METHOD FOR DATA COMMUNICATION AND SYSTEM THEREOF
    1.
    发明申请
    METHOD FOR DATA COMMUNICATION AND SYSTEM THEREOF 有权
    数据通信方法及其系统

    公开(公告)号:US20090119406A1

    公开(公告)日:2009-05-07

    申请号:US11951787

    申请日:2007-12-06

    IPC分类号: G06F15/16

    摘要: The present invention discloses a system and method for data communication. In the system and method for data communication, a part of communication peers in the communication system are assigned as super peers, and each super peer forwards message according to its route table. When a communication peer logs in the system, network information of the logged communication peer is saved in a super peer which is logically closest to the logged communication peer through messages forwarded among every super peer. And when an origination communication peer searches for a destination communication peer, the network information of the destination communication peer is saved in a super peer which is logically closest to the destination communication peer through the message forwarded among every super peer in super peer layer. The origination communication peer establishes connection with the destination communication peer based on the network information of the destination communication peer, and implements the data communication through the connection established.

    摘要翻译: 本发明公开了一种用于数据通信的系统和方法。 在用于数据通信的系统和方法中,通信系统中的通信对等体的一部分被分配为超级对等体,并且每个超级对等体根据其路由表转发消息。 当通信对等体登录系统时,记录的通信对等体的网络信息被保存在通过在每个超级对等体之间转发的消息在逻辑上最接近记录的通信对等体的超级对等体。 当起始通信对等体搜索目的地通信对等体时,通过在超级对等层中的每个超级对等体之间转发的消息,目的地通信对等体的网络信息被保存在逻辑上最接近目的地通信对等体的超级对等体。 始发通信对等体基于目的地通信对等体的网络信息建立与目的地通信对等体的连接,并通过建立的连接实现数据通信。

    Method for data communication and system thereof
    2.
    发明授权
    Method for data communication and system thereof 有权
    数据通信方法及其系统

    公开(公告)号:US07720978B2

    公开(公告)日:2010-05-18

    申请号:US11951787

    申请日:2007-12-06

    IPC分类号: G06F15/16

    摘要: The present invention discloses a system and method for data communication. In the system and method for data communication, a part of communication peers in the communication system are assigned as super peers, and each super peer forwards message according to its route table. When a communication peer logs in the system, network information of the logged communication peer is saved in a super peer which is logically closest to the logged communication peer through messages forwarded among every super peer. And when an origination communication peer searches for a destination communication peer, the network information of the destination communication peer is saved in a super peer which is logically closest to the destination communication peer through the message forwarded among every super peer in super peer layer. The origination communication peer establishes connection with the destination communication peer based on the network information of the destination communication peer, and implements the data communication through the connection established.

    摘要翻译: 本发明公开了一种用于数据通信的系统和方法。 在用于数据通信的系统和方法中,通信系统中的通信对等体的一部分被分配为超级对等体,并且每个超级对等体根据其路由表转发消息。 当通信对等体登录系统时,记录的通信对等体的网络信息被保存在通过在每个超级对等体之间转发的消息在逻辑上最接近记录的通信对等体的超级对等体。 当起始通信对等体搜索目的地通信对等体时,通过在超级对等层中的每个超级对等体之间转发的消息,目的地通信对等体的网络信息被保存在逻辑上最接近目的地通信对等体的超级对等体。 始发通信对等体基于目的地通信对等体的网络信息建立与目的地通信对等体的连接,并通过建立的连接实现数据通信。

    Shoulder-surfing resistant authentication methods and systems

    公开(公告)号:US10956552B2

    公开(公告)日:2021-03-23

    申请号:US15943847

    申请日:2018-04-03

    申请人: Ye Zhu

    发明人: Ye Zhu

    摘要: A shoulder-surfing resistant authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting an interactive virtual environment. During the authentication process, the user enters a passcode by modifying one or more attributes of one or more icons that are presented relative to the interactive environment. Such attributes may include one or more of the type of movement the icons perform, the change in position or visual characteristics of the icons relative to the virtual environment, as well as the removal and/or addition of one or more icons relative to the virtual environment. The entered passcode is then compared with a previously stored or “set” passcode to authenticate the user before granting access to the computing device.

    Leg and foot massage device capable of achieving foot swing
    4.
    发明授权
    Leg and foot massage device capable of achieving foot swing 有权
    足部按摩器能够实现脚踏摆动

    公开(公告)号:US08133192B2

    公开(公告)日:2012-03-13

    申请号:US12219417

    申请日:2008-07-22

    IPC分类号: A61H7/00

    摘要: The present invention relates to a massage device, and more particularly, to a leg and foot massage device capable of achieving foot swing. The device includes an electrical machinery deceleration element, a wobbler machine element and an air inflatable bag massage element. The electrical machinery deceleration element drives the air inflatable bag massage element through the wobbler machine element, and the electrical machinery realizes the one-off deceleration. Therefore mechanical transmission steps are simplified and transmission noise obviously dropped, wobbler machine element cooperates with air inflatable bags' inflation and deflation, generating many kinds of different massage motions and obtaining a comprehensive massage effect on leg and feet muscles and joints.

    摘要翻译: 按摩装置技术领域本发明涉及一种按摩装置,更具体地,涉及能够实现足部摆动的腿部和足部按摩装置。 该装置包括电机减速元件,摇摆机器元件和空气可充气袋按摩元件。 电机减速元件通过摆动机构驱动空气充气袋按摩元件,电机实现一次性减速。 因此机械传动步骤简化,传动噪声明显下降,摆动机构与空气充气袋充气通气配合,产生多种不同的按摩动作,对腿脚肌肉和关节得到全面的按摩效果。

    AUTHENTICATION METHOD FOR A COMPUTING DEVICE USING INTERACTIVE GAME BOARD AND GAME PIECE IMAGES

    公开(公告)号:US20180285551A1

    公开(公告)日:2018-10-04

    申请号:US15943910

    申请日:2018-04-03

    摘要: An authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting a graphical and interactive game board that is used for entering a user's passcode. During the authentication process, the user selects a game board (e.g. chess, checkers, poker, backgammon, etc.) and associated game pieces for presentation on the display. The user then moves one or more game pieces to locations on the game board. Together, the selected game board, selected game pieces, and the movements and/or locations which the game pieces are moved on the game board form an entered passcode. This generated passcode is then compared with a stored passcode to authenticate the user before granting access to the computing device.

    Augmented reality authentication methods and systems

    公开(公告)号:US11182465B2

    公开(公告)日:2021-11-23

    申请号:US16023059

    申请日:2018-06-29

    申请人: Ye Zhu

    发明人: Ye Zhu

    IPC分类号: G06F21/36 G06F3/01 G06T19/00

    摘要: An augmented reality (AR) authentication method and system provides an AR environment that is presented on a display. The AR environment combines real-world object images captured by a camera with computer generated virtual icons. The virtual icons may be “mapped” to the real-world objects, whereupon the real-world objects take on the characteristics of the mapped images. During an authentication process, a user interacts with the AR environment by a variety of techniques to enter their passcode. Such interaction may include physically moving objects in the real-world so that such movement is reflected in the AR environment; controlling the “mapped” real-world objects through user interaction with the AR environment via an input device; and controlling the virtual icons through user interaction with the AR environment via the input device. Accordingly, if the user interacts with the AR environment in a manner that matches their previously “set” passcode the user is authenticated.

    AUTHENTICATION METHODS AND SYSTEMS USING INTERACTIVE THREE-DIMENSIONAL ENVIRONMENTS

    公开(公告)号:US20180285538A1

    公开(公告)日:2018-10-04

    申请号:US15944340

    申请日:2018-04-03

    IPC分类号: G06F21/31 G06T19/00

    摘要: An authentication method and system, includes a display to present interactive three-dimensional (3D) virtual environments. The manner or sequence in which a user interacts with objects in the interactive 3D environment is used to form their passcode. The entered passcode is then compared with a previously stored or “set” passcode to determine whether the user is authenticated and permitted to access content controlled by the authentication process.