Patents by Inventor Zhuo Wei
Zhuo Wei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12375915Abstract: The present disclosure relates to an authentication method. An example method includes: a first authentication device obtaining first signal feature information according to a first wireless signal sent by a second authentication device, receiving second signal feature information from the second authentication device, and determining whether authentication is successful according to the first signal feature information and the second signal feature information.Type: GrantFiled: June 2, 2023Date of Patent: July 29, 2025Assignee: Shenzhen Yinwang Intelligent Technologies Co., Ltd.Inventors: Girish Revadigar, Zhuo Wei, Zhen Li, Sanjay Jha
-
Patent number: 12372638Abstract: A radar authentication method includes after obtaining output data of a to-be-authenticated radar, a computer device that first invokes a prediction model to obtain predicted data of the to-be-authenticated radar based on the output data of the to-be-authenticated radar, where the prediction model is obtained through training based on output data of a target radar. Then the computer device verifies, based on the predicted data of the to-be-authenticated radar and the output data of the to-be-authenticated radar, whether the to-be-authenticated radar and the target radar are the same radar.Type: GrantFiled: July 25, 2022Date of Patent: July 29, 2025Assignee: SHENZHEN YINWANG INTELLIGENT TECHNOLOGIES CO., LTD.Inventors: Mark Ryan, Flavio Garcia, Steven Yin Zhong, Zhuo Wei
-
Publication number: 20250203358Abstract: A communication method includes a first node that receives a first message from a first device, where the first message includes second node information, and the second node information indicates a second node; the first node determines the second node based on the second node information; the first node generates a security key between the first node and the second node; and the first node communicates with the second node based on the security key.Type: ApplicationFiled: February 17, 2025Publication date: June 19, 2025Inventors: Rehana Yasmin, Jianzhong Ma, Tianfu Fu, Zhuo Wei
-
Publication number: 20250193164Abstract: This application provides a communication method, apparatus, and system. The method may include: A first node receives a first message from a first device, where the first message includes second node information, and the second node information indicates a second node; the first node determines the second node based on the second node information; the first node generates a security key between the first node and the second node; and the first node communicates with the second node based on the security key. The communication method provided in this application helps ensure confidentiality and integrity of communication data without introducing an external connection.Type: ApplicationFiled: February 14, 2025Publication date: June 12, 2025Inventors: Rehana Yasmin, Jianzhong Ma, Tianfu Fu, Zhuo Wei, Yanjiang Yang
-
Publication number: 20250131082Abstract: Embodiments of this application provide a diagnosis method and apparatus. The method includes: receiving a first diagnosis policy file sent by a diagnosis device, where the diagnosis policy file includes access control policy information, and the diagnosis device includes a remote diagnosis platform or a local diagnosis instrument; verifying authenticity and integrity of the first diagnosis policy file; and when the verification on the authenticity and integrity of the first diagnosis policy file succeeds, verifying, based on the access control policy information, whether a diagnosis command has an access control permission. According to the foregoing method, a vehicle can be prevented from executing an incorrect or unauthorized diagnosis command during diagnosis, and property and privacy security of a vehicle owner can be ensured.Type: ApplicationFiled: December 30, 2024Publication date: April 24, 2025Applicant: Shenzhen Yinwang Intelligent Technologies Co., Ltd.Inventors: Steven Yin Zhong, Yujuan Xie, Zuoqiang Zhang, Zhuo Wei, Tianfu Fu
-
Publication number: 20250044449Abstract: An intrusion detection method includes obtaining a first point cloud from a light detection and ranging (LiDAR) sensor, obtaining a first object information by applying a first perception process to the first point cloud, modifying the first point cloud to obtain a second point cloud, obtaining a second object information by applying a second perception process to the second point cloud, and providing an intrusion result based on a comparison between the first object information and the second object information.Type: ApplicationFiled: February 26, 2024Publication date: February 6, 2025Inventors: Girish Shivalingappa Revadigar, Suk In Kang, Zhuo Wei, Seonghoon Jeong, Hyunjae Kang, Huy Kang Kim, Hyun Min Song
-
Publication number: 20250023890Abstract: A security detection method and apparatus, and a vehicle are provided. The method includes: obtaining a first data packet; inputting the first data packet into a first security detection apparatus for security detection, to obtain a first security detection result; obtaining a second data packet and inputting the second data packet into a second security detection apparatus for security detection if the first security detection result indicates that the first data packet poses a security threat, to obtain a second security detection result; and forwarding the second data packet or executing a first security instruction based on the second security detection result. The technical solution can be applied to a new energy vehicle or an intelligent vehicle, to implement multi-level detection on a security threat in a data packet, so as to help improve security performance of a vehicle.Type: ApplicationFiled: September 30, 2024Publication date: January 16, 2025Inventors: Chenyu WANG, Yongzheng WU, Zhuo WEI
-
Patent number: 12200323Abstract: A camera authentication method and a control apparatus are provided, and are applicable to an identity authentication of an on-board camera in the autonomous driving field. The method includes: obtaining one or more frames of a first image shot by a to-be-authenticated camera; determining one or more light intensity offset values of N photosensitive units based on the one or more frames of the first image; determining a matching degree between the light intensity offset values of the N photosensitive units and a preset N-dimensional vector; and if the matching degree meets a preset condition, determining that authentication of the to-be-authenticated camera succeeds, where the N photosensitive units are in a photosensitive layer of the to-be-authenticated camera, and the photosensitive layer includes M photosensitive units, where N?M. This technical solution is used to improve camera security.Type: GrantFiled: October 12, 2022Date of Patent: January 14, 2025Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Steven Yin Zhong, Yanjiang Yang, Zhuo Wei
-
Publication number: 20240426979Abstract: Embodiments of this application provide a method for detecting anomalies of LiDAR point cloud data and related device, the method including: obtaining a first position information, wherein the first position information indicating a position of a target data point in the LiDAR point cloud data; determining a second position information corresponding to the target data point according specifications of a LiDAR sensor; determining the target data point is an anomaly point or a normal point according to the first position information and the second position information. The above-mentioned technical solution can detect the anomaly point efficiently.Type: ApplicationFiled: February 22, 2024Publication date: December 26, 2024Inventors: Girish Shivalingappa REVADIGAR, Zhuo WEI, Suk In KANG, Kang Uk SEO, Hwejae LEE, Byung IL KWAK, Huy Kang KIM, Seonghoon JEONG
-
Publication number: 20240313981Abstract: A method for authentication and related devices includes obtaining a first session key BS1 generated according to a set X and a set Y. The set X is a set of samples of received signal strength indicators (RSSIs) of a wireless channel of a user equipment (UE), and the set Y is a set of samples of RSSIs of a wireless channel of a vehicle. Upon receiving a second message from the UE, wherein the second message is hashed by a second session key BS2, extracting the second session key BS2 from the second message. When the first session key BS1 is the same as the second session key BS2, the authentication between the UE and the vehicle is successful.Type: ApplicationFiled: May 29, 2024Publication date: September 19, 2024Inventors: Girish Shivalingappa Revadigar, Zhuo Wei, Zhen Li
-
Publication number: 20240312272Abstract: A method for verifying an identity of an electronic device includes: transmitting, by a first electronic device, N challenge packet(s) to a second electronic device; receiving, by the first electronic device, N response packet(s) from the second electronic device, where the N response packet(s) are in one-to-one correspondence with the N challenge packet(s); determining, by the first electronic device, a first verification information, according to the N response packet(s), where the first verification information indicates received signal strength (RSS) information of the N response packet(s); obtaining, by the first electronic device, a second verification information from the second electronic device, where the second verification information indicates RSS information of the N challenge packet(s); and verifying, according to the first verification information and the second verification information, an identity of the second electronic device.Type: ApplicationFiled: May 29, 2024Publication date: September 19, 2024Inventors: Girish Shivalingappa Revadigar, Zhuo Wei, Qinyong Jia
-
Patent number: 12079618Abstract: A method for managing software versions of an electronic device in a vehicle and a relevant device are disclosed. The method includes: transmitting an update bundle to a target vehicle; receiving an update response from the target vehicle, wherein the update response is used to indicate one or more patches which have been successfully installed among the N patches; updating a vehicle version tree corresponding to the target vehicle according to the update response to obtain an updated VVT. The technical solution provides a lightweight and efficient version control mechanism for maintaining the software versions for each of the electronic devices in a vehicle.Type: GrantFiled: June 30, 2022Date of Patent: September 3, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Girish Revadigar, Hsiao-Ying Lin, Zhuo Wei
-
Patent number: 12052357Abstract: A method and a related device for unlocking a smart lock are provided, and may be applied to an intelligent vehicle or a self-driving vehicle, to implement an unlocking function of a smart lock of the vehicle. The method includes: A terminal device monitors a distance change trend between the terminal device and an intelligent device, where the intelligent device includes a smart lock. If the terminal device determines that the terminal device is approaching the intelligent device and a distance between the terminal device and the intelligent device is less than a first distance threshold, the terminal device enables an identity authentication process between the terminal device and the intelligent device. The terminal device unlocks the smart lock when identity authentication between the terminal device and the intelligent device succeeds.Type: GrantFiled: December 17, 2021Date of Patent: July 30, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yanjiang Yang, Zhuo Wei, Wei Wang, Xutao Liu
-
Patent number: 11985238Abstract: Embodiments disclose a vehicle-mounted device upgrade method and a related device. The method may be applied to an intelligent vehicle, the intelligent vehicle includes a vehicle-mounted control device, and the method may include: receiving, by the vehicle-mounted control device, a first partial key sent by the communications device; restoring, by the vehicle-mounted control device, a first key by using the first partial key and a second partial key that is stored on the vehicle-mounted control device; and performing, by the vehicle-mounted control device, secure processing on a first upgrade file by using the first key, to obtain the securely processed first upgrade file, where the secure processing includes generating first message authentication code (MAC), and the securely processed first upgrade file includes the first upgrade file and the first MAC. According to this application, the vehicle-mounted device can be securely and efficiently upgraded.Type: GrantFiled: October 30, 2020Date of Patent: May 14, 2024Assignee: Huawei International Pte. Ltd.Inventors: Yanjiang Yang, Zhuo Wei, Hsiao-Ying Lin, He Wei, Junqiang Shen
-
Patent number: 11979413Abstract: A first apparatus sends a first random number to a second apparatus, where a vehicle carries the first apparatus and a first set. The second apparatus belongs to the first set. The first set further includes a third apparatus. The first apparatus communicates with the third apparatus using the second apparatus. The first apparatus receives a first message from the second apparatus. The first message includes first verification information to perform identity verification on the second apparatus. The first verification information is based on identity information of the second apparatus and the first random number. The first apparatus determines, based on the first verification information and the first random number, that the identity verification on the second apparatus has succeeded.Type: GrantFiled: June 28, 2021Date of Patent: May 7, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yanjiang Yang, Zhuo Wei, Shuang Wu
-
Publication number: 20230328523Abstract: The present disclosure relates to an authentication method. An example method includes: a first authentication device obtaining first signal feature information according to a first wireless signal sent by a second authentication device, receiving second signal feature information from the second authentication device, and determining whether authentication is successful according to the first signal feature information and the second signal feature information.Type: ApplicationFiled: June 2, 2023Publication date: October 12, 2023Inventors: Girish REVADIGAR, Zhuo WEI, Zhen LI, Sanjay JHA
-
Publication number: 20230231864Abstract: The present disclosure provides an intrusion monitoring system, an intrusion monitoring method and related products. The intrusion monitoring system includes: a first monitoring component deployed in a controller area network, a second monitoring component deployed in an Ethernet network, and a first control component; the first monitoring component is configured to obtain first CAN reporting information on data traffic in the system and transmit the first CAN reporting information to the first control component; the second monitoring component is configured to obtain second Ethernet reporting information on the data traffic and transmit the second Ethernet reporting information to the first control component; and the first control component is configured to receive the first CAN reporting information from the first monitoring component and the second Ethernet reporting information from the second monitoring component, and determine whether the data traffic is an attack.Type: ApplicationFiled: March 17, 2023Publication date: July 20, 2023Inventors: Rehana Yasmin, Zhuo Wei, Suk In KANG, Feng Geng
-
Patent number: 11662991Abstract: A vehicle-mounted device upgrade method and a related device. The method may be applied to a vehicle-mounted system, a vehicle-mounted control device and one or more to-be-upgraded vehicle-mounted devices, and the method may include: obtaining, by the vehicle-mounted control device, a vehicle-mounted upgrade package, where the vehicle-mounted upgrade package includes a plurality of upgrade files, and each upgrade file is used to upgrade at least one to-be-upgraded vehicle-mounted device; performing, by the vehicle-mounted control device, security verification on the plurality of upgrade files; and sending, by the vehicle-mounted control device, a target upgrade file to a target to-be-upgraded vehicle-mounted device that is to be upgraded by using the target upgrade file, where the target upgrade file is an upgrade file on which security verification succeeds in the plurality of upgrade files. According to this application, the vehicle-mounted device can be securely and efficiently upgraded.Type: GrantFiled: April 23, 2020Date of Patent: May 30, 2023Assignee: Huawei International Pte. Ltd.Inventors: Yanjiang Yang, Zhuo Wei, Hsiao-Ying Lin, Tieyan Li, Junqiang Shen
-
Publication number: 20230093544Abstract: A random number generation apparatus includes an electric network frequency (ENF) extractor, an entropy generation module, and an entropy pool. The random number generation apparatus may generate a true random number and a pseudo random number based on an ENF signal of an electric network without using a hardware entropy source.Type: ApplicationFiled: November 23, 2022Publication date: March 23, 2023Inventors: Girish Shivalingappa Revadigar, Zhuo Wei, Zhen Li, Xinxing Yin
-
Publication number: 20230080111Abstract: A camera authentication method and a control apparatus are provided, and are applicable to an identity authentication of an on-board camera in the autonomous driving field. The method includes: obtaining one or more frames of a first image shot by a to-be-authenticated camera; determining one or more light intensity offset values of N photosensitive units based on the one or more frames of the first image; determining a matching degree between the light intensity offset values of the N photosensitive units and a preset N-dimensional vector; and if the matching degree meets a preset condition, determining that authentication of the to-be-authenticated camera succeeds, where the N photosensitive units are in a photosensitive layer of the to-be-authenticated camera, and the photosensitive layer includes M photosensitive units, where N?M. This technical solution is used to improve camera security.Type: ApplicationFiled: October 12, 2022Publication date: March 16, 2023Inventors: Steven Yin ZHONG, Yanjiang YANG, Zhuo WEI