Abstract:
A key binding method capable of dynamic key generation includes the following steps: (a) dynamically generating key information for an identification-pending device; (b) transforming the key information into an image; and (c) transferring the key information to an object device through reading of the image. Applications of the method are also disclosed.
Abstract:
A server for providing presentity status is adapted to provide the latest status of a presentity to a watcher. The presentity and the watcher are respectively connected to a connection server through a network. The presentity belongs to at least one group, and the watcher also belongs to at least one group. The connection server can detect the latest status of the groups to which the presentity belongs. The server for providing presentity status automatically determines the provision of the status of the presentity to the watcher based on whether the respective authority values of the groups to which the presentity belongs and the respective authority values of the groups to which the watcher belongs satisfy a preset condition. When the preset condition is satisfied, the server for providing presentity status also sends the latest status of other presentities that belong to the same groups as the presentity and that are subscribed to by the watcher to the watcher.
Abstract:
An on-line handwritten Chinese character recognition apparatus based on character shapes uses a reference file for look-up of compressed codes-sequence codes in a conventional input method founded on dismantling by character shapes as reference when comparing character to reduce the number of matching templates required in the on-line handwritten Chinese character recognition system and to lower the time for matching. Input handwritten Chinese characters are dismantled into constituting radicals. Thereafter, with reference to code retrieving rules of the input method, and based on the character composing method of handwritten characters, radicals for comparison are retrieved. Then, the compression formula of the input method is used to compress the codes of the base radicals, and the compressed codes are compared with contents of the input method reference file to obtain the sequence codes of candidate characters. Finally, the final recognized sequence code is decided via further comparison during post-processing. The character that corresponds to the sequence code in a character font file is the recognition result and is outputted.
Abstract:
A backlight module includes a light guide plate, at least one light source, and a light-reflecting plate. The light guide plate includes a light-emitting surface, a bottom surface, a light-incident surface, and a guiding tilt surface. One end of guiding tilt surface and light-emitting surface are intersected at a first boundary, and the other end connects to a top edge of light-incident surface. The guiding tilt surface extends toward a direction of protruding the light-emitting surface. The horizontal distance between the first boundary and light-incident surface is L. The light-reflecting plate is disposed under the bottom surface. When the horizontal distance d between light-incident surface and an end of light-reflecting plate near light-incident surface is less than L, the horizontal distance between a vertical projection of the end on light-emitting surface and first boundary is not more than 0.5 mm. When d is more than L, x is at least 0.5 mm.
Abstract:
A light guide plate includes a main body portion and inclined light guide portions having at least one recess. The main body portion has a first light incident surface, a bottom surface that is adjacent to the first light incident surface, and a light emitting surface that is opposite to the bottom surface. The inclined light guide portions disposed on the main body portion have a second light incident surface and at least one inclined surface. The second light incident surface is connected to the first light incident surface of the main body portion. The inclined surface is connected to the light emitting surface of the main body portion. At least one recess is formed between the inclined light guide portions. In addition, a wedge-shaped body can further be formed between the main body portion and the inclined light guide portions.
Abstract:
A backlight module includes a light guide plate, at least one light source, and a light-reflecting plate. The light guide plate includes a light-emitting surface, a bottom surface, a light-incident surface, and a guiding tilt surface. One end of guiding tilt surface and light-emitting surface are intersected at a first boundary, and the other end connects to a top edge of light-incident surface. The guiding tilt surface extends toward a direction of protruding the light-emitting surface. The horizontal distance between the first boundary and light-incident surface is L. The light-reflecting plate is disposed under the bottom surface. When the horizontal distance d between light-incident surface and an end of light-reflecting plate near light-incident surface is less than L, the horizontal distance between a vertical projection of the end on light-emitting surface and first boundary is not more than 0.5 mm. When d is more than L, x is at least 0.5 mm.
Abstract:
A method for detecting computer viruses includes the following steps: (a) enabling a server device to make statistics of computer virus infection record of a mobile terminal and infection record of all computer viruses in a network so as to obtain infection number rankings of viruses that infected the mobile terminal and all computer viruses in the network, respectively; (b) enabling the server device to generate virus pattern data according to infection number ranking results of the viruses that infected the mobile terminal and all computer viruses in the network; (c) enabling the server device to transmit the virus pattern data to the mobile terminal; (d) enabling the mobile terminal to receive data via the network; and (e) enabling the mobile terminal to detect whether the data is infected by a computer virus with reference to the virus pattern data, and to transmit computer virus infection information to the server device upon detection that the data is infected by a computer virus.