Issued Patents All Time
Showing 26–50 of 57 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8843748 | Method for establishing secure network architecture, method and system for secure communication | Jun Cao, Qin Li, Li Ge | 2014-09-23 |
| 8831227 | Method and system for establishing secure connection between stations | Li Ge, Jun Cao, Qin Li, Xiaolong Lai | 2014-09-09 |
| 8819778 | Method and system for switching station in centralized WLAN when WPI is performed by access controller | Zhiqiang Du, Jun Cao, Xiaolong Lai, Zhenhai Huang | 2014-08-26 |
| 8813199 | Method for realizing convergent WAPI network architecture with separate MAC mode | Zhiqiang Du, Jun Cao, Xiaolong Lai, Zhenhai Huang | 2014-08-19 |
| 8787574 | Multicast key negotiation method suitable for group calling system and a system thereof | Yanan Hu, Jun Cao, Zhenhai Huang | 2014-07-22 |
| 8763100 | Entity authentication method with introduction of online third party | Jun Cao, Xiaolong Lai, Zhenhai Huang | 2014-06-24 |
| 8752126 | Method for enhancing the security of the multicast or broadcast system | Liaojun Pang, Jun Cao | 2014-06-10 |
| 8750521 | Method and system for station switching when wireless terminal point completes WPI in convergent WLAN | Zhiqiang Du, Jun Cao, Xiaolong Lai, Zhenhai Huang | 2014-06-10 |
| 8751792 | Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party | Jun Cao, Zhenhai Huang, Xiaolong Lai | 2014-06-10 |
| 8732464 | Bidirectional entity authentication method with introduction of online third party | Xiaolong Lai, Jun Cao, Yuelei Xiao, Zhenhai Huang | 2014-05-20 |
| 8726022 | Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely | Houjian Tang, Bianling Zhang, Ning Zhang, Xumao Ye | 2014-05-13 |
| 8713303 | Method and system for establishing security connection between switch equipments | Qin Li, Jun Cao, Li Ge, Zhenhai Huang | 2014-04-29 |
| 8689283 | Security access control method and system for wired local area network | Jun Cao, Li Ge, Xiaolong Lai, Zhenhai Huang, Qin Li +1 more | 2014-04-01 |
| 8646055 | Method and system for pre-shared-key-based network security access control | Li Ge, Jun Cao, Qin Li, Zhenhai Huang | 2014-02-04 |
| 8625801 | Authentication associated suite discovery and negotiation method | Yanan Hu, Jun Cao, Yuelei Xiao, Zhenhai Huang, Xiaolong Lai | 2014-01-07 |
| 8588423 | Group/multicast key distribution method and update method based upon unicast session key and base station | Liaojun Pang, Jun Cao | 2013-11-19 |
| 8578164 | Method of one-way access authentication | Liaojun Pang, Jun Cao, Zhenhai Huang | 2013-11-05 |
| 8571223 | Method for combining authentication and secret keys management mechanism in a sensor network | Zhiqiang Du, Jun Cao, Li Ge, Zhenhai Huang | 2013-10-29 |
| 8572378 | Method for protecting the first message of security protocol | Xiaolong Lai, Jun Cao, Yuelei Xiao, Zhenhai Huang, Bianling Zhang +1 more | 2013-10-29 |
| 8560847 | Light access authentication method and system | Liaojun Pang, Jun Cao, Zhenhai Huang | 2013-10-15 |
| 8547205 | Anonymous authentication method based on pre-shared cipher key, reader-writer, electronic tag and system thereof | Liaojun Pang, Xiaolong Lai, Zhenhai Huang | 2013-10-01 |
| 8533781 | Access method suitable for wireless personal area network | Jun Cao, Yuelei Xiao, Zhenhai Huang, Xiaolong Lai | 2013-09-10 |
| 8510565 | Bidirectional entity authentication method based on the credible third party | Jun Cao, Xiaolong Lai, Zhenhai Huang | 2013-08-13 |
| 8495712 | Peer-to-peer access control method of triple unit structure | Xiaolong Lai, Jun Cao, Bianling Zhang | 2013-07-23 |
| 8466775 | Electronic label authenticating method and system | Liaojun Pang, Xiaolong Lai, Zhenhai Huang | 2013-06-18 |