Patents by Inventor Weiyu JIANG
Weiyu JIANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240086518Abstract: Embodiments of this application provide a packet transmission method and apparatus, and relate to the field of communication technologies. When the packet transmission method is applied, a first packet may be determined by using a first device, where packet fields of the first packet include an authentication identifier field, an authentication code field, and at least one candidate authentication field, and the authentication identifier field indicates a field that is in the at least one candidate authentication field and that corresponds to the authentication code field; and then the first packet is sent.Type: ApplicationFiled: November 10, 2023Publication date: March 14, 2024Inventors: Weiyu JIANG, Fei YANG, Bingyang LIU, Daode ZHANG, Chuang WANG
-
Patent number: 11756435Abstract: An airspace network optimization method based on a flight normality target is capable of comprehensively considering spatial and temporal distribution of national air traffic demands, a service capability of an airspace network and a capacity increase limit of each airspace unit according to the flight normality optimization target on the basis of carrying out pre-analysis on a flight operation efficiency under a current airspace service capability, to position a key problem airspace and generate a capacity expansion suggestion of the related airspace; and aims at improving the flight operation efficiency by expanding the airspace service capability, and providing technical support for a user to carry out analysis and optimization work of national airspace network problems at a strategic level.Type: GrantFiled: August 11, 2022Date of Patent: September 12, 2023Assignee: THE 28TH RESEARCH INSTITUTE OF CHINA ELECTRONICS TECHNOLOGY GROUP CORPORATIONInventors: Feifei Chen, Mingwei Zhang, Hui Ding, Ming Tong, Xiaozhu Shi, Shan'e Xu, Jibo Huang, Yang Zhang, Fan Bao, Ke Xu, Jing Tian, Wenyi Tang, Zeyuan Liu, Qingqing Tan, Weiyu Jiang
-
Publication number: 20230283475Abstract: Embodiments of this application disclose an identity authentication system, method, apparatus, and device, and a computer-readable storage medium, and belong to the field of security technologies. In an embodiment of this application, a symmetric key based identity verification method is implemented by sharing the first symmetric key between the terminal device and the authorization device. In this way, when confidentiality of the symmetric key is ensured, authentication code generated based on the symmetric key in an entire identity authentication process is not easily forged, so that security and reliability of identity authentication can be ensured.Type: ApplicationFiled: May 11, 2023Publication date: September 7, 2023Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Weiyu JIANG, Bingyang LIU, Chuang WANG
-
Publication number: 20230269690Abstract: A user equipment (UE) uses a one-time identifier to identify itself in a registration request sent to a trusted core network (CN) node. The one-time identifier is in the form of a first temporary identifier. The trusted CN node registers the UE, generates a next temporary identifier, and sends a random challenge to the UE. The UE uses the random challenge to generate a copy of the next temporary identifier and stores the next temporary identifier in a memory. Then, until a next registration, the UE and the trusted CN node use the first temporary identifier to identify the UE when communicating with each other and with other trusted and untrusted CN nodes. In the next registration event, the UE uses the next temporary identifier to identity itself to the trusted CN node. A true identity of the UE is not detectable by an untrusted node that may become compromised.Type: ApplicationFiled: April 25, 2023Publication date: August 24, 2023Inventors: Gholamreza RAMEZAN, Bingyang LIU, Weiyu JIANG, Fei YANG, Amr Adel Nasr ABDELNASSER
-
Patent number: 11694556Abstract: A time-space conversion method of flight sequencing information aims to solve a problem that a flight sequencing suggestion generated by an arrival management system has poor effect in practical application due to abstract characteristics, comprising: generating a sequencing time and a delay suggestion of a flight in each key point in a terminal area and each runway by using a flight sequencing technology; predicting a flight status of the flight according to a current position and 4D trajectory information of the flight, and filtering a delay-consumed flight segment, and on that basis, generating a flight segment delay allocation strategy with reference to an aircraft performance and sequencing information, and obtaining a flight segment delay allocation result; and generating a visual spatial position reference target according to the flight segment delay allocation result and an operation deviation limit.Type: GrantFiled: August 10, 2022Date of Patent: July 4, 2023Assignee: THE 28TH RESEARCH INSTITUTE OF CHINA ELECTRONICS TECHNOLOGY GROUP CORPORATIONInventors: Feifei Chen, Ke Xu, Yibo Ding, Mingwei Zhang, Hui Ding, Ming Tong, Xiaozhu Shi, Yang Zhang, Jibo Huang, Wenyi Tang, Zeyuan Liu, Qingqing Tan, Weiyu Jiang
-
Publication number: 20220398931Abstract: A flight schedule optimization method based on a flight normality target is capable of carrying out pre-analysis on flight operation efficiency of a current flight schedule based on a national air traffic control service capability, and on this basis, generating a corresponding flight schedule adjustment suggestion according to a flight normality optimization target, which aims to provide a technical support means for carrying out flight schedule rationality analysis and optimization in strategic air traffic flow management.Type: ApplicationFiled: August 10, 2022Publication date: December 15, 2022Inventors: Feifei CHEN, Hui DING, Mingwei ZHANG, Ming TONG, Xiaozhu SHI, Shan'e XU, Fan BAO, Jibo HUANG, Yang ZHANG, Xuan WANG, Jing TIAN, Wenyi TANG, Zeyuan LIU, Qingqing TAN, Weiyu JIANG
-
Publication number: 20220392356Abstract: A time-space conversion method of flight sequencing information aims to solve a problem that a flight sequencing suggestion generated by an arrival management system has poor effect in practical application due to abstract characteristics, comprising: generating a sequencing time and a delay suggestion of a flight in each key point in a terminal area and each runway by using a flight sequencing technology; predicting a flight status of the flight according to a current position and 4D trajectory information of the flight, and filtering a delay-consumed flight segment, and on that basis, generating a flight segment delay allocation strategy with reference to an aircraft performance and sequencing information, and obtaining a flight segment delay allocation result; and generating a visual spatial position reference target according to the flight segment delay allocation result and an operation deviation limit.Type: ApplicationFiled: August 10, 2022Publication date: December 8, 2022Inventors: Feifei CHEN, Ke XU, Yibo DING, Mingwei ZHANG, Hui DING, MING TONG, Xiaozhu SHI, Yang ZHANG, Jibo HUANG, Wenyi TANG, Zeyuan LIU, Qingqing TAN, Weiyu JIANG
-
Publication number: 20220383759Abstract: An airspace network optimization method based on a flight normality target is capable of comprehensively considering spatial and temporal distribution of national air traffic demands, a service capability of an airspace network and a capacity increase limit of each airspace unit according to the flight normality optimization target on the basis of carrying out pre-analysis on a flight operation efficiency under a current airspace service capability, to position a key problem airspace and generate a capacity expansion suggestion of the related airspace; and aims at improving the flight operation efficiency by expanding the airspace service capability, and providing technical support for a user to carry out analysis and optimization work of national airspace network problems at a strategic level.Type: ApplicationFiled: August 11, 2022Publication date: December 1, 2022Inventors: Feifei CHEN, Mingwei ZHANG, Hui DING, Ming TONG, Xiaozhu SHI, Shan'e XU, Jibo HUANG, Yang ZHANG, Fan BAO, Ke XU, Jing TIAN, Wenyi TANG, Zeyuan LIU, Qingqing TAN, Weiyu JIANG
-
Publication number: 20220358846Abstract: A method for determining transition height elements in a flight climbing stage based on constant value segment identification comprises the steps of splitting a speed component and a Mach component from a flight track, and performing linear interpolation on the two respectively; discretizing the interpolated speed component, and setting a threshold for filtering to obtain a speed discrete value set; identifying a constant-speed segment, and acquiring a maximum constant-speed value and a maximum moment of the constant-speed segment; keeping the Mach component of the track with a time no less than the constant-speed maximum moment; discretizing the kept Mach components, and filtering to obtain a Mach discrete value set; identifying a constant-Mach segment, and acquiring a constant-Mach value corresponding to a minimum moment of the constant-Mach segment; and calculating a transition height in the flight climbing stage according to the constant-speed value and the constant-Mach value obtained.Type: ApplicationFiled: July 21, 2022Publication date: November 10, 2022Inventors: Yingchao XIAO, Weiyu JIANG, Yungang TIAN
-
Publication number: 20220182825Abstract: A method comprises generating, based on identity information of a user by an identity management server, a temporary privacy identity identifier of a terminal device, receiving, from the terminal device, a network access request comprising the temporary privacy identity identifier, generating an authentication key of the temporary privacy identity identifier based on the temporary privacy identity identifier and a primary identity authentication key of a domain to which the terminal device belongs, generating a first message based on the temporary privacy identity identifier and the authentication key, sending the first message to the terminal device, receiving a second message from the terminal device based on the first message, performing authentication on the second message based on the temporary privacy identity identifier and the authentication key, and allowing access to a network device by the terminal device after the authentication succeeds.Type: ApplicationFiled: February 25, 2022Publication date: June 9, 2022Inventors: Weiyu Jiang, Bingyang Liu, Junjie Wan
-
Publication number: 20220174085Abstract: A data processing method includes an authenticated identifier and a key corresponding to the authenticated identifier are allocated to a terminal that accesses a service supported by an application server. The terminal includes the authenticated identifier and a verification code in a sent data packet such that a network device can identify a legal data packet and an illegal data packet based on the authenticated identifier and the verification code, and forward the legal data packet.Type: ApplicationFiled: February 18, 2022Publication date: June 2, 2022Inventors: Weiyu Jiang, Bingyang Liu, Chuang Wang
-
Publication number: 20220174072Abstract: This application provides a data processing method and a device. In embodiments, a data processing method applied to a network device may include: receiving a first data packet, where the first data packet includes a source IP address and a first verification code; obtaining a first key; generating a second verification code based on the source IP address and the first key; and if the second verification code is the same as the first verification code, determining that the first data packet is valid.Type: ApplicationFiled: February 18, 2022Publication date: June 2, 2022Inventors: Bingyang Liu, Weiyu Jiang, Chuang Wang
-
Publication number: 20180018389Abstract: Embodiments of the disclosure provide a method and an apparatus for keyword-based text retrieval. The method comprises: performing word segmentation on an initial text for retrieval after receiving a retrieval instruction from a user to obtain keywords included in the initial text; displaying each of the keywords of the initial text; and after receiving, from the user, a keyword retrieval instruction for the displayed one or more keywords, performing retrieval based on a keyword selected by the user. The retrieval efficiency and retrieval experience for users is efficiently improved through the technical solutions provided in the disclosed embodiments.Type: ApplicationFiled: January 28, 2016Publication date: January 18, 2018Inventors: Weiyu JIANG, Dong WEI