-
公开(公告)号:US12175321B2
公开(公告)日:2024-12-24
申请号:US18040481
申请日:2021-11-23
Applicant: FEITIAN TECHNOLOGIES CO., LTD.
Inventor: Zhou Lu , Huazhang Yu
IPC: G06K7/10
Abstract: A card reader auxiliary device and a working method thereof, which relate to the field of card readers. The card reader auxiliary device detects whether a card exists based on contactless field of the card reader, when detecting that the card exists, the card reader auxiliary device opens its own contactless field and provides field strength enough for a fingerprint card to enable the fingerprint card to complete fingerprint comparison, the card reader auxiliary device obtains a current time of a timer, determines whether the current time is more than a first preset time, if yes, the card reader auxiliary device closes its own contactless field. According to the embodiments, the fingerprint comparison can be done by a card without updating the card reader, which can make the card communicate smoothly with the card reader.
-
公开(公告)号:US20240214193A1
公开(公告)日:2024-06-27
申请号:US18288049
申请日:2022-06-28
Applicant: FEITIAN TECHNOLOGIES CO., LTD.
Inventor: Zhou LU
IPC: H04L9/08
CPC classification number: H04L9/0861
Abstract: The invention provides a working key generation method and device and a computer readable storage medium, and belongs to the technical field of information security. The method comprises the following steps: the terminal receiving an operation instruction sent by an upper computer, obtaining a working key purpose and a working key algorithm according to the operation instruction, setting the working key purpose as a first purpose by the terminal, generating derived data according to the first purpose, a master key identifier, a first numerical value and a master key algorithm, determining the length of a working key according to the working key algorithm, obtaining data in a working key buffer area as a key, generating the working key according with the length of the working key according to the key and the derived data, executing corresponding operation according to the operation instruction and the working key, and returning an operation result to the upper computer. Compared with an encryption scheme in the prior art, the method provided by the invention is safer and wider in application range.
-
公开(公告)号:US11972651B2
公开(公告)日:2024-04-30
申请号:US17431378
申请日:2020-01-03
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
CPC classification number: G07C9/00563 , H04L9/3273 , H04L9/3297
Abstract: An intelligent key device and a verification method therefor. The verification method comprises: determining the type of an instruction by means of an intelligent key device; determining a key area according to the type of the instruction; acquiring a biometric verification identifier corresponding to the key area; determining, according to the biometric verification identifier, a biometric verification mode corresponding to the key area; and executing a corresponding operation according to the biometric verification mode. According to the present invention, a user can realize multiple verification modes of biometric features according to a key area in the process of performing verification using the intelligent key device, such that different verification requirements of the user for the key used in different application scenarios are met.
-
公开(公告)号:US20240120991A1
公开(公告)日:2024-04-11
申请号:US18276244
申请日:2022-03-23
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou LU , Huazhang YU
IPC: H04B7/185
CPC classification number: H04B7/18519
Abstract: The present application presents a method and an apparatus for synchronizing time by parsing satellite navigation data. A service application obtains current time of a system and caches it as a first time variable, receives and parses the satellite navigation data to obtain all character strings, obtains a character string as a current character string to be processed, determines a type of a system protocol identifier, if it is a preset system protocol identifier, converts a time field of the current character string to be processed into a local time zone time value for storing, obtains the current time and stores it as a second time variable, obtains a first time compensation value according to the first and second time variables, obtains satellite navigation time according to the first time compensation value and the maximum local time zone time value and sets system time as satellite navigation time.
-
公开(公告)号:US11954374B2
公开(公告)日:2024-04-09
申请号:US17775432
申请日:2021-05-20
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
CPC classification number: G06F3/1203 , G06F3/1222 , G06F3/1238 , G06F3/1287 , G06F21/602 , G06F21/608
Abstract: A processing method and system of cloud broadcasting and printing data, relating to the field of information security. When receiving a service obtaining request, a server processes first data in the service obtaining request into printing and broadcasting data, processes the printing and broadcasting data into first verifying data and then sends the first verifying data to a cloud broadcasting and printing service platform. The cloud broadcasting and printing service platform processes the first verifying data into second verifying data and then sends the second verifying data to a cloud broadcasting and printing all-in-one machine. The cloud broadcasting and printing all-in-one machine processes the second verifying data into printing and broadcasting data, and extracts printing information and broadcasting information from the printing and broadcasting data at a time and performs broadcasting and printing respectively.
-
公开(公告)号:US11763036B2
公开(公告)日:2023-09-19
申请号:US17045142
申请日:2019-04-10
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
IPC: G06F21/74 , G06F3/0484 , G06F3/04886 , G06F21/31 , G06F21/36
CPC classification number: G06F21/74 , G06F3/0484 , G06F3/04886 , G06F21/31 , G06F21/36
Abstract: A method for secure interaction on a universal platform. The method comprises: when a verification code needs to be inputted, a universal platform transmits a switching notification to a security chip via a secure interface; when the security chip receives the switching notification, same controls a switching circuit to switch a touch input module and a display module to be controlled by the security chip, controls the display module to prompt a user to input the verification code, controls, on the basis of coordinate data, the display module to generate and display a keyboard, acquires from the touch input module verification code coordinate information generated by the touch input module on the basis of screen-touching information of the user, produces the verification code on the basis of the verification code coordinate information and of the coordinate data, encrypts the produced verification code to produce a verification code ciphertext, outputs the verification code ciphertext via a preset interface, and controls the switching circuit to switch the touch input module and the display device to be controlled by the universal platform. The present invention prevents losses incurred by a verification code leakage.
-
公开(公告)号:US20230128424A1
公开(公告)日:2023-04-27
申请号:US17799563
申请日:2021-06-18
Applicant: FEITIAN TECHNOLOGIES CO., LTD.
Inventor: Zhou Lu , Huazhang Yu
IPC: G01R31/3842 , G01R31/36
Abstract: A method and apparatus for measuring the remaining power level of a device. The state of flag bits are detected, a password is calculated when a first flag bit is set, the password is displayed to reset the first flag bit, and the detection of the state of the flag bits is returned to; the total power consumption is calculated when a second flag bit is set, the remaining power level is updated on the basis of the total power consumption and of a second preset value, the second flag bit is reset, and the detection of the state of the flag bits is returned to. The present invention implements increased precision in measuring the remaining power level without additional component, accurately reflects the actual value of the remaining power level of a battery, and incurs no additional power consumption. This does not affect the service life of the device and is inexpensive.
-
公开(公告)号:US11381554B2
公开(公告)日:2022-07-05
申请号:US16092529
申请日:2017-03-29
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
Abstract: A working method of an NFC dynamic token, comprising the following steps: after detecting that a preset press key is triggered, the NFC dynamic token activates NFC communication and builds connection with a mobile device via NFC channel; when the NFC dynamic token receives a second instruction from the mobile device, the NFC dynamic token obtains a seed key from the second instruction, stores the seed key and sends a message that writing is successful to the mobile device; when the NFC dynamic token receives a third instruction from the mobile device, the NFC uses self-stored seed data to generate a dynamic password and sends the dynamic password to the mobile device via the NFC channel. According to the present invention, the seed key is written into the NFC dynamic token via the NFC channel, which improves security and flexibility of the dynamic token.
-
公开(公告)号:US11263507B2
公开(公告)日:2022-03-01
申请号:US17040758
申请日:2019-05-28
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
IPC: G06K19/07 , G06K7/00 , G06K19/073
Abstract: A working method for an IC card having a fingerprint recognition function, comprising: an IC card receiving and determining an instruction type from a terminal, and when determined that the received instruction is an application selection instruction, the IC card selecting an application and returning a response to the terminal; when determined that the received instruction is a processing option acquisition instruction, the IC card acquiring a user fingerprint information verification state according to the content of the instruction, and if verification is successful, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number does not need to be verified; if verification fails, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number must be verified; when determined that the received instruction is a record reading instruction, the IC card returning a record reading response to the terminal according to the record reading instruction, wherein the record reading response contains a method for verifying a card holder. Thus, the risk of a personal identification number being leaked is avoided, thus enhancing the security of a transaction, while also improving user experience.
-
公开(公告)号:US20220004519A1
公开(公告)日:2022-01-06
申请号:US17478829
申请日:2021-09-17
Applicant: FEITIAN TECHNOLOGIES CO., LTD.
Inventor: ZHOU LU , HUAZHANG YU
IPC: G06F13/42
Abstract: The disclosure provides a method and an apparatus for realizing USB communication; the method includes: step S1, when receiving a command sent by a host computer, a device determines a type of the command and returns enumerated general information of the device to the host computer if the command is an enumerating command, go back to step S1; if the command is a setting report command, the device acquires response data according to the setting report command and stores the response data, go back to step S1; if the command is a getting report command, the device selects a corresponding report size according to a size of current response data, acquires a second report identification corresponding to the report size, generates return data according to the acquired second report identification and the current response data and sends the return data to the host computer, go back to step S1.
-
-
-
-
-
-
-
-
-