Unlock instant, AI-driven research and patent intelligence for your innovation.
Enlarging method for character style displayed on USB KEY (Universal Serial Bus Key) liquid crystal display
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of LCD screen and font, applied in the field of intelligent authentication equipment, can solve the problems of increasing the size of USBKEY, large hardware storage space, increasing product cost, etc., to achieve the effect of good display effect, unchanged cost, and avoid erroneous transactions
Inactive Publication Date: 2012-06-13
天津映壶信息安全有限公司
View PDF9 Cites 1 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Due to the small size of the USBKEY and the small LCD screen installed on it, it is very inconvenient for users with poor eyesight to view it, but the importance of transaction information requires the user to confirm, the smaller display characters, the user's vision The problem and the confirmation of transaction information have formed a contradiction. It can be seen that the traditional 16X16 font cannot meet the needs of users, but using a large font requires a larger hardware storage space, which will not only increase the size of the USB KEY, which is not conducive to portability, but will also increase Product Cost
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0117] The 16×16 dot matrix data of a certain character includes 32 bytes (32 members in a one-dimensional array),
[0122] The process of converting dot matrix data into matrix is as follows: Figure 6 As shown, the first of the first 16 members is 0x10, which is 00010000 after being expanded into binary, arranged vertically according to the high position at the bottom and the low position at the top, and the other 15 members are also expanded and arranged, and the first 16 members are arranged in parallel to form a 8 ×16 matrix. Likewise, the latter 16 members are arranged in parallel to form an 8×16 matrix.
[0123] Two 8×16 matrices are arranged up and down horizontally to form a Figure 6 and...
Embodiment 2
[0132] The 16×16 dot matrix data of a certain character and the process of converting the 16×16 matrix are the same as those in Embodiment 1.
[0133] The built-in magnification factor of the USB KEY is 2, n=1, 2, 3...16, first copy and insert the data of each column in columns 1 to 16 as its adjacent column, and then copy the data of each row in rows 1 to 16 The data is copied and inserted into its adjacent rows, and the 32×32 matrix after column interpolation and row interpolation is completed, such as Figure 10 shown.
[0134]Perform interpolation smoothing in the above 32×32 matrix, the specific process is as follows:
[0135] 1. Read the data of the 4×4 small matrix whose upper left corner is located at (1,1) in the 32×32 matrix. For the 4×4 small matrix, see Figure 11 The data in the box with the black solid line in the middle.
[0136] Perform upper-left and lower-right interpolation (the first interpolation) in the 4×4 small matrix, see the specific process Figu...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to an enlarging method for a character style display on a USB KEY (Universal Serial Bus Key) liquid crystal display. The enlarging method comprises the following steps of: (1) receiving information to be displayed; (2) obtaining 16*16 dot matrix data of a first character; (3) converting the 16*16 dot matrix data of the first character into a 16*16 matrix; (4) reading enlargement times configured by the USB KEY, and carrying out enlargement interpolation process on the 16*16 matrix; (5) when the enlargement times is an integer, carrying out interpolation smooth process on a matrix after the integral times of enlargement interpolation process; and otherwise, continuing the next step; (6) reducing the obtained matrix to be the dot matrix data and inputting the dot matrix data into a cache of the liquid crystal display; and (7) obtaining 16*16 dot matrix data of a next character, and repeating the steps (3)-(6) till the cache of the liquid crystal display is full or submitting the results on the liquid crystal display to be displayed when the processing of all characters of display information is finished. The enlarging method disclosed by the invention has the advantages of automatic finish of an enlargement process, fast speed, good display effect, capability of making a user with poor eyesight clearly watch characters displayed on the liquid crystal display, constant volume of the USB KEY and changeless cost.
Description
technical field [0001] The invention belongs to the technical field of intelligent authentication equipment, in particular to a method for enlarging fonts displayed on a USB KEY liquid crystal screen. Background technique [0002] With the development of network and security technology, online transactions are gradually replacing traditional transaction methods, such as common online banking, securities transactions, payment gateways, etc. The user first inserts the USB KEY into the USB interface of the computer, and then performs selection or input operations according to the prompt information on the computer display screen, and the USB KEY and computer software perform data transmission and verification, including PIN code, encryption and decryption / transaction signature data, etc. There are many potential safety hazards in the process of data transmission and verification, such as interception of keyboard input data, malicious Trojan horse programs, and software tamperi...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.