Patents by Inventor Yilei CHEN
Yilei CHEN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230124498Abstract: A method is disclosed. The method includes receiving, by a user device, an encrypted message from a server computer. The encrypted message is a message encrypted with a master secret key or a key derived from the master secret key. The user device signs the encrypted message with a secure element private key. The user device, using a whitebox, cryptographically recovers a secure element public key from a certified key using a server computer public key. The certified key is certified by the server computer and based on at least the secure element public key. The user device, using the whitebox, cryptographically recovers the encrypted message from the signed encrypted message using the secure element public key. The user device, using the whitebox, decrypts the encrypted message using the master secret key or the key derived from the master secret key in the whitebox to obtain the message.Type: ApplicationFiled: May 14, 2021Publication date: April 20, 2023Applicant: Visa International Service AssociationInventors: Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven James Watson
-
Publication number: 20230124617Abstract: Techniques of generating a lattice-based verification matrix and signature vector are disclosed. The method enables a generating device to sample a gadget matrix and then generate a reduced gadget matrix. The generating device may then sample a trapdoor matrix and use the trapdoor matrix and the reduced gadget matrix to generate a verification matrix. A sending device may receive the trapdoor matrix and the verification matrix from the generating device, in addition to receiving a message. The sending device may then use the trapdoor matrix and the verification matrix to generate a signature vector for the message. A verification device can receive the verification matrix, the message, and the signature vector. The verification device may use the verification matrix and the signature vector to verify the message.Type: ApplicationFiled: December 15, 2022Publication date: April 20, 2023Applicant: Visa International Service AssociationInventors: Pratyay Mukherjee, Yilei Chen, Nicholas Genise
-
Patent number: 11563586Abstract: Techniques of generating a lattice-based verification matrix and signature vector are disclosed. The method enables a generating device to sample a gadget matrix and then generate a reduced gadget matrix. The generating device may then sample a trapdoor matrix and use the trapdoor matrix and the reduced gadget matrix to generate a verification matrix. A sending device may receive the trapdoor matrix and the verification matrix from the generating device, in addition to receiving a message. The sending device may then use the trapdoor matrix and the verification matrix to generate a signature vector for the message. A verification device can receive the verification matrix, the message, and the signature vector. The verification device may use the verification matrix and the signature vector to verify the message.Type: GrantFiled: August 1, 2019Date of Patent: January 24, 2023Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Pratyay Mukherjee, Yilei Chen, Nicholas Genise
-
Publication number: 20220353089Abstract: Improvements to post-quantum lattice-based digital signature schemes are disclosed. By sampling cryptographic material, including cryptographic key matrices and masking vectors from a uniform distribution, embodiments eliminate the need for a security check during generation of a digital signature vector. As a result, digital signatures can be generated faster and at a lower failure rate. A generating device can generate a verification matrix A and a secret matrix S from a uniform distribution, and an error matrix E from a special distribution (such as a Gaussian). The generating device can combine the three matrices to generate a public matrix Y. The first and the fourth matrices (A, Y) can be used as a public key used to verify digital signatures. The second and the third matrices (S, E) can be used as a private key used to generate digital signatures.Type: ApplicationFiled: September 23, 2020Publication date: November 3, 2022Inventors: Daniel Masny, Yilei Chen, Rouzbeh Behnia
-
Publication number: 20220086003Abstract: Systems, methods, and apparatuses for protecting a secret on a device with limited memory, while still providing tamper resistance, are described. To achieve security, an encoding computer can apply a memory-hard function MHF to a secret S and determine a result Y, then determine a proof ? for the result Y. Then, the encoding computer can send a codeword C comprising the secret S and the proof ? to a decoding computer. The decoding computer can retrieve the codeword C from persistent memory and parse the secret S and the proof ?. The decoding device can use transient memory to decode the codeword C by verifying the proof ? was generated with the secret S and the result Y. When the correctness of the result Y is verified, the decoding device can apply a cryptographic function to input data using the secret S then reset the transient memory.Type: ApplicationFiled: November 23, 2021Publication date: March 17, 2022Inventors: Pratyay Mukherjee, Binyi Chen, Yilei Chen
-
Publication number: 20220047211Abstract: The invention discloses a sleep quality monitoring system for the middle-aged and the elderly. The sleep quality monitoring system for the middle-aged and the elderly detects the sleep quality of the middle-aged and the elderly by a power socket A, an adapter A, a mobile phone APP, a cloud server, a bedside lamp, a power socket B, an adapter B, a transceiver controller, a humidity sensor, a temperature sensor, a pressure sensor, a heating pad, a signal collecting unit, a processor transmitting signal unit, a humidity sensing unit, a temperature sensing unit, an alarm unit, a preheating unit, a heating unit and a signal receiving processing unit.Type: ApplicationFiled: August 14, 2020Publication date: February 17, 2022Inventors: Xinghong Jiang, Wenfang Song, Xuechuan Duan, Xiang Ling, Yilei Chen
-
Publication number: 20220045865Abstract: Techniques of generating a lattice-based verification matrix and signature vector are disclosed. The method enables generating device to sample a gadget matrix and then generate a reduced gadget matrix. The generating device may then sample a trapdoor matrix and use the trapdoor matrix and the reduced gadget matrix to generate a verification matrix. A sending device may receive the trapdoor matrix and the verification matrix from the generating device, in addition to receiving a message. The sending device may then use the trapdoor matrix and the verification matrix to generate a signature vector for the message. A verification device can receive the verification matrix, the message, and the signature vector. The verification device may use the verification matrix and the signature vector to verify the message.Type: ApplicationFiled: August 1, 2019Publication date: February 10, 2022Inventors: Pratyay Mukherjee, Yilei Chen, Nicholas Genise
-
Patent number: 11212103Abstract: Systems, methods, and apparatuses for protecting a secret on a device with limited memory, while still providing tamper resistance, are described. To achieve security, an encoding computer can apply a memory-hard function MHF to a secret S and determine a result Y, then determine a proof ? for the result Y. Then, the encoding computer can send a codeword C comprising the secret S and the proof ? to a decoding computer. The decoding computer can retrieve the codeword C from persistent memory and parse the secret S and the proof ?. The decoding device can use transient memory decode the codeword C by verifying the proof ? was generated with the secret S and the result Y. When the correctness of the result Y is verified, the decoding device can apply a cryptographic function to input data using the secret S then reset the transient memory.Type: GrantFiled: August 7, 2019Date of Patent: December 28, 2021Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventors: Pratyay Mukherjee, Binyi Chen, Yilei Chen
-
Patent number: 11125554Abstract: A reference-level gear helix artifact for transferring gear helix value. The invention provides a reference-level gear helix artifact with a global symmetrical structure that can be easily obtained by generating method. The centroid point of the artifact passes through the geometric center of the artifact mandrel. The cylinder of the reference-level gear helix artifact is provided with the straight tooth groove, the left-hand tooth groove and the right-hand tooth groove, axial reference torus and radial reference cylinder, fine tooth threads and center holes. Among them, the straight tooth groove includes a pair of involute cylindrical surfaces with opposite 0° helix angle, the left-handed tooth groove includes a involute helicoidal surface with 15° and a involute helicoidal surface with 30°, and the right-hand tooth groove includes a involute helicoidal surface with 15° and a involute helicoidal surface with 30°.Type: GrantFiled: July 16, 2019Date of Patent: September 21, 2021Assignee: DALIAN UNIVERSITY OF TECHNOLOGYInventors: Siying Ling, Yilei Chen, Ming Ling, Huiyang Zhang, Xiaodong Wang
-
Patent number: 11090743Abstract: A mutual-lapping device and mutual-lapping method for improving processing precision based on the principle of error averaging is proposed. The device including driving friction wheel, driving belt pulley, transmission belt A, connecting rod A, rotation shaft segment A, multi-ball sleeve, mutual-lapping gear A, tension spring, driven friction wheel, pendulum bar of the driven friction wheel, driven belt pulley, transmission belt B, connecting rod B, pressure spring of tensioning pulley, tensioner mechanism, rotation shaft segment B and mutual-lapping gear B. By mutual lapping the high-precision gears, not only the pitch deviation, tooth profile deviation, helix deviation and runout can be reduced synchronously, but also the machining cost is low. Meanwhile, the effect of improving pitch accuracy, profile accuracy, helix accuracy and runout accuracy and reducing surface roughness is remarkable.Type: GrantFiled: May 9, 2018Date of Patent: August 17, 2021Assignee: Dalian University of TechnologyInventors: Siying Ling, Xunlian Wang, Ming Ling, Yilei Chen, Huiyang Zhang, Xiaodong Wang, Liding Wang
-
Publication number: 20210046565Abstract: A mutual-lapping device and mutual-lapping method for improving processing precision based on the principle of error averaging is proposed. The device including driving friction wheel, driving belt pulley, transmission belt A, connecting rod A, rotation shaft segment A, multi-ball sleeve, mutual-lapping gear A, tension spring, driven friction wheel, pendulum bar of the driven friction wheel, driven belt pulley, transmission belt B, connecting rod B, pressure spring of tensioning pulley, tensioner mechanism, rotation shaft segment B and mutual-lapping gear B. By mutual lapping the high-precision gears, not only the pitch deviation, tooth profile deviation, helix deviation and runout can be reduced synchronously, but also the machining cost is low. Meanwhile, the effect of improving pitch accuracy, profile accuracy, helix accuracy and runout accuracy and reducing surface roughness is remarkable.Type: ApplicationFiled: May 9, 2018Publication date: February 18, 2021Inventors: Siying LING, Xunlian WANG, Ming LING, Yilei CHEN, Huiyang ZHANG, Xiaodong WANG, Liding WANG
-
Publication number: 20200309519Abstract: A reference-level gear helix artifact for transferring gear helix value. The invention provides a reference-level gear helix artifact with a global symmetrical structure that can be easily obtained by generating method. The centroid point of the artifact passes through the geometric center of the artifact mandrel. The cylinder of the reference-level gear helix artifact is provided with the straight tooth groove, the left-hand tooth groove and the right-hand tooth groove, axial reference torus and radial reference cylinder, fine tooth threads and center holes. Among them, the straight tooth groove includes a pair of involute cylindrical surfaces with opposite 0° helix angle, the left-handed tooth groove includes a involute helicoidal surface with 15° and a involute helicoidal surface with 30°, and the right-hand tooth groove includes a involute helicoidal surface with 15° and a involute helicoidal surface with 30°.Type: ApplicationFiled: July 16, 2019Publication date: October 1, 2020Inventors: Siying LING, Yilei CHEN, Ming LING, Huiyang ZHANG, Xiaodong WANG
-
Publication number: 20150047053Abstract: A server, comprising a communication unit for receiving a user identifier and a unique identifier of digital content to be transferred from a first terminal, and feeding back intermediate information to the first terminal, and for receiving intermediate information and second terminal device information from a second terminal, and sending a license to the second terminal; a rights acquisition unit for acquiring rights information of the digital content to be transferred; a generation unit for generating the intermediate information; an authentication unit for authenticating the intermediate information from the second terminal; a license generation unit for generating a license. Information may be generated according to user identifier of the transferor and rights information of the digital content. The acceptor may gain use rights of the digital content based on received intermediate information, so that transfer flow of the digital content is optimized, leading to more convenient user operations.Type: ApplicationFiled: December 10, 2013Publication date: February 12, 2015Applicants: FOUNDER APABI TECHNOLOGY LIMITED, PEKING UNIVERSITY FOUNDER GROUP CO., LTD.Inventors: Yilei CHEN, Wei Wan
-
Publication number: 20130283043Abstract: A method for updating an authorization of electronic information includes receiving, by an authorization updating server, first information from a user equipment requesting for updating authorization items, wherein the first information includes first identification information and a first list of authorization items requested to be updated, determining a second list of authorization items stored in the authorization updating server that correspond to the first identification information, comparing the first list of authorization items and the second list of authorization items and determining a third list including authorization items that are listed in both the first list and the second list of authorization items, and transmitting the third list of authorization items to the user equipment.Type: ApplicationFiled: April 24, 2013Publication date: October 24, 2013Applicants: BEIJING FOUNDER APABI TECHNOLOGY LTD., PEKING UNIVERSITY FOUNDER GROUP CO., LTD.Inventors: Yilei CHEN, Wei WAN, Chao QU