Patents by Inventor Rongfeng Feng

Rongfeng Feng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10416994
    Abstract: A control method includes building at least two stacks for an app, and managing the Activity components based on the at least two stacks.
    Type: Grant
    Filed: January 15, 2018
    Date of Patent: September 17, 2019
    Assignee: LENOVO (BEIJING) CO., LTD.
    Inventors: Rong Zeng, Can Wang, Rongfeng Feng, Qixin Xing
  • Publication number: 20180285098
    Abstract: A control method includes building at least two stacks for an app, and managing the Activity components based on the at least two stacks.
    Type: Application
    Filed: January 15, 2018
    Publication date: October 4, 2018
    Inventors: Rong ZENG, Can WANG, Rongfeng FENG, Qixin XING
  • Publication number: 20140201619
    Abstract: A method and device for implementing a local operation on a web page are disclosed, which belong to the field of web technology. The method is applied to an electronic apparatus that includes a displaying unit and has an HTML operating environment. The method includes loading a web page in the HTML operating environment by address information; obtaining identification information for representing a status of local resources of the electronic apparatus, in the process of loading the web page; obtaining an operation request for representing a request for operating a first resource in the local resources; responding to the operation request with the first resource; and displaying a responding result of the responding to the operation request with the first resource on the displaying unit. The present method and device implement executing local operation on the web page, which improves the local calling capacity of a javascript code.
    Type: Application
    Filed: January 13, 2014
    Publication date: July 17, 2014
    Applicant: Beijing Lenovo Software Ltd.
    Inventors: Hongling Mo, Jing Li, Jing Xu, Rongfeng Feng, Weifeng Zhuang, Kang Chen, Zhong Chen
  • Patent number: 8261086
    Abstract: The present invention provides a computer and a method of sending security information for authentication, which relate to transmission of data information in computers. The present invention solves the vulnerability of information when a user conducts network transaction activities by a terminal. The computer of the present invention comprises: a virtual system platform; a first guest operating system installed on the virtual system platform, which is for installing a service application module, wherein the service application module generates a security information input interface when it is being executed; a second guest operating system installed on the virtual system platform; the second guest operating system comprises: a dynamic password generation module for generating security information, the security information is input into the security information input interface and is sent to a network server for authentication. The security of network activities conducted by users can be enhanced.
    Type: Grant
    Filed: December 9, 2008
    Date of Patent: September 4, 2012
    Assignees: Beijing Lenovo Software Ltd., Lenovo (Beijing) Limited
    Inventors: Zhigang Li, Min Hu, Rongfeng Feng, Yi Zhang
  • Patent number: 8132257
    Abstract: An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by a hashing operation for a computer key file and a system control program are stored in a memory of the security chip, and a backup file of the computer key file is stored in a backup storage area. When power up, the integrity of the system control program is verified by using the hash value of the system control program stored in the memory of the security chip. If the system control program is integral, a control is executed by the system control program, and the system control program verifies the integrity of the computer key file using the hash value of the computer key file stored in the memory of the security chip.
    Type: Grant
    Filed: March 23, 2006
    Date of Patent: March 6, 2012
    Assignee: Lenovo (Beijing) Limited
    Inventors: Jun Li, Kai Wang, Rongfeng Feng, Na Xu
  • Patent number: 8055911
    Abstract: The present invention allows creation of a backup key for backing up an encryption key inside a source trusted chip, encrypting the encryption key with the backup key, exporting the encrypted encryption key from the source trusted chip and storing it in a storage device, encrypting the backup key for transmission to a trusted third party. If the encrypted encryption key needs to be restored inside a destination trusted chip, the backup key and the encryption key encrypted with the backup key are imported to the destination trusted chip, where the encrypted encryption key is decrypted with the backup key inside the destination trusted chip to obtain the encryption key of the source trusted chip.
    Type: Grant
    Filed: December 7, 2005
    Date of Patent: November 8, 2011
    Assignees: Beijing Lenovo Software Ltd., Lenovo (Beijing) Limited
    Inventors: Rongfeng Feng, Ping Yin, Qiuxin Wu
  • Publication number: 20090150678
    Abstract: The present invention provides a computer and a method of sending security information for authentication, which relate to transmission of data information in computers. The present invention solves the vulnerability of information when a user conducts network transaction activities by a terminal. The computer of the present invention comprises: a virtual system platform; a first guest operating system installed on the virtual system platform, which is for installing a service application module, wherein the service application module generates a security information input interface when it is being executed; a second guest operating system installed on the virtual system platform; the second guest operating system comprises: a dynamic password generation module for generating security information, the security information is input into the security information input interface and is sent to a network server for authentication. The security of network activities conducted by users can be enhanced.
    Type: Application
    Filed: December 9, 2008
    Publication date: June 11, 2009
    Applicants: Beijing Lenovo Software Limited, Lenovo (Beijing) Limited
    Inventors: Zhigang Li, Min Hu, Rongfeng Feng, Yi Zhang
  • Publication number: 20090144582
    Abstract: An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by a hashing operation for a computer key file and a system control program are stored in a memory of the security chip, and a backup file of the computer key file is stored in a backup storage area. When power up, the integrity of the system control program is verified by using the hash value of the system control program stored in the memory of the security chip. If the system control program is integral, a control is executed by the system control program, and the system control program verifies the integrity of the computer key file using the hash value of the computer key file stored in the memory of the security chip.
    Type: Application
    Filed: March 23, 2006
    Publication date: June 4, 2009
    Applicant: Lenovo (Beijing) Limited
    Inventors: Jun Li, Kai Wang, Rongfeng Feng, Na Xu
  • Publication number: 20090094150
    Abstract: The invention discloses a method for implementing an online secure payment, which comprises steps of: transmitting to a dedicated operating system a secure payment request page for goods which is generated in a general operating system; and completing a payment operation in the secure payment request page of the dedicated operating system, after switching from the general operating system to the dedicated operating system. The invention further comprises a client system for implementing an online secure payment. In the invention, the general operating system for general operations is distinguished from the dedicated operating system for secure payment operations, and the security for the network payment is further enhanced by configuring the firewall and monitoring processes in the dedicated operating system.
    Type: Application
    Filed: October 7, 2008
    Publication date: April 9, 2009
    Applicant: LENOVO (BEIJING) LIMITED
    Inventors: Rongfeng Feng, Chunmei Liu, Yi Zhang, Min Hu
  • Publication number: 20090019437
    Abstract: The invention discloses an application management and execution system and a method thereof. The application management and execution system comprises a virtual machine monitor for managing at least one virtual machine; the at least one virtual machine for processing at least one application, and storing, separately and respectively, application data used by each application and platform data required by the virtual machine for processing the application in one or more storage disk (persistent storage), and reading the application data and the platform data from the one or more storage devices respectively. The at least one application executing on the virtual machine may share the platform data in the one or more storage devices. When the virtual machine executes the at least one application, it may modify the application data in the storage devices.
    Type: Application
    Filed: June 30, 2008
    Publication date: January 15, 2009
    Applicant: Lenovo (Beijing) Limited
    Inventors: Rongfeng Feng, Yang Lin, Min Hu, Kai Wang
  • Publication number: 20080192940
    Abstract: The present invention allows creation of a backup key for backing up an encryption key inside a source trusted chip, encrypting the encryption key with the backup key, exporting the encrypted encryption key from the source trusted chip and storing it in a storage device, encrypting the backup key for transmission to a trusted third party. If the encrypted encryption key needs to be restored inside a destination trusted chip, the backup key and the encryption key encrypted with the backup key are imported to the destination trusted chip, where the encrypted encryption key is decrypted with the backup key inside the destination trusted chip to obtain the encryption key of the source trusted chip.
    Type: Application
    Filed: December 7, 2005
    Publication date: August 14, 2008
    Applicants: BEIJING LENOVO SOFTWARE LTD., LENOVO (BEIJING) LIMITED
    Inventors: Rongfeng Feng, Ping Yin, Qiuxin Wu