Patents by Inventor YingJiu Li
YingJiu Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12121856Abstract: The invention provides a solid material for air purification and disinfection and a preparation method and application thereof. The solid material includes: 50-60 wt. % of inorganic porous materials, 10-20 wt. % of nano titanium dioxide, 3-5 wt. % of fluorescent materials, 20-30 wt. % of sodium chlorite, 3-5 wt. % of sodium lignosulfonate, 1-10 wt. % of polyethylene glycol, and 1-10 wt. % of polyvinyl alcohol. The method for preparing the solid material includes: formulating the fluorescent material into a slurry by using a polyethylene glycol aqueous solution; uniformly mixing the nano titanium dioxide, the sodium lignosulfonate, and the fluorescent material formulated into the slurry, and then spraying the mixture on an inorganic porous material carrier to be uniformly adsorbed; and mixing the sodium chlorite with the above mixture for granulation to obtain the product.Type: GrantFiled: August 25, 2020Date of Patent: October 22, 2024Assignees: MYAIRSHIELD, LIMITED, HEBEI LICHE ZHUOGE NEW MATERIALS CO., LTD.Inventors: Yingjiu Li, Jiagang Li, Jiawang Li, Zhao Li
-
Publication number: 20220297060Abstract: The invention provides a solid material for air purification and disinfection and a preparation method and application thereof. The solid material includes: 50-60 wt. % of inorganic porous materials, 10-20 wt. % of nano titanium dioxide, 3-5 wt. % of fluorescent materials, 20-30 wt. % of sodium chlorite, 3-5 wt. % of sodium lignosulfonate, 1-10 wt. % of polyethylene glycol, and 1-10 wt. % of polyvinyl alcohol. The method for preparing the solid material includes: formulating the fluorescent material into a slurry by using a polyethylene glycol aqueous solution; uniformly mixing the nano titanium dioxide, the sodium lignosulfonate, and the fluorescent material formulated into the slurry, and then spraying the mixture on an inorganic porous material carrier to be uniformly adsorbed; and mixing the sodium chlorite with the above mixture for granulation to obtain the product.Type: ApplicationFiled: August 25, 2020Publication date: September 22, 2022Applicants: HEBEI LICHE ZHUOGE NEW MATERIALS CO.,LTD, MYAIRSHIELD, LIMITEDInventors: Yingjiu Li, Jiagang Li, Jiawang Li, Zhao Li
-
Patent number: 10868670Abstract: A data processing method and apparatus include: generating, by a terminal device, a first public key and a first private key; sending the first public key to a key generation center (KGC), where the first public key is used by the KGC or a server to generate a transform key, and the transform key is used by the server to transform data that is encrypted based on an attribute structure of the terminal device into data that is encrypted based on the first public key; receiving second data sent by the server, where the second data is data that is generated after the server processes first data according to the transform key; and decrypting the second data according to the first private key. In the data processing, main work is completed by the server with no need to use a secure channel to transmit a key.Type: GrantFiled: January 30, 2019Date of Patent: December 15, 2020Assignees: Huawei International Pte. Ltd., Singapore Management UniversityInventors: Hui Cui, Robert H. Deng, Yingjiu Li, Guilin Wang, Tsz Hon Yuen
-
Publication number: 20190173668Abstract: A data processing method and apparatus include: generating, by a terminal device, a first public key and a first private key; sending the first public key to a key generation center (KGC), where the first public key is used by the KGC or a server to generate a transform key, and the transform key is used by the server to transform data that is encrypted based on an attribute structure of the terminal device into data that is encrypted based on the first public key; receiving second data sent by the server, where the second data is data that is generated after the server processes first data according to the transform key; and decrypting the second data according to the first private key. In the data processing, main work is completed by the server with no need to use a secure channel to transmit a key.Type: ApplicationFiled: January 30, 2019Publication date: June 6, 2019Inventors: Hui CUI, Robert H. DENG, Yingjiu LI, Guilin WANG, Tsz Hon YUEN
-
Publication number: 20180096142Abstract: This application describes a system and method for determining a security classification that is to be accorded to an unknown application using a trained classification model. The application describes a system and method for training the classification model so that the classification model may be subsequently used to determine whether an unknown application is to be classified as malicious and/or benign.Type: ApplicationFiled: December 6, 2017Publication date: April 5, 2018Applicants: Huawei International Pte. Ltd., Singapore Management UniversityInventors: Ke Xu, Yingjiu Li, Robert H. Deng
-
Patent number: 9652608Abstract: System and methods for securing inter-component communications in an operating system are provided. Systems and methods provided herein secure inter-component communications in an operating system by selectively generating instances when inter-component communication requests occur, whereby each of the generated instances are attached to a newly created blocked permissions list. System and methods further manage the invocation of Application Programming Interfaces by applications or instances in the operating system by determining whether the invocation of the Application Programming Interface is allowed or declined based on the blocked permissions list and default permission list associated with each invoking application or instance.Type: GrantFiled: September 21, 2015Date of Patent: May 16, 2017Assignees: Huawei Technologies Co., Ltd., Singapore Management UniversityInventors: Yingjiu Li, Daibin Wang, Haixia Yao, Ke Xu
-
Publication number: 20160092672Abstract: System and methods for securing inter-component communications in an operating system are provided. Systems and methods provided herein secure inter-component communications in an operating system by selectively generating instances when inter-component communication requests occur, whereby each of the generated instances are attached to a newly created blocked permissions list. System and methods further manage the invocation of Application Programming Interfaces by applications or instances in the operating system by determining whether the invocation of the Application Programming Interface is allowed or declined based on the blocked permissions list and default permission list associated with each invoking application or instance.Type: ApplicationFiled: September 21, 2015Publication date: March 31, 2016Inventors: Yingjiu LI, Daibin WANG, Haixia YAO, Ke XU
-
Patent number: 7730037Abstract: Disclosed is a fragile watermarking scheme for detecting and localizing malicious alterations made to a database relation with categorical attributes without introducing distortions to cover data. A watermark for a tuple group may be inserted by selectively switching the position of tuples in tuple pairs using a tuple hash associated with each tuple in the tuple pair; and a corresponding bit in a watermark derived from the tuple group using a embedding key, a primary key and hash functions.Type: GrantFiled: October 17, 2005Date of Patent: June 1, 2010Assignee: George Mason Intellectual Properties, Inc.Inventors: Sushil Jajodia, Huiping Guo, Yingjiu Li
-
Patent number: 7720250Abstract: A watermarking system embeds a watermark into data values that may be streamed. A data hash is calculated using data values and a hash key. The data values are grouped. The groups include a first group and a second group. A first group hash is calculated using data values in the first group and a first group hash key. A second group hash is calculated using data values in the second group and a second group hash key. A watermark is constructed based on the first group hash and the second group hash. The value of at least one of the data values in the first group is modified using the watermark.Type: GrantFiled: May 23, 2006Date of Patent: May 18, 2010Assignee: George Mason UniversityInventors: Sushil Jajodia, Huiping Guo, YingJiu Li
-
Publication number: 20060277410Abstract: A watermarking system embeds a watermark into data values that may be streamed. A data hash is calculated using data values and a hash key. The data values are grouped. The groups include a first group and a second group. A first group hash is calculated using data values in the first group and a first group hash key. A second group hash is calculated using data values in the second group and a second group hash key. A watermark is constructed based on the first group hash and the second group hash. The value of at least one of the data values in the first group is modified using the watermark.Type: ApplicationFiled: May 23, 2006Publication date: December 7, 2006Inventors: Sushil Jajodia, Huiping Guo, YingJiu Li
-
Publication number: 20060095775Abstract: Disclosed is a fragile watermarking scheme for detecting and localizing malicious alterations made to a database relation with categorical attributes without introducing distortions to cover data. A watermark for a tuple group may be inserted by selectively switching the position of tuples in tuple pairs using a tuple hash associated with each tuple in the tuple pair; and a corresponding bit in a watermark derived from the tuple group using a embedding key, a primary key and hash functions.Type: ApplicationFiled: October 17, 2005Publication date: May 4, 2006Inventors: Sushil Jajodia, Huiping Guo, Yingjiu Li