Patents by Inventor Zhou Lu

Zhou Lu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220317895
    Abstract: An implementation method for an encrypted USB flash disk system. A virtual drive letter is bound to an device object and then mapped; driver software wafts for an operation of an operating system on the device object; the driver software determines, according to the operation of the operating system on different device objects, the type of a received instruction; if the received instruction is a reading instruction, the driver software maps a read address in a storage chip according to a first address in the reading instruction, reads data, and calls an encryption lock chip to decrypt the read data to obtain decrypted read data; and if the received instruction is a writing instruction, the driver software calls the encryption lock chip to encrypt data to be written to obtain encrypted write data, maps a write address in the storage chip according to a second address in the writing instruction, and writes the encrypted write data or refuses the operation.
    Type: Application
    Filed: October 22, 2020
    Publication date: October 6, 2022
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 11463955
    Abstract: A method for implementing low power consumption on standby for a Bluetooth security device. The method comprises: a security module is waked up by a Bluetooth module and configures a working mode as the state of self; a security module determines whether data from the Bluetooth module is received by a fifth preset time; if yes, then executes a corresponding operation on the basis of the received data to produce an operation result, returns the operation result to the Bluetooth module, configures a low power consumption standby mode as the state of self, and waits to be waked up by the Bluetooth module; and if not, then configures the low power consumption standby mode as the state of self, and waits to be waked up by the Bluetooth module.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: October 4, 2022
    Assignee: Feitian Technologies Co., Ltd.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 11449475
    Abstract: Systems, methods, and non-transitory computer-readable media can access a plurality of schema-based encodings providing a structured representation of an environment captured by one or more sensors associated with a plurality of vehicles traveling through the environment. The plurality of schema-based encodings can be clustered into one or more clusters of schema-based encodings. At least one scenario associated with the environment can be determined based at least in part on the one or more clusters of schema-based encodings.
    Type: Grant
    Filed: June 28, 2019
    Date of Patent: September 20, 2022
    Assignee: Lyft, Inc.
    Inventors: Lina Dong, Shaohui Sun, Weiyi Hou, Somesh Khandelwal, Ivan Kirigin, Shaojing Li, Ying Liu, David Tse-Zhou Lu, Robert Charles Kyle Pinkerton, Vinay Shet
  • Patent number: 11442307
    Abstract: The present disclosure relates to a backlight module, a display module and an assembling method thereof. The backlight module includes: a backplane; a fixing member fixedly connected to the backplane; and an insertion clamp including a mounting portion fixedly connected to the fixing member, and a clamping portion for clamping to a circuit board inserted between the fixing member and the insertion clamp.
    Type: Grant
    Filed: July 28, 2020
    Date of Patent: September 13, 2022
    Assignees: K-TRONICS (SUZHOU) TECHNOLOGY CO., LTD., BOE TECHNOLOGY GROUP CO., LTD.
    Inventors: Yunben Shen, Lihua Sheng, Zhou Lu, Feng Zhou
  • Publication number: 20220253565
    Abstract: A terminal anti-tamper detection method and an apparatus, in the field of information security. The method comprises: a security processing system generating a dynamic signal, outputting the dynamic signal via a self-destruct line output terminal, and receiving a signal via a self-destruct line input terminal (Step S1); the security processing system performing comparison of the signal received via the self-destruct line input terminal and the dynamic signal output via the self-destruct line output terminal, obtaining a comparison result (Step S2); the security processing system determining whether the comparison result meets a self-destruct trigger condition, the self-destruct line being triggered if so, and if not, the self-destruct line not being triggered (Step S3).
    Type: Application
    Filed: September 3, 2020
    Publication date: August 11, 2022
    Inventors: Zhou Lu, Huazhang Yu
  • Publication number: 20220245977
    Abstract: An intelligent key device and a verification method therefor. The verification method comprises: determining the type of an instruction by means of an intelligent key device; determining a key area according to the type of the instruction; acquiring a biometric verification identifier corresponding to the key area; determining, according to the biometric verification identifier, a biometric verification mode corresponding to the key area; and executing a corresponding operation according to the biometric verification mode. According to the present invention, a user can realize multiple verification modes of biometric features according to a key area in the process of performing verification using the intelligent key device, such that different verification requirements of the user for the key used in different application scenarios are met.
    Type: Application
    Filed: January 3, 2020
    Publication date: August 4, 2022
    Inventors: Zhou Lu, Huazhang Yu
  • Publication number: 20220248198
    Abstract: A Bluetooth device, which realizes different types of device by setting a MAC address of the device or a type of a broadcast device; when the device is used as a Bluetooth keyboard device, it can realize a function for inputting a dynamic password, and the device shifts an obtained dynamic password value into Bluetooth keyboard class virtual key information according to the Bluetooth keyboard protocol, and sends automatically the virtual key information to the upper computer successively, and the device can restore a type of the device so as to resolve a keyboard conflict between the keyboard device and the upper computer, in this way, the user makes less error to input a dynamic password and the identity authentication becomes safer.
    Type: Application
    Filed: September 3, 2020
    Publication date: August 4, 2022
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 11403380
    Abstract: The present disclosure discloses a method for managing a fingerprint and a system thereof, which relates to the field of information technology. The method includes that an upper computer builds a connection with a fingerprint card; the upper computer receives an operation from a user and determines a type of the operation, the upper computer sends the collecting fingerprint instruction to the fingerprint card and the fingerprint card collects a fingerprint and returns a collecting fingerprint response to the upper computer if the operation is a collecting fingerprint operation; the upper computer sends the managing fingerprint instruction to the fingerprint card, the fingerprint card finishes a managing operation on the fingerprint according to the managing fingerprint instruction and returns the managing fingerprint response to the upper computer if the operation is a managing fingerprint operation; and the method further comprises the server authenticates the user information.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: August 2, 2022
    Assignee: FEITIAN TECHNOLOGIES CO., LTD.
    Inventors: Zhou Lu, Huazhang Yu
  • Publication number: 20220240096
    Abstract: A method for preventing a hardware wallet from being maliciously paired, comprising: a hardware wallet waiting to receive a connection request; when a connection request is received, determining whether a first terminal sending the connection request has been paired and connected; if so, waiting to receive an instruction of the first terminal; and when receiving a pairing transfer instruction sent by the first terminal, clearing terminal information stored in a whitelist of the hardware wallet. By means of the present technical solution, a hardware wallet can achieve pairing transfer only by means of the authorization of a previously paired terminal, thereby improving the security of the hardware wallet.
    Type: Application
    Filed: December 26, 2019
    Publication date: July 28, 2022
    Inventors: Zhou Lu, Huazhang Yu
  • Publication number: 20220231854
    Abstract: A hardware wallet binding authorization method.
    Type: Application
    Filed: July 15, 2020
    Publication date: July 21, 2022
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 11381554
    Abstract: A working method of an NFC dynamic token, comprising the following steps: after detecting that a preset press key is triggered, the NFC dynamic token activates NFC communication and builds connection with a mobile device via NFC channel; when the NFC dynamic token receives a second instruction from the mobile device, the NFC dynamic token obtains a seed key from the second instruction, stores the seed key and sends a message that writing is successful to the mobile device; when the NFC dynamic token receives a third instruction from the mobile device, the NFC uses self-stored seed data to generate a dynamic password and sends the dynamic password to the mobile device via the NFC channel. According to the present invention, the seed key is written into the NFC dynamic token via the NFC channel, which improves security and flexibility of the dynamic token.
    Type: Grant
    Filed: March 29, 2017
    Date of Patent: July 5, 2022
    Assignee: Feitian Technologies Co., Ltd.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 11381975
    Abstract: A method for avoiding a Bluetooth device from being traced, which comprises the following steps: parsing, by a target Bluetooth device, a second dynamic address to obtain a second random number and a second data; and generating, by the target Bluetooth device, a plurality of the third data successively according to the identity parsed keys in the identity parsed keys list save by the target Bluetooth device and a second random number, and determining whether there exists any third data which is the same as the second data, if yes, determining that there exists the second identity parsed key which is authenticated successfully; otherwise, determining that there isn't the second identity parsed key which is authenticated successfully.
    Type: Grant
    Filed: June 1, 2018
    Date of Patent: July 5, 2022
    Assignee: Feitian Technologies Co., Ltd.
    Inventors: Zhou Lu, Huazhang Yu
  • Publication number: 20220200938
    Abstract: Various embodiments of the present technology provide an online and/or offline meeting system that utilizes a “scene” as a collaboration context and/or for collecting and grouping related multimedia based messages exchanged in discussions, and causes the related messages to be presented to participants of an online and/or offline meeting in a cinematic way. When an online meeting is over and the meeting session is ended, participants can still make offline communications using the scene as the collaboration context. Further, the present technology improves user experience in viewing or annotating non-text based content in a chat session.
    Type: Application
    Filed: November 8, 2021
    Publication date: June 23, 2022
    Inventor: Zhou Lu
  • Publication number: 20220161811
    Abstract: A method includes generating, while a vehicle is operating in an autonomous-driving mode, a planned trajectory associated with a computing system of the vehicle based on first sensor data capturing an environment of the vehicle. The method further includes, while the vehicle is operating according to the planned trajectory, receiving a disengagement instruction associated that causes the vehicle to disengage from operating in the autonomous-driving mode and switch to operating in a disengagement mode. Subsequent to the vehicle operating in the disengagement mode, the method further includes capturing second sensor data and generating a simulation of the environment. The simulation is based on sensor data associated with the environment and the planned trajectory. Additionally, subsequent to the vehicle operating in the disengagement mode, the method concludes with evaluating a performance of an autonomy system based on the simulation, and providing feedback based on the evaluation.
    Type: Application
    Filed: November 25, 2020
    Publication date: May 26, 2022
    Applicant: Woven Planet North America, Inc.
    Inventors: David Tse-Zhou Lu, Sameer Qureshi, Shaojing Li, Luc Vincent
  • Publication number: 20220147217
    Abstract: In some examples, a touch screen includes resistors between the touch electrodes and routing traces. In some examples, the resistors can include a transparent conductive material included in the touch electrodes of the touch screen. The resistors can be located in a border region of the touch screen that can surround an active area of the touch screen that can include the touch electrodes and display pixels of the touch screen, for example. In some examples, the resistors included in the touch screen can have different resistances from each other and the same outer dimensions as one another. The resistors can reduce the variation in resistance from channel to channel in the touch screen, which can improve touch screen performance, for example.
    Type: Application
    Filed: January 24, 2022
    Publication date: May 12, 2022
    Inventors: Zhou LU, Isaac Wing-Tak CHAN, Justin Zachary WU, Rangarajan KRISHNAN, Qingbo GUO, Chao ZHANG
  • Patent number: 11314853
    Abstract: A method and an apparatus for implementing logging on of hardware to windows system with version 10 or higher, including: obtaining, by a computer, a first data package according to a registration index corresponding to a device identification of a hardware device when monitoring insertion of the hardware device, encrypting first data package to obtain first encrypted result using first encryption key stored and sending the first encrypted result and the registration index to the hardware device for verifying; when verifying successful, generating third encryption value and fourth encryption value according to second device key stored corresponding to registration index and third random number and second session random number in first encrypted result, encrypting third encryption value and fourth encryption value to obtain second encrypted result using second encryption key, and sending second encrypted result to the computer for verifying; permitting logon when verifying is successful, otherwise refusing log
    Type: Grant
    Filed: December 24, 2018
    Date of Patent: April 26, 2022
    Assignee: FEITIAN TECHNOLOGIES CO., LTD.
    Inventors: Zhou Lu, Huazhang Yu
  • Publication number: 20220118994
    Abstract: Embodiments provide a hardware-based mechanism to continuously calibrate a set of sensors on a vehicle while the vehicle is in motion or in use. Specifically, each sensor is mounted on a respective rigid mounting device placed on the vehicle. A secondary sensing device for calibration is also rigidly mounted on the mounting device such that the relative position between the secondary device and the camera sensor can remain unchanged. The secondary sensing devices can then be used to detect a relative distance and/or position of the same calibration target. The sensed data is then used to determine, via stereo triangulation, the relative positions of the two secondary sensing devices, which in turn indicates the relative positions of the sensors.
    Type: Application
    Filed: October 20, 2020
    Publication date: April 21, 2022
    Inventors: David Tse-Zhou Lu, Christy Fernandez Cull, Luca Del Pero, Jonathan Mazur Dyer, Charles J Richey
  • Patent number: 11308495
    Abstract: The present disclosure provides a financial card with function of fingerprint verification and a working method therefor, which belongs to information technology field The financial card with function of fingerprint verification includes: a waiting and receiving module (401), a determining module (402), a storing module (403), a first sending module (404), a second sending module (405), a third sending module (406), an application cryptogram module (407) and a fourth sending module (408). The financial card provided by the present disclosure further includes a cardholder verifying module and/or a boot-up verifying module The solution provided by the present disclosure improves security of the identity verification in an e-transaction and makes the e-transaction to be more convenient by using the fingerprint to execute identity verification.
    Type: Grant
    Filed: February 27, 2020
    Date of Patent: April 19, 2022
    Assignee: FEITIAN TECHNOLOGIES CO., LTD.
    Inventors: Zhou Lu, Huazhang Yu
  • Publication number: 20220113569
    Abstract: The present disclosure relates to a backlight module, a display module and an assembling method thereof. The backlight module includes: a backplane; a fixing member fixedly connected to the backplane; and an insertion clamp including a mounting portion fixedly connected to the fixing member, and a clamping portion for clamping to a circuit board inserted between the fixing member and the insertion clamp.
    Type: Application
    Filed: July 28, 2020
    Publication date: April 14, 2022
    Applicants: BOE TECHNOLOGY GROUP CO., LTD., K-TRONICS (SUZHOU) TECHNOLOGY CO., LTD.
    Inventors: Yunben SHEN, Lihua SHENG, Zhou LU, Feng ZHOU
  • Publication number: 20220103376
    Abstract: A method and apparatus for realizing secure signature, the method includes: when a PIN verification instruction is received, verifying a first calculation result in the instruction by using a second shared key generated according to a terminal public key and a signature module private key, if the verifying is failed, replacing a stored signature module key pair with a regenerated signature module key pair; otherwise, generating PIN verification signature data and storing the PIN verification signature data, generating a second calculation result according to a second shared key and the PIN verification signature data and sending the second calculation result to the terminal; when a signature operation instruction is received, determining whether the PIN verification signature data in the instruction is consistent with the stored PIN verification signature data, if yes, signing an intermediate data to be signed by using a signature private key.
    Type: Application
    Filed: December 9, 2021
    Publication date: March 31, 2022
    Applicant: Feitian Technologies Co., Ltd.
    Inventors: Zhou LU, Huazhang YU