Patents by Inventor Aiping Zhou
Aiping Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250245383Abstract: The present application relates to the technical field of computers, and provides a data protection method, including: selecting an obfuscation processing rule for performing a data obfuscation processing on the target data and an obfuscation processing parameter table adapted to the obfuscation processing rule, in response to receiving target data; and performing the data obfuscation processing on the target data according to the obfuscation processing rule and the obfuscation processing parameter table adapted to the obfuscation processing rule, so as to protect the target data. Since the computing resources consumed for performing the data obfuscation processing on data are far less than the computing resources consumed for performing secret key encryption on the data, so that the consumed computing resources for protecting the data may be reduced when the data is protected in a manner of performing the data obfuscation processing on the data.Type: ApplicationFiled: July 14, 2021Publication date: July 31, 2025Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventor: Aiping ZHOU
-
Patent number: 12369032Abstract: A method for establishing communication channel is provided, the method includes: performing a verification on the first verification information; generating second verification information when the verification of the first verification information is passed; generating third verification information according to the first verification information, and transmitting the second verification information and the third verification information to a server; performing a verification on the fourth verification information; when the verification of the fourth verification information is passed, generating fifth verification information according to the first verification information, generating sixth verification information according to the fourth verification information and transmitting the fifth verification information and the sixth verification information to the payment terminal; establishing a first communication channel based on a first session key, and establishing a second communication channel based on aType: GrantFiled: July 14, 2021Date of Patent: July 22, 2025Assignee: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventors: Xiaofeng Wang, Aiping Zhou, Gengxin Wu
-
Patent number: 12367488Abstract: An encryption method and a decryption method for a payment key are provided. The encryption method includes: generating an AES file key and an AES key through a key store management system; generating, by the back-end system, a SM4 white box secret key, a SM2 public key and a SM2 private key and saving the SM2 private key; receiving the SM4 white box secret key and the SM2 public key sent by the back-end system; encrypting, by using the AES file key, the SM4 white box secret key and the SM2 public key to generate and save a ciphertext of the SM4 white box secret key and the SM2 public key; encrypting, using the SM4 white box secret key, the AES key and the SM2 public key, a plaintext of the payment key issued by an electronic payment system to generate and save a ciphertext of the payment key.Type: GrantFiled: October 13, 2021Date of Patent: July 22, 2025Assignee: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventors: Huan Wang, Aiping Zhou, Youren Chen
-
Publication number: 20250148059Abstract: A method for application protection is applicable to the field of computer technologies and includes: detecting an operation state of a target application; terminating the target application to implement protection of the target application in response to detecting that the target application is in a target state. When the application is operated, an operating state of the application is detected in real time, and an operation of the application will be terminated once it is detected that the application is in the target state. A risk in the application may be detected in time, so that the application may be protected in time.Type: ApplicationFiled: October 13, 2021Publication date: May 8, 2025Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventors: Qiong HUANG, Aiping ZHOU, Lingcong ZENG
-
Patent number: 12287886Abstract: A method for file encryption includes: determining, in response to obtaining a file to be encrypted, a first secret key for encrypting a file name according to the file name of the file to be encrypted; encrypting the file name according to the first secret key to obtain file name encryption information; and sending the file to be encrypted and the file name encryption information to a local service layer, in order that the local service layer encrypts a file content of the file to be encrypted based on the file to be encrypted and the file name encryption information. The encryption operation of the file content is mainly performed in the local service layer, so that the security protection of the encrypted file may be guaranteed.Type: GrantFiled: July 14, 2021Date of Patent: April 29, 2025Assignee: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventors: Lingcong Zeng, Aiping Zhou, Qiong Huang
-
Patent number: 12020230Abstract: The present solution provides a method for card reading, the method includes: turning on a read head of the magnetic stripe card, a read head of the contact IC card, and a coil of the non-contact IC card; detecting card reading actions; turning off, if the card inserting action is detected, the coil of the non-contact IC card; powering on the card when the card reaches a bottom of a card slot of the payment terminal; controlling, if the card is successfully powered on, the read head of contact IC card to read the card; controlling, if the card fails to be powered on, the read head of the magnetic stripe card to read the card when the card swiping action is detected; and controlling, if the card waving action is detected, the coil of the non-contact IC card to read card.Type: GrantFiled: March 25, 2019Date of Patent: June 25, 2024Assignee: PAX COMPUTER TECHNOLOGY (SHENZHEN) CO., LTD.Inventors: Aiping Zhou, Jiansheng Zeng, Jiale Ren, Huan Wang
-
Publication number: 20230368194Abstract: An encryption method and a decryption method for a payment key are provided. The encryption method includes: generating an AES file key and an AES key through a key store management system; generating, by the back-end system, a SM4 white box secret key, a SM2 public key and a SM2 private key and saving the SM2 private key; receiving the SM4 white box secret key and the SM2 public key sent by the back-end system; encrypting, by using the AES file key, the SM4 white box secret key and the SM2 public key to generate and save a ciphertext of the SM4 white box secret key and the SM2 public key; encrypting, using the SM4 white box secret key, the AES key and the SM2 public key, a plaintext of the payment key issued by an electronic payment system to generate and save a ciphertext of the payment key.Type: ApplicationFiled: October 13, 2021Publication date: November 16, 2023Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventors: Huan WANG, Aiping ZHOU, Youren CHEN
-
Publication number: 20230325516Abstract: A method for file encryption includes: determining, in response to obtaining a file to be encrypted, a first secret key for encrypting a file name according to the file name of the file to be encrypted; encrypting the file name according to the first secret key to obtain file name encryption information; and sending the file to be encrypted and the file name encryption information to a local service layer, in order that the local service layer encrypts a file content of the file to be encrypted based on the file to be encrypted and the file name encryption information. The local service layer is high in security and is not prone to be decompiled and cracked. Moreover, the encryption operation of the file content is mainly performed in the local service layer, so that the security protection of the encrypted file may be guaranteed.Type: ApplicationFiled: July 14, 2021Publication date: October 12, 2023Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventors: Lingcong ZENG, Aiping ZHOU, Qiong HUANG
-
Publication number: 20230284027Abstract: A method for establishing communication channel is provided, the method includes: performing a verification on the first verification information; generating second verification information when the verification of the first verification information is passed; generating third verification information according to the first verification information, and transmitting the second verification information and the third verification information to a server; performing a verification on the fourth verification information; when the verification of the fourth verification information is passed, generating fifth verification information according to the first verification information, generating sixth verification information according to the fourth verification information and transmitting the fifth verification information and the sixth verification information to the payment terminal; establishing a first communication channel based on a first session key, and establishing a second communication channel based on aType: ApplicationFiled: July 14, 2021Publication date: September 7, 2023Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventors: Xiaofeng WANG, Aiping ZHOU, Gengxin WU
-
Publication number: 20220245610Abstract: The present solution provides a method for card reading, the method includes: turning on a read head of the magnetic stripe card, a read head of the contact IC card, and a coil of the non-contact IC card; detecting card reading actions; turning off, if the card inserting action is detected, the coil of the non-contact IC card; powering on the card when the card reaches a bottom of a card slot of the payment terminal; controlling, if the card is successfully powered on, the read head of contact IC card to read the card; controlling, if the card fails to be powered on, the read head of the magnetic stripe card to read the card when the card swiping action is detected; and controlling, if the card waving action is detected, the coil of the non-contact IC card to read card.Type: ApplicationFiled: March 25, 2019Publication date: August 4, 2022Inventors: Aiping ZHOU, Jiansheng ZENG, Jiale REN, Huan WANG
-
Publication number: 20200076919Abstract: A method and an apparatus for managing a hardware module of a payment terminal and a computer readable storage medium, aiming to uniformly manage the hardware modules of the payment terminal and to reduce the adverse influence on the POS application development. The method includes receiving a request to use a hardware module initiated by an application by calling an unified interface, where the request carries an identifier of the hardware module; calling a hardware interface corresponding to the hardware module according to the identifier of the hardware module; and returning an execution result of calling the hardware interface to the application that initiates the request.Type: ApplicationFiled: August 4, 2017Publication date: March 5, 2020Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.Inventors: Jiale REN, Aiping ZHOU, Riying WANG, Gengxin WU, Xiuliang CHEN, Daoyang LIU
-
Publication number: 20180081682Abstract: An application development platform includes a native layer, an intermediate layer, a component layer, and a template layer. By constructing the intermediate layer that encapsulates the hardware interface of the native layer, the differences between different operating systems and hardware platforms can be shielded so that in the course of application development the upper-layer application developers no longer rely on specific software operating systems or hardware platforms. By constructing the native layer, intermediate layer, component layer, and template layer, and further specifying the functions and interrelationships of these layers so as to provide a hierarchical application development platform, the upper-layer application developers can carry out the development in a layered, labor-divided, and collaborative manner, thereby improving the application development efficiency.Type: ApplicationFiled: November 28, 2017Publication date: March 22, 2018Inventors: Jiale Ren, Aiping Zhou, Xiaowei Wang