Patents by Inventor Weiqi LUO

Weiqi LUO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11886583
    Abstract: Disclosed is a description-entropy-based intelligent detection method for a big data mobile software similarity. The method comprises the following steps: acquiring a path of mobile software, and reading a file of the mobile software according to the path; performing preliminary reverse engineering decompilation on the file of the mobile software to obtain function characteristics of each piece of mobile software; counting distribution of description entropy of each piece of mobile software by means of description entropy in the function characteristics; further integrating description entropy of each piece of mobile software, after integration, comparing description entropy distribution conditions among the mobile software, and carrying out similarity score calculation to obtain similarity scores among the mobile software; and outputting the similarity scores of all mobile software to obtain a mobile software similarity result.
    Type: Grant
    Filed: April 22, 2020
    Date of Patent: January 30, 2024
    Inventors: Quanlong Guan, Weiqi Luo, Chuying Liu, Huanming Zhang, Lin Cui, Zhefu Li, Rongjun Li
  • Patent number: 11836616
    Abstract: Disclosed is a method for constructing an auditable and privacy-preserving collaborative deep learning platform based on a blockchain-empowered incentive mechanism, which allows trainers of multiple similar models to cooperate for training deep learning models while protecting confidentiality and auditing correctness of shared parameters. The invention has the following technical effects. Firstly, the encryption method used by model trainers protects the confidentiality of sharing parameters; furthermore, the updated parameters are decrypted through the cooperation of all participants, which reduces the possible disclosure of parameters. Secondly, the encrypted parameters are stored in the blockchain, and are only available to participants and authorized miners who are responsible to update parameters.
    Type: Grant
    Filed: December 4, 2019
    Date of Patent: December 5, 2023
    Assignee: Jinan University
    Inventors: Jian Weng, Jiasi Weng, Ming Li, Yue Zhang, Jilian Zhang, Weiqi Luo
  • Patent number: 11683189
    Abstract: With the popularity of Blockchain comes grave security-related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject to specific scenarios. The present disclosure proposes a method, a system, and a device for maintaining privacy and traceability of a Blockchain-based system. The method includes: registering in a Blockchain-based system; transmitting a message from a transmitter T to a receiver R via an anonymous network, after a registration request of the transmitter T has been approved and storing message transmission data generated during a message transmission process in a Blockchain; and performing an identity disclosure by using the message transmission data when the message is detected to be false. The anonymous network may transmit the message by onion routing. The solution proposed by the present disclosure can achieve traceability and privacy for a Blockchain-based system simultaneously.
    Type: Grant
    Filed: March 19, 2020
    Date of Patent: June 20, 2023
    Assignee: Jinan University
    Inventors: Jian Weng, Yue Zhang, Jiasi Weng, Ming Li, Weiqi Luo
  • Patent number: 11334669
    Abstract: A method for detecting mobile malware, including step S1: compressing a mobile software subject to detection and a primary mobile software each containing N functions, wherein each of the functions is compressed into a hash value, a description entropy and a compressed string; S2: calculating a quantity of identical functions between the mobile software subject to detection and the primary mobile software; and then finding out a quantity of similar functions using Hdsim method or entropy_descpt_sim method; and then calculating a degree of similarity to obtain a value of similarity; S3: comparing the value of similarity with a predetermined threshold value; if the value of similarity is greater then or equal to the predetermined threshold value, the mobile software subject to detection is suspected to repackaging; if the value of similarity is smaller than the predetermined threshold value, the mobile software subject to detection is not suspected to repackaging.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: May 17, 2022
    Inventors: Quanlong Guan, Weiqi Luo, Huanming Zhang, Zhefu Li, Lin Cui, Yuanfen Wu
  • Patent number: 11265722
    Abstract: A method for pairing a plurality of devices in the context of internet of things (IoT), including: connecting power supplies of the plurality of devices to a same power source, wherein the plurality of devices includes an initiator device and a responder device; synchronizing clocks of the initiator device and the responder device; switching the power source off and on for a plurality of times n; recording time stamps S(T)={T1, T2, T3, . . . Tn} corresponding to time stamps when the initiator device and the responder device switch off in response to switching off of the power source; and performing the pairing of the initiator device and the responder device if each of the initiator device time stamps is within a predefined delay tolerance of a corresponding time stamp of the responder device time stamps, otherwise rejecting the pairing of the initiator device and the responder device.
    Type: Grant
    Filed: March 19, 2020
    Date of Patent: March 1, 2022
    Assignee: Jinan University
    Inventors: Jian Weng, Zhijian Shao, Yue Zhang, Ming Li, Jiasi Weng, Yongdong Wu, Weiqi Luo
  • Publication number: 20220058263
    Abstract: Disclosed is a description-entropy-based intelligent detection method for a big data mobile software similarity. The method comprises the following steps: acquiring a path of mobile software, and reading a file of the mobile software according to the path; performing preliminary reverse engineering decompilation on the file of the mobile software to obtain function characteristics of each piece of mobile software; counting distribution of description entropy of each piece of mobile software by means of description entropy in the function characteristics; further integrating description entropy of each piece of mobile software, after integration, comparing description entropy distribution conditions among the mobile software, and carrying out similarity score calculation to obtain similarity scores among the mobile software; and outputting the similarity scores of all mobile software to obtain a mobile software similarity result.
    Type: Application
    Filed: April 22, 2020
    Publication date: February 24, 2022
    Inventors: Quanlong GUAN, Weiqi LUO, Chuying LIU, Huanming ZHANG, Lin CUI, Zhefu LI, Rongjun LI
  • Patent number: 11223487
    Abstract: A method of digital forensics based on blockchain technology and a fine-grained access control scheme, using a finite state machine (FSM) based on smart contracts to manage a digital certificate, where a law enforcement agency ends the warrant request to a court and upon approval of the request collects the forensics data by obtaining the master secret key for accessing the forensic data from a plurality of authorities. The forensics data are encrypted by D-KP-ABE (Distributed Key Police Attribute-based Encryption) with privacy-preserved access policy. The secret sharings are required to form the decryption key for accessing the forensics data. The secret sharings are distributed among the plurality of authorized authorities so that no individual authority has a complete master key by itself. Each state of the FSM requires digital signature(s) of at least one specific authorized authority for transitioning to a next state.
    Type: Grant
    Filed: March 19, 2020
    Date of Patent: January 11, 2022
    Assignee: Jinan University
    Inventors: Jian Weng, Ming Li, Jiasi Weng, Yue Zhang, Anjia Yang, Weiqi Luo
  • Publication number: 20210297851
    Abstract: A method for pairing a plurality of devices in the context of internet of things (IoT), including: connecting power supplies of the plurality of devices to a same power source, wherein the plurality of devices includes an initiator device and a responder device; synchronizing clocks of the initiator device and the responder device; switching the power source off and on for a plurality of times n; recording time stamps S(T)={T1, T2, T3, . . . Tn} corresponding to time stamps when the initiator device and the responder device switch off in response to switching off of the power source; and performing the pairing of the initiator device and the responder device if each of the initiator device time stamps is within a predefined delay tolerance of a corresponding time stamp of the responder device time stamps, otherwise rejecting the pairing of the initiator device and the responder device.
    Type: Application
    Filed: March 19, 2020
    Publication date: September 23, 2021
    Inventors: Jian WENG, Zhijian SHAO, Yue ZHANG, Ming LI, Jiasi WENG, Yongdong WU, Weiqi LUO
  • Publication number: 20210297272
    Abstract: With the popularity of Blockchain comes grave security-related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject to specific scenarios. The present disclosure proposes a method, a system, and a device for maintaining privacy and traceability of a Blockchain-based system. The method includes: registering in a Blockchain-based system; transmitting a message from a transmitter T to a receiver R via an anonymous network, after a registration request of the transmitter T has been approved and storing message transmission data generated during a message transmission process in a Blockchain; and performing an identity disclosure by using the message transmission data when the message is detected to be false. The anonymous network may transmit the message by onion routing. The solution proposed by the present disclosure can achieve traceability and privacy for a Blockchain-based system simultaneously.
    Type: Application
    Filed: March 19, 2020
    Publication date: September 23, 2021
    Inventors: Jian WENG, Yue ZHANG, Jiasi WENG, Ming LI, Weiqi LUO
  • Publication number: 20210297268
    Abstract: A method of digital forensics based on blockchain technology and a fine-grained access control scheme, using a finite state machine (FSM) based on smart contracts to manage a digital certificate, where a law enforcement agency ends the warrant request to a court and upon approval of the request collects the forensics data by obtaining the master secret key for accessing the forensic data from a plurality of authorities. The forensics data are encrypted by D-KP-ABE (Distributed Key Police Attribute-based Encryption) with privacy-preserved access policy. The secret sharings are required to form the decryption key for accessing the forensics data. The secret sharings are distributed among the plurality of authorized authorities so that no individual authority has a complete master key by itself. Each state of the FSM requires digital signature(s) of at least one specific authorized authority for transitioning to a next state.
    Type: Application
    Filed: March 19, 2020
    Publication date: September 23, 2021
    Inventors: Jian WENG, Ming LI, Jiasi WENG, Yue ZHANG, Anjia YANG, Weiqi LUO
  • Publication number: 20200410095
    Abstract: A method for detecting mobile malware, including step S1: compressing a mobile software subject to detection and a primary mobile software each containing N functions, wherein each of the functions is compressed into a hash value, a description entropy and a compressed string; S2: calculating a quantity of identical functions between the mobile software subject to detection and the primary mobile software; and then finding out a quantity of similar functions using Hdsim method or entropy_descpt_sim method; and then calculating a degree of similarity to obtain a value of similarity; S3: comparing the value of similarity with a predetermined threshold value; if the value of similarity is greater then or equal to the predetermined threshold value, the mobile software subject to detection is suspected to repackaging; if the value of similarity is smaller than the redetermined threshold value, the mobile software subject to detection is not suspected to repackaging.
    Type: Application
    Filed: March 29, 2019
    Publication date: December 31, 2020
    Inventors: Quanlong GUAN, Weiqi LUO, Huanming ZHANG, Zhefu LI, Lin CUI, Yuanfen WU
  • Publication number: 20200193292
    Abstract: Disclosed is a method for constructing an auditable and privacy-preserving collaborative deep learning platform based on a blockchain-empowered incentive mechanism, which allows trainers of multiple similar models to cooperate for training deep learning models while protecting confidentiality and auditing correctness of shared parameters. The invention has the following technical effects. Firstly, the encryption method used by model trainers protects the confidentiality of sharing parameters; furthermore, the updated parameters are decrypted through the cooperation of all participants, which reduces the possible disclosure of parameters. Secondly, the encrypted parameters are stored in the blockchain, and are only available to participants and authorized miners who are responsible to update parameters.
    Type: Application
    Filed: December 4, 2019
    Publication date: June 18, 2020
    Inventors: Jian WENG, Jiasi WENG, Ming LI, Yue ZHANG, Jilian ZHANG, Weiqi LUO