Patents by Inventor Zhangjie Huang

Zhangjie Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11159305
    Abstract: A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<<n. A random number r is selected, so that hr belongs to the predetermined cyclic group. To-be-encrypted data m, corresponding to the target user using the public key pk and the random number r, is processed to generate a homomorphic ciphertext c=(1+N)m·(hN mod N2)r mod N2. The homomorphic ciphertext c is provided to the target user, where the homomorphic ciphertext c can be decrypted using a private key sk to obtain the data m.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: October 26, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Shuai Han, Zhangjie Huang, Huanyu Ma, Hao Lei
  • Publication number: 20210312429
    Abstract: Implementations are directed to cross-asset trading in blockchain networks, and include a first node providing transaction information based on a first value, a second value, and an exchange rate of a second node, receiving, from the second node, a first evidence set, a first range proof, and a digital signature of the second node, and submitting the transaction for verification based on the first range proof, a second range proof, the first evidence set, a second evidence set, a digital signature of the first node, and the digital signature of the second node, the transaction being executed to decrease a balance of the first node by the first value, increase a first balance of the second node by the first value, decrease a second balance of the second node by the second value, and increase a balance of the third node by the second value.
    Type: Application
    Filed: April 22, 2021
    Publication date: October 7, 2021
    Applicant: Advanced New Technologies Co., Ltd.
    Inventors: Wenbin Zhang, Hao Lei, Lichun Li, Zhangjie Huang
  • Patent number: 10990963
    Abstract: Implementations are directed to cross-asset trading in blockchain networks, and include a first node providing transaction information based on a first value, a second value, and an exchange rate of a second node, receiving, from the second node, a first evidence set, a first range proof, and a digital signature of the second node, and submitting the transaction for verification based on the first range proof, a second range proof, the first evidence set, a second evidence set, a digital signature of the first node, and the digital signature of the second node, the transaction being executed to decrease a balance of the first node by the first value, increase a first balance of the second node by the first value, decrease a second balance of the second node by the second value, and increase a balance of the third node by the second value.
    Type: Grant
    Filed: June 21, 2019
    Date of Patent: April 27, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Wenbin Zhang, Hao Lei, Lichun Li, Zhangjie Huang
  • Patent number: 10956900
    Abstract: Implementations are directed to cross-asset trading in blockchain networks, and include a first node providing transaction information based on a first value, a second value, and an exchange rate of a second node, receiving, from the second node, a first evidence set, a first range proof, and a digital signature of the second node, and submitting the transaction for verification based on the first range proof, a second range proof, the first evidence set, a second evidence set, a digital signature of the first node, and the digital signature of the second node, the transaction being executed to decrease a balance of the first node by the first value, increase a first balance of the second node by the first value, decrease a second balance of the second node by the second value, and increase a balance of the third node by the second value.
    Type: Grant
    Filed: June 21, 2019
    Date of Patent: March 23, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventors: Wenbin Zhang, Hao Lei, Lichun Li, Zhangjie Huang
  • Publication number: 20200366460
    Abstract: A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<<n. A random number r is selected, so that hr belongs to the predetermined cyclic group. To-be-encrypted data m, corresponding to the target user using the public key pk and the random number r, is processed to generate a homomorphic ciphertext c=(1+N)m·(hN mod N2)r mod N2. The homomorphic ciphertext c is provided to the target user, where the homomorphic ciphertext c can be decrypted using a private key sk to obtain the data m.
    Type: Application
    Filed: July 31, 2020
    Publication date: November 19, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Shuai Han, Zhangjie Huang, Huanyu Ma, Hao Lei
  • Patent number: 10778410
    Abstract: A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<<n. A random number r is selected, so that hr belongs to the predetermined cyclic group. To-be-encrypted data m, corresponding to the target user using the public key pk and the random number r, is processed to generate a homomorphic ciphertext c=(1+N)m·(hN mod N2)r mod N2 . The homomorphic ciphertext c is provided to the target user, where the homomorphic ciphertext c can be decrypted using a private key sk to obtain the data m.
    Type: Grant
    Filed: February 5, 2020
    Date of Patent: September 15, 2020
    Assignee: Alibaba Group Holding Limited
    Inventors: Shuai Han, Zhangjie Huang, Huanyu Ma, Hao Lei
  • Publication number: 20200177366
    Abstract: A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for implementing privacy protection. In an implementation, a public key pk={N, h} corresponding to a target user is obtained, where h is a generator of a predetermined cyclic group with a size of k in a random number space Z*N, a length of k is i bits, a length of N is n bits, and i<<n. A random number r is selected, so that hr belongs to the predetermined cyclic group. To-be-encrypted data m, corresponding to the target user using the public key pk and the random number r, is processed to generate a homomorphic ciphertext c=(1+N)m·(hN mod N2)r mod N2. The homomorphic ciphertext c is provided to the target user, where the homomorphic ciphertext c can be decrypted using a private key sk to obtain the data m.
    Type: Application
    Filed: February 5, 2020
    Publication date: June 4, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Shuai Han, Zhangjie Huang, Huanyu Ma, Hao Lei
  • Publication number: 20190311351
    Abstract: Implementations are directed to cross-asset trading in blockchain networks, and include a first node providing transaction information based on a first value, a second value, and an exchange rate of a second node, receiving, from the second node, a first evidence set, a first range proof, and a digital signature of the second node, and submitting the transaction for verification based on the first range proof, a second range proof, the first evidence set, a second evidence set, a digital signature of the first node, and the digital signature of the second node, the transaction being executed to decrease a balance of the first node by the first value, increase a first balance of the second node by the first value, decrease a second balance of the second node by the second value, and increase a balance of the third node by the second value.
    Type: Application
    Filed: June 21, 2019
    Publication date: October 10, 2019
    Applicant: Alibaba Group Holding Limited
    Inventors: Wenbin Zhang, Hao Lei, Lichun Li, Zhangjie Huang