Patents by Inventor XIAOYU RUAN

XIAOYU RUAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190042725
    Abstract: In one embodiment, an apparatus includes a non-volatile storage to store a seed value and a signature that is based on an iterative execution of a function for a predetermined number of intervals. The apparatus may further include the security processor coupled to the non-volatile storage, where the security processor is to independently recover a credential for an updated version of the firmware based at least in part on the seed value and a security version number for the updated version of the firmware. Other embodiments are described and claimed.
    Type: Application
    Filed: June 28, 2018
    Publication date: February 7, 2019
    Inventors: Xiaoyu Ruan, William A. Stevens, JR.
  • Publication number: 20190007209
    Abstract: Technologies for provisioning cryptographic keys include hardcoding identical cryptographic key components of a Rivest-Shamir-Adleman (RSA) public-private key pair to each compute device of a plurality of compute devices. A unique cryptographic exponent that forms a valid RSA public-private key pair with cryptographic key components hardcoded into each compute device is provided to each compute device so that each compute device has a unique public key. The public key of each compute device may be used to provision unique secrets to the corresponding compute device.
    Type: Application
    Filed: June 30, 2017
    Publication date: January 3, 2019
    Inventors: Xiaoyu Ruan, Vincent Von Bokern, Daniel Nemiroff
  • Patent number: 10061472
    Abstract: An information terminal enables a user to simply and easily confirm a plurality of pieces of update information handled by a plurality of various application programs without any troublesome operation. An information storage stores a plurality of different types of information. An update information storage stores a part of information updated in the information storages as update information associated with the respective types. An update information manager monitors an information update in the information storages and stores, when an information update is made in the information storages, the part of the updated information in the update information storage as update information associated with the respective types. Further, an information selector extracts the update information stored in the update information storage in time series and outputs them to display them on a screen.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: August 28, 2018
    Assignee: Sony Mobile Communications Inc.
    Inventors: Kenta Ohmori, Takashi Kawakami, Seigo Iwasaki, Hiroyuki Kawakami, Akitaka Kimura, Xiaoyu Ruan, George Arriola, Yoshimitsu Funabashi, Kichiro Kurozumi, Brian Johnson, Jorge Furuya, Takahiro Kawaguchi
  • Patent number: 9215069
    Abstract: An automated method for authenticating a proving device to a verifying device involves an elliptic curve formula (ECF) for a predetermined elliptic curve associated with a proving device. According to one example method, the prover sends the verifier a message containing a first proof value (P2). The verifier determines whether P2 is a point on the elliptic curve associated with the proving device. If P2 is not on the elliptic curve, the verifier may determine that the proving device should not be trusted. The message may further comprise a second proof value (K1), and the verifier may automatically determine whether K1 corresponds to P1, based on a previous point (P0) on the elliptic curve. If K1 does not correspond to P1, the verifier may determine that the proving device should not be trusted. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 10, 2012
    Date of Patent: December 15, 2015
    Assignee: Intel Corporation
    Inventors: Xiaoyu Ruan, Xiaozhu Kang
  • Publication number: 20140289671
    Abstract: Information storages store a plurality of different types of information. An update information storage stores a part of information updated in the information storages as update information associated with the respective types. An update information manager monitors an information update in the information storages and stores, when an information update is made in the information storages, the part of the updated information in the update information storage as update information associated with the respective types. Further, an information selector extracts the update information stored in the update information storage in time series and outputs them to display them on a screen.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 25, 2014
    Applicant: SONY MOBILE COMMUNICATIONS AB
    Inventors: Kenta OHMORI, Takashi KAWAKAMI, Seigo IWASAKI, Hiroyuki KAWAKAMI, Akitaka KIMURA, Xiaoyu RUAN, George ARRIOLA, Yoshimitsu FUNABASHI, Kichiro KUROZUMI, Brian JOHNSON, Jorge FURUYA, Takahiro KAWAGUCHI
  • Publication number: 20140164767
    Abstract: An automated method for authenticating a proving device to a verifying device involves an elliptic curve formula (ECF) for a predetermined elliptic curve associated with a proving device. According to one example method, the prover sends the verifier a message containing a first proof value (P2). The verifier determines whether P2 is a point on the elliptic curve associated with the proving device. If P2 is not on the elliptic curve, the verifier may determine that the proving device should not be trusted. The message may further comprise a second proof value (K1), and the verifier may automatically determine whether K1 corresponds to P1, based on a previous point (P0) on the elliptic curve. If K1 does not correspond to P1, the verifier may determine that the proving device should not be trusted. Other embodiments are described and claimed.
    Type: Application
    Filed: December 10, 2012
    Publication date: June 12, 2014
    Inventors: XIAOYU RUAN, XIAOZHU KANG
  • Patent number: 8726346
    Abstract: Methods, apparatuses and storage medium associated with securely provisioning a digital content protection scheme are disclosed. In various embodiments, a method may include forming a trust relationship between a media application within an application execution environment of a device and a security controller of the device. The application execution environment may include an operating system, and the operating system may control resources within the application execution environment. Additionally, the security controller may be outside the application execution environment, enabling components of the security controller to be secured from components of the operating system. Further, the method may include the security controller in enabling a digital content protection scheme for the media application to provide digital content to a digital content protection enabled transmitter within the application execution environment for provision to a digital content protection enabled receiver.
    Type: Grant
    Filed: October 23, 2012
    Date of Patent: May 13, 2014
    Assignee: Intel Corporation
    Inventors: Changliang Wang, Periyakaruppan Kumaran Kalaiyappan, Xiaoyu Ruan, Radhakrishnan Venkataraman, Scott Janus, Tze Sen Fung
  • Publication number: 20130145424
    Abstract: Methods, apparatuses and storage medium associated with securely provisioning a digital content protection scheme are disclosed. In various embodiments, a method may include forming a trust relationship between a media application within an application execution environment of a device and a security controller of the device. The application execution environment may include an operating system, and the operating system may control resources within the application execution environment. Additionally, the security controller may be outside the application execution environment, enabling components of the security controller to be secured from components of the operating system. Further, the method may include the security controller in enabling a digital content protection scheme for the media application to provide digital content to a digital content protection enabled transmitter within the application execution environment for provision to a digital content protection enabled receiver.
    Type: Application
    Filed: October 23, 2012
    Publication date: June 6, 2013
    Inventors: CHANGLIANG WANG, PERIYAKARUPPAN KUMARAN KALAIYAPPAN, XIAOYU RUAN, RADHAKRISHNAN VENKATARAMAN, SCOTT JANUS, TZE SEN FUNG
  • Publication number: 20120036443
    Abstract: An information terminal enables a user to simply and easily confirm a plurality of pieces of update information handled by a plurality of various application programs without any troublesome operation. An information storage stores a plurality of different types of information. An update information storage stores a part of information updated in the information storages as update information associated with the respective types. An update information manager monitors an information update in the information storages and stores, when an information update is made in the information storages, the part of the updated information in the update information storage as update information associated with the respective types. Further, an information selector extracts the update information stored in the update information storage in time series and outputs them to display them on a screen.
    Type: Application
    Filed: September 30, 2009
    Publication date: February 9, 2012
    Applicant: SONY ERICSSON MOBILE COMMUNICATIONS
    Inventors: Kenta Ohmori, Takashi Kawakami, Siego Iwasaki, Hiroyuki Kawakami, Akitaka Kimura, Xiaoyu Ruan, George Arriola, Yoshimitsu Funabashi, Kichiro Kurozumi, Brian Johnson, Jorge Furuya, Takahiro Kawaguchi
  • Publication number: 20080063189
    Abstract: An apparatus and method is described of reducing joint weight for integers involved in a scalar multiplication, such as during cryptography. By way of example, the method is utilized within elliptic curve cryptography (ECC), wherein reducing joint weight speeds the execution of the scalar multiplication and reduces memory overhead. Generally, the recoding technique of the present invention involves generating a binary signed-digit representation for the two or more non-negative integers and then replacing groups of the binary signed-digits from left to right according to a predetermined pattern in order to reduce joint weight. The recoding process of the present invention is performed in a left-to-right order which is compatible with the order of the scalar multiplication. The present method reduces the amount of memory required for performing cryptography and allows it to be implemented in hardware or any desired combination of hardware and software.
    Type: Application
    Filed: November 10, 2006
    Publication date: March 13, 2008
    Applicant: NORTH DAKOTA STATE UNIVERSITY
    Inventors: RAJENDRA KATTI, XIAOYU RUAN