Feitian Technologies Co., Ltd. Patent applications |
Patent application number | Title | Published |
20160085609 | METHOD FOR MANAGING APPLICATION ON CARD - The present invention belongs to the field of intelligent cards, and disclosed is a method for managing an application on a card. The method comprises: after receiving data sent by a running environment, a card content management module checking a card state; when the card state is not a first preset state or a second preset state, checking the received data; and when the received data meets a preset format, continuing to receive the data sent by the running environment to obtain a complete command, and performing a corresponding command to implement an association of applications on a card. The beneficial effects of the present invention are to provide a method for managing an application on a card, so that loading, installation, update, personalization, and deletion of an application on the card can be implemented. | 03-24-2016 |
20160004511 | METHOD FOR IMPLEMENTING PRECOMPUTATION OF LARGE NUMBER IN EMBEDDED SYSTEM - Disclosed is a method for implementing precomputation of a large number in an embedded system. A modulo module, a modulo adding module, and a Montgomery modular multiplier are invoked according to a data format of a modulus length and a value of each data bit of a binary number corresponding to the modulus length, to perform an iterative operation, so that a precomputation result of a large number can be obtained when the modulus length is an arbitrary value, thereby improving the data processing speed. | 01-07-2016 |
20150358324 | SCHEDULE RECORDING METHOD - Disclosed is a schedule recording method, comprising: an authentication server receiving triggering information and then acquiring key information from the triggering information, the key information comprising an authentication code; acquiring an authentication window, and searching the authentication window for the authentication code; if the authentication code is found, extracting a time factor corresponding to the authentication code, and generating and storing an authentication code list and/or staff log. | 12-10-2015 |
20150349955 | METHOD FOR RAPIDLY GENERATING COORDINATE POINT IN EMBEDDED SYSTEM - A method for rapidly generating coordinate points in an embedded system, comprising: according to a preset segment number of segmentation and a preset step size, segmenting a numerical value to be calculated and then grouping each data segment, and calculating an initial point value corresponding to each digit in a group of data of each data segment; detecting the value of each digit in the current data group of all data segments, subjecting the initial point value corresponding to the digit with a value of 1 and an intermediate point value to point addition operation, and updating the intermediate point value using the point addition operation result; judging whether a next data group of each data segment exists, if it does not exist, taking the intermediate point value as a resulting coordinate point value and storing same, and ending; and if it exists, subjecting the intermediate point value to a point doubling operation for a preset step size frequency, and updating the intermediate point value using the point doubling operation result, taking a next data group of each data segment as a new current data group, and continuing to perform a point addition and point doubling operation. The present invention can rapidly generate coordinate points, is effectively applied to the generation of key pairs and signatures, and greatly improves the operation speed. | 12-03-2015 |
20150304313 | ONE-TIME PASSWORD OPERATING METHOD - Disclosed is a one-time password operating method, comprising: when a one-time password detects a valid key, judging the type of a pressed key, if the pressed key is a power-on key, detecting whether a current power-on logo is set, if yes, resetting same, otherwise, setting same and inspecting whether a locking logo is set, if yes, entering an unlocking code interface, otherwise entering an information interface; if the pressed key is a delete key, deleting data at the tail end of a data cache area; if the pressed key is a number key and the one-time password is not in the information interface, storing corresponding data in the data cache area; if the one-time password is in the information interface, judging whether the time for the key being pressed down goes beyond a preset time period, if yes, entering a power-on password modifying interface, otherwise storing corresponding data in the data cache area; if the pressed key is an Enter key and the one-time password is not in the information interface, judging whether the data in the data cache area are correct or meet requirements, if the one-time password is in the information interface, generating a dynamic password and displaying corresponding contents. | 10-22-2015 |
20150207790 | METHOD AND SYSTEM FOR GENERATING AND AUTHORIZING DYNAMIC PASSWORD - A method and system for generating and authorizing a dynamic password, which relate to the field of identity authentication. The method comprises: a token receiving a command for generating a dynamic password, and generating a first dynamic factor according to a first timer; acquiring current data from a first data set according to a first offset pointer, and generating a first dynamic password according to the first dynamic factor and the current data; a server receiving a second dynamic password input by a user, and obtaining a second dynamic factor according to a second timer; obtaining an authentication window according to the second dynamic factor and an authentication window value; and according to the dynamic factor in the authentication window and the data in a second data set, calculating to generate a group of dynamic passwords, and verifying whether there is a dynamic password consistent with the second dynamic password in the group of dynamic passwords or not. With the above-mentioned solution, the problem that a time-type token cannot be generated a plurality of times within a short time is solved, and that the situation where the event-type token causes desynchronization with the server because of continuous generation of dynamic passwords is avoided. | 07-23-2015 |
20150205987 | METHOD FOR ENHANCING STABILITY OF COMMUNICATION BETWEEN A CONTACTLESS CARD AND A CARD READER - The invention discloses a method for enhancing stability of communication between a contactless card and a card reader, relating to communication field. In the method, the card reader initiates time-out timing and a receiver, waits for receiving data, when the time-out does not happen and sub-carrier wave is detected, the card reader stops time-out timing, receives data and determines whether there is frame error in the received data frame, if yes, discards the data frame and goes on time-out timing; otherwise, determines whether CRC check and/or parity check of the data frame is correct, if the CRC check and/or the parity check of the data frame are correct, determines whether there is other error in the data frame, if there is other error in the data frame, discards the data frame and goes on time-out timing; if there is not other error in the data frame, shuts down the receiver and sends the received data to a host; or if the CRC check and/or the parity check of the data frame are not correct, determines whether length of the data frame is smaller than preset byte, if length of the data frame is smaller than preset byte, discards the data frame and goes on time-out timing; if length of the data frame is not smaller than preset byte, determines whether the data frame is integrate, if the data frame is integrate, shuts down the receiver; if the data frame is not integrate, discards the data frame and goes on time-out timing. | 07-23-2015 |
20150161367 | METHOD FOR VERIFYING AND CALIBRATING TIME - A method for verifying and calibrating time is provided. The method includes: receiving a password and related information sent by a client, obtaining related information and generating a dynamic password and comparing the related information with the dynamic password, determining whether a preset condition according to the prestored preset time is satisfied, computing offset rate according to a benchmark time offset value if the preset condition according to the prestored preset time is satisfied and determining whether a calibrating condition is satisfied, calibrating time offset value if the calibrating condition is satisfied, and returning successful verification information, returning successful verification information directly if calibrating condition is not satisfied. | 06-11-2015 |
20140298029 | CONTACTLESS SEED PROGRAMMING METHOD AND SYSTEM THEREOF - The invention discloses a contactless seed programming method, belonging to information security field. In the method, a seed programming device obtains a token ID of a dynamic token, obtains corresponding first seed data according to the token ID, communicates with the dynamic token contactlessly, obtains first seed data from the dynamic token, decrypts the first seed data so as to obtain second seed data, encrypts the second seed data with the first data so as to obtain third seed data and sends the third seed data to the dynamic token; and the dynamic token decrypts the seed and updates seed stored in itself. By the invention, programming operation is simplified and programming efficiency is improved by communicating with the dynamic token contactlessly and security is ensured by transferring the encrypted seed during communication between the programming device and the token. | 10-02-2014 |
20140223524 | KEY UPDATING METHOD AND SYSTEM THEREOF - A key updating method and system are provided. In the method, (1) a back-end authentication system receives a current dynamic password generated by a dynamic token and authenticates the current dynamic password, and if the authentication succeeds, generates key updating information and goes to (2); (2), the back-end authentication system generates a first updating key according to the key updating information and a first initial key stored therein and copies the first updating key to a buffer of the first initial key; the dynamic token obtains and authenticates the key updating information, and if the authentication succeeds, generates a second updating key according to the key updating information and a second initial key stored in the dynamic token and copies the second updating key to a buffer of the second initial key; or if authentication fails, quits the key updating. The solution avoids risk incurred by accidental key leakage. | 08-07-2014 |
20140208403 | METHOD FOR IDENTIFYING PULSE OPTICAL SIGNAL AND DEVICE THEREOF - The invention provides a method for identifying pulse optical signal, including: a. receiving first trigger information; b. collecting and identifying pulse optical signal with a predetermined method to obtain a unit of data; c. parsing the unit of data and determining type of it, if the unit of data is a unit of data representing header information, step d is executed; or if the unit of data is other type of unit of data, step b is executed; d. going on collecting and identifying pulse optical signal with the predetermined method to obtain a unit of data; e. determining whether all units of data corresponding to the unit of data representing the header information is received; f. packeting the unit of data representing the header information with all corresponding units of data into a group of data packets. The invention converts the pulse optical signal into bits, packets and converts the bits into a data packet, and receives the photosensitive-transfer information which accelerates the process of obtaining required data by a signal identifying device. | 07-24-2014 |
20140201395 | USB KEY AND A METHOD FOR COMMUNICATION BETWEEN THE USB KEY AND A TERMINAL - A USB Key and a method for communication between the USB Key and a terminal are provided, of which the USB Key includes an interface module, a power module and an MCU module. The MCU module is configured to make initialization setting after power on, check for power level status of each mode pin in the MCU module, and in case of the power level status conforms to a first predetermined condition, set the pin for serial interface communication in the MCU module to a high impedance state, configure a USB function, receive a request for enumerating the device being initiated by a terminal connecting to the interface module, and after enumeration, perform USB communication with the terminal; and in case that the power level status conforms to a second predetermined condition, set a pin for performing USB communication in the MCU module to high impedance state, set the serial interface function, initiate a request for enumerating the device to the terminal connecting to the interface module, and after enumeration, perform a serial-interface communication with the terminal. The USB Key in the invention is able to be compatible with a USB interface and a serial interface. | 07-17-2014 |
20140195824 | PROTECTING METHOD AND SYSTEM OF JAVA SOURCE CODE - The present disclosure discloses a protecting method and system of Java source code. When a first initiating class is invoked, the method comprises following steps, wherein the first initiating class is an initiating class of Java program: the first initiating class decrypts first cipher data to obtain a class loader; the class loader reads second cipher data to the memory and decrypts the second cipher data to obtain a first class, wherein the first class is a class run by a Java virtual machine, and the suffix of the first class is .class; the class loader loads a second initiating class to the memory; wherein the second initiating class is an original class in jar packet of the Java program; and the class loader loads the first class to the Java virtual machine so that the Java virtual machine can invoke a main interface in the second initiating class to run the Java program. The present disclosure can protect Java source code and make it difficult to decompile the Java source code. | 07-10-2014 |
20140101747 | SYSTEM AND METHOD FOR COMMUNICATION BETWEEN DYNAMIC TOKEN AND TOOL - The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a dynamic token part; the tool part comprises a control module and a tool radio frequency communication module; the dynamic token part comprises an MCU and liquid crystal module and an OTP radio frequency communication module. The method comprises: the tool part transmits a modulated wake-up command signal to the dynamic token part in the form of an electromagnetic wave; when a wake-up response command signal returned by the dynamic token part is correctly received, the tool part transmits the modulated command signal to the dynamic token part in the form of an electromagnetic wave; and the tool part detects the amplitude variation of the generated carrier signal, judges whether the response signal is correctly received, and operates correspondingly. | 04-10-2014 |
20140082710 | METHOD FOR AUTHENTICATING AN OTP AND AN INSTRUMENT THEREFOR - A method for authenticating an OTP (one time password) and an instrument therefor, in which the method includes determining whether the OTP token is authenticated successfully, if the OTP token is not authenticated successfully, setting size of an authentication window to be a first predetermined time length and authenticating the obtained OTP according to the authentication window; if the OTP token is authenticated successfully, determining whether the interval between the authentication success time and the current system time is longer than a second predetermined time length, if yes, setting size of the authentication window to be a third predetermined time length and authenticating the obtained OTP according to the authentication window and the authentication success time, in which the third predetermined time length is shorter than the first predetermined time length; otherwise, setting size of the authentication window to be a fourth predetermined time length and authenticating the obtained OTP according to the authentication window and the authentication success time, in which the fourth time length is shorter than the third predetermined time length. The invention can ensure both the authentication success rate and the authentication security. | 03-20-2014 |
20140082709 | DYNAMIC PASSWORD AUTHENTICATION METHOD AND SYSTEM THEREOF - The present invention discloses a dynamic password authentication method and a system thereof. The method comprises: a server receives first information sent from the client, generates second information according to the first information, sets every transmission bit in the second information to be in corresponding brightness status or color status to obtain a third information and sends it to a client; the client transforms the third information into impulse optical signal and outputs it; a dynamic password device transforms the impulse optical signal into intermediate information, extracts part or all of it and transforms it into display information; the dynamic password device receives trigger information, generates a first dynamic password; the server generates a second dynamic password or a set of second dynamic passwords and verifies whether the first dynamic password is legitimate by it. Security of authentication is improved by the present invention. | 03-20-2014 |
20130304779 | METHOD AND DEVICE FOR GENERATING BIG PRIME - The invention discloses a method for generating a large prime number and a system thereof. The method includes Step 1, generating a random number in size corresponding to number of digits input by a user, in which number of digits of the random number is identical to number of digits input by the user; Step 2, obtaining remainders by dividing all prime numbers in a predetermined little prime number table by a current value of the random number so as to form a remainder array; Step 3, determining whether there is a remainder 0 in the remainder array, if yes, going to Step 4; otherwise, going to Step 5; Step 4, updating the random number with a predetermined step, updating remainders in remainder array and going to Step 3; Step 5, checking for whether a current value of the random number is a prime number, if yes, going to Step 6; otherwise, going to Step 4; and Step 6, storing or outputting the current value of the random number. The solution provided by embodiments of the invention reduces primality test times, and thus saves time of generating a large prime number. | 11-14-2013 |
20130110846 | DATA PROCESSING METHOD AND APPARATUS | 05-02-2013 |
20130097419 | METHOD AND SYSTEM FOR ACCESSING E-BOOK DATA - Provided is a method for accessing e-book data, including: step A: e-book hardware establishes a connection with an electronic device and negotiates a reading key; step B: the electronic device downloads e-book data via a client, specifically is: firstly, the electric device establishes a connection with the client; the client sends a connection establishment request to a server; the server verifies the identification of the electronic device via the client; if the verification is not passed, then the access will be refused; if the verification is passed, then the server uses a downloaded key to encrypt the e-book data and sends the encrypted e-book data to the electronic device via the client; and step C: the electronic hardware establishes a connection with the electronic device, processes the encrypted e-book data using the downloaded key and/or the reading key, and the e-book hardware displays the e-book data. The method provided in the present embodiment not only enables the download and reading of the e-book to be more rapid but also protects the copyright of the e-book. | 04-18-2013 |
20130031277 | METHOD FOR IDENTIFYING VERSION TYPE OF WINDOWS OPERATING SYSTEM ON A HOST BY A USB DEVICE - The invention provides a method for identifying version type of a Windows operating system on a host by USB device, relating to operating system field and including steps: A, USB device is powered on and initialized; B, the USB device performs USB enumeration, determines whether a first predetermined instruction is received in process of USB enumeration, if yes, determines the operating system is a first operating system and goes to Step D, if no, goes to C; C, the USB device determines the device type returned in process of USB enumeration, if it is a CCID device, determines whether the received instruction includes a second predetermined instruction, if yes, determines the operating system is a second operating system, if no, determines the operating system is a third operating system; when the device is an SCSI device, the USB device determines whether the second received SCSI instruction is a third predetermined instruction or fourth predetermined instruction, if it is the third predetermined instruction, determines that the operating system is a second operating system, if it is the fourth predetermined instruction, determines that the operating system is a third operating system; D, the USB device establishes communication with the host, waits for instruction sent by the host and returns related information to the host according to the determined type of the host operating system. | 01-31-2013 |
20130013095 | AUDIO COMMUNICATION BASED ELECTRONIC SIGNATURE SYSTEM AND METHOD THEREOF - An audio communication based electronic signature system and a method thereof are provided. The system includes: an audio smart key device including an interface module, a data processing module, a smart key module and a power module; and a terminal including an audio output interface, an audio input interface and an application unit. The interface module of the audio smart key device communicates with the terminal in the form of audio signal and it can perform operations of A/D conversion and modulation and demodulation on the audio signal. In the signing method, the terminal sends an audio signal including important data to the smart key device, the audio smart key device receives and decodes the audio signal, demodulates the decoded data and decrypts the demodulated data, signs the decrypted data, encodes, modulates and encrypts the signature result subsequently, sends the crypted result to the terminal, where the encrypted result is sent to the server for signature verification. | 01-10-2013 |
20120291023 | DEVICE AND METHOD FOR AUTOMATIC DRIVER INSTALLATION - Provided are a device and method for automatic driver installation. The device comprises: a remoter server, a client host and an information security device. The remote server stores driver and interface protocol program downloading service for the client host. The client host is in communication connection with the remote server, receives data information inputted by the information security device, and downloads the driver or interface protocol program from the remote server according to the data information and install or load the driver or interface protocol program. The information security device is in communication connection with the client host and feedbacks data information according to instruction issued by the client host. The present scheme can effectively reduce the number of times user account control (UAC) window pops up and ensure operating system security while installing and deploying middleware, thus simplifying user operation. | 11-15-2012 |
20120096214 | Working Method for Information Security Device with CF Interface and Working System Thereof - A working method for information security device with CF interface and working system thereof are disclosed in the invention. The method includes that the card reading apparatus sends instruction to the information security device with CF interface, and the information security device with CF interface determines the object being operated by the instruction, if the object is flash module in the information security device with CF interface, the information security device with CF interface operates the flash module as normal, or else if the object is information security chip of the information security device with CF interface, the information security device with CF interface performs information security operation on the information security chip;
| 04-19-2012 |
20120089653 | Data Converting Method and a Device Therefor - A data converting method and device therefor are disclosed by the invention, relating to data converting algorithm field, solving the problem of complicate data converting method in prior art. Steps of the invention are obtaining offset from the predetermined byte of the data string to be converted; obtaining the predetermined bits of data from the data string to be converted according to the offset; converting the obtained bits to decimal number; determining whether size of the decimal number is smaller than the first predetermined length, if so, keeping adding 0 to the upper digit of the decimal number till the first predetermined length is reached, and taking the data with added 0 as the converted data; otherwise keeping obtaining data from low bit of the decimal number, till the first predetermined length is reached, and taking the obtained data as the converted data. The method of the invention is mainly used for devices and methods requiring data converting, e.g. one time password generating method and device therefor. | 04-12-2012 |
20110196788 | Method for loading double e-wallets - The invention discloses a method for loading double e-wallets, relating to the information security field. The method includes steps of entering into a contactless inductive area of a terminal by the CPU card; being powered on and initialized, synchronizing a first e-wallet and a second e-wallet by the CPU card; receiving and executing INITIALIZE FOR LOAD instruction sent by the terminal, and returning a response message of INITIALIZE FOR LOAD instruction to the terminal, by the CPU card; receiving the response message of INITIALIZE FOR LOAD instruction and sending data in the response message of INITIALIZE FOR LOAD instruction, to a host, by the terminal; receiving and storing the data, sending LOAD allowing message to the terminal, by the host; receiving LOAD allowing message and sending LOAD instruction to the CPU card, by the terminal; receiving LOAD instruction, performing loading operation on the second e-wallet, refreshing balance of the first e-wallet and returning the response message of LOAD instruction, to the terminal, by the CPU card. (FIG. | 08-11-2011 |
20110191709 | VIRTUAL KEYBOARD INPUT MEANS WITH MULTIPLE INPUT FOCUSES AND METHOD THEREOF - The invention discloses a virtual keyboard input means with multiple input focuses and method thereof, relating to the field of information security. The means includes a control module and a virtual keyboard. The virtual keyboard is a virtual keyboard unit controlled by the control module or a virtual keyboard module communicated with the control module. The method includes that displaying virtual keyboard and multiple simulated input/output unit in the virtual keyboard input mode and setting corresponding focus indicator; if a user clicks simulated input/output unit, the control module sets the current input focus indicator as the focus indicator of the simulated input/output unit, if the user clicks virtual keyboard, virtual keyboard unit controlled by the control module or a virtual keyboard module communicated with the control module determines corresponding character according to the position of the cursor and performs corresponding processing. The invention improves the security of input with the virtual keyboard. | 08-04-2011 |
20100115465 | Logon System and Method Thereof - The invention discloses a logon system and a method thereof, which relates to information security field. The invention solves the problems that the user can log on Windows by username and password only. In the invention, the Credential Provider module adapted to pop up a human-computer interactive interface when the Credential Provider module is called by the operating system of the computer; further adapted to collect the information needed for logging on the operating system and transfer the collected information to the operating system of the computer; the Cryptographic Service Provider module is adapted to perform authentication with the information received from the operating system of the computer; and, if the authentication is successful, to perform operation with the corresponding private key of the key device logon certificate to generate credential information needed for logging on the operating system. The embodiments of the invention are applied for logging on the Windows, which provide more alternative logon ways for the user. | 05-06-2010 |
20100082843 | Method and System for Implementing Automatic Installation of Key Device - The invention discloses a method and system for implementing automatic installation of a key device, and relates to the field of smart card. The method includes steps of: establishing, by the key device, a connection with a computer; declaring to the computer that the key device itself is a compound device containing a USB keyboard device; sending a predefined first keyboard message sequence to the computer, wherein the first keyboard message sequence is used for starting an operation environment of the computer; converting, after the operation environment is started, a pre-stored script instruction for running an installation program into a second keyboard message sequence, and sending the second keyboard message sequence to the computer; sending a predefined third keyboard message sequence to the computer, wherein the third keyboard message sequence is used for running the installation program. The system includes a key device and a computer. According to the invention, by way of interaction between the key device and the computer, the technical problem that the key device can not be installed automatically in the case that the autorun function of the Windows system is shielded is solved, thereby facilitating automatic installation of the key device. | 04-01-2010 |
20090289117 | Method For Reducing RF Interference Inside Dual-Interface Card Reader And Dual-Interface Card Reader Thereof - The present invention provides a method for reducing RF interference inside a dual-interface card reader and a dual-interface card reader, which relate to dual-interface card reader field. The method includes: adjusting RF power by the dual-interface card reader to reach a specified maximum value; determining the type of an IC card which is operating currently by the dual-interface card reader; if the IC card is a contactless IC card, responding to the contactless card and not responding to any contact IC card before the operation of the contactless IC card is completed by the dual-interface card reader; if the IC card is a contact IC card, adjusting the RF power so as to make the RF power to be lower and responding to the contact IC card by the dual-interface card reader, and if a contactless IC is operating before the operation of the contact IC card is completed, responding to the contactless IC card simultaneously by the dual-interface card reader. The dual-interface card reader includes: a determining module, a control module, a contact card communication module, a contactless card communication module and a data transferring module. The invention provides a solution for reducing RF interference inside a dual-interface card reader, which is implemented easily and conveniently. The identification effect of the dual-interface card reader is improved. | 11-26-2009 |
20090287688 | Method for Searching for Class and Function Based on .NET Card and .NET Card Thereof - The present invention relates to information security field and presents a method for searching for a class and a function based on a .NET card and a .NET card thereof. The method includes: building a first character string according to information of a class currently executed by the .NET card, or information of a function currently executed by the .NET card and a class that the function belongs to; computing a first index value from the first character string; searching for a first locator value corresponding to the first index value in an index table pre-stored in the .NET card, wherein index values in the index table are generated in the same way as the first index value is generated; finding, in a runtime library of the .NET card, the class or the function currently executed according to the first locator value. The .NET card includes a storage module, a building module, a computing module and a searching module. The invention improves the speed of searching for a class or a function when a program is executed in the .NET card. And the index table consumes a small part of the memory of the .NET card, therefore the method is convenient and easy to implement. | 11-19-2009 |
20090249373 | METHOD FOR PROGRAM PROTECTION BASED ON .NET CARD AND A SYSTEM THEREOF - A method and system for program protection based on a .NET card. The method includes compiling, by a first device, first source code into a first assembly, and storing the first assembly to a .NET card. Information of a remotely invoked class in the first source code is extracted to form a new class. A remote invocation instruction is written in the new class to generate second source code. The second source code is compiled into a second assembly, and the .NET card and the second assembly are provided to a second device. The second device executes the second assembly, remotely invoking the class in the first source code, executing the class at the .NET card via an interface of the .NET card, and receiving an execution result returned by the .NET card. The system includes a .NET card, a first device and a second device. | 10-01-2009 |
20090249066 | Method for Safe Operation and A System Thereof - The present invention relating to computer security field provides a method for safe operation and a system thereof. The method includes: loading the compressed kernel of a safe operating system to a memory of a computer, decompressing the driver of a security device to the memory of the computer; a security master process inquiring the security device and determining whether the security device is legitimate, and if so, the safe operating system creates a security sub-process with which the safe operating system performing information interaction with the security device; verifying whether a user is legitimate, if so, permitting the safe operating system to run properly; otherwise, performing exception handling. The system includes an operating system storage device, a security device and a computer. The presented invention provides a solution that a kernel program of a safe operating system is cooperated with a security device by starting the safe operating system. In the whole process of the computer operation, the kernel of the safe operating system works with the security device, and the security device completes the verification of the user ID and the processing of file data encryption/decryption, which assures the security of the computer operation. | 10-01-2009 |
20090198861 | Device With A USB Interface Which Can Be Used As A Time-Sharing Standard I/O Interface And A Method Thereof - The invention provides a device with a USB interface which can be used as a time-sharing standard I/O interface. The device includes a USB interface module, a status detecting module, a power extracting module and a switch module. The power extracting module is connected to the USB interface module, the switch module is connected to the USB interface module, and the status detecting module is connected to the switch module and the USB interface module. With an interface used in a time-sharing way according to the invention, the device can transfer data according to the USB protocol or standard I/O interface protocol depending on the tool used. When the data needs to be transferred according to the I/O interface protocol, there is no need to open the casing of the USB device and it is more convenient to use because the I/O interface protocol can be defined by the user. | 08-06-2009 |
20090193516 | ONE TIME PASSWORD INQUIRY METHOD AND TOKEN - The invention relates to a one time password inquiry method, including steps of triggering a one time password token, determining whether the trigger is a generation or an inquiry operation, if it is an inquiry operation, inquiring and displaying the latest generated password; otherwise, generating a one time password. Meanwhile, the invention also provides a one time password token with inquiry function, including a trigger module, a determining module, a one time password generating module, a storage module, a display module and an inquiry module. By adding inquiry function, the token meets the need for a user to inquiry a one time password, eliminates the asynchronous problem between the token and a server, and lowers power loss taken by the token. | 07-30-2009 |