Patents by Inventor Aiping Zhou

Aiping Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250245383
    Abstract: The present application relates to the technical field of computers, and provides a data protection method, including: selecting an obfuscation processing rule for performing a data obfuscation processing on the target data and an obfuscation processing parameter table adapted to the obfuscation processing rule, in response to receiving target data; and performing the data obfuscation processing on the target data according to the obfuscation processing rule and the obfuscation processing parameter table adapted to the obfuscation processing rule, so as to protect the target data. Since the computing resources consumed for performing the data obfuscation processing on data are far less than the computing resources consumed for performing secret key encryption on the data, so that the consumed computing resources for protecting the data may be reduced when the data is protected in a manner of performing the data obfuscation processing on the data.
    Type: Application
    Filed: July 14, 2021
    Publication date: July 31, 2025
    Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventor: Aiping ZHOU
  • Patent number: 12369032
    Abstract: A method for establishing communication channel is provided, the method includes: performing a verification on the first verification information; generating second verification information when the verification of the first verification information is passed; generating third verification information according to the first verification information, and transmitting the second verification information and the third verification information to a server; performing a verification on the fourth verification information; when the verification of the fourth verification information is passed, generating fifth verification information according to the first verification information, generating sixth verification information according to the fourth verification information and transmitting the fifth verification information and the sixth verification information to the payment terminal; establishing a first communication channel based on a first session key, and establishing a second communication channel based on a
    Type: Grant
    Filed: July 14, 2021
    Date of Patent: July 22, 2025
    Assignee: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventors: Xiaofeng Wang, Aiping Zhou, Gengxin Wu
  • Patent number: 12367488
    Abstract: An encryption method and a decryption method for a payment key are provided. The encryption method includes: generating an AES file key and an AES key through a key store management system; generating, by the back-end system, a SM4 white box secret key, a SM2 public key and a SM2 private key and saving the SM2 private key; receiving the SM4 white box secret key and the SM2 public key sent by the back-end system; encrypting, by using the AES file key, the SM4 white box secret key and the SM2 public key to generate and save a ciphertext of the SM4 white box secret key and the SM2 public key; encrypting, using the SM4 white box secret key, the AES key and the SM2 public key, a plaintext of the payment key issued by an electronic payment system to generate and save a ciphertext of the payment key.
    Type: Grant
    Filed: October 13, 2021
    Date of Patent: July 22, 2025
    Assignee: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventors: Huan Wang, Aiping Zhou, Youren Chen
  • Publication number: 20250148059
    Abstract: A method for application protection is applicable to the field of computer technologies and includes: detecting an operation state of a target application; terminating the target application to implement protection of the target application in response to detecting that the target application is in a target state. When the application is operated, an operating state of the application is detected in real time, and an operation of the application will be terminated once it is detected that the application is in the target state. A risk in the application may be detected in time, so that the application may be protected in time.
    Type: Application
    Filed: October 13, 2021
    Publication date: May 8, 2025
    Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventors: Qiong HUANG, Aiping ZHOU, Lingcong ZENG
  • Patent number: 12287886
    Abstract: A method for file encryption includes: determining, in response to obtaining a file to be encrypted, a first secret key for encrypting a file name according to the file name of the file to be encrypted; encrypting the file name according to the first secret key to obtain file name encryption information; and sending the file to be encrypted and the file name encryption information to a local service layer, in order that the local service layer encrypts a file content of the file to be encrypted based on the file to be encrypted and the file name encryption information. The encryption operation of the file content is mainly performed in the local service layer, so that the security protection of the encrypted file may be guaranteed.
    Type: Grant
    Filed: July 14, 2021
    Date of Patent: April 29, 2025
    Assignee: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventors: Lingcong Zeng, Aiping Zhou, Qiong Huang
  • Patent number: 12020230
    Abstract: The present solution provides a method for card reading, the method includes: turning on a read head of the magnetic stripe card, a read head of the contact IC card, and a coil of the non-contact IC card; detecting card reading actions; turning off, if the card inserting action is detected, the coil of the non-contact IC card; powering on the card when the card reaches a bottom of a card slot of the payment terminal; controlling, if the card is successfully powered on, the read head of contact IC card to read the card; controlling, if the card fails to be powered on, the read head of the magnetic stripe card to read the card when the card swiping action is detected; and controlling, if the card waving action is detected, the coil of the non-contact IC card to read card.
    Type: Grant
    Filed: March 25, 2019
    Date of Patent: June 25, 2024
    Assignee: PAX COMPUTER TECHNOLOGY (SHENZHEN) CO., LTD.
    Inventors: Aiping Zhou, Jiansheng Zeng, Jiale Ren, Huan Wang
  • Publication number: 20230368194
    Abstract: An encryption method and a decryption method for a payment key are provided. The encryption method includes: generating an AES file key and an AES key through a key store management system; generating, by the back-end system, a SM4 white box secret key, a SM2 public key and a SM2 private key and saving the SM2 private key; receiving the SM4 white box secret key and the SM2 public key sent by the back-end system; encrypting, by using the AES file key, the SM4 white box secret key and the SM2 public key to generate and save a ciphertext of the SM4 white box secret key and the SM2 public key; encrypting, using the SM4 white box secret key, the AES key and the SM2 public key, a plaintext of the payment key issued by an electronic payment system to generate and save a ciphertext of the payment key.
    Type: Application
    Filed: October 13, 2021
    Publication date: November 16, 2023
    Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventors: Huan WANG, Aiping ZHOU, Youren CHEN
  • Publication number: 20230325516
    Abstract: A method for file encryption includes: determining, in response to obtaining a file to be encrypted, a first secret key for encrypting a file name according to the file name of the file to be encrypted; encrypting the file name according to the first secret key to obtain file name encryption information; and sending the file to be encrypted and the file name encryption information to a local service layer, in order that the local service layer encrypts a file content of the file to be encrypted based on the file to be encrypted and the file name encryption information. The local service layer is high in security and is not prone to be decompiled and cracked. Moreover, the encryption operation of the file content is mainly performed in the local service layer, so that the security protection of the encrypted file may be guaranteed.
    Type: Application
    Filed: July 14, 2021
    Publication date: October 12, 2023
    Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventors: Lingcong ZENG, Aiping ZHOU, Qiong HUANG
  • Publication number: 20230284027
    Abstract: A method for establishing communication channel is provided, the method includes: performing a verification on the first verification information; generating second verification information when the verification of the first verification information is passed; generating third verification information according to the first verification information, and transmitting the second verification information and the third verification information to a server; performing a verification on the fourth verification information; when the verification of the fourth verification information is passed, generating fifth verification information according to the first verification information, generating sixth verification information according to the fourth verification information and transmitting the fifth verification information and the sixth verification information to the payment terminal; establishing a first communication channel based on a first session key, and establishing a second communication channel based on a
    Type: Application
    Filed: July 14, 2021
    Publication date: September 7, 2023
    Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventors: Xiaofeng WANG, Aiping ZHOU, Gengxin WU
  • Publication number: 20220245610
    Abstract: The present solution provides a method for card reading, the method includes: turning on a read head of the magnetic stripe card, a read head of the contact IC card, and a coil of the non-contact IC card; detecting card reading actions; turning off, if the card inserting action is detected, the coil of the non-contact IC card; powering on the card when the card reaches a bottom of a card slot of the payment terminal; controlling, if the card is successfully powered on, the read head of contact IC card to read the card; controlling, if the card fails to be powered on, the read head of the magnetic stripe card to read the card when the card swiping action is detected; and controlling, if the card waving action is detected, the coil of the non-contact IC card to read card.
    Type: Application
    Filed: March 25, 2019
    Publication date: August 4, 2022
    Inventors: Aiping ZHOU, Jiansheng ZENG, Jiale REN, Huan WANG
  • Publication number: 20200076919
    Abstract: A method and an apparatus for managing a hardware module of a payment terminal and a computer readable storage medium, aiming to uniformly manage the hardware modules of the payment terminal and to reduce the adverse influence on the POS application development. The method includes receiving a request to use a hardware module initiated by an application by calling an unified interface, where the request carries an identifier of the hardware module; calling a hardware interface corresponding to the hardware module according to the identifier of the hardware module; and returning an execution result of calling the hardware interface to the application that initiates the request.
    Type: Application
    Filed: August 4, 2017
    Publication date: March 5, 2020
    Applicant: SHENZHEN PAX SMART NEW TECHNOLOGY CO., LTD.
    Inventors: Jiale REN, Aiping ZHOU, Riying WANG, Gengxin WU, Xiuliang CHEN, Daoyang LIU
  • Publication number: 20180081682
    Abstract: An application development platform includes a native layer, an intermediate layer, a component layer, and a template layer. By constructing the intermediate layer that encapsulates the hardware interface of the native layer, the differences between different operating systems and hardware platforms can be shielded so that in the course of application development the upper-layer application developers no longer rely on specific software operating systems or hardware platforms. By constructing the native layer, intermediate layer, component layer, and template layer, and further specifying the functions and interrelationships of these layers so as to provide a hierarchical application development platform, the upper-layer application developers can carry out the development in a layered, labor-divided, and collaborative manner, thereby improving the application development efficiency.
    Type: Application
    Filed: November 28, 2017
    Publication date: March 22, 2018
    Inventors: Jiale Ren, Aiping Zhou, Xiaowei Wang