FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Li, Tao
Xie, Xinchun
Lin, Yu
Abrégé
The present invention provides a service processing method and system. The method comprises: receiving service request data sent by multiple first terminals, and respectively perform processing on the service request data sent by each first terminal; storing processed data after service request data processing to a local Sqlite database, and respectively pushing the processed data to each first terminal. The service processing method and system provided in the present invention can be applied to an ordering system, so that all the first terminals can perform the ordering service operation for customers of any one of rooms or a table, and all the first terminals simultaneously receive ordering service processing results, so that an attendant holding the first terminal and closest to the customer can feedback to the customer in time to improve the efficiency of the ordering system and the customer experience; meanwhile, data storage is performed by means of the local Sqlite database without additionally providing a large database as a shared database, and use costs of service processing are reduced.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Lin, Fuxiong
Abrégé
Provided are a method for installing initial configuration information of a POS machine, and a terminal. The method comprises: receiving first initial configuration information configured by a server; acquiring, according to the first initial configuration information, second initial configuration information adapted to a POS machine; receiving, according to the second initial configuration information, a download address of a configuration file corresponding to the second initial configuration information; and downloading, according to the download address, the configuration file corresponding to the second initial configuration information, and installing the configuration file. The configuration file corresponding to the second initial configuration information adapted to the POS machine can be acquired from the first initial configuration information according to requirements, and the configuration file can be downloaded and installed, so that flexibility in installing the configuration file corresponding to the initial configuration information of the POS machine is improved, the problem of high costs caused by customized production of POS machines is avoided, and costs are economized.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Hong, Yixuan
Abrégé
Disclosed in the present invention are a key transfer method, a terminal and a system. The method comprises: inputting into a POS terminal a transfer key of a first key to be transferred; a key sending terminal injecting said first key into the POS terminal; using, by means of the POS terminal, the transfer key to encrypt said first key, to obtain a key file; the POS terminal sending the key file to the key sending terminal, the key sending terminal sending the key file to a key receiving terminal. The present invention uses the POS terminal to realize the transfer of a key, without the need for a personnel business trip for the injection, reducing costs, without worrying about the leakage caused by paper transfer, realizing low-cost key transfer whilst ensuring the security and reliability of the transferred key.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Zhang, Liangdian
Abrégé
The present invention provides a reset apparatus and method for time division multiplexing and a terminal. The method comprises: connecting a master controller to a slave controller by means of a serial port, and when the master controller receives a reset instruction, adjusting a baud rate of the serial port to a pre-configured first value; the master controller transmitting pre-configured data to the slave controller via the serial port; and connecting an RX interface of the slave controller to a reset end of the slave controller by means of a reset circuit, and after the RX interface of the master controller receives a continuous low-level signal, transmitting the continuous low-level signal to the reset end via the reset circuit so as to complete a reset operation performed on the slave controller. The present invention resolves the issue in which precious resources, such as dedicated IO pins, communication cables, and connector port lines, need to be occupied when a reset signal is transmitted to the slave controller via an IO pin of the master controller.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Kang, Longquan
Abrégé
Disclosed is a function test fixture. A PCB (2) is arranged on a base (1), a peripheral device for a module to be tested can be set up by means of the PCB (2), and it is only by means of electrically connecting an intelligent communication module to be tested to the PCB (2) that the intelligent communication module to be tested can be driven to operate by an existing test device by means of the PCB (2); and a camera (3) is electrically connected to the PCB (2), and an image fixing unit is arranged opposite the camera (3), so that the test for a facial recognition function of the intelligent communication module can be realized without the need to assemble the intelligent communication module into a finished electronic device product, and operation thereof is easy. Moreover, a test result can be determined by means of comparing a facial image fixed by the image fixing unit to a facial image parsed by the intelligent communication module for consistency, and the accuracy thereof is high.
09 - Appareils et instruments scientifiques et électriques
Produits et services
Data processing equipment; Recorded computer programs; bar code readers; computer programs (downloadable software); Computer software applications, downloadable; cash registers; smart phones; chips (integrated circuits); Point-of-sale terminals; smart card readers; Computer terminals for banking purposes; Automated teller machines; none of the foregoing for use in connection with motor vehicles.
09 - Appareils et instruments scientifiques et électriques
Produits et services
Data processing equipment; Recorded computer programs; bar code readers; computer programs (downloadable software); Computer software applications, downloadable; cash registers; smart phones; chips (integrated circuits); Point-of-sale terminals; smart card readers; Computer terminals for banking purposes; Automated teller machines; none of the foregoing for use in connection with motor vehicles.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO.,LTD. (Chine)
Inventeur(s)
Wang, Wenchao
Hong, Yixuan
Abrégé
The present invention relates to an API invoking method and terminal. Each upper-level application has a unique application name and signature information for identification. When an upper-level application invokes a lower-level API, the invoking permission of the upper-level application to invoke the lower-level API is defined according to the application name and signature information. Compared with the conventional invoking definition method for input passwords, the present invention configures the application name and signature information for the upper-level application and defines the invoking permission by means of the application name and signature information, so that the risk of an unauthorized upper-layer application invoking a lower-level API caused by password leakage is avoided, thereby improving the security of lower-level API invoking.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO.,LTD. (Chine)
Inventeur(s)
Peng, Jiangming
Abrégé
A method for generating a short web address, and a terminal. The method comprises: initializing an ID value of a redis by using a java programming language; and every time a request for generating a short web address corresponding to a long web address is received, incrementing the ID value of the redis by a pre-set value and converting the incremented ID value via a pre-set scale algorithm to generate the corresponding short web address, and taking the short web address as a key, taking the long web address corresponding to the short web address as a value, and taking the key and the value as a key/value pair and storing the pair in the redis. By means of the present invention, software can be deployed in multiple operating systems, thereby greatly reducing constraint of the software by the operating systems, so that the software can run in various environments; moreover, a high concurrency request is supported, thereby preventing a system from entering an abnormal state when in a high concurrency scene.
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
12.
CONTROL CIRCUIT FOR SPARE BATTERIES OF POS MACHINE AND CONTROL METHOD THEREFOR
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Liu, Zongming
Jiang, Jiangqi
Zheng, Qirui
Abrégé
A control circuit for spare batteries of a POS machine and a control method therefor, wherein the spare batteries comprise an internal spare battery and an external spare battery; the control circuit comprises a switching unit; the internal spare battery and the external spare battery are separately connected to the POS machine by means of the switching unit; and the switching unit is used for switching from the power supply state for a POS machine load by the external spare battery to the power supply state for the POS machine load by the internal spare battery when the external spare battery is lower than a preset voltage value. For existing spare batteries of a POS machine, a switching unit is added for control, so that only when the external spare battery is lower than the preset voltage value is the power supply state switched to the power supply for the POS machine load by the internal spare battery, thereby reducing the usage frequency of the internal spare battery, and avoiding the maintenance of the whole POS machine due to the internal spare battery being out of power.
H02J 9/06 - Circuits pour alimentation de puissance de secours ou de réserve, p. ex. pour éclairage de secours dans lesquels le système de distribution est déconnecté de la source normale et connecté à une source de réserve avec commutation automatique
13.
SCAN CODE PAYMENT AND TEST METHOD AND SYSTEM CONTROLLING BARCODE
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Lin, Jishen
Lin, Jinan
Abrégé
A scan code payment and test method and system controlling a barcode. The method comprises: starting a scan code cash collection process, a cash register generating a scan code payment instruction and sending the scan code payment instruction to a payment device terminal (S1); the payment device terminal receiving the scan code payment instruction and entering a bar code interface (S2); and the cash register scanning the bar code interface so as to acquire bar code information, and completing the scan code payment (S3). The method realizes an automatic payment process in a real scenario through the cooperation of a cash register and a payment device terminal, and realizes long-term automatic testing of the cash register; the method is easy to set up, low in cost, easy to implement, and convenient in promotion and usage.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Lin, Jishen
Lin, Jinan
Zheng, Decheng
Abrégé
Disclosed in the present invention are a method and a system for a cash register to test a kitchen printing function. The method comprises: a cash register acquiring ordering information, generating kitchen printing order information, sending the kitchen printing order information to a server in which a kitchen printing simulation system is installed, the kitchen printing simulation system receiving and storing the kitchen printing order information, and determining, by means of an order number generation rule, whether an order has been lost during kitchen printing. The present invention replaces a kitchen printer with a kitchen printing simulation system, wherein a cash register can send kitchen printing information to the kitchen printing simulation system after ordering has been performed, the kitchen printing simulation system analyzes, by means of an order number generation rule, whether an order has been lost, thereby realizing verification of whether an order has been lost during kitchen printing and replacing manual detection, greatly reducing resource investments, i.e., reducing the cost of the entire stress test. Moreover, automatic detection is more efficient and accurate than manual detection.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Wang, Mingwei
Xu, Yongbiao
Abrégé
Disclosed in the present invention are a remote distribution method and system for a terminal master key. The method comprises: generate a terminal master key and a customer protection key, and inject the customer protection key into a hardware encryption machine; encrypt the terminal master key using the customer protection key to obtain a first terminal master key ciphertext; associate the first terminal master key ciphertext with a unique identification code and saves an association to a key management system; a payment terminal generates a transport key, and sends the transport key and the unique identification code to the key management system; the key management system obtains the corresponding terminal master key ciphertext according to the unique identification code; transcodes the terminal master key ciphertext to obtain a second terminal master key ciphertext, and sends the second terminal master key ciphertext to the payment terminal; the payment terminal decrypts the second terminal master key ciphertext using the transport key, and stores the terminal master key obtained by decryption into a secure area. The present invention can securely and reliably distribute a terminal master key to a payment terminal in a production stage.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Chen, Yangjian
Abrégé
The present invention provides a method and an adapter for charging a specific host, connecting the adapter to a host to be identified. The adapter outputs a first voltage to a DC-DC circuit by means of an AC-DC conversion circuit, and at this moment, the DC-DC circuit does not work and only transmits the first voltage to the host to be identified; the host to be identified obtains first voltage input; a power supply negotiation circuit of the host to be identified works; if the host to be identified is a specific host, the specific host outputs a feedback signal to a control circuit by means of a feedback circuit; the control circuit controls the DC-DC circuit to output a second voltage to the specific host for charging. An expensive TYPE-C protocol chip does not need to be added in the adapter and the host to be identified, and therefore, the costs are low.
H02J 7/02 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries pour la charge des batteries par réseaux à courant alternatif au moyen de convertisseurs
H02M 7/02 - Transformation d'une puissance d'entrée en courant alternatif en une puissance de sortie en courant continu sans possibilité de réversibilité
H02M 3/00 - Transformation d'une puissance d'entrée en courant continu en une puissance de sortie en courant continu
17.
METHOD, SERVER, AND SYSTEM FOR VERIFYING VALIDITY OF TERMINAL
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Wang, Mingwei
Xu, Yongbiao
Abrégé
The present invention discloses a method, a server, and a system for verifying the validity of terminal. A terminal sends a transaction request to a server; the transaction request comprises a working certificate corresponding to the terminal; the server verifies whether or not the working certificate corresponding to the terminal is valid, if valid, then the server sends a random character string to the terminal; the terminal receives the random character string, uses a private key of the working certificate corresponding to the terminal to sign the random character string, and sends signed characters to the server; the server receives the signed character string sent by the terminal and uses a public key of the working certificate corresponding to the terminal to verify whether or not the signed character string is valid, if valid, then the terminal is confirmed to be valid. The working certificate corresponding to the terminal cannot be falsified and, in combination with the public key and digital signing mechanism, increases security. An additional verification system back end is not required, enabling a reduction in costs.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Wang, Mingwei
Xu, Yongbiao
Abrégé
The present invention relates to the field of information security, and in particular to a certificate importing method and a terminal. In the present invention, a preset root certificate is compiled into an executable file. When a database write request corresponding to a certificate is received, the executable file acquires a public key corresponding to the root certificate. The executable file verifies a digital signature of the certificate according to the public key, and obtains a verification result, the verification result comprising one of a verification success and a verification failure. If the verification result is a verification success, the executable file writes the certificate and a certificate chain corresponding to the certificate into a database. The present invention improves the effectiveness of certificates without increasing hardware costs.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Wang, Mingwei
Chen, Lei
Abrégé
The present invention relates to the field of data security, and in particular to a method for transmitting a key and a POS terminal. In the present invention, a POS terminal acquires a first protection key corresponding to a sender. The POS terminal acquires a second protection key corresponding to a receiver. The POS terminal decrypts, according to the first protection key, a first work key ciphertext from the sender to obtain a work key plaintext. The POS terminal encrypts the work key plaintext according to the second protection key to obtain a second work key ciphertext. The POS terminal sends the second work key ciphertext to the receiver. The present invention boosts convenience in setting a protection key for secure transmission of a work key.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data processing apparatus; computer programs, recorded; bar
code readers; computer programs, downloadable; computer
software applications, downloadable; cash registers;
automated teller machines [ATM]; smartphones; chips
[integrated circuits]; integrated circuit cards [smart
cards]/ smart cards [integrated circuit cards]. Technical research; research and development of new products
for others; scientific laboratory services; industrial
design; computer software design; updating of computer
software; consultancy in the design and development of
computer hardware; rental of computer software; computer
system design; installation of computer software; conversion
of computer programs and data,other than physical
conversion; computer software consultancy; rental of web
servers; monitoring of computer systems by remote access;
electronic data storage; providing information on computer
technology and programming via a web site; cloud computing;
computer software design (computer software design in the
field of financial transaction settlement and
reconciliation, electronic transfer, and electronic payment
services); conversion of computer programs and data (provide
data encryption development and services for financial
transaction security verification).
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Wang, Wenchao
Hong, Yixuan
Abrégé
The present invention relates to the field of data processing, and in particular, to a method and system for transmitting data. According to the present invention, a mobile terminal acquires a pair of asymmetrical keys from a payment terminal, the pair of asymmetric keys comprising a public key ciphertext and a private key ciphertext; the mobile terminal encrypts a PIN code according to the public key to obtain a PIN code ciphertext; the mobile terminal sends the PIN code ciphertext and the private key ciphertext to a POS terminal, so that the POS terminal acquires account information corresponding to the PIN code ciphertext according to the private key ciphertext; the mobile terminal forwards a ciphertext of the account information from the POS terminal to the payment terminal, so that the payment terminal verifies the validity of the account information according to the ciphertext of the account information. The security of PIN code transmission is improved and the cost is also reduced.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Wang, Wenchao
Hong, Yixuan
Abrégé
The present invention relates to the field of data processing, and particularly relates to a data transmission method and system. In the present invention, the method comprises: a mobile terminal acquiring a public key from a POS terminal; the mobile terminal encrypting a PIN code according to the public key to obtain a PIN code ciphertext; the mobile terminal sending the PIN code ciphertext to the POS terminal, so that the POS terminal acquires account information corresponding to the PIN code ciphertext according to a private key corresponding to the public key; and the mobile terminal forwarding a ciphertext of the account information from the POS terminal to a payment terminal, so that the payment terminal verifies the validity of the account information according to the ciphertext of the account information. The transmission security of a PIN code is improved while the costs are reduced.
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Li, Lingui
Wu, Weidong
Zhou, Tao
Abrégé
The present invention relates to the field of data processing and in particular relates to an address error correction method and a terminal. acquiring an address to be error corrected; identifying, based on a first trie tree, the province names corresponding to the address to be error corrected to obtain a primary name; the first trie tree is used to store the province names and city names; acquiring a second trie tree corresponding to the primary name; the second trie tree is used to store the city names, county names and district names corresponding to the current province names; identifying, based on the second trie tree, the county names or district names corresponding to the address to be error corrected to obtain a secondary name; acquiring a third trie tree corresponding to the secondary name; the third trie tree is used to store the village town names, village names and street names corresponding to the secondary name; and acquiring, based on the third trie tree, more than one candidate addresses corresponding to the address to be error corrected to obtain a candidate address set. The space occupied during address error correction is reduced.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Sheng, Ning
Abrégé
The present invention provides a terminal LTE and Wi-Fi coexistence testing method and system. The method comprises: adding a Wi-Fi signaling tester into an OTA antenna dark room testing system, and establishing a Wi-Fi signaling connection with a tested terminal in a dark room; according to preset first test parameter templates containing transmission powers and channels, corresponding to different channel interference scenarios, controlling, by means of the Wi-Fi signaling tester, a Wi-Fi antenna of the tested terminal to operate at a specified transmission power and a specified channel, and acquiring the total omnidirectional sensitivity of LTE of the tested terminal in a large Wi-Fi power transmission; likewise, by adding an LTE signaling tester into the OTA antenna dark room testing system, acquiring the total omnidirectional sensitivity of Wi-Fi of the tested terminal in a large LTE power transmission. The present invention simulates interference frequency point characteristics between LTE and Wi-Fi, and covers various frequency bands and channels, so that the obtained test result is of better significance as a reference.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Tang, Yinxi
Xu, Yongbiao
Abrégé
The present invention relates to the field of data processing, and in particular, to a method for remotely transmitting a key, a receiving terminal, and a distribution terminal. In the present invention, a first authentication message is obtained according to the unique identifier of a receiving terminal and a first random character string; the first authentication message is sent to a distribution terminal, so that the distribution terminal verifies the validity of the receiving terminal according to the first authentication message; a second authentication message from the distribution terminal is verified to obtain a first verification result, the first verification result including verification pass and verification fail, and the second authentication message including the unique identifier of the distribution terminal, a second random string, a second MAC value, and a specific key ciphertext; and when the first verification result is the verification pass, the specific key ciphertext is decrypted to obtain a specific key plaintext. The efficiency of remote transmission of a key is improved.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Tang, Yinxi
Xu, Yongbiao
Abrégé
The present invention relates to the field of data processing, and in particular, to a method for transmitting a key, a receiving terminal, and a distribution terminal. The present invention relates to randomly generating a character string with more than 16 bytes to obtain a first plaintext; performing MAC operation on an unique identifier of the receiving terminal and the first plaintext to obtain a first MAC value; packaging the unique identifier of the receiving terminal, the first plaintext, and the first MAC value to obtain a first authentication message; sending the first authentication message to the distribution terminal so that the distribution terminal verifies the validity of the receiving terminal according to the first authentication message; and obtaining a specific key according to a response message sent by the distribution terminal. The security of remote key transmission is improved.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Tang, Yinxi
Xu, Yongbiao
Abrégé
The present invention relates to the field of data processing, and specifically relates to a method for transmitting a key, and a receiving terminal and a distribution terminal. In the present invention, a first public key certificate is sent to a distribution terminal, such that the distribution terminal verifies the validity of the first public key certificate; the validity of a second public key certificate from the distribution terminal is verified, and a first verification result is obtained, said first verification result comprising a certificate being valid and a certificate being invalid; a key distribution request is sent to the distribution terminal when the first verification result is that the certificate is valid; and a specific key is obtained according to a response message that is sent by the distribution terminal. The convenience and security of transmitting a key are simultaneously improved.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Zhang, Taozong
Lin, Lianghuo
Fang, Xunhua
Abrégé
Provided is a printer, comprising a housing and a printing module (1), wherein the housing comprises a main body (2) and a rear cover (3), the main body (2) is provided with an accommodation space (21) for mounting the printing module (1), the printing module (1) is mounted in the accommodation space (21), and the rear cover (3) is mounted over the accommodation space (21); the printing module (1) comprises a core (11), a bracket (12) and a circuit board (13), the bracket (12) being located between the core (11) and the circuit board (13); the core (11) and the circuit board (13) are detachably connected to the bracket (12), and the bracket (12) is detachably connected over the accommodation space (21); and the circuit board (13) is electrically connected to the main body (2) and the core (11). By means of the design in which the core (11) and the circuit board (13) are detachably connected to the bracket (12) and the bracket (12) is detachably connected to the accommodation space (21), the printing module can be directly detached on site without removing a printer such that a standby module is immediately used for substitution to make the device operate normally.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Zhang, Taozong
Lin, Lianghuo
Fang, Xunhua
Liao, Zelong
Abrégé
A noise-reduced printer paper holder, comprising a body (1); an accommodating cavity (3) for accommodating a paper roll (2) is provided inside the body (1), the accommodating cavity (3) comprises a side wall, an inner surface and several movable rollers (4), a paper outlet (5) being provided on the side wall, and the paper outlet (5) penetrates through the side wall to communicate with the accommodating cavity (3); two ends of each movable roller (4) are rotatably connected to the inner surface; the movable rollers (4) are parallel to the central axis of the paper roll (2). The beneficial effects of the present invention are as follows: by using the movable rollers (4), the weight of the paper roll (2) itself can be pressed against the movable rollers (4) that can roll freely, and the paper roll (2) is changed from having a sliding friction originally with the paper holder to having a rolling friction with the movable rollers (4), reducing the resistance, reducing the noise generated by the friction, improving the working environment, reducing sound pollution while avoiding damage to the thermosensitive paper layer when the paper roll (2) slidingly rubs against the paper holder.
B41J 15/04 - Dispositifs de supports, d'alimentation ou de guidageMontages pour rouleaux ou axes
B41J 15/06 - Dispositifs de supports, d'alimentation ou de guidageMontages pour rouleaux ou axes caractérisés par leur application à des systèmes d'impression ayant des chariots stationnaires
B41J 15/08 - Dispositifs de supports, d'alimentation ou de guidageMontages pour rouleaux ou axes caractérisés par leur application à des systèmes d'impression ayant des chariots se déplaçant transversalement
B41J 29/00 - Parties constitutives ou accessoires pour machines à écrire ou mécanismes d'impression sélective non prévus ailleurs
30.
PERFORMANCE TESTING METHOD AND TESTING APPARATUS FOR FACE RECOGNITION DEVICE
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Jiang, Meiqiong
Lin, Kui
Deng, Yangpeng
Abrégé
The present invention relates to the technical field of face recognition testing, and in particular to a performance testing method and a testing apparatus for a face recognition device. The performance testing method for the face recognition device comprises the following steps: a face recognition device to be tested acquiring face recognition data when a head model is at a certain position, wherein the position is composed of a certain distance and a certain angle; acquiring standard face recognition data corresponding to the head model in a preset database; and calculating the similarity between the face recognition data and the standard face recognition data, and obtaining and recording the similarity value for when the head model is at the position. By means of acquiring the face recognition data when the head model is located at a certain position, and calculating the similarity to the standard face recognition data corresponding to the head model in the preset database, it is determined whether the face recognition device to be tested may identify the head model at said position.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Zhang, Taozong
Lin, Lianghuo
Fang, Xunhua
Abrégé
Provided is a flip device, comprising a base body (1) and a cover body (2), wherein the base body (1) is provided with a notch matching the cover body (2), the notch comprises a bottom portion, and the cover body (2) is movably connected to the bottom portion of the notch; and the cover body (2) comprises a cover plate (21) and a torsion spring (22), and the cover plate (21) comprises a bottom end. The pre-set angle of the torsion spring (22) is, when the cover body (2) cooperates with the base body (1), between an opening angle of the torsion spring (22) when the cover is opened to the maximum extent and the opening angle of the torsion spring (22) is closed. By means of setting the pre-set angle of the torsion spring (22), when the cover plate (21) is opened, the cover body (2) is driven by a restoring force generated by the deformation of the torsion spring (22) itself to rapidly rotate and open. When the cover plate (21) is driven by the torsion spring (22) to return to the pre-set angle of the torsion spring (22), the torsion spring (22) is driven by the inertia and the weight of the cover plate (21) to continue to deform, such that energy is absorbed by means of the deformation of the torsion spring (22), thereby reducing the speed of the cover plate (21) to avoid producing a large mass impact and noise after the cover plate (21) is flipped up into position.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Wang, Wenchao
Hong, Yixuan
Abrégé
Provided are a software encryption terminal, a payment terminal, and a software package encryption and decryption method and system. The method comprises: acquiring a symmetric key; encrypting a pre-set software package according to the symmetric key so as to obtain an encrypted software package; uploading the encrypted software package to a server; and the fourth processor implementing the following steps when executing the program: downloading the encrypted software package from the server, and according to the symmetric key imported to a payment terminal, the payment terminal decrypting the encrypted software package so as to obtain a software package. In the present invention, by means of the method, a software package is not vulnerable during the transmission process, a key used for encrypting a software package complies with a key security management regulation, and there is no risk of key leakage. The present invention improves the security of transmitting a software package to a payment terminal, and avoids the problem of huge loss due to a user installing a software package that has been maliciously attacked.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
33.
PUBLIC AND PRIVATE KEY PAIR ACQUISITION METHOD AND SYSTEM, AND POS TERMINAL
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Peng, Botao
Meng, Luqiang
Abrégé
The present invention relates to a public and private key pair acquisition method and system, and a POS terminal. Said method comprises: generating a preset number of public and private key pairs by means of a key terminal to obtain an initial public and private key pair set; the key terminal encrypting the initial public and private key pair set to obtain a public and private key pair ciphertext set; a POS terminal acquiring the public and private key pair ciphertext set; the POS terminal decrypting the public and private key pair ciphertext set to obtain a public and private key pair plaintext set; the POS terminal storing the public and private key pair plaintext set into a storage unit corresponding to the security chip of the POS terminal; and upon detection of an instruction corresponding to a public and private key pair acquisition operation, the POS terminal selecting a public and private key pair from the public and private key pair plaintext set. The present invention improves the speed at which the POS terminal acquires a public and private key pair.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Lu, Zhiquan
Lin, Kui
Abrégé
A code scanning payment method based on a head-mounted MR device (11), comprising: a cashier system (1) receives a monetary amount to be charged; switching on a code scanning function of a camera (2) on a head-mounted MR device (11); the cashier system (1) collects a transaction amount equal to the monetary amount to be charged by means of the camera (2) scanning a payment code by following the head movement of the operator; displaying the transaction result by means of an MR display interface (3) in front of the eyes of the operator. The present method incorporates MR technology that combines real life and virtual reality into the payment field; the operator wearing the head-mounted MR device (11) can implement a code scanning operation during the process of a line-of-sight movement, and the payment results are displayed in front of the eyes in the form of an image that does not affect the real visual field, thereby implementing payment result confirmation. The present method can be used by both the payee and the payer, and can reduce the traditional code scanning payment process, significantly increasing the efficiency of code scanning payment.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Data processing apparatus; computer programs recorded; bar
code readers; computer programs downloadable; computer
software applications downloadable; cash registers;
automated teller machines [ATM]; smartphones; chips
[integrated circuits]; integrated circuit cards [smart
cards]/ smart cards [integrated circuit cards]. Technical research; research and development of new products
for others; scientific laboratory services; industrial
design; computer software design; updating of computer
software; consultancy in the design and development of
computer hardware; rental of computer software; computer
system design; installation of computer software; conversion
of computer programs and data, other than physical
conversion; computer software consultancy; rental of web
servers; monitoring of computer systems by remote access;
electronic data storage; providing information on computer
technology and programming via a web site; cloud computing;
conversion of data or documents from physical to electronic
media.
36.
FACE AND ELECTROCARDIOGRAM-BASED PAYMENT AUTHENTICATION METHOD AND TERMINAL
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Zhang, Zhicheng
Tang, Chaoxun
Abrégé
Provided are a face and electrocardiogram-based payment authentication method and a terminal. The method comprises the following steps: determining, according to electrocardiogram information, whether a user is in a sleeping state; determining, according to facial information, whether facial image information of the facial information contains high-frequency information greater than a preset threshold; and if both determination results are negative, performing a related matching operation according to the facial image information, the electrocardiogram information, and pre-stored facial image information and electrocardiogram information of the user, and determining, according to a match result, whether payment authentication is successful. The present invention can effectively determine, according to electrocardiogram information and facial image information, whether a user is in a compelled state or a sleeping state, thereby ensuring more secure and reliable transactions. The method combines face and electrocardiogram recognition techniques, thereby greatly reducing risks of unauthorized payments, and enhancing transaction security and reliability.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
37.
FACE AND VOICEPRINT-BASED PAYMENT AUTHENTICATION METHOD, AND TERMINAL
FUJIAN LANDI COMMERCIAL EQUIPMENT CO. , LTD. (Chine)
Inventeur(s)
Zhang, Zhicheng
Tang, Chaoxun
Abrégé
Provided are a face and voiceprint-based payment authentication method, and a terminal. The method comprises the following steps: determining, according to facial information, whether facial image information of facial information contains high-frequency information greater than a preset first threshold; determining, according to voiceprint information, whether the voiceprint information contains a high-frequency component greater than a preset second threshold; and if both determination results are negative, performing payment authentication according to the facial image information and the voiceprint information. In the present invention, whether a user is in a compelled state can be effectively determined according to facial image information and voiceprint information, thereby ensuring a more secure and reliable payment process. The method combines face and voiceprint recognition techniques, thereby greatly reducing risks of unauthorized payments, and enhancing transaction security and reliability.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Wang, Feng
Abrégé
The present invention provides a commodity information display method, a mobile terminal, and a commodity information display system: synchronizing commodity data stored in a cash register, the commodity data comprising a Bluetooth identification code and corresponding commodity information of a commodity; receiving a Bluetooth signal sent from a Bluetooth sensing point corresponding to a commodity and determining a Bluetooth identification code of a target commodity according to the Bluetooth signal; and displaying the corresponding commodity information according to the Bluetooth identification code of the target commodity. In combination with cash registers and Bluetooth technology, by using a cash register as a commodity information memory bank and using the Bluetooth technology to identify which commodity is approaching, i.e., a target commodity, commodity information of the commodity is automatically presented, thereby achieving convenient and comprehensive displaying of commodity information.
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD. (Chine)
Inventeur(s)
Huang, Guofu
Abrégé
An audio pin testing method and testing device for a communication module. The method comprises: transmitting a pre-set audio signal from an audio output pin to be tested of a communication module to an MIC pin of the communication module; acquiring an audio signal received by the MIC pin; comparing the pre-set audio signal with the audio signal received by the MIC pin; and determining whether the audio output pin to be tested is normal according to the result of the comparison. By means of outputting the audio signal from the audio output pin of the communication module to the MIC pin of the communication module, and comparing the audio signal with the signal received by the MIC pin, it is determined whether the audio output pin is normal. An audio output pin is detected by means of an MIC pin, and whether a function of the audio output pin is normal is automatically determined, so that the test efficiency is high, and the problem of manual misjudgment does not occur.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Peng, Botao
Abrégé
A terminal random number generation method and system. The method comprises: generate a true random number by means of a hardware random number generator; securely transmit the true random number to a terminal; and the terminal uses the received true random number as a random number seed to generate a random number sequence by means of a pseudo-random number generator. According to the method and system, the true random number is generated by an external hardware random number generator and is securely transmitted to the terminal, and the terminal uses the true random number as the random number seed to disperse lots of random numbers by means of the pseudo-random number generator. Therefore, the method significantly reduces terminal costs, and ensures that the random number meets the requirements of unpredictability and randomness.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Peng, Botao
Abrégé
The present invention relates to the field of data processing, and in particular to a method and terminal for managing and controlling a permission of an application, and a POS terminal. By obtaining a permission file corresponding to an application, the permission file comprising information of an accessible interface of the application, packaging an original installation package corresponding to the application and the permission file to obtain a checked installation package, and performing a sign operation on the checked installation package to obtain a signed installation package, the present invention improves the legitimacy of a third-party application installed on a terminal.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Peng, Botao
Abrégé
A financial payment terminal activation method and system. The system comprises a payment terminal and an intelligent IC card, a root certificate being stored in the payment terminal, and a working certificate and a corresponding private key being stored in the intelligent IC card. The method comprises: acquiring, by the payment terminal, a password input by an operator, and transmitting the password to the intelligent IC card connected to the payment terminal; if the verification of the password by the intelligent IC card succeeds, unlocking the private key stored in the intelligent IC card; and verifying, by the payment terminal, according to the root certificate thereof, the intelligent IC card by means of a digital signature, and if the verification succeeds, allowing activation of the payment terminal. By means of the present method and system, an operator identity can be effectively verified and traced while the operation security is ensured; moreover, high convenience during the verification process can be achieved; furthermore, the financial payment terminal has a small size and is convenient to carry; in addition, management and maintenance costs can be remarkably reduced.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Chen, Feifei
Meng, Luqiang
Peng, Botao
Jiang, Zhongjie
Abrégé
An APK signature authentication method and system. The method comprises: S1, signing an original APK file to generate signature information; S2, adding a self-defined ID-value field to an APK signature block, inserting the signature information into the self-defined ID-value field, and generating a signed APK file; S3, a terminal acquiring the signed APK file, extracting the signature information, and restoring the original APK file; and S4, the terminal verifying the legitimacy of the signature information and the original APK file, and after verification is passed, the terminal installing the original APK file. The method does not affect an original signature authentication mechanism of an operating system of a terminal, and can be applied to systems with Android 7.0 or higher. The system has good compatibility and wide applicability. An order receiving mechanism can be downloaded to a payment terminal manufacturer device and other Android devices as long as one signed APK file is generated, thereby reducing the maintenance cost of the order receiving mechanism.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Zhang, Weichao
Wu, Weidong
Wu, Hongbin
Abrégé
A Ukey (4)-based software decryption method and terminal (1). The method comprises: encrypting a software code to obtain encrypted data, and storing, in the Ukey (4), a decryption program corresponding to the encryption; acquiring the encrypted data by means of a shell program, and sending the encrypted data to the Ukey (4), so that the Ukey (4) decrypts the encrypted data by means of the decryption program to obtain decrypted data; and receiving the decrypted data sent by the Ukey (4). By storing the decryption program in the Ukey (4), and decrypting the encrypted program code by means of the Ukey (4), the decryption program is separated from the program code, so that a cracker cannot acquire the decryption program and analyze same, thereby improving the security of software decryption.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Liu, Qinneng
Su, Long
Hu, Changfa
Xu, Guan
Tang, Dahai
Abrégé
A Micro USB socket connector, comprising a frame type connecting member (1). The connecting member (1) is a hollow structure and has openings at both ends. The Micro USB socket connector further comprises a metal casing (2). The metal casing (2) comprises a contact portion (21) and soldering portions (22); the contact portion (21) comprises three sides; the three sides of the contact portion (21) are separately provided with a soldering portion (22); the contact portion (21) is disposed outside the connecting member (1) and is connected to the connecting member (1); the soldering portions (22) are disposed corresponding to two opposite side walls of the connecting member (1) and one end of the connecting member (1), respectively. According to the Micro USB socket connector, a metal casing (2) is additionally provided outside the connecting member (1), and the metal casing (2) is additionally provided with soldering portions (22); the soldering effect is thus reinforced, so that the connection between a socket and a circuit board is more firm, and the Micro USB socket is not easy to be damaged and fall off.
H01R 13/504 - SoclesBoîtiers composés de différentes pièces les différentes pièces étant moulées, collées, soudées, p. ex. par soudage à ultrasons, ou réunies par estampage
46.
NOVEL SECURITY PATCH BOARD AND POS MACHINE USING SECURITY PATCH BOARD
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Huangdian
Abrégé
A novel security patch board and a POS machine using the security patch board. The machine comprises a security patch board (1), a zebra stripe (2) and a PCB (3), wherein the security patch board (1) comprises a glass substrate (11), a silicon dioxide barrier layer (12) and an ITO mesh layer (13) in sequence; a mesh trace is provided on the ITO mesh layer (13); one face of the zebra stripe (2) is attached and electrically connected to the PCB (3), and the other face is attached and electrically connected to the ITO mesh layer (13) on the security patch board (1); and the number of zebra stripes (2) is at least one. A fragile security patch board and a zebra stripe are combined to protect a PCB, without requiring tin soldering; an external signal can detect a device on the PCB when the security patch board is moved or damaged; and a security action of a POS machine can be triggered when the security patch board is moved or damaged, so that the usage security of the POS machine is improved.
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wang, Lei
Lin, Cen
Chai, Weirong
Abrégé
Disclosed by the present invention are an anti-differential power analysis (DPA) attack encryption method and a computer readable storage medium, the method comprising: generating a plurality of fake keys; obtaining a key set according to a real key and the plurality of fake keys; sequentially acquiring a key in the key set as an encryption key, and encrypting a plaintext to obtain a ciphertext corresponding to the key; sending a ciphertext corresponding to the real key to a receiving terminal after completing the acquisition of the key in the key set. Since the operation time, energy consumption and electromagnetic radiation of the fake key and real key are essentially same, a differential energy analysis method cannot clearly analyze key length and a time sequence of the real key being involved in the operation, and the generated energy analysis curve is not fixed, while the real key cannot be cracked, thereby effectively guaranteeing the security of encrypted data.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Technical research; research and development of new products
for others; scientific laboratory services; industrial
design; computer software design; updating of computer
software; consultancy in the design and development of
computer hardware; rental of computer software; computer
system design; installation of computer software; conversion
of computer programs and data, other than physical
conversion; computer software consultancy; rental of web
servers; monitoring of computer systems by remote access;
electronic data storage; providing information on computer
technology and programming via a web site; cloud computing;
conversion of data or documents from physical to electronic
media.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wang, Feng
Abrégé
The invention discloses a cash register user management method and a terminal. Voice information input at a cash register by a user is received, a text string corresponding to the voice information is used as a user name, and voiceprint information corresponding to the voice information is used as a password to log in to the cash register. Users do not need to memorize complex user names or passwords, and only need to speak, at a cash register, corresponding voice information, and the cash register can rapidly identify them. Operation is simple, convenient, and rapid. Since voiceprint information corresponding to each user is unique, and cannot be imitated, using voiceprint information corresponding to each user as a password is a secure means, reduces user authentication steps and improves efficiency.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Technical research; research and development of new products
for others; scientific laboratory services; industrial
design; computer software design; updating of computer
software; consultancy in the design and development of
computer hardware; rental of computer software; computer
system design; installation of computer software; conversion
of computer programs and data, other than physical
conversion; computer software consultancy; rental of web
servers, monitoring of computer systems by remote access;
electronic data storage; providing information on computer
technology and programming via a web site; cloud computing;
computer software design (computer software design in the
field of financial transaction settlement and
reconciliation, electronic transfer, and electronic payment
services);conversion of computer programs and data (provide
data encryption development and services for financial
transaction security verification).
53.
INTELLIGENT TERMINAL INFORMATION SECURITY INPUT METHOD AND SYSTEM
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Zhang, Zhicheng
Xu, Jianfeng
Abrégé
An intelligent terminal information security input method and a system. The method comprises: when a security input is invoked by an application, entering by an operating system of an intelligent terminal a trusted execution environment (TEE) (S1); turning off a screen access permission in a rich execution environment (REE) (S4); and turning on the permission after an information input is completed. The method isolates the TEE from the REE, so as to guarantee the security of the TEE; the method can also effectively prevent malicious programs in the REE from stealing security information by means of accessing a screen, thereby significantly improving the information input security of a user; furthermore, the method reduces businesses involved in the TEE as much as possible, so as to ensure wider versatility of the TEE; and the REE interface can be timely and completely restored, and two demonstrating modes of the information input by the user are provided, thus greatly improving user experience.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Dongzhou
Abrégé
Provided is a safety protection structure for a liquid crystal touch screen, comprising: a liquid crystal module; a structural substrate; a PCB; and a key. The liquid crystal module is provided with a safety contact, and comprises a fixing portion for fixing the safety contact. The liquid crystal module, the structural substrate and the PCB are sequentially arranged from top to bottom. The fixing portion has one end fixed to an inner surface of the liquid crystal module and the other end passing through the structural substrate and positioned between the structural substrate and the PCB. The key is provided at an inner surface of the PCB and abuts against the fixing portion. Also provided are a financial payment device and a safety protection method for a liquid crystal touch screen. The safety protection structure for a liquid crystal touch screen can solve a problem in which provision of a contact under a liquid crystal touch screen exerts a force on a liquid crystal module, thereby reducing costs, and enhancing production convenience.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wang, Feng
Su, Long
Abrégé
A voice interaction method and terminal for a cash register. The method comprises: displaying a preset advertisement slogan on a customer display screen of a cash register (S1); acquiring voice information inputted by a user (S2); determining whether a text corresponding to the voice information matches the advertisement slogan, and if so, offering a certain discount on a product corresponding to the advertisement slogan (S3). The method enables voice interaction with a cash register and draws more attention from customers by means of voice input to achieve the purpose of broadcasting displayed information on a customer display screen, such that the information is communicated more easily, the interaction is enhanced, and the user endorses a product by reading aloud an advertisement slogan, thus increasing the loyalty and affinity to the product.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wang, Feng
Su, Long
Abrégé
A payment method and terminal for a cash register. The method comprises: after a user completes a designed task for an advertisement presented by a cash register, the cash register recording and saving an account and password for withdrawal pre-stored by the user (S1); and after the cash register acquires login information of login using the account and password for withdrawal by the user, the cash register deducting the sum of consumption of the user from a payment or making a payment to the account corresponding to the user (S2). The above method and terminal fully utilize the nature of financial management of a cash register and discard the idea that a traditional cash register can only receive but not make a payment, and the method can authenticate the identity of a user by means of account login, thus improving the payment security.
G07G 1/12 - Caisses enregistreuses à commande électronique
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Li, Lianjie
Hong, Xiaohui
Li, Zhaoming
Zhao, Wei
Abrégé
The invention relates to the field of configuration management, and especially relates to a method for grading configuration files and a terminal thereof. The method comprises the following steps: generating a first exam configuration file corresponding to each software module, in order to obtain multiple secondary configuration files; according to multiple soft modules required by different mobile terminals, generating different second exam configuration files corresponding to different mobile terminals, to obtain multiple primary configuration files; compiling each primary configuration file and corresponding multiple different secondary configuration files thereof, to obtain third exam configuration files with grading information corresponding to each mobile terminal. The present invention solves the problems of difficult maintenance and low maintenance efficiency of exam configuration files, and tedious modification of public software module change.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Zhang, Chicheng
Xu, Jianfeng
Abrégé
The present invention relates to the technical field of computers, and in particular, to a method and system for the automatic unlocking and locking of a POS machine. The method comprises: a POS machine acquiring a physical address and signal strength of each mobile terminal within a pre-set range; determining whether the physical address of each mobile terminal is in a pre-set first physical address list; if so, determining whether the signal strength of the mobile terminal corresponding to the physical address is greater than a pre-set signal strength; and if so, unlocking the POS machine, otherwise, locking the POS machine. According to the present invention, it can be automatically identified whether an operator of a POS and a shopkeeper are in the vicinity of a POS machine; and it is only when the operator and the shopkeeper are near the POS machine that the POS is allowed to be unlocked, and a related operation is then carried out, thereby effectively preventing the POS machine from being secretly operated without the shopkeeper knowing.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Peng, Jiangming
Abrégé
The present invention relates to the field of data processing, and particularly, to a service data processing method, a client, a server and a system. In the present invention, by adding version information of service operations into network requests, a server can rapidly identify version information of service operations requested by different clients, and can invoke, according to the version information, corresponding service logics to process service data carried by the network requests. Compared with the prior art, the time for the server to identify service data corresponding to service operations of different versions that is submitted by the client are shortened, so that the server can compatibly process service operations of multiple versions, and the response time for performing service operations by the client is effectively shortened.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Hong, Yixuan
Meng, Luqiang
Abrégé
Provided by the present invention are a method for generating a configurable point of sale (POS) machine secret key pair and a computer readable storage medium, the method comprising: presetting a configuration file, parameters in the configuration file comprising a manner of generating a terminal secret key pair; according to the performance that is produced by the terminal, setting parameters for a manner of generating a terminal secret key pair in a corresponding configuration file; during the production process, the terminal obtaining the corresponding configuration file; the terminal parsing the configuration file and generating a secret key pair according to the manner of generating a terminal secret key pair that is set in the configuration file. The present invention may make full use of the performance of a POS machine terminal, while reducing the load of a certificate authority (CA) center service end, and may also reduce the transmission frequency of sensitive data and improve data security; further, the method may ensure consistency in the production processes of equipment having different performances without needing to design different equipment production processes for different asymmetric secret key pair generation solutions according to conditions, while also being able to meet a variety of different needs.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wang, Feng
Su, Long
Abrégé
The present invention relates to the technical field of multimedia, and specifically relates to an advertising method and a terminal. The method comprises: controlling, by means of product information and a QR code corresponding thereto, a cash register to generate advertising information corresponding to a product; and displaying the advertising information, such that a user can scan the QR code to obtain and store corresponding product introduction information and special offer information. The invention resolves an issue in which existing advertisement methods provide only short broadcasts, wherein if a user wants to learn more about product introduction information and special offer information corresponding to advertising information, the user does not know how to begin to obtain the information. The invention improves advertising efficiency, and when a user sees advertising information of interest to the user, the user can store the advertising information in a timely manner, so as to facilitate future viewing, thereby providing the user with a convenient means for acquiring information.
G06Q 30/02 - MarketingEstimation ou détermination des prixCollecte de fonds
G06K 17/00 - Méthodes ou dispositions pour faire travailler en coopération des équipements couverts par plusieurs des groupes principaux , p. ex. fichiers automatiques de cartes incluant les opérations de transport et de lecture
G07G 1/14 - Systèmes comportant une ou plusieurs stations coopérant avec une unité centrale
09 - Appareils et instruments scientifiques et électriques
Produits et services
Data processing equipment; recorded computer programs for use in database management; bar code readers; downloadable computer software for use in database management; downloadable computer application software for use in word processing; cash registers; automatic teller machines (ATMs); smart phones; semiconductor chips; point-of-sale terminals; smart card readers; bank computer terminals; none of the forgoing for use in connection with motor vehicles and the automotive industry
09 - Appareils et instruments scientifiques et électriques
Produits et services
(1) Computer communications software to allow customers to access bank account information and transact bank business; recorded computer operating programs; bar code readers; computer utility programs for file management; computer software for database management; cash registers; automated teller machines (ATM); smart phones; electronic chips for the manufacture of integrated circuits; point-of-sale (POS) terminals; smart card readers; electronic payment terminals; blank integrated circuit cards;
09 - Appareils et instruments scientifiques et électriques
Produits et services
(1) Computer communications software to allow customers to access bank account information and transact bank business; recorded computer operating programs; bar code readers; computer utility programs for file management; computer software for database management; cash registers; automated teller machines (ATM); smart phones; electronic chips for the manufacture of integrated circuits; point-of-sale (POS] terminals; smart card readers; electronic payment terminals; blank integrated circuit cards;
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Technical research in the field of data encryption; research and development of new products for others; scientific laboratory services; industrial design; computer software design; updating of computer software; consultancy in the design and development of computer hardware; rental of computer software; computer system design; installation of computer software; conversion of computer programs and data, other than physical conversion; computer software consultancy; rental of web servers; monitoring of computer systems by remote access to ensure proper functioning; electronic data storage; providing information on computer technology and programming via a web site; providing virtual computer systems through cloud computing; conversion of data or documents from physical to electronic media * ; none of the forgoing for use in connection with motor vehicles and the automotive industry *
09 - Appareils et instruments scientifiques et électriques
Produits et services
Data processing equipment; recorded computer programs for use in database management; bar code readers; downloadable computer software for use in database management; downloadable computer application software for use in word processing; cash registers; automatic teller machines (ATMs); smart phones; semiconductor chips; point-of-sale terminals; smart card readers; bank computer terminals; none of the forgoing for use in connection with motor vehicles and the automotive industry
67.
DOWNLOADING METHOD FOR IMPROVING DOWNLOAD EFFICIENCY AND DOWNLOADING SYSTEM THEREOF
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Xiao, Xiangying
Chen, Ruibin
Peng, Jiangming
Abrégé
The present invention relates to the field of network downloading technology, in particular to a downloading method for improving download efficiency and a downloading system thereof. The method comprises the following steps: sending by a terminal, terminal information and download task ID to a terminal management system; determining whether the same terminal information and download task ID exist in the terminal management system and whether the same terminal information and the download task ID have already called a pack picking dynamic library; if yes, sending a download confirmation packet to the terminal; if not, sending a download confirmation packet to the terminal after calling the pack picking dynamic library; after receiving the download confirmation packet, sending by the terminal a download request to the terminal management system; and after receiving the download request, sending by the terminal management system a corresponding file to the terminal. After receiving the terminal information and the download information sent by the terminal, the terminal management system makes a determination before deciding whether to call the pack picking dynamic library, so that the pack picking dynamic library is only called once when the same terminal sends for multiple times the terminal information and the download information to the terminal management system.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Huangdian
Xiao, Feng
Abrégé
Disclosed are a method and system for identifying liquid crystal of different manufacturers, wherein said method comprises the steps of: S1. Connecting a data line interface of a liquid crystal to a reading pin, configuring the liquid crystal data line interface as a general purpose input/output (GPIO) port and to be in a low-level output state, and configuring the state of the reading pin to be pull-down input; S2. Reading said reading pin to obtain a first value, and if the first value is valid, acquiring the connection status of a liquid crystal ID pin, and acquiring first liquid crystal information corresponding to said connection status. By using a data line interface preinstalled to a liquid crystal and connecting the liquid crystal data line interface to a reading pin, and by means of configuring the data line interface as a GPIO port and to a low-level output state, as well as configuring the state of the reading pin to pull-down input, eleven different liquid crystal manufacturers may be identified.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Technical research in the field of financial transaction security; research and development of new products for others; scientific laboratory services; industrial design; computer software design; updating of computer software; consultancy in the design and development of computer hardware; rental of computer software; computer system design; installation of computer software; conversion of computer programs and data, other than physical conversion; computer software consultancy; rental of web servers, monitoring of computer systems by remote access to ensure proper functioning; electronic data storage; providing information on computer technology and programming via a web site; providing virtual computer systems through cloud computing; computer software design in the field of financial transaction settlement and reconciliation, electronic transfer, and electronic payment services; provide development of data encryption technologies and electronic services for financial transaction security verification * ; none of the forgoing for use in connection with motor vehicles and the automotive industry *
70.
METHOD AND SYSTEM FOR MANAGING AND CONTROLLING ROOT PERMISSION
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wang, Wei
Abrégé
A method and system for managing and controlling a Root permission, which relate to the field of Root permission management and control. The method comprises: S1, a terminal sending user identity information to a remote server; S2, the remote server verifying the identity information so as to obtain a verification result; S3, if the verification result is that same is verified to be legitimate, the terminal acquiring an identification code corresponding to a mobile terminal; S4, the terminal sending the identification code to the remote server; S5, the remote server setting an authorization code and an authorization time limit according to the identification code; S6, the terminal acquiring the authorization code and the authorization time limit; S7, the terminal sending the authorization code and the authorization time limit to the mobile terminal; and S8, the mobile terminal setting a corresponding permission according to the authorization code and the authorization time limit. The present invention prevents unauthorized personnel from obtaining a permission that should not be obtained thereby or prevents an obtained Root permission from being a permission without a time limit, thereby improving the security of a system.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/51 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p. ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
71.
DUAL-CAMERA SCANNING GUN AND SCANNING METHOD THEREFOR
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Weidong
Liu, Lijian
Abrégé
The present invention provides a dual-camera scanning gun and a scanning method for the dual-camera scanning gun. The dual-camera scanning gun comprises a housing, a near-focus camera, and a far-focus camera. A scanning window is disposed on the housing. The near-focus camera and the far-focus camera are both mounted at the position of the scanning window. The method comprises: obtaining a first bar code image by means of a near-focus camera, and at the same time, obtaining a second bar code image by means of a far-focus camera; and decoding the first bar code image and/or the second bar code image. The bar code images are obtained by means of the near-focus camera and the far-focus camera having different depths of focus, and the bar code images are decoded, and accordingly, the use scope of the scanning gun is expanded, the time for manual adjustment of the scanning gun is shortened, the time for code scanning of the scanning gun is reduced, and the sensitivity of code scanning is increased.
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
72.
POS TERMINAL TEST METHOD AND SYSTEM RUNNING ON PC TERMINAL
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Lin, Jinan
Lin, Wei
Chen, Benfeng
Li, Yunying
Liu, Chunyan
Hu, Linyan
Lin, Liang
Abrégé
The present invention relates to the technical field of POS transactions, and in particular to a POS terminal test method and system running on a PC terminal. The method comprises the following steps: selecting a simulation test card configured in a test card database of a card simulation tool software of a PC terminal; a simulation COS library determining a corresponding COS according to the selected simulation test card; the selected simulation test card performing APDU data exchange with the POS terminal via the corresponding COS to complete a test of the simulation test card; and the card simulation tool software of the PC terminal recording test information about the simulation test card. The present invention only needs a PC containing a Windows system to construct a POS terminal test system, which is easy to construct and is low in cost. The test card database can configure a new card via a card configuration template according to test requirements, which can be updated on-line and has a good expansibility.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Lin, Jinan
Lin, Wei
Lin, Huan
Li, Yunying
Hu, Linyan
Lin, Liang
Abrégé
The present invention relates to the technical field of POS transactions, and in particular relates to a method and system for testing a POS terminal running on a mobile phone terminal. The method comprises the following steps: selecting a simulation test card configured in a test card database of card simulation tool software of a mobile phone terminal; a simulation COS library determining a corresponding COS according to the selected simulation test card; the selected simulation test card performing APDU data exchange with a POS terminal via the corresponding COS, so as to complete the testing of the simulation test card; and the card simulation tool software of the mobile phone terminal recording test information about the simulation test card. The present invention only requires a mobile phone containing an Android system to construct a POS terminal test system, such that the construction is easy and the cost is low. The test card database can configure a new card via a card configuration template according to test requirements, and can be updated online and has good expansibility.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Lin, Hui
Wu, Minxing
Abrégé
The present invention relates to the technical field of USB communications, and provides a password keyboard USB communication anomaly recovery method and system. The method comprises the following steps: various underlying drive modules of a password keyboard insert command numbers in respective communication data; determine whether communication is abnormal or not; if yes, the various underlying drive modules of the password keyboard determine whether data needs to be retransmitted; if yes, the underlying drive modules transmit original data again with the same command numbers; a connecting device determines whether the command numbers of the received data are same or not; if yes, discard repetitively received data, or otherwise, receive the data. According to the technical solution of the present invention, various underlying drive modules perform error processing; the short-time disconnection problem due to the fact that communication is interfered is resolved; design of a communication protocol can be simplified; and thus, by means of a command serial number mechanism, the problem of asynchronous or repetitive operation of both communication sides due to the fact that same commands are repetitively received and transmitted can be prevented.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Chen, Feifei
Peng, Botao
Meng, Luqiang
Lin, Hui
Abrégé
A method and system for authorizing to clear an attack alarm for a terminal, which fall within the technical field of communications. The method for authorizing to clear an attack alarm for terminal comprises: a server acquiring an authentication account number and determining that the authentication account number has an authority to clear an attack; the server sending first data to be authenticated to an attack-clearing tool; the attack-clearing tool encrypting the first data to be authenticated so as to generate first authentication data; the server authenticating the first authentication data; if the authentication is passed, the terminal sending second data to be authenticated to the server; the server authenticating the second data to be authenticated, and if the authentication is passed, encrypting the second data to be authenticated so as to generate second authentication data and sending the second authentication data to the terminal; and if the terminal passes the authentication of the second authentication data, the terminal clearing an attack alarm prompt. The whole process uses two-factor authentication so as to ensure the security, and clearing an attack alarm prompt for a terminal is a legal behavior approved by a server so as to ensure the legality of an attack-clearing operation.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Chen, Feifei
Meng, Luqiang
Lin, Hui
Abrégé
The present invention relates to a method and system for securely setting the system time of a terminal, which fall within the technical field of communications. The method for securely setting the system time of a terminal comprises: a server acquiring an authentication account number; the server determining that the authentication account number has a right to set a system time; the server sending first data to be authenticated to a client tool; the client tool encrypting the first data to be authenticated by using an operator private key to generate first authentication data; the server authenticating the first authentication data; if authentication is passed, a terminal sending second data to be authenticated to the client tool, and the client tool sending the second data to be authenticated to the server; and the server authenticating the second data to be authenticated. In this solution, a system time is set without disassembly and key re-downloading, thereby facilitating the setting of the system time.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Meng, Luqiang
Hong, Yixuan
Abrégé
Disclosed are a data isolation system and method, and a method using the data isolation system. The data isolation system comprises: a user POS machine, a server, a signature module, and at least one user module. The user POS machine is connected to the server, the server is connected to the signature module, and the signature module is connected to the user module. The user POS machine comprises a default application area and at least one user application area. The default application area is used for storing application programs and default digital certificates which are shared by users. The user application area is used for storing application programs and user digital certificates of authorized users. The user module comprises the user digital certificates of the corresponding authorized users. The signature module is used for making a digital signature. The sever comprises user application programs. The present invention realizes data isolation between different application areas, and software of a current user cannot be downloaded to other user application areas.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G07G 1/14 - Systèmes comportant une ou plusieurs stations coopérant avec une unité centrale
78.
WRITE METHOD AND WRITE SYSTEM UTILIZED IN NAND FLASH PRODUCTION
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Abrégé
The invention relates to the field of personal computers (PC), and specifically, to a write method and a write system utilized in a NAND flash production stage. The write method comprises the following steps: S1: a PC terminal data write program transmits, to a NAND flash of the terminal, a terminal write program; S2: the terminal write program detects bad block locations in the NAND flash, and transmits, to the PC terminal write program, the bad block locations; S3: the PC terminal write program computes, according to the received bad block locations and a preconfigured first partition table, an actual used size of each of partitions, so as to generate a second partition table of the partitions, wherein the first partition table includes an actual required size of each of the partitions; and S4: the PC terminal write program writes, to the NAND flash of the terminal, and according to the second partition table, an image file of each of the partitions. The embodiments ensure production quality and increase a utilization rate of storage space, keeping costs in control.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Chen, Qingbin
Wang, Bin
Abrégé
The invention relates to the field of system initialization, and specifically, to a module initialization method and system. The method comprises: preconfiguring a module initialization program; configuring the module initialization program to be in a non-root partition; and adding, into a system initialization script, a line to initialize the module initialization program. The embodiment is utilized to separate, from a system initialization program, a module initialization program, and configure the module initialization program to be in a non-root partition. As a result, an initialization process of a module can be modified without modifying the corresponding system, increasing the level of system modulization.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Xie, Yaohua
Liu, Lijian
Abrégé
A method for solving the problem that an ADB port is occupied, and a system therefor. The method comprises: associating a manufacturer number and a device number of an ADB device with a pre-set interface number (S1); adding functional combination information to attribute information about the ADB device (S2); setting an interface subclass and an interface protocol code in descriptor information about the ADB device as parameters of corresponding custom types (S3); judging whether the manufacturer number and the device number of the ADB device are consistent with a pre-set manufacturer number and a device number (S4); if so, setting the descriptor information about the ADB device as pre-set descriptor information (S5); adding a pre-set manufacturer number, a pre-set device number and an interface number corresponding thereto to an ADB drive program information file (S6); modifying a communication port number into a pre-set port number in an ADB communication program of a PC device (S7); the ADB device being connected to a PC device (S8); judging whether the manufacturer number and the device number of the ADB device and the interface number corresponding thereto are consistent with the pre-set manufacturer number, the device number and the interface number corresponding thereto (S9); if so, judging whether the descriptor information about the ADB device is the pre-set descriptor information (S10); if so, the PC device installing a corresponding ADB drive program (S11); and setting the communication port number of the PC device and the ADB device as the port number corresponding to the manufacturer number and the device number (S12). The method can solve the problem that an ADB tool port is occupied, thus improving the development efficiency.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Xie, Yaohua
Liu, Lijian
Abrégé
A method for managing an ADB device, and a system therefor. The method comprises: an ADB device being connected to a PC device; the PC device modifying a sequence number of the ADB device connected thereto into a pre-set value; and the PC device allocating a pre-set virtual serial port for the ADB device. By setting all sequence numbers of ADB devices to be a pre-set value, namely, setting same to be the same value or setting same to be null, a Windows system of the PC device will not re-install a drive program for each of the ADB devices thus guaranteeing that the PC device only installs the drive program once when being connected to a plurality of ADB devices, and thereby saving a large amount of time and improving the production capacity.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wang, Shusheng
Abrégé
A printing method based on a virtual Bluetooth apparatus, and a system thereof. The method comprises: a smart apparatus creates a virtual Bluetooth apparatus corresponding to a printer of the smart apparatus; a third party application connects to the virtual Bluetooth apparatus; the third party application transmits, via the virtual Bluetooth apparatus and to the smart apparatus, printing data; the smart apparatus analyzes the printing data to obtain printing command data supported by the printer; and the smart apparatus transmits to the printer the printing command data. The embodiment is utilized to enable a third party application to use a printer of a smart apparatus without making other modifications, and as a result, a user does not need to perchance an extra Bluetooth printer, saving cost, being easy to use, and significantly enhancing user experience.
The present invention relates to the technical field of computers, and provides a method for facilitating on-site failure identification of a payment terminal, and system for same. The method comprises the following steps: S1, embedding payment terminal debugging code into software source code of a payment terminal; S2, running software of the payment terminal to generate a log, the log comprising program operation information, failure information, and debugging information; S3, configuring a log level of the debugging information of the payment terminal as a debugging level, and configuring the log level of the program operation information and failure information of the payment terminal as a failure level; and S4, if the payment terminal is in normal operation, then the payment terminal generating an output with a log level as the failure level; and if the payment terminal has a failure and is under repair, then setting a log level of the output of the payment terminal as the debugging level, and outputting, from the payment terminal, the program operation information, failure information, and debugging information of the payment terminal. The present invention enables technical personnel to acquire the debugging information simply by setting the log level of an output, thus improving efficiency.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Abrégé
A software module management method and system. The method comprises: uploading data packets of system software, wherein the system software comprises at least two software modules, the data packets comprise software packages of the software modules, version information of the system software, a comparison file, and a check comparison program, and the comparison file comprises names and corresponding version numbers of the software modules; a terminal acquiring the data packets; the terminal performing an update according to the data packets and installing the check comparison program; running the check comparison program, and comparing the version numbers of the software modules in the comparison file against version numbers of all software modules on the terminal; if the version numbers of the software modules in the comparison file match the version numbers of all software modules on the terminal, then acquiring the version information of the system software; and if the version numbers of the software modules in the comparison file do not match the version numbers of the software modules on the terminal, then acquiring the version information of the system software, a name of a mismatching software module, and a version number on the terminal.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Abrégé
A method and device for accelerating activation of a payment terminal. The method comprises the following steps: step S1, acquiring software modules requiring initialization in a payment terminal, and dividing the software modules into multiple initialization sets; step S2, sequentially establishing, according to the number of the initialization sets in step S1, a corresponding number of initialization processes; and step S3, sequentially executing, according to the initialization processes, initialization operations of the software modules in the corresponding initialization sets, wherein the software modules are initialized in the order thereof in the initialization sets. The method and device of the present invention have advantageous effects in that: compared to most of prior art initialization procedures of a payment terminal in which loading of a program only begins after all software modules are initialized sequentially, the method and device modify the initialization procedure into multi-process initialization operation, such that the parallel processing capability of a multi-core processor is fully utilized to reduce time spent on system initialization.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wang, Shusheng
Abrégé
The invention discloses a fast Wi-Fi connection method and device. The method comprises the following steps: acquiring a Wi-Fi connection request; acquiring, according to the Wi-Fi connection request, a prestored SSID and password; selecting an acquired SSID and inputting the password; and establishing a Wi-Fi connection. The invention is utilized to achieve automatic Wi-Fi connection establishment, enhancing connection efficiency.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Lin, Hui
Wu, Minxing
Abrégé
A recovery method and system for password keyboard USB communication abnormality. The method comprises: insert frame numbers in data sent between a password keyboard and a connected device (S101); the password keyboard and the connected device return response information of each frame of data during data reception, the response information comprising data reception success, data reception failure, and data reception timeout (S102); detect whether USB communication between the password keyboard and the connected device is abnormal, and if yes, reestablish a communication connection by means of a communication reconnection mechanism (S103); and after the communication connection is reestablished, the password keyboard and the connected device determine, according to the received response information and the data frame numbers, whether data is repeatedly received, discard repeated data, and retransmit data (S104). By inserting frame numbers in sent data and establishing a data response mechanism and a communication reconnection mechanism, the technical solution can reestablish a communication service connection after communication is interrupted, and thus effectively resolves the problem of asynchronous communication parties or repeated operations caused by repeatedly receiving and sending the same data during communication abnormality.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Lin, Hui
Abrégé
To provide a novel solution for fast encryption of large fingerprint image data by means of a 3DES algorithm, provided is a method for encrypting fingerprint image data, comprising the following steps: performing binary conversion on original fingerprint image data to obtain a digital sequence to be encrypted; using a preset key to encrypt 256 possible combinations of digits to be encrypted to obtain a password list; and grouping the digital sequence to be encrypted by taking eight bytes as a unit, searching the password list for a password corresponding to each group, and splicing the passwords to obtain the encryption result. Also provided is a device for encrypting fingerprint image data, for realizing the method. According to the technical solution, when a large volume of fingerprint image data is encrypted by means of 3DES, the encryption time can be greatly shortened, and user experience is improved.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
89.
METHOD AND SYSTEM FOR GRANTING AUTHORITY TO ACQUIRE TERMINAL ATTACK ALARM INFORMATION LOG
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Chen, Feifei
Lin, Hui
Abrégé
Provided are a method and system for granting authority to acquire a terminal attack alarm information log, belonging to a technical field of communications. The method comprises: after a service end (10) acquires an authentication account having an authority to acquire an attack alarm information log, the service end (10) authenticating the legality of a client tool (30), and after the authentication of the legality thereof is passed, a terminal (20) sending second data to be authenticated to the client tool (30), and then the client tool (30) sending same to the service end (10); if the authentication performed by the service end (10) on the second data to be authenticated is passed, encrypting same to generate second authentication data and sending the second authentication data to the terminal (20); and if the authentication performed by the terminal (20) on the second authentication data is passed, the terminal (20) acquiring an attack alarm information log, and encrypting same, and sending same to the client tool (30) after encryption. The whole process using a double-factor authentication method to ensure safety, and an instruction for the terminal (20) to acquire an attack alarm information log is a legal action authenticated by the service end (10), thereby ensuring the legality of acquiring an operation instruction.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Chen, Feifei
Peng, Botao
Chen, Bojie
Abrégé
A programmed file image signing and authentication method and device, and a programmed file image programming method and system. The programmed file image signature authentication method comprises: acquiring a signature file of a programmed file image (S101); verifying the legality of a working public key certificate in the signature file by using a pre-set root public key certificate (S102); if the working public key certificate is illegal, the signature authentication being unsuccessful, and if the working public key certificate is legal, verifying the legality of a signature cipher text in the signature file by using the working public key certificate (S103); if the signature cipher text is illegal, the signature authentication being unsuccessful, and if the cipher text is legal, the signature authentication being passed (S104). A programmed file image is signed, and double-verification is performed during verification, wherein not only is verification performed by using a pre-set root public key certificate, but also a signature cipher text in a signature file is verified. When a programmed file image is uploaded to a programmed process, the consistency between programmed file images is ensured.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Zeng, Ha
Jiang, Jinyang
Abrégé
A method for testing an antistatic ability of a card function module of a POS terminal. The method comprises: firstly, manufacturing a magnetic card tooling (1) or an IC card tooling (2); inserting the magnetic card tooling (1) or the IC card tooling (2) into a POS terminal, wherein the magnetic card tooling (1) or the IC card tooling (2) is electrically connected to a card function module in the POS terminal, using a static gun to perform electrical contact with the magnetic card tooling (1) or the IC card tooling (2), adjusting a static value output by the static gun, and respectively recording a working state of the POS terminal where the static gun outputs different static values; taking the magnetic card tooling (1) or the IC card tooling (2) out of the POS terminal, detecting parameter data of the card function module of the POS terminal, and determining whether the card function module of the POS terminal is faulty; and according to the recorded working state of the POS terminal and the parameter data of the card function module, obtaining a test grade of the anti-static ability of the POS terminal. By means of the simple contact of a magnetic card tooling (1) and an IC card tooling (2) with a POS terminal, and by means of discharging via a static gun, an anti-static grade of the POS terminal is tested.
G01R 31/00 - Dispositions pour tester les propriétés électriquesDispositions pour la localisation des pannes électriquesDispositions pour tests électriques caractérisées par ce qui est testé, non prévues ailleurs
92.
POS TERMINAL APPLICATION PACKAGE DOWNLOAD METHOD AND APPARATUS, AND COMMUNICATION METHOD
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Hong, Xiaohui
Wu, Weidong
Abrégé
Disclosed in the present invention are a POS terminal application package download method and apparatus, and a communication method, the POS terminal application package download method comprising a substitution download method: directly downloading the file to be downloaded; a deletion download method: issuing a deletion notification to the POS terminal, determining whether the files in the deletion notification list are stored in the POS terminal, and if stored, then deleting said files, and if not, then automatically ignoring the deletion notification; and an update download method: determining whether an original file that is the same as the file to be downloaded is stored in the POS terminal; if stored, then comparing the file versions, and if the version of the original file is lower, then downloading the file to be downloaded, and if not, then automatically deleting the file to be downloaded from the download list; and if not stored, then directly downloading the file to be downloaded. The present invention simplifies and speeds up POS terminal upgrade maintenance, and ensures more reliable operation after upgrade.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Chen, Qingbin
Wang, Bin
Abrégé
A method and system for maintaining software package dependency. The method comprises: analyzing a library required by a target program; allocating a version number to an interface of the library; acquiring software package information of interface dependency; associating the version number of the interface and the software package information to generate dependency; acquiring the version number of the interface required by the target program to obtain a first version number; and adding, into a dependency file, dependency corresponding to the first version number. The method is utilized to automatically maintain software package dependency information of an interface of a target program, and implement automatic acquisition of a dependent software package of the target program.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Li, Dengxi
Hu, Liguo
Abrégé
An intelligent charging method and system, relating to the field of electronic device charging. The method comprises: acquiring a zero-load voltage of a charger; pre-setting a first voltage threshold and a second voltage threshold, the first voltage threshold and the second voltage threshold both being lower than the zero-load voltage of the charger and the second voltage threshold being greater than the first voltage threshold; acquiring a real-time voltage of the charger; comparing the first voltage threshold, the second voltage threshold, and the real-time voltage, so as to obtain comparison results; controlling different current outputs according to the comparison results. Dynamic adjustment may be automatically carried out on a charging solution according to the charging capability of a charger.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Abrégé
The present invention relates to the technical field of payment terminals, and particularly relates to a method and device for facilitating on-site failure tracing and identification of a payment terminal. The method comprises the following steps: pre-configuring a generation format of failure logs; detecting whether a log outputted by a payment terminal contains an identifier of a failure log; and if the log is detected to contain the identifier of a failure log, then storing the failure log on a memory unit. The present invention has advantageous effects in that the method and device for facilitating on-site failure tracing and identification of a payment terminal achieve timely scene conservation of a failure instance by means of formatting output of failure logs, and collecting and storing a failure log on a flash memory by a dedicated failure log back-end server. In this way, the present invention enables acquisition of sufficient information for analysis and problem identification after a failure, and significantly helps early detection and removal of a problem, thus effectively overcoming drawbacks of existing solutions for certain programs.
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p. ex. essais de mise en route
96.
METHOD AND DEVICE FOR IMPROVING RELIABILITY OF NAND FLASH MEMORY
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Abrégé
The present invention relates to the technical field of flash memory, and provides a method and device for improving reliability of a NAND flash memory. The method comprises the following steps: upon receiving an interrupt signal, a NAND controller (13) determining a type of a current operation of a NAND flash memory; if the type indicates a programming operation, then completing the programming operation by employing a capacitor (12), and resetting, by means of the NAND controller (13), the NAND flash memory to terminate the current operation; and if the type indicates a non-programming operation, then resetting, by means of the NAND controller (13), the NAND flash memory to terminate the current operation. The advantageous effect of the method of the present invention is achieving effective prevention of NAND flash data damage caused by a power failure by means of capturing critical operations to be protected, i.e., programming operations, at a power failure, and ensuring completion of the critical operations upon a power failure, thus ensuring data reliability of a terminal employing a NAND flash memory.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Chen, Qingbin
Wang, Bin
Abrégé
Provided in the present invention are a software update method for a terminal having a specific hardware configuration, and device for same. The method comprises: a terminal generating, according to hardware resource configurations thereof, a virtual software package having a one-to-one correspondence relationship with the hardware resource configurations, the virtual software package containing configuration names and configuration information; the terminal sending, to a master computer, a hardware module software package and a virtual module software package; a developer pre-configuring, according to an update software package developed by himself or herself, a dependency relationship with respect to a hardware resource configuration requirement on an operation terminal; sending, to the master computer, an update software package containing names, version information, and a dependency relationship of hardware modules corresponding to the update software package; the master computer determining whether an update software package is available for updating the hardware modules of the terminal; if so, then determining whether the configuration information in the virtual software package of the terminal matches the dependency relationship of the update software package; and if so, then enabling the terminal to acquire the update software package. The present invention enables download of an update software package to be restricted to terminals having a specific hardware configuration, thus ensuring normal operation of software.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Wu, Xuan
Abrégé
A method for improving application security of a payment terminal, and apparatus for same. The method comprises: pre-configuring permissions of an application program, and generating a permission list corresponding to the application program; an issuer digitally signing the application program and the permission list thereof; after a terminal authenticates the digital signature, acquiring the application program and the permission list thereof, and allocating an identifier to the application program; establishing an association relationship of the application program, identifier, and permission list; when the application program calls a function related to a payment operation, the terminal acquiring the identifier of the application program; the terminal acquiring, according to the association relationship, the permission list corresponding to the identifier; and the terminal determining, according to the permission list, whether the application program has the permission to call said function. The method of the present invention establishes, on the basis of coordination between a signing tool, a permission management service, and a device driver back-end service, a permission management mechanism for third-party application programs, thus achieving permission management of third-party applications, and improving payment security of terminals.
G06F 21/52 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
99.
METHOD AND APPARATUS FOR SAFE INPUT OF PASSWORD OF TOUCH DISPLAY SCREEN OF POS MACHINE
A method and apparatus for safe input of a password of a touch display screen of a point of sale (POS) machine, the method for safe input of a password in a touch display screen of a POS machine comprising the following steps: detecting contact with a touch display screen; acquiring coordinate information of a contact point according to the contact; analyzing a key value according to a coordinate of the contact point and storing the key value; sending a display event to the touch display screen; displaying on the touch display screen non-password custom characters of the same quantity as a quantity of display events; and encrypting the key value, and sending a finish event to the touch display screen. Said method may implement soft keyboard-based safe input of a personal password in a touch display screen, thereby saving on costs. In addition, the touch display screen does not have a plaintext personal password display, nor the possibility of obtaining a plaintext personal password by means of various channels, and thus safety of a personal password is guaranteed.
FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD (Chine)
Inventeur(s)
Chen, Feifei
Meng, Luqiang
Abrégé
The present invention relates to the technical field of communications. Provided are a method and system for authorizing conversion of a terminal state. The method for authorizing conversion of a terminal state mainly comprises: a server obtains an authentication account, and determines whether the authentication account has a conversion authority; if yes, the server obtains terminal information and to-be-authenticated data from a terminal; the server encrypts, by using an authentication private key, the to-be-authenticated data so as to generate authentication data, and sends the authentication data to the terminal; and the terminal authenticates the authentication data, and converts a terminal state if the authentication is successful. An application developer can log in by using an authorized account and directly converts a terminal between a using state and a debugging state; the method and the system are simple and convenient, and greatly help the application developer in debugging.