Patent application number | Description | Published |
20100171202 | Method of securely data protecting arrangement for electronic device - A method of securely data protection for an electronic device includes the steps of: enclosing a core circuit module of the electronic within a protection element to form a protection circuit surrounding the core circuit module; operatively linking a detective circuit between the protection element and the core circuit module; and activating the detective circuit in case of a hack of the electronic device, such that when the electronic device is broken to access the core circuit module through the protection element, the detective circuit is activated to block data information saved in the core circuit module from being access. | 07-08-2010 |
20100172501 | Secure key system - A secure key system includes a key provider for partitioning and converting a private key into a plurality of key components, and a plurality of key holders storing the key components therein respectively for enhancing a security level of the private key, wherein all of the key holders are united to synthesize back the private key from the key components in order for completing a confirmation process so as to ensure the confirmation process being verified by all of the key holders. | 07-08-2010 |
20100172655 | NON-FEEDBACK PRE-ENCODER FOR OPTICAL DQPSK MODULATION - A non-feedback pre-encoder for optical DQPSK modulation includes four differential encoders, two power splitters, two delay lines, one exclusive OR gate and a cross switch. Each of two data streams input to the pre-encoder is divided into two identical streams by one of the power splitter, called an upper stream and a lower stream, respectively. Every upper stream is differentially encoded by one of the differential encoders, and outputs of the differential encoders are fed into the XOR gate. An output of the XOR gate drives the cross switch as a control signal. Two lower input data stream are delayed in the delay lines, and fed into the cross switch. The outputs of the cross switch are differentially encoded, separately, where outputs of the pre-encoder are provided. The invention eliminates the speed limitation due to the electrical propagation by constructing an all-forward control signal. | 07-08-2010 |
20100174631 | Secure device firmware - The present invention provides a method and a device using a secure firmware for secure electronic transactions. This firmware realizes two main functions: (1) providing protection for transaction, and (2) providing a unified standard interface for application programs. | 07-08-2010 |
20100174653 | Secure method and device of financial transaction - A secure method and device thereof is provided for financial transaction without being access of any personal and confidential transaction information by any unwanted party, which includes the following steps. Receive transaction information and personal information of a user in a secure financial transaction device. Encrypt the transaction information, the personal information and a secure PIN of the user in the device and transfer the encrypted transaction information, personal information and the secure PIN to a designate financial entity through the Internet. Verify a payment amount to a designated financial account with the financial entity. Receive a confirmation in the device for the transaction of the payment amount to the designated financial account, after the payment amount is transferred to the designated financial account from the financial entity, by the financial entity through the Internet. | 07-08-2010 |
20100175016 | Security key inputting system for touch screen device - A touch screen device includes a touch screen panel having a key input area and defining a plurality of touch-sensitive keys at the key input area, a control module operatively linking with the touch screen panel, and a security key inputting system operatively linked to the control module. The control module displays a plurality of input characters at the touch-sensitive keys respectively in such a manner that when one of the touch-sensitive keys is contacted, the control module identifies the corresponding input character being selected as an input data. The security key inputting system is arranged for randomly re-arranging the input characters at different touch-sensitive keys respectively, wherein the input characters are alternately displayed at the touch-sensitive keys for preventing the input characters from being read by memorization of fixed location. | 07-08-2010 |
20110095084 | Personal financial terminal device - A personal financial terminal device includes a core circuit module having a CPU and a data unit electrically connected to the CPU, a display module operatively connected to the core circuit module, and a protection arrangement for protecting the security data information store in the core circuit module. A swipe slot, an inserting slot, and a USB port are further provided at a peripheral edge of an outer casing, so that the terminal device of the present invention is able to obtain information stored in a magnetic strip card, smart card, or via connecting to an external device respectively. Therefore, the personal financial terminal device is able to integrate with most of the existing financial transaction networks or platforms to complete the individual business transactions. | 04-28-2011 |
20120089516 | Method and system of processing financial transaction - A system for processing financial transaction includes two or more financial transaction devices, a management control linked with a financial institution network, and a financial transaction network linking the financial transaction devices with the management control, wherein the financial transaction devices are communicatively linked with each other. The financial transaction devices of a payer and a payee respectively obtain financial information of the payer and the payee. The financial information of the payer, the financial information of the payee, and payment amount of the financial transaction are consolidated in the financial transaction device to generate payment information, which is sent together with a request for financial transaction by the financial transaction device to the management control. The management control transact the payment from an account of the payer regarding to the financial information thereof to an account of the payee regarding to the financial information thereof through the financial institution network for processing the financial transaction between the payer and the payee. | 04-12-2012 |
20120116964 | Method and system of transaction cards management through business network - The present invention provides a system and a method for managing transaction cards through a business network, with which, the management and the deposit of transaction cards can be implemented any where and any time without carrying the transaction cards with card holders and without providing card holders' confidential information to card providers, and with which, card holders can manage transaction cards, make deposits and access and update card information of the transaction cards any where and any time without carrying the transaction cards with him/her and without providing card holders' confidential information to card providers, and with which, card providers can manage transaction cards and receive deposits any where and any time without requiring card holders' confidential information, wherein all the activities of transaction cards are recorded and reviewable. | 05-10-2012 |
Patent application number | Description | Published |
20130291111 | Method and Device for Program Identification Based on Machine Learning - The invention discloses a method and device for programidentification based on machine learning. The method comprises: analyzing an inputted unknown program, and extracting a feature of the unknown program; coarsely classifying the unknown program according to the extracted feature; judging by inputting the unknown program into a corresponding decision-making machine generated by training according to a result of the coarse classification; and outputting an identification result of the unknown program, wherein the identification result is a malicious program or a non-malicious program. The embodiments of the invention adopt the machine learning technology, achieve the decision-making machine for identifying a malicious program by analyzing a large number of program samples, and can save a lot of manpower and improve the identification efficiency for a malicious program by using the decision-making machine; and furthermore, can find an inherent law of programs based on data mining for massive programs, prevent a malicious program that has not happened and make it difficult for a malicious program to avoid killing. | 10-31-2013 |
20150205979 | METHOD AND SYSTEM FOR REPAIRING FILE AT USER TERMINAL - Provided are a method and system for repairing a file at user terminal. The method comprises: scanning a file at user terminal, determining whether the file is abnormal, and acquiring file characteristics information; if the file is abnormal, then according to the file characteristics information, acquiring from a cloud server a secure file corresponding to the abnormal file and uploaded before abnormity occurring, wherein the secure file in the cloud server is acquired by directly uploading file of user terminal; and replacing the corresponding abnormal file of the user terminal with the secure file. The method and system save the secure files of each user terminal in a cloud server, and when an abnormal file occurs in the user terminal, download the secure version of a corresponding file from the cloud server to replace the local abnormal file, thus ensuring recovery of the correct version of the file into the system, and solving the problems that the abnormal file cannot be restored to normal status during the conventional file repair process or cannot be repaired due to complexities caused by virus infection. | 07-23-2015 |
Patent application number | Description | Published |
20150355850 | MEMORY LIFE EXTENSION SYSTEM AND METHOD - A memory life extension system and method is provided for managing operation of rewritable memory used to store a monotonically increasing sequence of multiple-byte binary values in a set of one or more memory locations in the rewritable memory. A first value is read in from a set of one or more memory locations. On detection of an instruction to store an incremented value, the incremented value is permuted by applying an encoding, in which a value of a least significant bit changes only on every second increment, to two least significant bits of the incremented value. On overflow of a least significant byte as a result of the increment, a cyclic byte-wise shift is applied to the incremented value. The permuted incremented value is then stored in the one or more memory locations. | 12-10-2015 |
20150357133 | WIRELESS LIGHT SWITCH SYSTEM AND METHOD, REMOTE SWITCH DEVICE, AND LOAD CONTROLLER DEVICE - A wireless load control system is provided including one or more wireless switch components and one or more load controller components optionally in one-to-one, many-to-many, many-to-one, and one-to-many wireless communication with each other. A wireless switch assembly includes a base and a corresponding rocker shell that together define an enclosure for a control circuit and at least one elastically deformable actuator, the actuator being movable between an engaged position and a disengaged position. | 12-10-2015 |
20150359075 | WIRELESS LIGHT SWITCH SYSTEM AND METHOD, LOAD CONTROLLER DEVICE, AND REMOTE SWITCH DEVICE - A wireless load control system is provided including one or more wireless switch components and one or more load controller components optionally in one-to-one, many-to-many, many-to-one, and one-to-many wireless communication with each other. A wirelessly-controlled load controller assembly includes an enclosure adapted to fit within a junction box, the enclosure comprising a projecting fitting adapted to fit through an aperture of the junction box to maintain the enclosure in fixed relation to the junction box. A control circuit in the enclosure is provided with an antenna that extends through an antenna port that is disposed within the fitting so that when the load controller is mounted in a junction box, the antenna extends through the aperture of the junction box. | 12-10-2015 |