Patents by Inventor Xiaorong ZHAO

Xiaorong ZHAO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11955663
    Abstract: This application provides a battery module and an assembling method thereof. The battery module includes batteries and busbar components. The batteries are arranged consecutively along a longitudinal direction of the battery module. Each battery includes a first electrode terminal and a second electrode terminal. The busbar components are connected to the batteries. The batteries include a first battery and a second battery. The first electrode terminal of the first battery and the first electrode terminal of the second battery are arranged along the longitudinal direction. The busbar components include a first busbar component, and the first busbar component includes a first part, a second part, and a third part.
    Type: Grant
    Filed: December 18, 2020
    Date of Patent: April 9, 2024
    Assignee: CONTEMPORARY AMPEREX TECHNOLOGY CO., LIMITED
    Inventors: Changjin Wen, Ye Xu, Anwei Wu, Guofeng Liu, Xiaorong Liu, Bin Zhao
  • Publication number: 20240097887
    Abstract: An identity authentication method is disclosed in embodiments of the present application. When a requester and an authentication access controller perform identity authentication using an authentication mechanism of a pre-shared key, the identity information of entities is transmitted in the form of ciphertext, thereby preventing the identity information of the entities from being exposed during the transmission, so that attackers cannot obtain private or sensitive information. The mutual or unilateral identity authentication between the authentication access controller and the requester is achieved while ensuring the confidentiality of the entity identity and related information, thereby laying a foundation for ensuring that the user accessing the network is legitimate and/or the network accessed by the user is legitimate.
    Type: Application
    Filed: December 21, 2021
    Publication date: March 21, 2024
    Inventors: Xiaolong LAI, Jun CAO, Manxia TIE, Qin LI, Xiaorong ZHAO, Bianling ZHANG, Zhenhai HUANG, Chaofan SHAO
  • Publication number: 20240096288
    Abstract: A display substrate a driving method therefor, and a display apparatus. The display substrate comprises: M rows and N columns of sub-pixels, N data signal lines and a data reset circuit, wherein at least one sub-pixel comprises a pixel circuit; an ith data signal line is connected to pixel circuits in an ith column, where M?1, N?1, and 1?i?N; and the data reset circuit is electrically connected to a data reset control end, a data initial signal end and the N data signal lines, and is configured to provide a signal of the data initial signal end to the N data signal lines under the control of the data reset control end.
    Type: Application
    Filed: December 20, 2021
    Publication date: March 21, 2024
    Inventors: Haoliang ZHENG, Yan QU, Dongni LIU, Li XIAO, Jiao ZHAO, Xiaorong CUI, Seungwoo HAN, Minghua XUAN
  • Publication number: 20240064025
    Abstract: An identity authentication method and apparatus, a device, a chip, a storage medium, and a program. Confidentiality processing is performed on identity information of a requesting device and an authentication access controller, such that the identity information of the requesting device and the authentication access controller is prevented from being exposed during a transmission process, thereby ensuring that an attacker cannot obtain private and sensitive information of the requesting device and the authentication access controller. In addition, by means of involving an authentication server, mutual identity authentication of the requesting device and the authentication access controller is realized while the confidentiality of information related to an entity identity is ensured.
    Type: Application
    Filed: December 21, 2021
    Publication date: February 22, 2024
    Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Yuehui WANG
  • Publication number: 20240064006
    Abstract: Disclosed is an identity authentication method. During the process of a requesting device authenticating the identity of an authentication access controller, confidentiality processing is performed on identity information that carries private and sensitive information, and identity authentication result information, thus private and sensitive information can be prevented from being exposed, such that an attacker cannot acquire private and sensitive information in a first authentication response message or an authentication result message even if they have intercepted same, thereby preventing an attack of an attacker on a legitimate authentication access controller, and ensuring the security of the authentication access controller, the requesting device and even a network. Further disclosed are an identity authentication apparatus, a storage medium, a program, and a program product.
    Type: Application
    Filed: December 21, 2021
    Publication date: February 22, 2024
    Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Zhenhai HUANG, Xiang YAN
  • Publication number: 20240064027
    Abstract: Disclosed is an identity authentication method. By means of the method, confidentiality processing is performed on identity information of a requesting device, to prevent the identity information of the requesting device from being exposed during a transmission process, thereby ensuring that an attacker cannot obtain private information of the requesting device. Moreover, by means of introducing an authentication server, identity authentication performed on the requesting device by an authentication access controller is realized while ensuring the confidentiality of information related to an entity identity, so as to ensure that only legitimate users can access a network. Further disclosed are an identity authentication apparatus, a storage medium, a program, and a program product.
    Type: Application
    Filed: December 21, 2021
    Publication date: February 22, 2024
    Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Yuehui WANG, Dandan MA
  • Publication number: 20240064024
    Abstract: Disclosed in the present application are an identity authentication method and apparatus, and a device, a chip, a storage medium and a program. The identity information of a requesting device is confidentially processed to prevent the identity information of the requesting device from being exposed during transmission, thereby ensuring that an attacker cannot obtain the private information of the requesting device. In addition, by introducing an authentication server, real-time two-way identity authentication between the requesting device and an authentication access controller is achieved while ensuring the confidentiality of entity identity-related information.
    Type: Application
    Filed: December 21, 2021
    Publication date: February 22, 2024
    Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Xiang YAN
  • Publication number: 20240064011
    Abstract: Disclosed in embodiments of the present application are an identity authentication method and apparatus, a device, a chip, a storage medium, and a program. Identify information of a requesting device and an authentication access controller is subjected to confidential processing to prevent the identify information of the requesting device and the authentication access controller from being exposed in a transmission process, so as to ensure that an attacker cannot obtain the private and sensitive information. Moreover, an authentication server is introduced, such that real-time authentication of bidirectional identity between the requesting device and the authentication access controller is achieved while the confidentiality of entity identity related information is guaranteed.
    Type: Application
    Filed: December 21, 2021
    Publication date: February 22, 2024
    Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Zhenhai HUANG
  • Publication number: 20240056433
    Abstract: Disclosed is an identity authentication method. When a request device and an authentication access controller perform identity verification on the basis of an authentication mechanism of a pre-shared key, identity information of a verified party is transmitted in the form of a ciphertext, thereby preventing the identity information of the verified party from being directly exposed during transmission, and ensuring that an attacker cannot obtain private and sensitive information. Two-way or one-way identity authentication between the authentication access controller and the request device is realized, while the confidentiality of entity identity related information is ensured, thereby laying the foundation for ensuring that a user accessing a network is legitimate and/or the network accessed by the user is legitimate.
    Type: Application
    Filed: December 21, 2021
    Publication date: February 15, 2024
    Inventors: Manxia TIE, Jun CAO, Xiaolong LAI, Xiaorong ZHAO, Qin LI, Bianling ZHANG, Liang LU
  • Publication number: 20240056296
    Abstract: Disclosed in embodiments of the present application are an identity authentication method. Bidirectional or unidirectional identity authentication between an authentication access controller and a requesting device is implemented by using a pre-shared key, thereby laying a foundation for ensuring that a user accessing a network is legitimate and/or a network accessed by a user is legitimate, so as to implement secret communication between the requesting device and the authentication access controller. In addition, in an identity authentication process, a verified party performs calculation on information comprising the pre-shared key of two parties and random numbers respectively generated by the two parties to obtain an identity authentication key, and performs calculation on specified content by using the identity authentication key to obtain an identity authentication code of the verified party.
    Type: Application
    Filed: December 21, 2021
    Publication date: February 15, 2024
    Inventors: Manxia TIE, Jun CAO, Xiaorong ZHAO, Xiaolong LAI, Qin LI, Bianling ZHANG, Xiang YAN, Dandan MA
  • Publication number: 20220417750
    Abstract: A wireless network switching method. In the method, a station and a target access device directly generate a message integrity check key by means of a domain key, and verify an integrity code on the basis of the message integrity check key, so as to realize the authentication of two parties; and when the authentication of the opposite party is successful, session keys are generated by means of the domain key and in conjunction with random numbers of the two parties, thereby simplifying a switching process and realizing secure and efficient network switching. Further disclosed are a corresponding station and a corresponding access device.
    Type: Application
    Filed: November 2, 2020
    Publication date: December 29, 2022
    Inventors: Bianling ZHANG, Xiaolong LAI, Manxia TIE, Yuehui WANG, Xiaorong ZHAO, Qin LI, Guoqiang ZHANG, Zhiqiang DU