-
公开(公告)号:US12265481B2
公开(公告)日:2025-04-01
申请号:US18044109
申请日:2021-11-23
Applicant: FEITIAN TECHNOLOGIES CO., LTD.
Inventor: Zhou Lu , Huazhang Yu
Abstract: A method and system for communicating between Apple mobile device and Apple peripheral. The Apple application runs a first script and sends a credential creating request to a server; when the first script receives a challenge code returned by the server, takes data to be processed as a parameter of user information and a parameter of server information to generate the user information and the server information, sets values of a first extension and a key storing identification to preset values; the Apple application generates register data and sends the register data to the Apple peripheral; the Apple peripheral obtains the data to be processed from the register data and processes the data to be processed, takes the obtained processing result as a second extension to generate a register response; the first script obtains the processing result from the register response.
-
公开(公告)号:US12192376B2
公开(公告)日:2025-01-07
申请号:US17546692
申请日:2021-12-09
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
Abstract: A method and apparatus for realizing secure signature, the method includes: when a PIN verification instruction is received, verifying a first calculation result in the instruction by using a second shared key generated according to a terminal public key and a signature module private key, if the verifying is failed, replacing a stored signature module key pair with a regenerated signature module key pair; otherwise, generating PIN verification signature data and storing the PIN verification signature data, generating a second calculation result according to a second shared key and the PIN verification signature data and sending the second calculation result to the terminal; when a signature operation instruction is received, determining whether the PIN verification signature data in the instruction is consistent with the stored PIN verification signature data, if yes, signing an intermediate data to be signed by using a signature private key.
-
公开(公告)号:US12141056B2
公开(公告)日:2024-11-12
申请号:US18283901
申请日:2022-04-22
Applicant: FEITIAN TECHNOLOGIES CO., LTD.
Inventor: Zhou Lu , Huazhang Yu
Abstract: A mnemonic phrase management method. The method comprises: generating a random number having a first preset length and performing calculation on the random number; splicing the random number and data having a second preset length acquired from the random number calculation result to obtain a first spliced value; grouping the first spliced value according to a third preset length; sequentially searching an offset storage area for corresponding indexes according to values of the groups; obtaining mnemonic phrase starting offset addresses and mnemonic phrase lengths according to the indexes; and acquiring corresponding mnemonic phrases from a mnemonic phrase storage area according to the mnemonic phrase starting offset addresses and the mnemonic phrase lengths and sequentially storing the mnemonic phrases into a mnemonic phrase buffer. The present invention relates to the field of information security. Compared with the prior art, the present invention can greatly reduce storage space, solve the problem of space limitation of a security chip, and save more space for applications, is applicable to existing security chips, and meets production requirements of hardware devices.
-
公开(公告)号:US12061567B2
公开(公告)日:2024-08-13
申请号:US17911506
申请日:2021-08-25
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
CPC classification number: G06F13/4282 , G06F13/382 , G06F2213/0042
Abstract: A method, an apparatus and a system for implementing an external device simulating a keyboard relates to the field of electronic technology. The external device generates key-value data in a case that a user pressing a key is detected, and sends a start command to an Apple device after receiving a data request sent by the Apple device. After receiving the start command, the Apple device exits a soft keyboard and continuously sends the data request to the external device. After receiving the data request, the external device sends an attaching report command including the key-value data to the Apple device. The Apple device displays the key-value data and continuously sends the data request to the external device. After receiving the data request, the external device sends an end command to the Apple device. The Apple device pops up the soft keyboard again after receiving the end command.
-
公开(公告)号:US11868985B2
公开(公告)日:2024-01-09
申请号:US16307196
申请日:2017-07-21
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
CPC classification number: G06Q20/351 , G06Q20/12 , G06Q20/34 , G06Q20/4012 , G06Q20/4016 , G06Q20/40145
Abstract: A method of online transaction, in which a visual financial IC card receives transaction transferring data from a client, obtains transaction data, receive an online PIN from a user, obtains online PIN ciphertext by encrypting, executes behavior analyzing to obtain a card behavior analyzing result, sets a first transaction result, organizes message according to the transaction data, the online PIN ciphertext, the card behavior analyzing result and the first transaction result, and sends the message to the client; receives an online response package sent by the client, executes completing process to obtain a completing process result, sets a second transaction result, displays a corresponding information, organizes a data package according to the second transaction result and the completing process result, and sends the data package to the client. In this invention, any transaction terminal is avoided to improve security and convenience of the online financial IC card transaction.
-
公开(公告)号:US11622253B2
公开(公告)日:2023-04-04
申请号:US17297013
申请日:2020-09-03
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
Abstract: A Bluetooth device, which realizes different types of device by setting a MAC address of the device or a type of a broadcast device; when the device is used as a Bluetooth keyboard device, it can realize a function for inputting a dynamic password, and the device shifts an obtained dynamic password value into Bluetooth keyboard class virtual key information according to the Bluetooth keyboard protocol, and sends automatically the virtual key information to the upper computer successively, and the device can restore a type of the device so as to resolve a keyboard conflict between the keyboard device and the upper computer, in this way, the user makes less error to input a dynamic password and the identity authentication becomes safer.
-
公开(公告)号:US20220327192A1
公开(公告)日:2022-10-13
申请号:US17432078
申请日:2020-10-22
Applicant: FEITIAN TECHNOLOGIES CO., LTD.
Inventor: Zhou Lu , Huazhang Yu
Abstract: A method and system for safely entering a password, the method comprising: a smart key device receives a password verification request sent from an upper computer, generates and displays randomly arranged characters, and returns a password verification response to the upper computer; upon the reception of the password verification response, the upper computer displays a password input interface and waits for a user to input, upon the reception of a user input, obtains a password acquisition response according to the user input, and sends the password acquisition response to the smart key device; and the smart key device determines whether the user input is correct according to the received password acquisition response. By means of the present invention, a password input solution in which a user needs to click a different position every time a password character is entered is achieved. In addition, the numbers are not displayed on the screen of the upper computer, the security of the user's digital assets is further ensured.
-
公开(公告)号:US11381975B2
公开(公告)日:2022-07-05
申请号:US16609486
申请日:2018-06-01
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
Abstract: A method for avoiding a Bluetooth device from being traced, which comprises the following steps: parsing, by a target Bluetooth device, a second dynamic address to obtain a second random number and a second data; and generating, by the target Bluetooth device, a plurality of the third data successively according to the identity parsed keys in the identity parsed keys list save by the target Bluetooth device and a second random number, and determining whether there exists any third data which is the same as the second data, if yes, determining that there exists the second identity parsed key which is authenticated successfully; otherwise, determining that there isn't the second identity parsed key which is authenticated successfully.
-
公开(公告)号:US11275869B2
公开(公告)日:2022-03-15
申请号:US16628726
申请日:2018-11-28
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
Abstract: An operating method for a credit card, the method comprising: step S1, a microprocessor is powered on to perform system initialization; step S2, the microprocessor hibernates and is awakened when a preset interruption is detected so as to execute step S3; and step S3, the microprocessor executes preset interruption processing by entering a preset interruption processing flow, and exits the preset interruption processing flow when the preset interruption processing is finished, then returns to step S2. Alternatively, the method comprises: step s1, the microprocessor is powered on to perform system initialization; step s2, the microprocessor checks whether a preset interruption marker is set, and if so, the preset interruption marker is reset so as to execute the preset interruption processing, otherwise the microprocessor executes step s3; and step s3, the microprocessor hibernates, is awakened when detecting the preset interruption so as to set the preset interruption marker, and then returns to step s2. The present invention may reduce the risk of credit card fraud.
-
公开(公告)号:US11271932B2
公开(公告)日:2022-03-08
申请号:US16470591
申请日:2018-01-31
Applicant: Feitian Technologies Co., Ltd.
Inventor: Zhou Lu , Huazhang Yu
IPC: H04L29/06 , H04L9/32 , H04L67/303
Abstract: A method for integrating an authentication device and a website, the method comprising: a registration plug-in receiving user registration information from a website and a registration result identifier corresponding to the user registration information, and determining whether the user has registered successfully according to the registration result identifier; if yes, then sending registered information to the website and ending the registration process; otherwise, sending a request to obtain device registration, which comprises a user identifier, to an authentication server; receiving the device registration request from the authentication server; sending the device registration request to an authentication device by means of a browser; receiving device registration data, which is generated by the authentication device, by means of the browser; sending a first authentication request comprising the device registration data to the authentication server; receiving a first authentication result from the authentication server; sending the first authentication result to the website, for use in the website verifying whether the user is registered successfully. According to the present invention, the authentication device is integrated with a website that applies Joomla technology so as to register and authenticate a user on the website.
-
-
-
-
-
-
-
-
-