Patents by Inventor YingJiu Li

YingJiu Li has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220297060
    Abstract: The invention provides a solid material for air purification and disinfection and a preparation method and application thereof. The solid material includes: 50-60 wt. % of inorganic porous materials, 10-20 wt. % of nano titanium dioxide, 3-5 wt. % of fluorescent materials, 20-30 wt. % of sodium chlorite, 3-5 wt. % of sodium lignosulfonate, 1-10 wt. % of polyethylene glycol, and 1-10 wt. % of polyvinyl alcohol. The method for preparing the solid material includes: formulating the fluorescent material into a slurry by using a polyethylene glycol aqueous solution; uniformly mixing the nano titanium dioxide, the sodium lignosulfonate, and the fluorescent material formulated into the slurry, and then spraying the mixture on an inorganic porous material carrier to be uniformly adsorbed; and mixing the sodium chlorite with the above mixture for granulation to obtain the product.
    Type: Application
    Filed: August 25, 2020
    Publication date: September 22, 2022
    Applicants: HEBEI LICHE ZHUOGE NEW MATERIALS CO.,LTD, MYAIRSHIELD, LIMITED
    Inventors: Yingjiu Li, Jiagang Li, Jiawang Li, Zhao Li
  • Patent number: 10868670
    Abstract: A data processing method and apparatus include: generating, by a terminal device, a first public key and a first private key; sending the first public key to a key generation center (KGC), where the first public key is used by the KGC or a server to generate a transform key, and the transform key is used by the server to transform data that is encrypted based on an attribute structure of the terminal device into data that is encrypted based on the first public key; receiving second data sent by the server, where the second data is data that is generated after the server processes first data according to the transform key; and decrypting the second data according to the first private key. In the data processing, main work is completed by the server with no need to use a secure channel to transmit a key.
    Type: Grant
    Filed: January 30, 2019
    Date of Patent: December 15, 2020
    Assignees: Huawei International Pte. Ltd., Singapore Management University
    Inventors: Hui Cui, Robert H. Deng, Yingjiu Li, Guilin Wang, Tsz Hon Yuen
  • Publication number: 20190173668
    Abstract: A data processing method and apparatus include: generating, by a terminal device, a first public key and a first private key; sending the first public key to a key generation center (KGC), where the first public key is used by the KGC or a server to generate a transform key, and the transform key is used by the server to transform data that is encrypted based on an attribute structure of the terminal device into data that is encrypted based on the first public key; receiving second data sent by the server, where the second data is data that is generated after the server processes first data according to the transform key; and decrypting the second data according to the first private key. In the data processing, main work is completed by the server with no need to use a secure channel to transmit a key.
    Type: Application
    Filed: January 30, 2019
    Publication date: June 6, 2019
    Inventors: Hui CUI, Robert H. DENG, Yingjiu LI, Guilin WANG, Tsz Hon YUEN
  • Publication number: 20180096142
    Abstract: This application describes a system and method for determining a security classification that is to be accorded to an unknown application using a trained classification model. The application describes a system and method for training the classification model so that the classification model may be subsequently used to determine whether an unknown application is to be classified as malicious and/or benign.
    Type: Application
    Filed: December 6, 2017
    Publication date: April 5, 2018
    Applicants: Huawei International Pte. Ltd., Singapore Management University
    Inventors: Ke Xu, Yingjiu Li, Robert H. Deng
  • Patent number: 9652608
    Abstract: System and methods for securing inter-component communications in an operating system are provided. Systems and methods provided herein secure inter-component communications in an operating system by selectively generating instances when inter-component communication requests occur, whereby each of the generated instances are attached to a newly created blocked permissions list. System and methods further manage the invocation of Application Programming Interfaces by applications or instances in the operating system by determining whether the invocation of the Application Programming Interface is allowed or declined based on the blocked permissions list and default permission list associated with each invoking application or instance.
    Type: Grant
    Filed: September 21, 2015
    Date of Patent: May 16, 2017
    Assignees: Huawei Technologies Co., Ltd., Singapore Management University
    Inventors: Yingjiu Li, Daibin Wang, Haixia Yao, Ke Xu
  • Publication number: 20160092672
    Abstract: System and methods for securing inter-component communications in an operating system are provided. Systems and methods provided herein secure inter-component communications in an operating system by selectively generating instances when inter-component communication requests occur, whereby each of the generated instances are attached to a newly created blocked permissions list. System and methods further manage the invocation of Application Programming Interfaces by applications or instances in the operating system by determining whether the invocation of the Application Programming Interface is allowed or declined based on the blocked permissions list and default permission list associated with each invoking application or instance.
    Type: Application
    Filed: September 21, 2015
    Publication date: March 31, 2016
    Inventors: Yingjiu LI, Daibin WANG, Haixia YAO, Ke XU
  • Patent number: 7730037
    Abstract: Disclosed is a fragile watermarking scheme for detecting and localizing malicious alterations made to a database relation with categorical attributes without introducing distortions to cover data. A watermark for a tuple group may be inserted by selectively switching the position of tuples in tuple pairs using a tuple hash associated with each tuple in the tuple pair; and a corresponding bit in a watermark derived from the tuple group using a embedding key, a primary key and hash functions.
    Type: Grant
    Filed: October 17, 2005
    Date of Patent: June 1, 2010
    Assignee: George Mason Intellectual Properties, Inc.
    Inventors: Sushil Jajodia, Huiping Guo, Yingjiu Li
  • Patent number: 7720250
    Abstract: A watermarking system embeds a watermark into data values that may be streamed. A data hash is calculated using data values and a hash key. The data values are grouped. The groups include a first group and a second group. A first group hash is calculated using data values in the first group and a first group hash key. A second group hash is calculated using data values in the second group and a second group hash key. A watermark is constructed based on the first group hash and the second group hash. The value of at least one of the data values in the first group is modified using the watermark.
    Type: Grant
    Filed: May 23, 2006
    Date of Patent: May 18, 2010
    Assignee: George Mason University
    Inventors: Sushil Jajodia, Huiping Guo, YingJiu Li
  • Publication number: 20060277410
    Abstract: A watermarking system embeds a watermark into data values that may be streamed. A data hash is calculated using data values and a hash key. The data values are grouped. The groups include a first group and a second group. A first group hash is calculated using data values in the first group and a first group hash key. A second group hash is calculated using data values in the second group and a second group hash key. A watermark is constructed based on the first group hash and the second group hash. The value of at least one of the data values in the first group is modified using the watermark.
    Type: Application
    Filed: May 23, 2006
    Publication date: December 7, 2006
    Inventors: Sushil Jajodia, Huiping Guo, YingJiu Li
  • Publication number: 20060095775
    Abstract: Disclosed is a fragile watermarking scheme for detecting and localizing malicious alterations made to a database relation with categorical attributes without introducing distortions to cover data. A watermark for a tuple group may be inserted by selectively switching the position of tuples in tuple pairs using a tuple hash associated with each tuple in the tuple pair; and a corresponding bit in a watermark derived from the tuple group using a embedding key, a primary key and hash functions.
    Type: Application
    Filed: October 17, 2005
    Publication date: May 4, 2006
    Inventors: Sushil Jajodia, Huiping Guo, Yingjiu Li