blockchain-based system and method for preventing unauthorized deletion of surveillance video, the system at least comprising: a plurality of camera components, for generating surveillance video; at least one video-recording node, for connecting to a blockchain network and randomly generating a key pair, splitting the video file received from the camera components into a plurality of video-file blocks and randomly sending them to participation nodes across the blockchain network for storage, and recording hash values of the stored video files and node information; and a blockchain network device, for updating the hash values of the video files uploaded by the video-recording nodes based on a smart contract. In the present invention, uploading and storing time for camera-videos is recorded by the smart contract as tamper-resistant time reference for law enforcement, protecting video data from malicious deletion at video-recording nodes without the need of redundant space.Type: GrantFiled: July 20, 2023Date of Patent: July 29, 2025Assignee: Huazhong University of Science and TechnologyInventors: Weiqi Dai, Ziyi Liang, Kexuan Zhao, Deqing Zou, Hai Jin
-
Patent number: 12088742Abstract: The present invention provides an anti-trapdoor-leakage on-chain data restoration system, at least comprising: a blockchain node, for broadcasting transaction data of a request-initiating person to blockchain nodes and proposer nodes in other groups, respectively; and a proposer node, for performing computation of a Chameleon-Hash function using a key set that is generated by a key-generating module provided in the proposer node, packaging the transaction data to generate a new block, and distributing the new block to all the blockchain nodes so that the blockchain nodes update their respective underlying ledgers according to the new blocks broadcasted by the proposer. The system of the present invention not only realizes such functions as restoration and editing of the transaction data, but also protects operational security and reliability of blockchains.Type: GrantFiled: May 24, 2022Date of Patent: September 10, 2024Assignee: HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGYInventors: Weiqi Dai, Jinkai Liu, Hai Jin, Deqing Zou
-
Publication number: 20240220647Abstract: The present invention relates to a blockchain-based system and method for preventing unauthorized deletion of surveillance video, the system at least comprising: a plurality of camera components, for generating surveillance video; at least one video-recording node, for connecting to a blockchain network and randomly generating a key pair, splitting the video file received from the camera components into a plurality of video-file blocks and randomly sending them to participation nodes across the blockchain network for storage, and recording hash values of the stored video files and node information; and a blockchain network device, for updating the hash values of the video files uploaded by the video-recording nodes based on a smart contract. In the present invention, uploading and storing time for camera-videos is recorded by the smart contract as tamper-resistant time reference for law enforcement, protecting video data from malicious deletion at video-recording nodes without the need of redundant space.Type: ApplicationFiled: July 20, 2023Publication date: July 4, 2024Inventors: Weiqi DAI, Ziyi LIANG, Kexuan ZHAO, Deqing ZOU, Hai JIN
-
Publication number: 20230351035Abstract: The present invention relates to system and method for user-controllable sharing of authorization for private data, wherein the system at least comprises: a blockchain node, for recording and verifying transaction information and/or completing payment, a client, for encrypting a symmetric key into a re-encryption key to be sent to an IPFS node, so that after a re-encryption request it sends to the IPFS node is verified as valid, the client sends the symmetric key to a server; the IPFS node, for calling a zero-knowledge proof verification contract from the blockchain node in response to the re-encryption request from the client, and performing authorization and verification; a server, for sending first encrypted data involving user authorization to the IPFS node, and/or acquiring the symmetric key sent by the client and capable of decrypting authorization data.Type: ApplicationFiled: October 4, 2022Publication date: November 2, 2023Inventors: Weiqi DAI, Liangliang YU, Hai JIN, Deqing ZOU
-
Publication number: 20230299938Abstract: The present invention provides a system for privacy protection during IoT secure data sharing and a method thereof. The present invention relates to IoT data sharing, wherein it allows users to securely share data encrypted through decentralized attribute-based encryption on a blockchain-based platform without disclosing their attribute permission, so that individual users will not be identified according to their attributes, thereby protecting user privacy. The present invention also enables users sharing encrypted data and achieving traceability and accountability in the event of privacy breach. The present invention further provides an approach to verifying user permission using an attribute-based zero-knowledge proof, so as to securely and reliably verify whether permission of a data user is real.Type: ApplicationFiled: May 4, 2022Publication date: September 21, 2023Inventors: Weiqi DAI, Shuyue TUO, Hai JIN, Deqing ZOU
-
Publication number: 20230087557Abstract: The present invention provides a system for privacy protection during IoT secure data sharing and a method thereof. The present invention relates to IoT data sharing, wherein it allows users to securely share data encrypted through decentralized attribute-based encryption on a blockchain-based platform without disclosing their attribute permission, so that individual users will not be identified according to their attributes, thereby protecting user privacy. The present invention also enables users sharing encrypted data and achieving traceability and accountability in the event of privacy breach. The present invention further provides an approach to verifying user permission using an attribute-based zero-knowledge proof, so as to securely and reliably verify whether permission of a data user is real.Type: ApplicationFiled: May 4, 2022Publication date: March 23, 2023Inventors: Weiqi DAI, Shuyue TUO, Hai JIN, Deqing ZOU
-
Publication number: 20230085807Abstract: The present invention provides an anti-trapdoor-leakage on-chain data restoration system, at least comprising: a blockchain node, for broadcasting transaction data of a request-initiating person to blockchain nodes and proposer nodes in other groups, respectively; and a proposer node, for performing computation of a Chameleon-Hash function using a key set that is generated by a key-generating module provided in the proposer node, packaging the transaction data to generate a new block, and distributing the new block to all the blockchain nodes so that the blockchain nodes update their respective underlying ledgers according to the new blocks broadcasted by the proposer. The system of the present invention not only realizes such functions as restoration and editing of the transaction data, but also protects operational security and reliability of blockchains.Type: ApplicationFiled: May 24, 2022Publication date: March 23, 2023Inventors: Weiqi DAI, Jinkai LIU, Hai JIN, Deqing ZOU
-
Patent number: 11301361Abstract: The present disclosure involves a sidechain testing system and method for improving security and stability of a smart contract.Type: GrantFiled: January 28, 2020Date of Patent: April 12, 2022Assignee: Huazhong University of Science and TechnologyInventors: Weiqi Dai, Hai Jin, Deqing Zou, Bingcheng Zhao
-
Publication number: 20200349054Abstract: The present disclosure involves a sidechain testing system and method for improving security and stability of a smart contract.Type: ApplicationFiled: January 28, 2020Publication date: November 5, 2020Inventors: Weiqi Dai, Hai Jin, Deqing Zou, Bingcheng Zhao
-
Patent number: 10754953Abstract: The present invention provides a TrustZone-based security isolation system for shared library, the system at least comprising: a sandbox creator, a library controller, and an interceptor, the sandbox creator, in a normal world, dynamically creating a sandbox isolated from a Rich OS, the interceptor, intercepting corresponding system-calling information and/or Android framework APIs by means of inter-process stack inspection, the library controller, performing analysis based on the intercepted system-calling information and/or Android framework APIs, redirecting a library function to the sandbox, and switching calling states of the library function in the sandbox as well as setting up a library authority. The present invention has good versatility, low cost and high security. It realizes isolation of the library without increasing the trusted bases in the Secure World of the TrustZone, effectively reducing the risk of being attacked.Type: GrantFiled: August 23, 2018Date of Patent: August 25, 2020Assignee: Huazhong University of Science and TechnologyInventors: Hai Jin, Weiqi Dai, Jun Deng, Deqing Zou
-
Patent number: 10749880Abstract: The present invention involves with a cloud tenant oriented method and system for protecting privacy data. The method comprises at least the following steps: analyzing event handler information and/or behavioral signature information of request information and determining an execution mode, selecting at least one node without a behavioral signature plot to execute the tenant request and recording an execution result, generating a behavioral signature plot based on the execution result, and dynamically detecting security-sensitive behavior based on the behavioral signature plot. The present invention ensures data security during processing of security-sensitive data for cloud services by adopting a technology based on behavioral signatures, and prevents attackers from exploiting vulnerabilities and bypassing security control to conduct malicious operations.Type: GrantFiled: August 23, 2018Date of Patent: August 18, 2020Assignee: Huazhong University of Science and TechnologyInventors: Hai Jin, Weiqi Dai, Yan Xia, Deqing Zou
-
Publication number: 20190294798Abstract: The present invention provides a TrustZone-based security isolation system for shared library, the system at least comprising: a sandbox creator, a library controller, and an interceptor, the sandbox creator, in a normal world, dynamically creating a sandbox isolated from a Rich OS, the interceptor, intercepting corresponding system-calling information and/or Android framework APIs by means of inter-process stack inspection, the library controller, performing analysis based on the intercepted system-calling information and/or Android framework APIs, redirecting a library function to the sandbox, and switching calling states of the library function in the sandbox as well as setting up a library authority. The present invention has good versatility, low cost and high security. It realizes isolation of the library without increasing the trusted bases in the Secure World of the TrustZone, effectively reducing the risk of being attacked.Type: ApplicationFiled: August 23, 2018Publication date: September 26, 2019Inventors: Hai JIN, Weiqi Dai, Jun Deng, Deqing Zou
-
Publication number: 20190281074Abstract: The present invention involves with a cloud tenant oriented method and system for protecting privacy data. The method comprises at least the following steps: analyzing event handler information and/or behavioral signature information of request information and determining an execution mode, selecting at least one node without a behavioral signature plot to execute the tenant request and recording an execution result, generating a behavioral signature plot based on the execution result, and dynamically detecting security-sensitive behavior based on the behavioral signature plot. The present invention ensures data security during processing of security-sensitive data for cloud services by adopting a technology based on behavioral signatures, and prevents attackers from exploiting vulnerabilities and bypassing security control to conduct malicious operations.Type: ApplicationFiled: August 23, 2018Publication date: September 12, 2019Inventors: Hai JIN, Weiqi DAI, Yan XIA, Deqing ZOU
-
Patent number: 9275240Abstract: In at least one embodiment, a method for secured rollback of a virtual Trusted Platform Module (vTPM) that renders available functionalities offered by Trusted Platform Module (TPM) on a computer to a virtual machine (VM) is provided. The method includes taking and saving a snapshot of current state of a virtual machine as well as a snapshot of the corresponding vTPM, upon receiving a request for taking a snapshot of the virtual machine. The method further includes converting the snapshots into the current state of the virtual machine and the current state of the vTPM, respectively, upon receiving a request to roll back the virtual machine.Type: GrantFiled: July 9, 2013Date of Patent: March 1, 2016Assignee: Hua Zhong University of Science TechnologyInventors: Hai Jin, Deqing Zou, Weiqi Dai, Fengwei Wang
-
Publication number: 20150244717Abstract: In a computing environment that includes multiple virtual machines performing computing tasks for a same entity, the integrity of each of the virtual machines may be synchronized between different virtual machines to create a trusted logic virtual domain for a user.Type: ApplicationFiled: July 9, 2013Publication date: August 27, 2015Inventors: Hai Jin, Deqing Zou, Weiqi Dai, Changqing Jiang
-
Publication number: 20150199524Abstract: In at least one embodiment, a method for secured rollback of a virtual Trusted Platform Module (vTPM) that renders available functionalities offered by Trusted Platform Module (TPM) on a computer to a virtual machine (VM) is provided. The method includes taking and saving a snapshot of current state of a virtual machine as well as a snapshot of the corresponding vTPM, upon receiving a request for taking a snapshot of the virtual machine. The method further includes converting the snapshots into the current state of the virtual machine and the current state of the vTPM, respectively, upon receiving a request to roll back the virtual machine.Type: ApplicationFiled: July 9, 2013Publication date: July 16, 2015Inventors: Hai Jin, Deqing Zou, Weiqi Dai, Fengwei Wang