Patents by Inventor Yingfang Fu

Yingfang Fu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180359099
    Abstract: One embodiment described herein provides a system and method for secure attestation. During operation, a Trusted Platform Module (TPM) of a trusted platform receives a request for an attestation key from an application module configured to run an application on the trusted platform. The request comprises a first nonce generated by the application module. The TPM computes an attestation public/private key pair based on the first nonce and a second nonce, which is generated by the TPM, computes TPM identity information based on a unique identifier of the TPM and attestation key, and transmits a public key of the attestation public/private key pair and the TPM identity information to the application module, thereby enabling the application module to verify the public key of the attestation public/private key pair based on the TPM identity information.
    Type: Application
    Filed: December 19, 2017
    Publication date: December 13, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Yingfang Fu
  • Patent number: 10103880
    Abstract: One embodiment described herein provides a system and method for negotiating quantum data keys between first and second entities. During operation, the system performs a mutual authentication between the first and second entities. In response to the mutual authentication succeeding, the first entity receives one or more sets of key-generation parameters from the second entity. In response to validating the sets of key-generation parameters, the first entity sends an acknowledgment message to the second entity, and extracts, from a quantum string shared between the first and second entities, one or more quantum data keys based on the key-generation parameters. A respective quantum data key comprises a number of bits extracted from the quantum string.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: October 16, 2018
    Assignee: ALIBABA GROUP HOLDING LIMITED
    Inventor: Yingfang Fu
  • Patent number: 10104061
    Abstract: A method and an apparatus for distinguishing humans from computers and for controlling access to network services. One intended application of the method is a CAPTCHA technique, deployed using a shared Trusted Computing technology over a trusted network of a user terminal, a network server, and a Trusted Party, any of which may be at a Decision Point. The method distinguishes a human user making a legitimate request for network access from a programmed computer making undesired requests, by detecting unusually high network access request frequencies made by an identifiable user and/or a trusted module from the user terminal. The CAPTCHA function is further used to improve the method for controlling access to network services. The information transmitted between the members of the trusted network may be encrypted.
    Type: Grant
    Filed: May 17, 2017
    Date of Patent: October 16, 2018
    Assignee: Alibaba Group Holding Limited
    Inventors: Yingfang Fu, Yudong Zhang, Qian Zhang
  • Publication number: 20180287792
    Abstract: One embodiment described herein provides a system and method for facilitating user access to encryption keys stored within a hardware module. During operation, a server coupled to the hardware module receives a key request from the user, the key request comprising a user identifier and a key identifier. The server receives a voice message from the user, extracts voice features from a voiceprint associated with the received voice message, looks up voice features stored within the hardware module based on the user identifier, and compares the extracted voice features with the voice features stored within the hardware module. In response to the extracted voice features matching the stored voice features, the server retrieves from the hardware module an encryption key based on the user identifier and the key identifier.
    Type: Application
    Filed: February 22, 2018
    Publication date: October 4, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Yingfang Fu
  • Publication number: 20180241549
    Abstract: The disclosure provides a key generation method and apparatus. The key generation method comprises: encrypting a first key factor generated by a first device with an initial key, and sending the encrypted first key factor to a second device through a first secure channel, wherein the initial key is a key preset for the first device and the second device; receiving, through the first secure channel, a second key factor encrypted with the initial key, wherein the second key factor is generated by the second device; decrypting the second key factor encrypted with the initial key and received through the first secure channel, so as to obtain the second key factor; and generating a shared key between the first device and the second device according to the first key factor and the second key factor.
    Type: Application
    Filed: August 16, 2016
    Publication date: August 23, 2018
    Inventors: Qing AN, Yingfang FU
  • Publication number: 20180234255
    Abstract: One embodiment described herein provides a system and method for secure attestation. During operation, a Trusted Platform Module (TPM) of a trusted platform receives a request for an attestation key from an application module configured to run an application on the trusted platform. The request comprises a first nonce generated by the application module. The TPM computes an attestation public/private key pair based on the first nonce and a second nonce, which is generated by the TPM, computes TPM identity information based on a unique identifier of the TPM and attestation key, and transmits a public key of the attestation public/private key pair and the TPM identity information to the application module, thereby enabling the application module to verify the public key of the attestation public/private key pair based on the TPM identity information.
    Type: Application
    Filed: December 19, 2017
    Publication date: August 16, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Yingfang Fu
  • Patent number: 10050781
    Abstract: Embodiments of the present application provide apparatus and methods for generating a shared key, including setting up a key negotiation connection, and determining an algorithm code by negotiating using the key negotiation connection. An algorithm corresponding to the algorithm code is retrieved from a pre-stored algorithm library, and a pre-stored seed key is calculated using the algorithm to obtain a shared key. Compared with traditional key generation methods, embodiments of the present invention avoid the problem of a high bit error rate that occurs in the traditional quantum key generation methods, especially quantum key generation methods. One exemplary method determines an algorithm code through negotiation, retrieves a pre-stored algorithm corresponding to the algorithm code, and generates a new shared key using a seed key.
    Type: Grant
    Filed: August 19, 2016
    Date of Patent: August 14, 2018
    Assignee: Alibaba Group Holding Limited
    Inventors: Peng Yuan, Yingfang Fu, Shaojie Liu, Zhiqiang Wang
  • Patent number: 10038554
    Abstract: An identity authentication method for a quantum key distribution process includes selecting, by a sender, preparation bases of an identity authentication bit string in accordance with a preset basis vector selection rule; sending, by a sender, quantum states of the identity authentication bit string and quantum states of a randomly generated key bit string by using different wavelengths. The identity authentication bit string is interleaved in the key bit string at a random position and with a random length.
    Type: Grant
    Filed: February 5, 2016
    Date of Patent: July 31, 2018
    Assignee: ALIBABA GROUP HOLDING LIMITED
    Inventors: Yingfang Fu, Shuanlin Liu
  • Publication number: 20180131688
    Abstract: Disclosed herein are methods, apparatuses, and systems for remotely accessing cloud applications. In one embodiment, the method comprises receiving an access request of a requester, sent by a cloud server, requesting being accessed by a controlling party; establishing a secure channel with the cloud server based on the access request of the requester, sent by the cloud server, requesting being accessed by the controlling party; receiving, via the safety channel, a login key generated based on the access request of the requester sent by the cloud server; generating, based on the login key, a login request for logging into the requester and sending the login request to the cloud server; receiving mode information of a login success returned by the cloud server after the cloud server verifies the login request; and receiving current mode information of the requester pushed by the cloud server, and entering a remote access mode for the requester.
    Type: Application
    Filed: March 21, 2016
    Publication date: May 10, 2018
    Inventors: Qiang FANG, Hongru ZHU, Qing AN, Yingfang FU
  • Publication number: 20180109378
    Abstract: One embodiment described herein provides a system and method for secure data storage. During operation, a client device selects a quantum data key from a plurality of quantum data keys shared between the client device and a storage server, encrypts to-be-stored data using the selected quantum data key, and transmits a data-storage request to the storage server. The data-storage request comprises a key-identifier of the selected quantum data key and the encrypted data.
    Type: Application
    Filed: September 27, 2017
    Publication date: April 19, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Yingfang Fu
  • Publication number: 20180109377
    Abstract: One embodiment described herein provides a system and method for ensuring data and computation security. During operation, a server receives a key-negotiation request from a client and authenticates the client. In response to the client authenticating the server, the server negotiates, via a quantum-key-distribution process, a secret key shared between the client and the server; and stores the secret key in a trusted-computing module.
    Type: Application
    Filed: September 27, 2017
    Publication date: April 19, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Yingfang Fu
  • Publication number: 20180109372
    Abstract: One embodiment described herein provides a system and method for negotiating quantum data keys between first and second entities. During operation, the system performs a mutual authentication between the first and second entities. In response to the mutual authentication succeeding, the first entity receives one or more sets of key-generation parameters from the second entity. In response to validating the sets of key-generation parameters, the first entity sends an acknowledgment message to the second entity, and extracts, from a quantum string shared between the first and second entities, one or more quantum data keys based on the key-generation parameters. A respective quantum data key comprises a number of bits extracted from the quantum string.
    Type: Application
    Filed: September 27, 2017
    Publication date: April 19, 2018
    Applicant: Alibaba Group Holding Limited
    Inventor: Yingfang Fu
  • Publication number: 20170338951
    Abstract: One embodiment described herein provides a system and method for establishing a secure communication channel between a client and a server. During operation, the client generates a service request comprising a first dynamic message, transmits the first service request to the server, which authenticates the client based on the first dynamic message, and receives a second dynamic message from the server in response to the first dynamic message. The client authenticates the server based on the second dynamic message, and negotiates, via a quantum-key-distribution process, a secret key shared between the client and the server. The client and server then establish a secure communication channel based on at least a first portion of the secret key.
    Type: Application
    Filed: May 5, 2017
    Publication date: November 23, 2017
    Applicant: Alibaba Group Holding Limited
    Inventors: Yingfang Fu, Shuanlin Liu
  • Publication number: 20170331623
    Abstract: One embodiment provide a system and method for detecting eavesdropping while establishing secure communication between a local node and a remote node. During operation, the local node generates a random key and a regular optical signal based on the random key. The local node also generates a quantum optical signal based on a control sequence and a set of quantum state bases, and multiplexes the regular optical signal and the quantum optical signal to produce a hybrid optical signal. The local node transmits the hybrid optical signal to the remote node, sends information associated with the control sequence and information associated with the set of quantum state bases to the remote node, and receives an eavesdropping-detection result from the remote node based on measurement of the quantum optical signal, the information associated with the control sequence, and the information associated with the set of quantum state bases.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 16, 2017
    Applicant: Alibaba Group Holding Limited
    Inventors: Yingfang Fu, Shuanlin Liu
  • Publication number: 20170318010
    Abstract: A method and an apparatus for distinguishing humans from computers and for controlling access to network services. One intended application of the method is a CAPTCHA technique, deployed using a shared Trusted Computing technology over a trusted network of a user terminal, a network server, and a Trusted Party, any of which may be at a Decision Point. The method distinguishes a human user making a legitimate request for network access from a programmed computer making undesired requests, by detecting unusually high network access request frequencies made by an identifiable user and/or a trusted module from the user terminal. The CAPTCHA function is further used to improve the method for controlling access to network services. The information transmitted between the members of the trusted network may be encrypted.
    Type: Application
    Filed: May 17, 2017
    Publication date: November 2, 2017
    Inventors: Yingfang Fu, Yudong Zhang, Qian Zhang
  • Publication number: 20170201516
    Abstract: A terminal identification method, a machine identification code registration method and related system and apparatus are disclosed. After receiving a first request for which signature or certificate verification is to be performed from a terminal, a service network obtains a signature or certificate of a trusted party for a machine identification code identifier of the terminal from the first request, wherein the machine identification code identifier being an identifier allocated by the trusted party to the machine identification code of the terminal. The service network verifies the obtained signature or certificate, and if a verification result indicates legitimacy, identifies the terminal using the machine identification code identifier obtained from the signature or certificate. The present disclosure further provides a trusted party and a method of registering a machine identification code by the trusted party.
    Type: Application
    Filed: March 24, 2017
    Publication date: July 13, 2017
    Inventors: Yingfang Fu, Yudong Zhang, Zhenyuan Zhang, Jian Liu
  • Patent number: 9686269
    Abstract: A method and an apparatus for distinguishing humans from computers and for controlling access to network services. One intended application of the method is a CAPTCHA technique, deployed using a shared Trusted Computing technology over a trusted network of a user terminal, a network server, and a Trusted Party, any of which may be at a Decision Point. The method distinguishes a human user making a legitimate request for network access from a programmed computer making undesired requests, by detecting unusually high network access request frequencies made by an identifiable user and/or a trusted module from the user terminal. The CAPTCHA function is further used to improve the method for controlling access to network services. The information transmitted between the members of the trusted network may be encrypted.
    Type: Grant
    Filed: April 2, 2014
    Date of Patent: June 20, 2017
    Assignee: Alibaba Group Holding Limited
    Inventors: Yingfang Fu, Yudong Zhang, Qian Zhang
  • Patent number: 9648008
    Abstract: A terminal identification method, a machine identification code registration method and related system and apparatus are disclosed. After receiving a first request for which signature or certificate verification is to be performed from a terminal, a service network obtains a signature or certificate of a trusted party for a machine identification code identifier of the terminal from the first request, wherein the machine identification code identifier being an identifier allocated by the trusted party to the machine identification code of the terminal. The service network verifies the obtained signature or certificate, and if a verification result indicates legitimacy, identifies the terminal using the machine identification code identifier obtained from the signature or certificate. The present disclosure further provides a trusted party and a method of registering a machine identification code by the trusted party.
    Type: Grant
    Filed: May 27, 2014
    Date of Patent: May 9, 2017
    Assignee: Alibaba Group Holding Limited
    Inventors: Yingfang Fu, Yudong Zhang, Zhenyuan Zhang, Jian Liu
  • Publication number: 20170126654
    Abstract: One embodiment described herein provides a client-side process for performing dynamic-password authentication between a client and a server. This client-side process includes the steps of: generating, by the client, a service request comprising a first dynamic message; transmitting the first service request to the server; receiving a second dynamic message from the server in response to the first dynamic message for cross-validating the server; authenticating the second dynamic message to verify the validity of the server. If the validity of the server is verified, the client-side process further includes: generating a third dynamic message based on the second dynamic message; and transmitting the third dynamic message to the server for a final approval of the service request.
    Type: Application
    Filed: October 24, 2016
    Publication date: May 4, 2017
    Applicant: Alibaba Group Holding Limited
    Inventor: Yingfang Fu
  • Publication number: 20170078318
    Abstract: A method and a system of distinguishing between a human and a machine are disclosed. The method includes: when a request for accessing a designated network service is received, recording information of the request which include a time of receiving the request and information of an access object that sends the request; computing a statistical value of requests sent by the access object in real time based on a record; and determining the access object to be abnormal when the statistical value of the requests sent by the access object falls outside a predetermined normal range. The disclosed system of distinguishing between a human and a machine includes a recording module, a computation module and a determination module. Identification between humans and machines using the disclosed scheme is difficult to be cracked down and can improve an accuracy rate of human-machine identification.
    Type: Application
    Filed: November 22, 2016
    Publication date: March 16, 2017
    Inventors: Yingfang Fu, Yudong Zhang, Zhenyuan Zhang, Jian Liu