Patents by Inventor Weiyu JIANG

Weiyu JIANG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240086518
    Abstract: Embodiments of this application provide a packet transmission method and apparatus, and relate to the field of communication technologies. When the packet transmission method is applied, a first packet may be determined by using a first device, where packet fields of the first packet include an authentication identifier field, an authentication code field, and at least one candidate authentication field, and the authentication identifier field indicates a field that is in the at least one candidate authentication field and that corresponds to the authentication code field; and then the first packet is sent.
    Type: Application
    Filed: November 10, 2023
    Publication date: March 14, 2024
    Inventors: Weiyu JIANG, Fei YANG, Bingyang LIU, Daode ZHANG, Chuang WANG
  • Patent number: 11756435
    Abstract: An airspace network optimization method based on a flight normality target is capable of comprehensively considering spatial and temporal distribution of national air traffic demands, a service capability of an airspace network and a capacity increase limit of each airspace unit according to the flight normality optimization target on the basis of carrying out pre-analysis on a flight operation efficiency under a current airspace service capability, to position a key problem airspace and generate a capacity expansion suggestion of the related airspace; and aims at improving the flight operation efficiency by expanding the airspace service capability, and providing technical support for a user to carry out analysis and optimization work of national airspace network problems at a strategic level.
    Type: Grant
    Filed: August 11, 2022
    Date of Patent: September 12, 2023
    Assignee: THE 28TH RESEARCH INSTITUTE OF CHINA ELECTRONICS TECHNOLOGY GROUP CORPORATION
    Inventors: Feifei Chen, Mingwei Zhang, Hui Ding, Ming Tong, Xiaozhu Shi, Shan'e Xu, Jibo Huang, Yang Zhang, Fan Bao, Ke Xu, Jing Tian, Wenyi Tang, Zeyuan Liu, Qingqing Tan, Weiyu Jiang
  • Publication number: 20230283475
    Abstract: Embodiments of this application disclose an identity authentication system, method, apparatus, and device, and a computer-readable storage medium, and belong to the field of security technologies. In an embodiment of this application, a symmetric key based identity verification method is implemented by sharing the first symmetric key between the terminal device and the authorization device. In this way, when confidentiality of the symmetric key is ensured, authentication code generated based on the symmetric key in an entire identity authentication process is not easily forged, so that security and reliability of identity authentication can be ensured.
    Type: Application
    Filed: May 11, 2023
    Publication date: September 7, 2023
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Weiyu JIANG, Bingyang LIU, Chuang WANG
  • Publication number: 20230269690
    Abstract: A user equipment (UE) uses a one-time identifier to identify itself in a registration request sent to a trusted core network (CN) node. The one-time identifier is in the form of a first temporary identifier. The trusted CN node registers the UE, generates a next temporary identifier, and sends a random challenge to the UE. The UE uses the random challenge to generate a copy of the next temporary identifier and stores the next temporary identifier in a memory. Then, until a next registration, the UE and the trusted CN node use the first temporary identifier to identify the UE when communicating with each other and with other trusted and untrusted CN nodes. In the next registration event, the UE uses the next temporary identifier to identity itself to the trusted CN node. A true identity of the UE is not detectable by an untrusted node that may become compromised.
    Type: Application
    Filed: April 25, 2023
    Publication date: August 24, 2023
    Inventors: Gholamreza RAMEZAN, Bingyang LIU, Weiyu JIANG, Fei YANG, Amr Adel Nasr ABDELNASSER
  • Patent number: 11694556
    Abstract: A time-space conversion method of flight sequencing information aims to solve a problem that a flight sequencing suggestion generated by an arrival management system has poor effect in practical application due to abstract characteristics, comprising: generating a sequencing time and a delay suggestion of a flight in each key point in a terminal area and each runway by using a flight sequencing technology; predicting a flight status of the flight according to a current position and 4D trajectory information of the flight, and filtering a delay-consumed flight segment, and on that basis, generating a flight segment delay allocation strategy with reference to an aircraft performance and sequencing information, and obtaining a flight segment delay allocation result; and generating a visual spatial position reference target according to the flight segment delay allocation result and an operation deviation limit.
    Type: Grant
    Filed: August 10, 2022
    Date of Patent: July 4, 2023
    Assignee: THE 28TH RESEARCH INSTITUTE OF CHINA ELECTRONICS TECHNOLOGY GROUP CORPORATION
    Inventors: Feifei Chen, Ke Xu, Yibo Ding, Mingwei Zhang, Hui Ding, Ming Tong, Xiaozhu Shi, Yang Zhang, Jibo Huang, Wenyi Tang, Zeyuan Liu, Qingqing Tan, Weiyu Jiang
  • Publication number: 20220398931
    Abstract: A flight schedule optimization method based on a flight normality target is capable of carrying out pre-analysis on flight operation efficiency of a current flight schedule based on a national air traffic control service capability, and on this basis, generating a corresponding flight schedule adjustment suggestion according to a flight normality optimization target, which aims to provide a technical support means for carrying out flight schedule rationality analysis and optimization in strategic air traffic flow management.
    Type: Application
    Filed: August 10, 2022
    Publication date: December 15, 2022
    Inventors: Feifei CHEN, Hui DING, Mingwei ZHANG, Ming TONG, Xiaozhu SHI, Shan'e XU, Fan BAO, Jibo HUANG, Yang ZHANG, Xuan WANG, Jing TIAN, Wenyi TANG, Zeyuan LIU, Qingqing TAN, Weiyu JIANG
  • Publication number: 20220392356
    Abstract: A time-space conversion method of flight sequencing information aims to solve a problem that a flight sequencing suggestion generated by an arrival management system has poor effect in practical application due to abstract characteristics, comprising: generating a sequencing time and a delay suggestion of a flight in each key point in a terminal area and each runway by using a flight sequencing technology; predicting a flight status of the flight according to a current position and 4D trajectory information of the flight, and filtering a delay-consumed flight segment, and on that basis, generating a flight segment delay allocation strategy with reference to an aircraft performance and sequencing information, and obtaining a flight segment delay allocation result; and generating a visual spatial position reference target according to the flight segment delay allocation result and an operation deviation limit.
    Type: Application
    Filed: August 10, 2022
    Publication date: December 8, 2022
    Inventors: Feifei CHEN, Ke XU, Yibo DING, Mingwei ZHANG, Hui DING, MING TONG, Xiaozhu SHI, Yang ZHANG, Jibo HUANG, Wenyi TANG, Zeyuan LIU, Qingqing TAN, Weiyu JIANG
  • Publication number: 20220383759
    Abstract: An airspace network optimization method based on a flight normality target is capable of comprehensively considering spatial and temporal distribution of national air traffic demands, a service capability of an airspace network and a capacity increase limit of each airspace unit according to the flight normality optimization target on the basis of carrying out pre-analysis on a flight operation efficiency under a current airspace service capability, to position a key problem airspace and generate a capacity expansion suggestion of the related airspace; and aims at improving the flight operation efficiency by expanding the airspace service capability, and providing technical support for a user to carry out analysis and optimization work of national airspace network problems at a strategic level.
    Type: Application
    Filed: August 11, 2022
    Publication date: December 1, 2022
    Inventors: Feifei CHEN, Mingwei ZHANG, Hui DING, Ming TONG, Xiaozhu SHI, Shan'e XU, Jibo HUANG, Yang ZHANG, Fan BAO, Ke XU, Jing TIAN, Wenyi TANG, Zeyuan LIU, Qingqing TAN, Weiyu JIANG
  • Publication number: 20220358846
    Abstract: A method for determining transition height elements in a flight climbing stage based on constant value segment identification comprises the steps of splitting a speed component and a Mach component from a flight track, and performing linear interpolation on the two respectively; discretizing the interpolated speed component, and setting a threshold for filtering to obtain a speed discrete value set; identifying a constant-speed segment, and acquiring a maximum constant-speed value and a maximum moment of the constant-speed segment; keeping the Mach component of the track with a time no less than the constant-speed maximum moment; discretizing the kept Mach components, and filtering to obtain a Mach discrete value set; identifying a constant-Mach segment, and acquiring a constant-Mach value corresponding to a minimum moment of the constant-Mach segment; and calculating a transition height in the flight climbing stage according to the constant-speed value and the constant-Mach value obtained.
    Type: Application
    Filed: July 21, 2022
    Publication date: November 10, 2022
    Inventors: Yingchao XIAO, Weiyu JIANG, Yungang TIAN
  • Publication number: 20220182825
    Abstract: A method comprises generating, based on identity information of a user by an identity management server, a temporary privacy identity identifier of a terminal device, receiving, from the terminal device, a network access request comprising the temporary privacy identity identifier, generating an authentication key of the temporary privacy identity identifier based on the temporary privacy identity identifier and a primary identity authentication key of a domain to which the terminal device belongs, generating a first message based on the temporary privacy identity identifier and the authentication key, sending the first message to the terminal device, receiving a second message from the terminal device based on the first message, performing authentication on the second message based on the temporary privacy identity identifier and the authentication key, and allowing access to a network device by the terminal device after the authentication succeeds.
    Type: Application
    Filed: February 25, 2022
    Publication date: June 9, 2022
    Inventors: Weiyu Jiang, Bingyang Liu, Junjie Wan
  • Publication number: 20220174085
    Abstract: A data processing method includes an authenticated identifier and a key corresponding to the authenticated identifier are allocated to a terminal that accesses a service supported by an application server. The terminal includes the authenticated identifier and a verification code in a sent data packet such that a network device can identify a legal data packet and an illegal data packet based on the authenticated identifier and the verification code, and forward the legal data packet.
    Type: Application
    Filed: February 18, 2022
    Publication date: June 2, 2022
    Inventors: Weiyu Jiang, Bingyang Liu, Chuang Wang
  • Publication number: 20220174072
    Abstract: This application provides a data processing method and a device. In embodiments, a data processing method applied to a network device may include: receiving a first data packet, where the first data packet includes a source IP address and a first verification code; obtaining a first key; generating a second verification code based on the source IP address and the first key; and if the second verification code is the same as the first verification code, determining that the first data packet is valid.
    Type: Application
    Filed: February 18, 2022
    Publication date: June 2, 2022
    Inventors: Bingyang Liu, Weiyu Jiang, Chuang Wang
  • Publication number: 20180018389
    Abstract: Embodiments of the disclosure provide a method and an apparatus for keyword-based text retrieval. The method comprises: performing word segmentation on an initial text for retrieval after receiving a retrieval instruction from a user to obtain keywords included in the initial text; displaying each of the keywords of the initial text; and after receiving, from the user, a keyword retrieval instruction for the displayed one or more keywords, performing retrieval based on a keyword selected by the user. The retrieval efficiency and retrieval experience for users is efficiently improved through the technical solutions provided in the disclosed embodiments.
    Type: Application
    Filed: January 28, 2016
    Publication date: January 18, 2018
    Inventors: Weiyu JIANG, Dong WEI