Patents by Inventor Chen-Hwa Song
Chen-Hwa Song has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8957886Abstract: A context-showing and power-saving display information converting system and a corresponding apparatus are provided for lowering the power consumption of displaying images on a pixel self-emissive display device. The display information converting system includes a context-showing module and a power-saving conversion module. The context-showing module receives display information that describes the content of an image, wherein the display information includes one or more elements, and each element corresponds to a plurality of pixels displayed by a display device. In addition, the context-showing module determines a relevance of the one or more elements according to the viewing interest of the user. The power-saving conversion module converts the display information in unit of the one or more elements according to the relevance and provides the converted display information to the display device.Type: GrantFiled: January 13, 2011Date of Patent: February 17, 2015Assignee: Industrial Technology Research InstituteInventors: Tun-Hao You, Yi-Jui Wu, Hsiang-Tsung Kung, Koan-Sin Tan, Chen-Hwa Song, Yi-Jen Yeh
-
Patent number: 8706911Abstract: Display information to be displayed by a display device having a power consumption model is converted according to a power-saving conversion model and the power consumption model, such that the power consumption of the display device for displaying the converted display information is lower than that for displaying the original display information.Type: GrantFiled: January 11, 2011Date of Patent: April 22, 2014Assignee: Industrial Technology Research InstituteInventors: Tun-Hao You, Yi-Jui Wu, Hsiang-Tsung Kung, Koan-Sin Tan, Chen-Hwa Song, Yi-Jen Yeh
-
Publication number: 20120162101Abstract: A method for establishing a control response between a portable control device and a controlled device is provided. The portable control device includes a touch interface for receiving control instructions. The control instructions may be issued from a user, who does not have to keep his eyes on the portable control device during control. In an embodiment, the method is applied to a portable control device to remotely control a connected TV, which may include a preview function, so that the user can control the connected TV without keeping his eyes on the portable control device. Response from a preview window on the TV can guide the user to correctly issue his control instructions from the portable control device. The control instructions can be issued by, for example, contacting the touch interface or sliding the touch interface.Type: ApplicationFiled: May 11, 2011Publication date: June 28, 2012Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Chen-Hwa Song, Ching-Sung Li, Hao-Yang Jian
-
Publication number: 20120120114Abstract: A graphic object browsing method includes the steps of: providing a Graphical User Interface (GUI) on a display, in which the GUI includes a main displaying area for displaying a plurality of graphic objects; receiving a tilt signal, in which the tilt signal includes a tilt direction and a tilt degree; displaying the plurality of graphic objects sliding on the main displaying area according to the tilt direction of the tilt signal; and controlling the sliding speed of the plurality of graphic objects according to the tilt degree of the tilt signal.Type: ApplicationFiled: September 21, 2011Publication date: May 17, 2012Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Tun Hao YOU, Yi Jen Yeh, Tsung Pin Chiang, Chen Hwa Song
-
Publication number: 20110181628Abstract: A context-showing and power-saving display information converting system and a corresponding apparatus are provided for lowering the power consumption of displaying images on a pixel self-emissive display device. The display information converting system includes a context-showing module and a power-saving conversion module. The context-showing module receives display information that describes the content of an image, wherein the display information includes one or more elements, and each element corresponds to a plurality of pixels displayed by a display device. In addition, the context-showing module determines a relevance of the one or more elements according to the viewing interest of the user. The power-saving conversion module converts the display information in unit of the one or more elements according to the relevance and provides the converted display information to the display device.Type: ApplicationFiled: January 13, 2011Publication date: July 28, 2011Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Tun-Hao You, Yi-Jui Wu, Hsiang-Tsung Kung, Koan-Sin Tan, Chen-Hwa Song, Yi-Jen Yeh
-
Publication number: 20110185205Abstract: Display information to be displayed by a display device having a power consumption model is converted according to a power-saving conversion model and the power consumption model, such that the power consumption of the display device for displaying the converted display information is lower than that for displaying the original display information.Type: ApplicationFiled: January 11, 2011Publication date: July 28, 2011Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Tun-Hao YOU, Yi-Jui WU, Hsiang-Tsung KUNG, Koan-Sin TAN, Chen-Hwa SONG, Yi-Jen YEH
-
Patent number: 7849314Abstract: A method and a system for secure authentication in a wireless network are provided. The method comprises the following steps. First, a network device and a client device of a wireless network authenticate each other with EAP-TLS. Wherein, the network device mentioned above is a gateway or an access point. Then, the network device and the client device generate a TLS master secret jointly. In addition, the method uses a distributed mechanism to prevent the consequences of the failure of a single AAA server, and to alleviate the consequences resulting from a violated network device. Furthermore, the method includes a multiple time digital signature mechanism achieved by performing multiple times of one-way hash operation to enable verification and revocation of certificate.Type: GrantFiled: April 24, 2006Date of Patent: December 7, 2010Assignee: Industrial Technology Research InstituteInventors: Min-Chih Kao, Ya-Wen Lee, Yi-Shiung Yeh, Chen-Hwa Song
-
Patent number: 7779250Abstract: The invention is directed to a method for applying a certificate suitable for a portable telephone belonging to a user, wherein the portable telephone comprises a telephone number. The method comprises steps of generating a user key pair in the portable telephone, wherein the key pair comprises a user public key information and then transmitting an applying packet from the portable telephone to a certificate authority through a switching center by using a short message service, wherein the applying packet comprises at least the user public key information. The user is verified according to the telephone number received by the certificate authority from the switching center. A certificate packet is generated by the certificate authority, wherein the certificate packet comprises at least a serial number and a certificate authority signature. The certificate packet is transmitted to the portable telephone according to the telephone number by using the short message service.Type: GrantFiled: April 6, 2006Date of Patent: August 17, 2010Assignee: Industrial Technology Research InstituteInventors: Chen-Hwa Song, Chih-Yin Lin, Yau-Deh Tzeng
-
Patent number: 7665138Abstract: A detecting method and architecture thereof for malicious codes is provided, which is applicable to a computer system having at least a host. Each host executes at least a process. The method is implemented with a system call interposition module and an analysis module for malicious codes. The system call module intercepts all system calls of process calls and all related arguments of the system calls. The analysis module for malicious codes analyzes the input data of pre-determined system calls, and executes the suspicious malicious codes. Once the same behaviors between the analysis module and the suspicious malicious codes are found, a system-intrusion warning is immediately triggered. The method is not required to maintain huge signature databases, and can detect unknown attack-skills in a manner of high correct rate and low incorrect ruling.Type: GrantFiled: June 26, 2005Date of Patent: February 16, 2010Assignee: Industrial Technology Research InstituteInventors: Chen-Hwa Song, Ying-Yuan Huang
-
Publication number: 20090157654Abstract: Disclosed is directed to a system and method for presenting mixed media. The system at least comprises location component, time component, and event component. Event component provides specified records or incidents. Location component provides specified places or areas. Time component provides specified time or time intervals. Disclosed embodiments create the multi-dimensional information retrieval, which is useful for user to obtain the relevant location and time while inquiring about a specific interesting event. Disclosed embodiments also present the interaction and relation of multi-dimensional information retrieval.Type: ApplicationFiled: March 21, 2008Publication date: June 18, 2009Inventors: Chen-Hwa Song, Wen-Hsi Yeh, Chin-Ta Lin, Shih-Fang Chang, Ko-Hsuan Chang, Yi-Jen Yeh
-
Publication number: 20070162742Abstract: The invention is directed to a method for applying a certificate suitable for a portable telephone belonging to a user, wherein the portable telephone comprises a telephone number. The method comprises steps of generating a user key pair in the portable telephone, wherein the key pair comprises a user public key information and then transmitting an applying packet from the portable telephone to a certificate authority through a switching center by using a short message service, wherein the applying packet comprises at least the user public key information. The user is verified according to the telephone number received by the certificate authority from the switching center. A certificate packet is generated by the certificate authority, wherein the certificate packet comprises at least a serial number and a certificate authority signature. The certificate packet is transmitted to the portable telephone according to the telephone number by using the short message service.Type: ApplicationFiled: April 6, 2006Publication date: July 12, 2007Inventors: Chen-Hwa Song, Chih-Yin Lin, Yau-Deh Tzeng
-
Publication number: 20070162958Abstract: A method and a system for secure authentication in a wireless network are provided. The method comprises the following steps. First, a network device and a client device of a wireless network authenticate each other with EAP-TLS. Wherein, the network device mentioned above is a gateway or an access point. Then, the network device and the client device generate a TLS master secret jointly. In addition, the method uses a distributed mechanism to prevent the consequences of the failure of a single AAA server, and to alleviate the consequences resulting from a violated network device. Furthermore, the method includes a multiple time digital signature mechanism achieved by performing multiple times of one-way hash operation to enable verification and revocation of certificate.Type: ApplicationFiled: April 24, 2006Publication date: July 12, 2007Inventors: Min-Chih Kao, Ya-Wen Lee, Yi-Shiung Yeh, Chen-Hwa Song
-
Publication number: 20070150481Abstract: A file access and management mechanism over Internet, and a method for distributing a file in arbitrary storage spaces and maintaining file security in the storage spaces are introduced herein. In addition, a method for maintaining file availability in the aforementioned storage spaces, a conversion manner between a network address and a virtual storage space address, and an addressing manner for determining addresses for placing file fragments are also introduced. The above storing manner also considers parameters at least including truth, availability, and size for choosing the storage space. And the present invention further provides a method for retrieving and deleting file fragments.Type: ApplicationFiled: April 12, 2006Publication date: June 28, 2007Inventors: Chen-Hwa Song, Chih-Yin Lin
-
Publication number: 20060143707Abstract: A detecting method and architecture thereof for malicious codes is provided, which is applicable to a computer system having at least a host. Each host executes at least a process. The method is implemented with a system call interposition module and an analysis module for malicious codes. The system call module intercepts all system calls of process calls and all related arguments of the system calls. The analysis module for malicious codes analyzes the input data of pre-determined system calls, and executes the suspicious malicious codes. Once the same behaviors between the analysis module and the suspicious malicious codes are found, a system-intrusion warning is immediately triggered. The method is not required to maintain huge signature databases, and can detect unknown attack-skills in a manner of high correct rate and low incorrect ruling.Type: ApplicationFiled: June 26, 2005Publication date: June 29, 2006Inventors: Chen-Hwa Song, Ying-Yuan Huang
-
Patent number: 6658114Abstract: A key management method to prevent illegal eavesdropping in a network system. Keys of the network system are divided into several family subkeys and several communication subkeys. A plurality of trusted-key centers are provided for respectively preserving a part of the family subkeys and one of the communication subkeys, and generating a one-way hash value involving the preserved communication subkey and an open information. Each of the trusted-key centers passes the hash value to an eavesdropper according to an authority certificate. Each of the trusted-key centers interchanges the preserved family subkeys according to the authority certificate to obtain a session key which is passed to the eavesdropper. The eavesdropper combines all the hash values from the trusted-key centers to obtain a corresponding communication key which is accompanied by the session key to eavesdrop an authorized communication.Type: GrantFiled: August 11, 1999Date of Patent: December 2, 2003Assignee: Industrial Technology Research InstituteInventors: Kwo-Jean Farn, Cheng-Tsung Chao, Chi-Kuo Hsu, Chen-Hwa Song