Patents by Inventor Zheng Yan

Zheng Yan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10362001
    Abstract: An approach is provided for providing secure communications based on trust evaluation in a distributed manner. A method can comprises: sending data to a plurality of devices, the data being encrypted with a communication key; encrypting the communication key with public attribute keys associated with attributes, wherein the attributes comprising at least one trust level related attribute representing an access condition for the data based on a trust level; evaluating a trust level of each device of the plurality of devices, to identify eligible devices of the plurality of devices whose trust levels satisfy the access condition; sending the encrypted communication key to the plurality of devices; and sending secret attribute keys associated with the attributes to each device of the eligible devices for decrypting the encrypted communication key, the secret attribute keys being personalized for the each device of the eligible devices.
    Type: Grant
    Filed: October 17, 2012
    Date of Patent: July 23, 2019
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Publication number: 20190213268
    Abstract: A subtree pinning system includes a file system tree, a plurality of metadata servers, and a metadata server assignment system. The file system tree includes a plurality of subtrees. The metadata servers are configured to manage the plurality of subtrees. The metadata server assignment system is configured to receive a command to reassign a subtree to a first metadata server. The metadata server assignment system is also configured to remove an assignment of a second metadata server to manage the subtree and create an assignment of the first metadata server to manage the subtree. The metadata server assignment is further configured to prevent the subtree from being managed by another metadata server.
    Type: Application
    Filed: January 10, 2018
    Publication date: July 11, 2019
    Inventors: Patrick Joseph Donnelly, John Charles Spray, Gregory Allan Farnum, Douglas James Fuller, Zheng Yan, Ramana Krisna Venkatesh Raja
  • Publication number: 20190174307
    Abstract: A method is disclosed, comprising obtaining, by a first apparatus, a first identifier associated with the first apparatus, wherein the first identifier is different from a second identifier associated with the first apparatus, providing, by the first apparatus, at least one message to at least one further apparatus of at least one further apparatus, wherein each of the at least one message comprises a key information of the first apparatus and is associated with the first identifier associated with the first apparatus, and determining, by the first apparatus, a session key of a communication session associated with the first apparatus and the at least one further apparatus, based on at least one message received, by the first apparatus, provided by at least one further apparatus of the at least one further apparatus, wherein each of the at least one message comprises a key information of the respective further apparatus and is associated with a first identifier associated with the respective further apparatus
    Type: Application
    Filed: August 5, 2016
    Publication date: June 6, 2019
    Applicant: Nokia Technologies Oy
    Inventors: Mingjun Wang, Zheng Yan
  • Patent number: 10291587
    Abstract: A method for anonymous authentication may comprise: issuing token information to a first node registered with a network entity, wherein the token information indicates one or more tokens for the first node; distributing a token list to a plurality of nodes registered with the network entity, wherein the token list is associated with respective tokens for the plurality of nodes comprising at least the first node and a second node, and wherein the token information and the token list are used for an anonymous authentication between the first node and the second node.
    Type: Grant
    Filed: June 25, 2013
    Date of Patent: May 14, 2019
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Patent number: 10181033
    Abstract: An approach is provided for providing an offline malware detection, and in addition a real-time malware detection. The offline malware detection may comprise: detecting at least one of function calling map of the application offline, wherein a function calling map records relationships of callings among functions called by the application; extracting patterns of the function callings of the application from the at least one function calling map; and comparing the extracted pattern with at least one basic pattern of normal applications. The real-time malware detection may comprises: running an application in a real environment; recording behaviors of the application at runtime of the application; extracting behavior patterns from the recorded behaviors; and comparing the extracted behavior patterns with at least one of basic patterns of normal applications or patterns previously recorded for the application.
    Type: Grant
    Filed: December 30, 2013
    Date of Patent: January 15, 2019
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Publication number: 20190005508
    Abstract: A method and apparatus is provided for providing an active ticket in a mobile terminal for use by a mobile terminal user, wherein at least one active ticket has a ticket characteristic that dynamically changes based on one or more states in a life cycle of the active ticket. Dynamic changes to the ticket characteristic include multimedia changes or other presentation data, including text, sound (audio), animation, video, still pictures, or some combination thereof. The active ticket can have different states in it's life cycle, such as purchased, validated, invalid for certain events. Also the ticket service provider or issuer can send new control data to change the characteristic and/or contents of the active ticket.
    Type: Application
    Filed: August 30, 2018
    Publication date: January 3, 2019
    Inventors: Petteri SAARINEN, Mia LAHTEENMAKI, Zheng YAN
  • Publication number: 20180376318
    Abstract: A method for authentication and key agreement in a communication network is disclosed. In the method, a network node generates a common public key and a master secret key, assigns to a first user equipment a first set of one or more pseudonym identifications corresponding to a real identity of the first user equipment, the common public key and a first private key specific to the first user equipment, and assigns to a second user equipment a second set of one or more pseudonym identifications corresponding to a real identity of the second user equipment, the common public key and a second private key specific to the second user equipment.
    Type: Application
    Filed: December 24, 2015
    Publication date: December 27, 2018
    Applicant: Nokia Technologies Oy
    Inventors: Mingjun Wang, Zheng Yan
  • Publication number: 20180375647
    Abstract: A method for securing D2D communications may comprise: encrypting communication data based at least in part on a security policy associated with at least one of a general trust evaluation and a local trust evaluation; and sending the encrypted communication data from a first user equipment to one or more second user equipments, wherein the second user equipment of which at least one of a general trust evaluation result and a local trust evaluation result satisfies the security policy set by the first user equipment is eligible to access the encrypted communication data.
    Type: Application
    Filed: December 22, 2015
    Publication date: December 27, 2018
    Inventor: Zheng Yan
  • Patent number: 10158649
    Abstract: A method for privacy-enhanced evidence evaluation may comprise: sending a request for pre-evaluation information regarding evidence data of a target object to a first network entity from a requesting node; obtaining the pre-evaluation information from the first network entity, in response to successful verification of the requesting node at a second network entity; and calculating an evidence evaluation of the target object based at least in part on the pre-evaluation information, wherein the pre-evaluation information comprises re-encrypted evidence data of the target object associated with one or more time slots, and wherein the re-encrypted evidence data of the target object at an associated time slot is resulted at least in part from encrypted evidence data of the target object collected by the first network entity from one or more evidence providers at the associated time slot, by using a re-encryption key from the second network entity.
    Type: Grant
    Filed: August 20, 2013
    Date of Patent: December 18, 2018
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan
  • Publication number: 20180359229
    Abstract: Method and apparatus are disclosed for homomorphic re-encryption schemes in a system comprising a cloud service provider (CSP), a third authorized party (TAP), a data requestor (DR) and a plurality of data providers (DPs). According to an embodiment, a method implemented at a CSP comprises: in response to a request from a TAP, obtaining from a plurality of DPs cipher texts of their respective data, based on the request, wherein each DP is able to homomorphically encrypt its data; analyzing the cipher texts; and sending the analyzing result to the TAP, wherein the TAP is able to re-encrypt the analyzing result, such that a DR can decrypt the re-encrypted analyzing result with the DR's secret key.
    Type: Application
    Filed: December 10, 2015
    Publication date: December 13, 2018
    Inventors: Wenxiu DING, Zheng YAN
  • Publication number: 20180338029
    Abstract: A method and a device are provided for switching a display mode in the mobile terminal field. The method includes: obtaining a first display mode of an operating system; and when the first display mode of the operating system is a night mode, switching a second display mode of an application to an application night mode.
    Type: Application
    Filed: May 11, 2018
    Publication date: November 22, 2018
    Applicant: BEIJING XIAOMI MOBILE SOFTWARE CO., LTD.
    Inventors: Chenxi WANG, Chengxing GAO, Zheng YAN
  • Publication number: 20180294965
    Abstract: Methods, apparatus, computer program product and computer readable medium are disclosed for authentication. A method comprises: receiving an authentication request from a user apparatus (802); sending a verification code to the user apparatus, wherein the verification code comprises a combination of pattern codes and the pattern codes are associated with encrypted bio-patterns that the user has registered respectively (804); receiving first encrypted bio-information of the user corresponding to the verification code (806); and calculating a first encrypted deviation between the registered encrypted bio-patterns corresponding to the combination of pattern codes and the codes and the pattern codes are associated with encrypted first encrypted bio-information (808).
    Type: Application
    Filed: October 15, 2015
    Publication date: October 11, 2018
    Inventor: Zheng YAN
  • Patent number: 10096031
    Abstract: A method and apparatus is provided for providing an active ticket in a mobile terminal for use by a mobile terminal user, wherein at least one active ticket has a ticket characteristic that dynamically changes based on one or more states in a life cycle of the active ticket. Dynamic changes to the ticket characteristic include multimedia changes or other presentation data, including text, sound (audio), animation, video, still pictures, or some combination thereof. The active ticket can have different states in it's life cycle, such as purchased, validated, invalid for certain events. Also the ticket service provider or issuer can send new control data to change the characteristic and/or contents of the active ticket.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: October 9, 2018
    Assignee: Nokia Technologies Oy
    Inventors: Petteri Saarinen, Mia Lahteenmaki, Zheng Yan
  • Publication number: 20180286643
    Abstract: An apparatus, system, and method for in-situ etching monitoring in a plasma processing chamber. The apparatus includes a continuous wave broadband light source; an illumination system configured to illuminate an area on a substrate with an incident light beam having a fixed polarization direction, the incident light beam from the broadband light source being modulated by a shutter; a collection system configured to collect a reflected light beam being reflected from the illuminated area on the substrate, and direct the reflected light beam to a detector; and processing circuitry. The processing circuitry is configured to process the reflected light beam to suppress background light, determine a property value from the processed light, and control an etch process based on the determined property value.
    Type: Application
    Filed: March 29, 2017
    Publication date: October 4, 2018
    Applicant: Tokyo Electron Limited
    Inventors: Holger TUITJE, Xinkang Tian, Ching-Ling Meng, Vi Vuong, Wen Jin, Zheng Yan, Mihail Mihaylov
  • Publication number: 20180270069
    Abstract: According to an example aspect of the invention, there is provided an apparatus comprising at least one processing core and at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to receive, from a first user, a ciphertext, a first hash value and a first ciphered encryption key, receive, from a second user, a second hash value, responsive to a determination the first hash value is the same as the second hash value, obtain a re-encryption key, and apply the re-encryption key to the first ciphered encryption key to obtain a re-encrypted encryption key, the re-encrypted encryption key being decryptable with a secret key of the second user.
    Type: Application
    Filed: December 18, 2014
    Publication date: September 20, 2018
    Inventor: Zheng YAN
  • Patent number: 9992571
    Abstract: In accordance with embodiments of the present disclosure, a controller configured to be coupled to an audio transducer, may be further configured to receive an audio input signal, calculate a displacement compensation signal in a displacement domain of the audio transducer based on the audio input signal, convert the displacement compensation signal from the displacement domain into a voltage compensation signal in a voltage domain, and apply the voltage compensation signal to the audio input signal, or a derivative thereof, to minimize overexcursion of the audio transducer.
    Type: Grant
    Filed: May 9, 2016
    Date of Patent: June 5, 2018
    Assignee: Cirrus Logic, Inc.
    Inventors: Rong Hu, Zheng Yan, Jie Su
  • Publication number: 20180139223
    Abstract: According to embodiments of the present invention, trust evaluation is performed on network entities including a host and a network node with privacy preservation to determine an unwanted traffic source. The trust evaluation is based on detection reports from the hosts and monitoring reports from the network nodes. The network nodes do not know contents of the detection reports, and an entity which executes the trust evaluation does not know real identifiers of the hosts and network nodes.
    Type: Application
    Filed: June 15, 2015
    Publication date: May 17, 2018
    Inventor: Zheng YAN
  • Patent number: 9970818
    Abstract: Disclosed is a method, computer method, system, and apparatus for measuring two-dimensional distributions of optical emissions from a plasma in a semiconductor plasma processing chamber. The acquired two-dimensional distributions of plasma optical emissions can be used to infer the two-dimensional distributions of concentrations of certain chemical species of interest that are present in the plasma, and thus provide a useful tool for process development and also for new and improved processing tool development. The disclosed technique is computationally simple and inexpensive, and involves the use of an expansion of the assumed optical intensity distribution into a sum of basis functions that allow for circumferential variation of optical intensity. An example of suitable basis functions are Zernike polynomials.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: May 15, 2018
    Assignee: Tokyo Electron Limited
    Inventors: Junwei Bao, Ching-Ling Meng, Holger Tuitje, Mihail Mihaylov, Yan Chen, Zheng Yan, Haixing Zou, Hanyou Chu
  • Patent number: 9896340
    Abstract: In some embodiments, the present disclosure pertains to methods of forming a reinforcing material by: (1) depositing a first material onto a catalyst surface; and (2) forming a second material on the catalyst surface, where the second material is derived from and associated with the first material. In some embodiments, the first material includes, without limitation, carbon nanotubes, graphene nanoribbons, boron nitride nanotubes, chalcogenide nanotubes, carbon onions, and combinations thereof. In some embodiments, the formed second material includes, without limitation, graphene, hexagonal boron nitride, chalcogenides, and combinations thereof. In additional embodiments, the methods of the present disclosure also include a step of separating the formed reinforcing material from the catalyst surface, and transferring the separated reinforcing material onto a substrate without the use of polymers.
    Type: Grant
    Filed: July 18, 2014
    Date of Patent: February 20, 2018
    Assignee: WILLIAM MARSH RICE UNIVERSITY
    Inventors: James M. Tour, Zheng Yan, Zhiwei Peng, Robert H. Hauge, Yilun Li
  • Patent number: 9894082
    Abstract: Various methods for unwanted traffic control in a wireless network are provided. One example method may include detecting an occurrence of unwanted content as indicated by receipt of a complaint about a content item provided by a source device, wherein the complaint may be received from a remote mobile device or generated locally based on a local detection. The example method may further include determining a trust value for the source device based at least on the complaint, determining that the source device is a distrusted device based at least on a comparison between the trust value and a trust threshold value, and causing traffic from the source device to be controlled as unwanted traffic. Similar and related example methods, example apparatuses, and example computer program products are also provided.
    Type: Grant
    Filed: January 18, 2011
    Date of Patent: February 13, 2018
    Assignee: Nokia Technologies Oy
    Inventor: Zheng Yan