Patents by Inventor Rongfeng Feng
Rongfeng Feng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10416994Abstract: A control method includes building at least two stacks for an app, and managing the Activity components based on the at least two stacks.Type: GrantFiled: January 15, 2018Date of Patent: September 17, 2019Assignee: LENOVO (BEIJING) CO., LTD.Inventors: Rong Zeng, Can Wang, Rongfeng Feng, Qixin Xing
-
Publication number: 20180285098Abstract: A control method includes building at least two stacks for an app, and managing the Activity components based on the at least two stacks.Type: ApplicationFiled: January 15, 2018Publication date: October 4, 2018Inventors: Rong ZENG, Can WANG, Rongfeng FENG, Qixin XING
-
Publication number: 20140201619Abstract: A method and device for implementing a local operation on a web page are disclosed, which belong to the field of web technology. The method is applied to an electronic apparatus that includes a displaying unit and has an HTML operating environment. The method includes loading a web page in the HTML operating environment by address information; obtaining identification information for representing a status of local resources of the electronic apparatus, in the process of loading the web page; obtaining an operation request for representing a request for operating a first resource in the local resources; responding to the operation request with the first resource; and displaying a responding result of the responding to the operation request with the first resource on the displaying unit. The present method and device implement executing local operation on the web page, which improves the local calling capacity of a javascript code.Type: ApplicationFiled: January 13, 2014Publication date: July 17, 2014Applicant: Beijing Lenovo Software Ltd.Inventors: Hongling Mo, Jing Li, Jing Xu, Rongfeng Feng, Weifeng Zhuang, Kang Chen, Zhong Chen
-
Patent number: 8261086Abstract: The present invention provides a computer and a method of sending security information for authentication, which relate to transmission of data information in computers. The present invention solves the vulnerability of information when a user conducts network transaction activities by a terminal. The computer of the present invention comprises: a virtual system platform; a first guest operating system installed on the virtual system platform, which is for installing a service application module, wherein the service application module generates a security information input interface when it is being executed; a second guest operating system installed on the virtual system platform; the second guest operating system comprises: a dynamic password generation module for generating security information, the security information is input into the security information input interface and is sent to a network server for authentication. The security of network activities conducted by users can be enhanced.Type: GrantFiled: December 9, 2008Date of Patent: September 4, 2012Assignees: Beijing Lenovo Software Ltd., Lenovo (Beijing) LimitedInventors: Zhigang Li, Min Hu, Rongfeng Feng, Yi Zhang
-
Patent number: 8132257Abstract: An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by a hashing operation for a computer key file and a system control program are stored in a memory of the security chip, and a backup file of the computer key file is stored in a backup storage area. When power up, the integrity of the system control program is verified by using the hash value of the system control program stored in the memory of the security chip. If the system control program is integral, a control is executed by the system control program, and the system control program verifies the integrity of the computer key file using the hash value of the computer key file stored in the memory of the security chip.Type: GrantFiled: March 23, 2006Date of Patent: March 6, 2012Assignee: Lenovo (Beijing) LimitedInventors: Jun Li, Kai Wang, Rongfeng Feng, Na Xu
-
Patent number: 8055911Abstract: The present invention allows creation of a backup key for backing up an encryption key inside a source trusted chip, encrypting the encryption key with the backup key, exporting the encrypted encryption key from the source trusted chip and storing it in a storage device, encrypting the backup key for transmission to a trusted third party. If the encrypted encryption key needs to be restored inside a destination trusted chip, the backup key and the encryption key encrypted with the backup key are imported to the destination trusted chip, where the encrypted encryption key is decrypted with the backup key inside the destination trusted chip to obtain the encryption key of the source trusted chip.Type: GrantFiled: December 7, 2005Date of Patent: November 8, 2011Assignees: Beijing Lenovo Software Ltd., Lenovo (Beijing) LimitedInventors: Rongfeng Feng, Ping Yin, Qiuxin Wu
-
Publication number: 20090150678Abstract: The present invention provides a computer and a method of sending security information for authentication, which relate to transmission of data information in computers. The present invention solves the vulnerability of information when a user conducts network transaction activities by a terminal. The computer of the present invention comprises: a virtual system platform; a first guest operating system installed on the virtual system platform, which is for installing a service application module, wherein the service application module generates a security information input interface when it is being executed; a second guest operating system installed on the virtual system platform; the second guest operating system comprises: a dynamic password generation module for generating security information, the security information is input into the security information input interface and is sent to a network server for authentication. The security of network activities conducted by users can be enhanced.Type: ApplicationFiled: December 9, 2008Publication date: June 11, 2009Applicants: Beijing Lenovo Software Limited, Lenovo (Beijing) LimitedInventors: Zhigang Li, Min Hu, Rongfeng Feng, Yi Zhang
-
Publication number: 20090144582Abstract: An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by a hashing operation for a computer key file and a system control program are stored in a memory of the security chip, and a backup file of the computer key file is stored in a backup storage area. When power up, the integrity of the system control program is verified by using the hash value of the system control program stored in the memory of the security chip. If the system control program is integral, a control is executed by the system control program, and the system control program verifies the integrity of the computer key file using the hash value of the computer key file stored in the memory of the security chip.Type: ApplicationFiled: March 23, 2006Publication date: June 4, 2009Applicant: Lenovo (Beijing) LimitedInventors: Jun Li, Kai Wang, Rongfeng Feng, Na Xu
-
Publication number: 20090094150Abstract: The invention discloses a method for implementing an online secure payment, which comprises steps of: transmitting to a dedicated operating system a secure payment request page for goods which is generated in a general operating system; and completing a payment operation in the secure payment request page of the dedicated operating system, after switching from the general operating system to the dedicated operating system. The invention further comprises a client system for implementing an online secure payment. In the invention, the general operating system for general operations is distinguished from the dedicated operating system for secure payment operations, and the security for the network payment is further enhanced by configuring the firewall and monitoring processes in the dedicated operating system.Type: ApplicationFiled: October 7, 2008Publication date: April 9, 2009Applicant: LENOVO (BEIJING) LIMITEDInventors: Rongfeng Feng, Chunmei Liu, Yi Zhang, Min Hu
-
Publication number: 20090019437Abstract: The invention discloses an application management and execution system and a method thereof. The application management and execution system comprises a virtual machine monitor for managing at least one virtual machine; the at least one virtual machine for processing at least one application, and storing, separately and respectively, application data used by each application and platform data required by the virtual machine for processing the application in one or more storage disk (persistent storage), and reading the application data and the platform data from the one or more storage devices respectively. The at least one application executing on the virtual machine may share the platform data in the one or more storage devices. When the virtual machine executes the at least one application, it may modify the application data in the storage devices.Type: ApplicationFiled: June 30, 2008Publication date: January 15, 2009Applicant: Lenovo (Beijing) LimitedInventors: Rongfeng Feng, Yang Lin, Min Hu, Kai Wang
-
Publication number: 20080192940Abstract: The present invention allows creation of a backup key for backing up an encryption key inside a source trusted chip, encrypting the encryption key with the backup key, exporting the encrypted encryption key from the source trusted chip and storing it in a storage device, encrypting the backup key for transmission to a trusted third party. If the encrypted encryption key needs to be restored inside a destination trusted chip, the backup key and the encryption key encrypted with the backup key are imported to the destination trusted chip, where the encrypted encryption key is decrypted with the backup key inside the destination trusted chip to obtain the encryption key of the source trusted chip.Type: ApplicationFiled: December 7, 2005Publication date: August 14, 2008Applicants: BEIJING LENOVO SOFTWARE LTD., LENOVO (BEIJING) LIMITEDInventors: Rongfeng Feng, Ping Yin, Qiuxin Wu