Patent application number | Description | Published |
20090276960 | Adjustable Pillow Device - An adjustable pillow device includes a base adapted to be disposed on a supporting surface, a pillow unit disposed above the base and movable vertically relative to the base, and an adjustable supporting unit mounted on the base, disposed between the base and the pillow unit and operable so as to support the pillow unit in a desired state. | 11-12-2009 |
20100077465 | KEY PROTECTING METHOD AND A COMPUTING APPARATUS - A key protecting method includes the steps of: (a) in response to receipt of an access request, configuring a control application program module to generate a key confirmation request; (b) in response to receipt of the key confirmation request, configuring a hardware control module to generate, via the control application program module, a key input request to prompt a user for a key input; (c) upon receipt of the key input, configuring the hardware control module to determine if the key input matches a predefined key preset in the hardware control module; (d) configuring the hardware control module to enter an execution mode if it is determined in step (c) that the key input matches the predefined key; and (e) configuring the hardware control module to enter a failure mode if it is determined in step (c) that the key input does not match the predefined key. | 03-25-2010 |
20100107248 | REAL-TIME DATA PROTECTION METHOD AND DATA PROTECTION DEVICE FOR IMPLEMENTING THE SAME - A real-time data protection method includes: receiving input data from an input device; storing the input data; sending the input data to a computing device, thereby permitting the computing device to generate result data based on the input data; receiving the result data from the computing device; generating test data that correspond to the result data; comparing the test data to the input data; and when it is determined that the test data are not identical to the input data, indicating that the result data have been modified. A data protection device that implements the real-time data protection method is also disclosed. | 04-29-2010 |
20100138932 | DATA PROTECTING METHOD AND COMPUTING APPARATUS - A data protecting method, including the steps of: (a) upon receipt of a triggering command, configuring a hardware control module to store data in a hidden zone that is unidentifiable, unreadable and unwritable by an operating system block in communication with the hardware control module; and (b) upon receipt of a restore request command from an input device in direct communication with the hardware control module, configuring the hardware control module to execute the restore request command so as to transfer the data from the hidden zone to a working zone that is identifiable, readable and writable by the operating system block when a predetermined condition is satisfied. | 06-03-2010 |
20100270871 | Electric generating system of a vehicle - An electric generating system includes a vehicle having at least two mechanical components which are capable of reciprocating movements relative to each other; and an electric generator connected to the mechanical components and including a magnet unit and a conductor winding unit. The reciprocating movements include an interaction of the conductor winding unit and magnetic flux lines of the magnet unit to generate electricity. The electricity can be produced from vibration energy induced by shock. | 10-28-2010 |
20120272321 | ANTIVIRUS COMPUTING SYSTEM - An antivirus computing system includes: a storage device having an operating partition that has stored therein a to-be-scanned file, and a hidden partition that has stored therein a virus code; and an antivirus device operatively associated with the storage device, and configured to perform a virus scan on the to-be-scanned file in the operating partition based on the virus code in the hidden partition. | 10-25-2012 |
20120304264 | KEY PROTECTING METHOD AND A COMPUTING APPARATUS - A key protecting method includes the steps of: (a) in response to receipt of an access request, configuring a control application program module to generate a key confirmation request; (b) in response to receipt of the key confirmation request, configuring a hardware control module to generate, via the control application program module, a key input request to prompt a user for a key input; (c) upon receipt of the key input, configuring the hardware control module to determine if the key input matches a predefined key preset in the hardware control module; (d) configuring the hardware control module to enter an execution mode if it is determined in step (c) that the key input matches the predefined key; and (e) configuring the hardware control module to enter a failure mode if it is determined in step (c) that the key input does not match the predefined key. | 11-29-2012 |
20140177831 | KEY PROTECTING METHOD AND A COMPUTING APPARATUS - A key protecting method includes the steps of: in response to receipt of an access request, configuring a control application program to generate a key confirmation request; in response to receipt of the key confirmation request, configuring a key protecting device to generate a key input request to prompt a user for a key input; upon receipt of the key input, the key protecting device determining if the key input matches a predefined key preset therein; the key protecting device entering an execution mode if it is determined that the key input matches the predefined key; and the key protecting device entering a failure mode if it is determined that the key input does not match the predefined key. | 06-26-2014 |
20140201016 | PORTABLE ELECTRONIC DEVICE HAVING A MEMORY CARD MODULE FOR CONDUCTING ELECTRONIC TRANSACTIONS - A portable electronic device is provided for conducting an electronic transaction with a point-of-sale (POS) terminal, and includes a device processor, and a memory card module. The memory card module includes a transceiver unit to receive transaction data from the POS terminal, a storage unit including a working zone and a hidden zone that stores the transaction data, and a processing unit. The transaction data stored in the hidden zone is accessible only to the processing unit. The processing unit is responsive to control by the device processor that executes a read-only control application stored in the working zone for accessing the transaction data stored in the hidden zone. | 07-17-2014 |
20150089174 | DATA ACCESS SYSTEM AND INSTRUCTION MANAGEMENT DEVICE THEREOF - A data access system includes a storage device, an instruction management device, and a host device. The host device is configured to transmit an access instruction associated with an access operation directed to an intended physical address of the storage device to the instruction management device, which compares the access instruction with a specified instruction list. When the instruction management device determines that the access instruction conforms with an instruction included in the specified instruction list, the instruction management device is configured to generate a modified access instruction associated with an access operation directed to a target physical address that is different from the intended physical address of the storage device. | 03-26-2015 |