会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • ENCRYPTED USB FLASH DISK SYSTEM AND IMPLEMENTATION METHOD THEREFOR
    • US20220317895A1
    • 2022-10-06
    • US17626304
    • 2020-10-22
    • FEITIAN TECHNOLOGIES CO., LTD.
    • Zhou LuHuazhang Yu
    • G06F3/06
    • An implementation method for an encrypted USB flash disk system. A virtual drive letter is bound to an device object and then mapped; driver software wafts for an operation of an operating system on the device object; the driver software determines, according to the operation of the operating system on different device objects, the type of a received instruction; if the received instruction is a reading instruction, the driver software maps a read address in a storage chip according to a first address in the reading instruction, reads data, and calls an encryption lock chip to decrypt the read data to obtain decrypted read data; and if the received instruction is a writing instruction, the driver software calls the encryption lock chip to encrypt data to be written to obtain encrypted write data, maps a write address in the storage chip according to a second address in the writing instruction, and writes the encrypted write data or refuses the operation. The present invention can encrypt and store data and decrypt and read data, thereby ensuring the safety of data reading and writing, and can also use the encrypted USB flash disk as an optical disk for data reading and writing.
    • 8. 发明申请
    • IC CARD WITH FINGERPRINT RECOGNITION FUNCTION AND WORKING METHOD THEREOF
    • US20210357718A1
    • 2021-11-18
    • US17040758
    • 2019-05-28
    • Feitian Technologies Co., Ltd.
    • Zhou LuHuazhang Yu
    • G06K19/073G06K19/07
    • A working method for an IC card having a fingerprint recognition function, comprising: an IC card receiving and determining an instruction type from a terminal, and when determined that the received instruction is an application selection instruction, the IC card selecting an application and returning a response to the terminal; when determined that the received instruction is a processing option acquisition instruction, the IC card acquiring a user fingerprint information verification state according to the content of the instruction, and if verification is successful, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number does not need to be verified; if verification fails, returning to the terminal a processing option instruction response containing an application file locator list for which a personal identification number must be verified; when determined that the received instruction is a record reading instruction, the IC card returning a record reading response to the terminal according to the record reading instruction, wherein the record reading response contains a method for verifying a card holder. Thus, the risk of a personal identification number being leaked is avoided, thus enhancing the security of a transaction, while also improving user experience.