Patents by Inventor Weiqi LUO
Weiqi LUO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11886583Abstract: Disclosed is a description-entropy-based intelligent detection method for a big data mobile software similarity. The method comprises the following steps: acquiring a path of mobile software, and reading a file of the mobile software according to the path; performing preliminary reverse engineering decompilation on the file of the mobile software to obtain function characteristics of each piece of mobile software; counting distribution of description entropy of each piece of mobile software by means of description entropy in the function characteristics; further integrating description entropy of each piece of mobile software, after integration, comparing description entropy distribution conditions among the mobile software, and carrying out similarity score calculation to obtain similarity scores among the mobile software; and outputting the similarity scores of all mobile software to obtain a mobile software similarity result.Type: GrantFiled: April 22, 2020Date of Patent: January 30, 2024Inventors: Quanlong Guan, Weiqi Luo, Chuying Liu, Huanming Zhang, Lin Cui, Zhefu Li, Rongjun Li
-
Patent number: 11836616Abstract: Disclosed is a method for constructing an auditable and privacy-preserving collaborative deep learning platform based on a blockchain-empowered incentive mechanism, which allows trainers of multiple similar models to cooperate for training deep learning models while protecting confidentiality and auditing correctness of shared parameters. The invention has the following technical effects. Firstly, the encryption method used by model trainers protects the confidentiality of sharing parameters; furthermore, the updated parameters are decrypted through the cooperation of all participants, which reduces the possible disclosure of parameters. Secondly, the encrypted parameters are stored in the blockchain, and are only available to participants and authorized miners who are responsible to update parameters.Type: GrantFiled: December 4, 2019Date of Patent: December 5, 2023Assignee: Jinan UniversityInventors: Jian Weng, Jiasi Weng, Ming Li, Yue Zhang, Jilian Zhang, Weiqi Luo
-
Patent number: 11683189Abstract: With the popularity of Blockchain comes grave security-related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject to specific scenarios. The present disclosure proposes a method, a system, and a device for maintaining privacy and traceability of a Blockchain-based system. The method includes: registering in a Blockchain-based system; transmitting a message from a transmitter T to a receiver R via an anonymous network, after a registration request of the transmitter T has been approved and storing message transmission data generated during a message transmission process in a Blockchain; and performing an identity disclosure by using the message transmission data when the message is detected to be false. The anonymous network may transmit the message by onion routing. The solution proposed by the present disclosure can achieve traceability and privacy for a Blockchain-based system simultaneously.Type: GrantFiled: March 19, 2020Date of Patent: June 20, 2023Assignee: Jinan UniversityInventors: Jian Weng, Yue Zhang, Jiasi Weng, Ming Li, Weiqi Luo
-
Patent number: 11334669Abstract: A method for detecting mobile malware, including step S1: compressing a mobile software subject to detection and a primary mobile software each containing N functions, wherein each of the functions is compressed into a hash value, a description entropy and a compressed string; S2: calculating a quantity of identical functions between the mobile software subject to detection and the primary mobile software; and then finding out a quantity of similar functions using Hdsim method or entropy_descpt_sim method; and then calculating a degree of similarity to obtain a value of similarity; S3: comparing the value of similarity with a predetermined threshold value; if the value of similarity is greater then or equal to the predetermined threshold value, the mobile software subject to detection is suspected to repackaging; if the value of similarity is smaller than the predetermined threshold value, the mobile software subject to detection is not suspected to repackaging.Type: GrantFiled: March 29, 2019Date of Patent: May 17, 2022Inventors: Quanlong Guan, Weiqi Luo, Huanming Zhang, Zhefu Li, Lin Cui, Yuanfen Wu
-
Patent number: 11265722Abstract: A method for pairing a plurality of devices in the context of internet of things (IoT), including: connecting power supplies of the plurality of devices to a same power source, wherein the plurality of devices includes an initiator device and a responder device; synchronizing clocks of the initiator device and the responder device; switching the power source off and on for a plurality of times n; recording time stamps S(T)={T1, T2, T3, . . . Tn} corresponding to time stamps when the initiator device and the responder device switch off in response to switching off of the power source; and performing the pairing of the initiator device and the responder device if each of the initiator device time stamps is within a predefined delay tolerance of a corresponding time stamp of the responder device time stamps, otherwise rejecting the pairing of the initiator device and the responder device.Type: GrantFiled: March 19, 2020Date of Patent: March 1, 2022Assignee: Jinan UniversityInventors: Jian Weng, Zhijian Shao, Yue Zhang, Ming Li, Jiasi Weng, Yongdong Wu, Weiqi Luo
-
Publication number: 20220058263Abstract: Disclosed is a description-entropy-based intelligent detection method for a big data mobile software similarity. The method comprises the following steps: acquiring a path of mobile software, and reading a file of the mobile software according to the path; performing preliminary reverse engineering decompilation on the file of the mobile software to obtain function characteristics of each piece of mobile software; counting distribution of description entropy of each piece of mobile software by means of description entropy in the function characteristics; further integrating description entropy of each piece of mobile software, after integration, comparing description entropy distribution conditions among the mobile software, and carrying out similarity score calculation to obtain similarity scores among the mobile software; and outputting the similarity scores of all mobile software to obtain a mobile software similarity result.Type: ApplicationFiled: April 22, 2020Publication date: February 24, 2022Inventors: Quanlong GUAN, Weiqi LUO, Chuying LIU, Huanming ZHANG, Lin CUI, Zhefu LI, Rongjun LI
-
Patent number: 11223487Abstract: A method of digital forensics based on blockchain technology and a fine-grained access control scheme, using a finite state machine (FSM) based on smart contracts to manage a digital certificate, where a law enforcement agency ends the warrant request to a court and upon approval of the request collects the forensics data by obtaining the master secret key for accessing the forensic data from a plurality of authorities. The forensics data are encrypted by D-KP-ABE (Distributed Key Police Attribute-based Encryption) with privacy-preserved access policy. The secret sharings are required to form the decryption key for accessing the forensics data. The secret sharings are distributed among the plurality of authorized authorities so that no individual authority has a complete master key by itself. Each state of the FSM requires digital signature(s) of at least one specific authorized authority for transitioning to a next state.Type: GrantFiled: March 19, 2020Date of Patent: January 11, 2022Assignee: Jinan UniversityInventors: Jian Weng, Ming Li, Jiasi Weng, Yue Zhang, Anjia Yang, Weiqi Luo
-
Publication number: 20210297851Abstract: A method for pairing a plurality of devices in the context of internet of things (IoT), including: connecting power supplies of the plurality of devices to a same power source, wherein the plurality of devices includes an initiator device and a responder device; synchronizing clocks of the initiator device and the responder device; switching the power source off and on for a plurality of times n; recording time stamps S(T)={T1, T2, T3, . . . Tn} corresponding to time stamps when the initiator device and the responder device switch off in response to switching off of the power source; and performing the pairing of the initiator device and the responder device if each of the initiator device time stamps is within a predefined delay tolerance of a corresponding time stamp of the responder device time stamps, otherwise rejecting the pairing of the initiator device and the responder device.Type: ApplicationFiled: March 19, 2020Publication date: September 23, 2021Inventors: Jian WENG, Zhijian SHAO, Yue ZHANG, Ming LI, Jiasi WENG, Yongdong WU, Weiqi LUO
-
Publication number: 20210297272Abstract: With the popularity of Blockchain comes grave security-related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject to specific scenarios. The present disclosure proposes a method, a system, and a device for maintaining privacy and traceability of a Blockchain-based system. The method includes: registering in a Blockchain-based system; transmitting a message from a transmitter T to a receiver R via an anonymous network, after a registration request of the transmitter T has been approved and storing message transmission data generated during a message transmission process in a Blockchain; and performing an identity disclosure by using the message transmission data when the message is detected to be false. The anonymous network may transmit the message by onion routing. The solution proposed by the present disclosure can achieve traceability and privacy for a Blockchain-based system simultaneously.Type: ApplicationFiled: March 19, 2020Publication date: September 23, 2021Inventors: Jian WENG, Yue ZHANG, Jiasi WENG, Ming LI, Weiqi LUO
-
Publication number: 20210297268Abstract: A method of digital forensics based on blockchain technology and a fine-grained access control scheme, using a finite state machine (FSM) based on smart contracts to manage a digital certificate, where a law enforcement agency ends the warrant request to a court and upon approval of the request collects the forensics data by obtaining the master secret key for accessing the forensic data from a plurality of authorities. The forensics data are encrypted by D-KP-ABE (Distributed Key Police Attribute-based Encryption) with privacy-preserved access policy. The secret sharings are required to form the decryption key for accessing the forensics data. The secret sharings are distributed among the plurality of authorized authorities so that no individual authority has a complete master key by itself. Each state of the FSM requires digital signature(s) of at least one specific authorized authority for transitioning to a next state.Type: ApplicationFiled: March 19, 2020Publication date: September 23, 2021Inventors: Jian WENG, Ming LI, Jiasi WENG, Yue ZHANG, Anjia YANG, Weiqi LUO
-
Publication number: 20200410095Abstract: A method for detecting mobile malware, including step S1: compressing a mobile software subject to detection and a primary mobile software each containing N functions, wherein each of the functions is compressed into a hash value, a description entropy and a compressed string; S2: calculating a quantity of identical functions between the mobile software subject to detection and the primary mobile software; and then finding out a quantity of similar functions using Hdsim method or entropy_descpt_sim method; and then calculating a degree of similarity to obtain a value of similarity; S3: comparing the value of similarity with a predetermined threshold value; if the value of similarity is greater then or equal to the predetermined threshold value, the mobile software subject to detection is suspected to repackaging; if the value of similarity is smaller than the redetermined threshold value, the mobile software subject to detection is not suspected to repackaging.Type: ApplicationFiled: March 29, 2019Publication date: December 31, 2020Inventors: Quanlong GUAN, Weiqi LUO, Huanming ZHANG, Zhefu LI, Lin CUI, Yuanfen WU
-
Publication number: 20200193292Abstract: Disclosed is a method for constructing an auditable and privacy-preserving collaborative deep learning platform based on a blockchain-empowered incentive mechanism, which allows trainers of multiple similar models to cooperate for training deep learning models while protecting confidentiality and auditing correctness of shared parameters. The invention has the following technical effects. Firstly, the encryption method used by model trainers protects the confidentiality of sharing parameters; furthermore, the updated parameters are decrypted through the cooperation of all participants, which reduces the possible disclosure of parameters. Secondly, the encrypted parameters are stored in the blockchain, and are only available to participants and authorized miners who are responsible to update parameters.Type: ApplicationFiled: December 4, 2019Publication date: June 18, 2020Inventors: Jian WENG, Jiasi WENG, Ming LI, Yue ZHANG, Jilian ZHANG, Weiqi LUO