会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Touch recognition method, touch key structure and touch device
    • 触摸识别方法,触摸键结构和触摸设备
    • US09063626B2
    • 2015-06-23
    • US13877051
    • 2010-12-01
    • Tao LongZhengdong LiuJiang Long
    • Tao LongZhengdong LiuJiang Long
    • G06F3/044H03K17/96G06F3/041
    • G06F3/044G06F3/0416H03K17/9622H03K2217/960755
    • A touch recognition method, a touch key structure and a touch device are provided. The touch recognition method includes when the touch key structure is faced to touching or near touching, supplementing charges to a charge accumulation area corresponding to each key in the touch key structure until the charge amount in the charge accumulation area corresponding to each key reaches a balance; calculating the charge variation amount in each charge accumulation area when the touch key structure is faced to touching according to the charge supplement amount in the charge accumulation area corresponding to each key, and calculating the ratio of the charge variation amount to the charge balance amount in each charge accumulation area; recognizing the key corresponding to the charge accumulation area which has the largest charge variation amount and the largest ratio of the charge variation amount to the charge balance amount as the touched key.
    • 提供了触摸识别方法,触摸键结构和触摸装置。 触摸识别方法包括当触摸键结构面向触摸或接近触摸时,向与触摸键结构中的每个键相对应的电荷累积区域补充电荷,直到对应于每个键的电荷累积区域中的电荷量达到平衡 ; 根据与每个键相对应的电荷累积区域中的充电补充量,当触摸键结构面对触摸时,计算每个电荷累积区域中的电荷变化量,并且计算电荷变化量与电荷平衡量的比例 每个电荷积累区; 将具有最大电荷变化量和电荷变化量与电荷平衡量的最大比例的电荷累积区相对应的键识别为触摸键。
    • 4. 发明申请
    • Scalable and Extensible Architecture for Asymmetrical Cryptographic Acceleration
    • 用于不对称加密加速的可扩展和可扩展架构
    • US20090319804A1
    • 2009-12-24
    • US12121693
    • 2008-05-15
    • Zheng QITao Long
    • Zheng QITao Long
    • G06F17/00
    • G09C1/00G06F7/72G06F9/30145G06F9/30167G06F9/30192G06F9/3885G06F9/3897H04L9/3013H04L9/302H04L9/3066H04L9/3252H04L2209/12
    • Systems and methods for providing asymmetrical cryptographic acceleration are provided. The scalable asymmetric cryptographic accelerator engine uses a layered approach based on the collaboration of firmware and hardware to perform a specific cryptographic operation. Upon receipt of a request for a cryptographic function, the system accesses a sequence of operations required to perform the requested function. A micro code sequence is prepared for each hardware operation and sent to the hardware module. The micro code sequence includes a set of load instructions, a set of data processing instructions, and a set of unload instructions. An instruction may include a register operand having a register type and a register index. Upon receipt of a load instruction, the hardware module updates size information in a content addressable memory for a register included in the instruction. The hardware module continuously monitors the content addressable memory to avoid buffer overflow or underflow conditions.
    • 提供了提供不对称密码加速度的系统和方法。 可扩展的非对称加密加速器引擎使用基于固件和硬件协作的分层方法来执行特定的加密操作。 在接收到加密功能的请求时,系统访问执行所请求的功能所需的一系列操作。 为每个硬件操作准备一个微代码序列并发送到硬件模块。 微码序列包括一组加载指令,一组数据处理指令和一组卸载指令。 指令可以包括具有寄存器类型和寄存器索引的寄存器操作数。 在接收到加载指令时,硬件模块更新用于指令中包括的寄存器的内容可寻址存储器中的大小信息。 硬件模块持续监控内容可寻址存储器,以避免缓冲区溢出或下溢条件。
    • 7. 发明授权
    • System and methods for side-channel attack prevention
    • 侧路防攻击的系统和方法
    • US08781111B2
    • 2014-07-15
    • US12059554
    • 2008-03-31
    • Zheng QiTao Long
    • Zheng QiTao Long
    • H04K1/00H04L9/00
    • G06F7/723G06F21/556G06F21/572G06F21/72G06F2207/7223G06F2207/7266G06F2221/2123H04L9/003H04L9/005H04L2209/08H04L2209/125
    • A side channel attack utilizes information gained from the physical implementation of a cryptosystem. Software and hardware-based systems and methods for preventing side channel attacks are presented. Cryptographic hardware may introduce dummy operations to compensate for conditional math operations in certain functions such as modular exponentiation. Cryptographic hardware may also introduce random stalls of the data path to introduce alterations in the power profile for the operation. A cryptographic function may be mapped to a micro code sequence having a plurality of instructions. Firmware in the cryptosystem may alter the micro code sequence by altering the order of instructions, add dummy operations in the micro code sequence, break the micro code sequence into multiple sub micro code sequences and/or change the register location for source and destination operands used in the sequence. These alterations are designed to randomly change the timing and power profile of the requested function.
    • 侧信道攻击利用从密码系统的物理实现获得的信息。 介绍了用于防止侧向信道攻击的基于软件和硬件的系统和方法。 加密硬件可能会引入虚拟操作来补偿某些功能(如模幂)的条件数学运算。 加密硬件还可能引入数据路径的随机停顿,以引入用于操作的功率分布的改变。 密码函数可以被映射到具有多个指令的微码序列。 密码系统中的固件可以通过改变指令的顺序来改变微码序列,在微码序列中添加虚拟操作,将微码序列分解成多个子微码序列和/或改变所使用的源和目的地操作数的寄存器位置 顺序。 这些改变被设计为随机改变所请求功能的时序和功率曲线。
    • 9. 发明申请
    • METHOD FOR JUDGING CAPACITANCE TYPE TOUCH BUTTONS
    • 用于判断电容式触控按钮的方法
    • US20130214848A1
    • 2013-08-22
    • US13882929
    • 2010-12-17
    • Tao LongZhengdong LiuJiang Long
    • Tao LongZhengdong LiuJiang Long
    • H03K17/96
    • H03K17/9622H03K2217/960725
    • A method for judging capacitance type touch buttons in touch sensing technical field includes that: when touching a button, determining the change trend of the charge quantity on the button; a charge regulation is performed to the charge accumulation area corresponding to each button, until the charge quantity in the charge accumulation area corresponding to the button remains unchanged; calculating the charge changing quantity of the charge accumulation area when touching the button, and calculating the ratio between the charge changing quantity of the charge accumulation area and the charge balance quantity as well; and when the change trend of the charge quantity on the button is decrease and the ratio between the charge changing quantity of the charge accumulation area corresponding to the button and the charge balance quantity is larger than or equal to the first threshold value and smaller than the third threshold value, or when the change trend of the charge quantity on the button is increase and the ratio between the charge changing quantity of the charge accumulation area corresponding to the button and the charge balance quantity is larger than or equal to the second threshold value and smaller than the third threshold value, the button is the touched button. The capacitance type touch buttons are judged more accurately according to the present invention.
    • 一种用于判断触摸感测技术领域中的电容型触摸按钮的方法包括:当触摸按钮时,确定按钮上的充电量的变化趋势; 对与每个按钮相对应的电荷累积区域执行电荷调节,直到对应于按钮的电荷累积区域中的电荷量保持不变; 计算触摸按钮时电荷累积区域的电荷变化量,并计算电荷累积区域的电荷变化量与电荷平衡量之间的比率; 并且当按钮上的电荷量的变化趋势减小并且与按钮对应的电荷累积区域的电荷变化量与电荷平衡量之间的比例大于或等于第一阈值并且小于 或者当按钮上的电荷量的变化趋势增加并且与按钮对应的电荷累积区域的电荷变化量与电荷平衡量之间的比例大于或等于第二阈值时, 并且小于第三阈值,按钮是被触摸的按钮。 根据本发明,更精确地判断电容式触摸按钮。
    • 10. 发明申请
    • Method and Apparatus for Recovering Database Backup
    • 用于恢复数据库备份的方法和装置
    • US20130024427A1
    • 2013-01-24
    • US13259974
    • 2010-11-22
    • Tao Long
    • Tao Long
    • G06F17/00
    • G06F11/1448G06F11/1469G06F16/258G06F2201/80
    • A method and an apparatus for recovering a database backup is provided by the present invention, wherein the method comprises: backing up an old version database, wherein table structures of the old version database are stored; clearing records of all tables in a new version database, and acquiring table structures of the new version database; comparing the table structures of the old version database with the table structures of the new version database, and determining that the table structures changes; and recovering a backup of the old version database into the new version database according to a type of the change and a corresponding preset strategy. The forward compatibility of database backup recovery is achieved by the present invention.
    • 本发明提供了一种用于恢复数据库备份的方法和装置,其中方法包括:备份旧版本数据库,其中存储旧版本数据库的表结构; 清除新版本数据库中所有表的记录,并获取新版本数据库的表结构; 将旧版本数据库的表结构与新版本数据库的表结构进行比较,并确定表结构发生变化; 并根据更改的类型和相应的预设策略,将旧版本数据库的备份恢复到新版本数据库中。 数据库备份恢复的前向兼容性是通过本发明实现的。