Patents by Inventor Yafeng Jiang
Yafeng Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240350545Abstract: The present application provides modified immune cells that express TLR receptors. In some embodiments, the modified immune cell further comprises an engineered receptor such as a chimeric antigen receptor (CAR). The present application also provides methods and pharmaceutical compositions for cancer treatment using the modified immune cells described herein.Type: ApplicationFiled: August 18, 2022Publication date: October 24, 2024Inventors: Yanliang ZHU, Qingling JIANG, Zhongyuan TU, Yafeng ZHANG, Shu WU, Xiaohu FAN
-
Patent number: 12095770Abstract: Example implementations relate to connecting an IoT device to a wireless network using Device Provisioning Protocol (DPP). An authentication server receives a DPP network access authorization request including a connector identifier from an Access Point (AP) in communication with the IoT device. The connector identifier is a hash of the public network access key of the IoT device. If the connector identifier is valid, the authentication server determines a configurable policy from a set of configurable policies that is applicable to the IoT device. The authentication server transmits network permissions defined in the configurable policy to the AP. The IoT device is connected to the wireless network by the AP based on the network permissions.Type: GrantFiled: June 14, 2021Date of Patent: September 17, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Yafeng Jiang, Daniel Harkins, Rajesh Kumar Ganapathy Achari, Amogh Guruprasad Deshmukh, Chunfeng Wang
-
Patent number: 12095905Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.Type: GrantFiled: August 30, 2021Date of Patent: September 17, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Yafeng Jiang, Jianpo Han, Guangzhi Ran
-
Patent number: 11722898Abstract: Systems and methods are provided for a detection and defense system relating to a network connection sharing application. For example, the system can simulate a request for a network password using a conventional application that shares this information. The application may be implemented on, for example, a mobile device or a virtual machine (VM). In some embodiments, the mobile device/VM attempts to establish a network connection to an access point (AP) using the shared password over a tunnel established between the AP and mobile device/VM. If the mobile device/VM can connect to the AP, an assumption may be made that the user credentials have been leaked and a potential security risk exists. An alert can be sent to a network administrator of the communication network (e.g., to perform an action, etc.). The action may include, for example, changing the password, removing access from one or more users, and the like.Type: GrantFiled: July 26, 2021Date of Patent: August 8, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Jianpo Han, Yafeng Jiang, Guangzhi Ran
-
Patent number: 11671830Abstract: In embodiments of the present disclosure, there is provided an approach for connecting an access point (AP) to a wireless multi-hop network. An electronic device obtains device information of the AP in a wireless manner, and the electronic device and the AP can establish a wireless trusted connection based on the device information. Then, the electronic device transmits a configuration to the AP over the wireless trusted connection, wherein the configuration at least indicates an identifier of a wireless multi-hop network and a network role of the AP in the wireless multi-hop network. The AP then connects to the wireless multi-hop network according to the configuration. Embodiments of the present disclosure provide a wireless trusted way to provision an AP, which requires little manual intervention and technical expertise, while ensuring the safety of the provisioning.Type: GrantFiled: March 3, 2020Date of Patent: June 6, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Yafeng Jiang, Chunfeng Wang, Qiang Zhou
-
Publication number: 20230068972Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.Type: ApplicationFiled: August 30, 2021Publication date: March 2, 2023Inventors: Yafeng Jiang, Jianpo Han, Guangzhi Ran
-
Publication number: 20230027153Abstract: Systems and methods are provided for a detection and defense system relating to a network connection sharing application. For example, the system can simulate a request for a network password using a conventional application that shares this information. The application may be implemented on, for example, a mobile device or a virtual machine (VM). In some embodiments, the mobile device/VM attempts to establish a network connection to an access point (AP) using the shared password over a tunnel established between the AP and mobile device/VM. If the mobile device/VM can connect to the AP, an assumption may be made that the user credentials have been leaked and a potential security risk exists. An alert can be sent to a network administrator of the communication network (e.g., to perform an action, etc.). The action may include, for example, changing the password, removing access from one or more users, and the like.Type: ApplicationFiled: July 26, 2021Publication date: January 26, 2023Inventors: Jianpo Han, Yafeng Jiang, Guangzhi Ran
-
Patent number: 11561917Abstract: In embodiments of the present disclosure, there is provided a solution for managing a USB connection between a USB device and a host device. According to embodiments of the present disclosure, a USB management server receives, from a USB management client at a host device, USB ID information for identifying a USB device that is plugged into the host device. Whether the USB ID information is valid is determined based on an authentication policy for authenticating the USB device. If the USB ID information is valid, the USB management client is instructed to permit a connection between the USB device and the host device. Accordingly, the connection may be managed by the USB management server. Embodiments of the present disclosure present an effective way for managing USB connections in a centralized way, which provides various flexible authentication policies and requires less manual operations.Type: GrantFiled: September 23, 2020Date of Patent: January 24, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Jiabao Jin, Yafeng Jiang, Jian Dong, Chunfeng Wang, Berend Dunsbergen
-
Patent number: 11546755Abstract: Systems and methods are provided for implementing a centralized configurator server/service in the cloud that can take the place of conventional mobile devices used for provisioning IoT devices or WiFi clients in a network. In order to provision the IoT devices or WiFi clients, a mobile device or access point (AP) may be used to relay Device Provisioning Protocol (DPP) messages and/or information between the centralized configurator server/service and the IoT devices or WiFi clients.Type: GrantFiled: January 4, 2019Date of Patent: January 3, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Yafeng Jiang, Chunfeng Wang, Jiabao Jin, Guangning Qin
-
Publication number: 20220400118Abstract: Example implementations relate to connecting an IoT device to a wireless network using Device Provisioning Protocol (DPP). An authentication server receives a DPP network access authorization request including a connector identifier from an Access Point (AP) in communication with the IoT device. The connector identifier is a hash of the public network access key of the IoT device. If the connector identifier is valid, the authentication server determines a configurable policy from a set of configurable policies that is applicable to the IoT device. The authentication server transmits network permissions defined in the configurable policy to the AR The IoT device is connected to the wireless network by the AP based on the network permissions.Type: ApplicationFiled: June 14, 2021Publication date: December 15, 2022Inventors: Yafeng JIANG, Daniel HARKINS, Rajesh Kumar GANAPATHY ACHARI, Amogh Guruprasad DESHMUKH, Chunfeng WANG
-
Publication number: 20220092011Abstract: In embodiments of the present disclosure, there is provided a solution for managing a USB connection between a USB device and a host device. According to embodiments of the present disclosure, a USB management server receives, from a USB management client at a host device, USB ID information for identifying a USB device that is plugged into the host device. Whether the USB ID information is valid is determined based on an authentication policy for authenticating the USB device. If the USB ID information is valid, the USB management client is instructed to permit a connection between the USB device and the host device. Accordingly, the connection may be managed by the USB management server. Embodiments of the present disclosure present an effective way for managing USB connections in a centralized way, which provides various flexible authentication policies and requires less manual operations.Type: ApplicationFiled: September 23, 2020Publication date: March 24, 2022Inventors: Jiabao JIN, Yafeng JIANG, Jian DONG, Chunfeng WANG, Berend DUNSBERGEN
-
Publication number: 20220038422Abstract: Examples of authentication and firewall enforcement for Internet of Things (IoT) devices are described. In an example, a request to authenticate an IoT device coupled to a network device is sent to an authentication server. The request includes a Media Access Control (MAC) address of the IoT device. A response indicative of successful authentication of the IoT device based on the MAC address is received from the authentication server. The response includes a first attribute indicative of a network address of a remote server to connect with the IoT device. A firewall role for the IoT device is generated based on a combination of an Internet Protocol (IP) address of the IoT device and the first attribute. The IoT device is associated with the firewall role.Type: ApplicationFiled: July 31, 2020Publication date: February 3, 2022Inventors: Hao LU, Berend DUNSBERGEN, Xiaoding SHANG, Yafeng JIANG
-
Publication number: 20210282013Abstract: In embodiments of the present disclosure, there is provided an approach for connecting an access point (AP) to a wireless multi-hop network. An electronic device obtains device information of the AP in a wireless manner, and the electronic device and the AP can establish a wireless trusted connection based on the device information. Then, the electronic device transmits a configuration to the AP over the wireless trusted connection, wherein the configuration at least indicates an identifier of a wireless multi-hop network and a network role of the AP in the wireless multi-hop network. The AP then connects to the wireless multi-hop network according to the configuration. Embodiments of the present disclosure provide a wireless trusted way to provision an AP, which requires little manual intervention and technical expertise, while ensuring the safety of the provisioning.Type: ApplicationFiled: March 3, 2020Publication date: September 9, 2021Inventors: Yafeng JIANG, Chunfeng WANG, Qiang ZHOU
-
Patent number: 11082880Abstract: An example wireless device, comprising: a radio system including an antenna, to receive receiver feedback information, the receiver feedback information being information collected by a receiver relating to receiving status of the receiver; a memory; and a processor executing instructions stored on the memory to: determine whether a level of noises and interferences associated with the receiver exceeds a predefined threshold based on the receiver feedback information; in response to determining that the level of noises and interferences associated with the receiver does not exceed the predefined threshold, obtain a revised data error ratio based on an original data error ratio and the receiver feedback information, the original data error ratio being a data error ratio collected by the wireless device; and adjust the data rate associated with the receiver based on the revised data error ratio.Type: GrantFiled: October 27, 2017Date of Patent: August 3, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: Yafeng Jiang, Guangzhi Ran, Qiang Zhou, Jianpo Han
-
Patent number: 10849087Abstract: Systems and methods are provided for implementing a coexistence coordinator in an access point (AP) operating in a Internet of Things (IoT) network. The coexistence coordinator coordinates transmission of both IoT-related data from an IoT radio and WiFi data from a WiFi radio, the IoT radio and the WiFi radio coexisting in the AP. The coexistence coordinator synchronizes time between the WiFi radio and the IoT radio so that times during which IoT-related data is to be sent from the IoT radio (in accordance with Time-Division Multiple Access (TDMA) channel access method) can be determined. Operation of the WiFi radio is suspended during those times when the IoT-related data is transmitted from the IoT radio.Type: GrantFiled: January 17, 2019Date of Patent: November 24, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Yafeng Jiang, Qiang Zhou, Chunfeng Wang, Zhiyuan Yao
-
Publication number: 20200336932Abstract: An example wireless device, comprising: a radio system including an antenna, to receive receiver feedback information, the receiver feedback information being information collected by a receiver relating to receiving status of the receiver; a memory; and a processor executing instructions stored on the memory to: determine whether a level of noises and interferences associated with the receiver exceeds a predefined threshold based on the receiver feedback information; in response to determining that the level of noises and interferences associated with the receiver does not exceed the predefined threshold, obtain a revised data error ratio based on an original data error ratio and the receiver feedback information, the original data error ratio being a data error ratio collected by the wireless device; and adjust the data rate associated with the receiver based on the revised data error ratio.Type: ApplicationFiled: October 27, 2017Publication date: October 22, 2020Inventors: Yafeng JIANG, Guangzhi RAN, Qiang ZHOU, Jianpo HAN
-
Publication number: 20200236640Abstract: Systems and methods are provided for implementing a coexistence coordinator in an access point (AP) operating in a Internet of Things (IoT) network. The coexistence coordinator coordinates transmission of both IoT-related data from an IoT radio and WiFi data from a WiFi radio, the IoT radio and the WiFi radio coexisting in the AP. The coexistence coordinator synchronizes time between the WiFi radio and the IoT radio so that times during which IoT-related data is to be sent from the IoT radio (in accordance with Time-Division Multiple Access (TDMA) channel access method) can be determined. Operation of the WiFi radio is suspended during those times when the IoT-related data is transmitted from the IoT radio.Type: ApplicationFiled: January 17, 2019Publication date: July 23, 2020Inventors: Yafeng Jiang, Qiang Zhou, Chunfeng Wang, Zhiyuan Yao
-
Publication number: 20200221296Abstract: Systems and methods are provided for implementing a centralized configurator server/service in the cloud that can take the place of conventional mobile devices used for provisioning IoT devices or WiFi clients in a network. In order to provision the IoT devices or WiFi clients, a mobile device or access point (AP) may be used to relay Device Provisioning Protocol (DPP) messages and/or information between the centralized configurator server/service and the IoT devices or WiFi clients.Type: ApplicationFiled: January 4, 2019Publication date: July 9, 2020Inventors: Yafeng Jiang, Chunfeng Wang, Jiabao Jin, Guangning Qin