Patents by Inventor Ko-Cheng Fang
Ko-Cheng Fang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11953828Abstract: Provided is a method of making a circuit pattern. The method includes: Step (A): providing a master substrate comprising a first photosensitive layer containing photosensitive particles; Step (B): providing an energy beam to reduce metal ions in a predetermined area of the first photosensitive layer to form multiple first metal particles; Step (C): removing unreduced photosensitive particles by a fixer to obtain a master mask; wherein the first metal particles form a first predetermined pattern in the master mask; Step (D): providing a chip comprising a second photosensitive layer containing second photosensitive particles; Step (E): putting the master mask on the second photosensitive layer and providing an energy beam to reduce metal ions of an uncovered part of the second photosensitive layer to form multiple atomized second metal particles; Step (F): removing unreduced photosensitive particles by a fixer to obtain the circuit pattern having line spacing at picoscopic/nanoscopic scale.Type: GrantFiled: February 9, 2021Date of Patent: April 9, 2024Assignee: LONGSERVING TECHNOLOGY CO., LTDInventor: Ko-Cheng Fang
-
Publication number: 20220229363Abstract: Provided is a method of making a circuit pattern. The method includes: Step (A): providing a master substrate comprising a first photosensitive layer containing photosensitive particles; Step (B): providing an energy beam to reduce metal ions in a predetermined area of the first photosensitive layer to form multiple first metal particles; Step (C): removing unreduced photosensitive particles by a fixer to obtain a master mask; wherein the first metal particles form a first predetermined pattern in the master mask; Step (D): providing a chip comprising a second photosensitive layer containing second photosensitive particles; Step (E): putting the master mask on the second photosensitive layer and providing an energy beam to reduce metal ions of an uncovered part of the second photosensitive layer to form multiple atomized second metal particles; Step (F): removing unreduced photosensitive particles by a fixer to obtain the circuit pattern having line spacing at picoscopic/nanoscopic scale.Type: ApplicationFiled: February 9, 2021Publication date: July 21, 2022Applicant: LONGSERVING TECHNOLOGY CO., LTDInventor: Ko-Cheng FANG
-
Patent number: 10861492Abstract: A multi-bit optical computing system includes an optical source module for generating multi-frequency optical signals. An optical information storage module receives each of the multi-frequency optical signals through an optical path module, and stores them as a plurality of optical information. An optical processing module receives each of the optical information in the optical information storage module via the optical path module according to an external command, generates a plurality of output information, and stores the output information through the optical path module to the optical information storage module.Type: GrantFiled: August 20, 2019Date of Patent: December 8, 2020Inventor: Ko Cheng Fang
-
Publication number: 20200335130Abstract: A multi-bit optical computing system includes an optical source module for generating multi-frequency optical signals. An optical information storage module receives each of the multi-frequency optical signals through an optical path module, and stores them as a plurality of optical information. An optical processing module receives each of the optical information in the optical information storage module via the optical path module according to an external command, generates a plurality of output information, and stores the output information through the optical path module to the optical information storage module.Type: ApplicationFiled: August 20, 2019Publication date: October 22, 2020Inventor: Ko Cheng Fang
-
Patent number: 8705326Abstract: A copy protection method includes the steps of providing an optical storage device having a substrate layer and a data structure layer coated on the substrate layer and containing a set of raw data codes; forming on the data structure layer at least one polarizing layer capable of causing a change in a light beam; and forming on the polarizing layer a scratch protection layer. The polarizing layer is located between the data structure layer and an optical reading device to influence a light beam irradiated thereon by the optical reading device, so that the set of raw data codes being optically accessed is conditionally converted into a different set of physical data codes. By providing the polarizing layer on the optical storage device to change the data codes that can be obtained by the optical reading device, it is able to stop illegal copying of the optical storage device.Type: GrantFiled: May 22, 2013Date of Patent: April 22, 2014Inventor: Ko Cheng Fang
-
Publication number: 20130336102Abstract: A copy protection method includes the steps of providing an optical storage device having a substrate layer and a data structure layer coated on the substrate layer and containing a set of raw data codes; forming on the data structure layer at least one polarizing layer capable of causing a change in a light beam; and forming on the polarizing layer a scratch protection layer. The polarizing layer is located between the data structure layer and an optical reading device to influence a light beam irradiated thereon by the optical reading device, so that the set of raw data codes being optically accessed is conditionally converted into a different set of physical data codes. By providing the polarizing layer on the optical storage device to change the data codes that can be obtained by the optical reading device, it is able to stop illegal copying of the optical storage device.Type: ApplicationFiled: May 22, 2013Publication date: December 19, 2013Inventor: Ko Cheng FANG
-
Publication number: 20120057707Abstract: A method of abolishing unauthorized copying of digital data stored on an optical disc includes the steps of distributing overwrite modules of a copy protection module into a data file that is to be protected against illegal copying, so as to form a copy-protected data file; and writing the copy-protected data file into a non-rewriteable optical storage media. The overwrite modules are respectively located between any two adjacent data blocks of the data file, such that each data block and a following overwrite module together form a group and the copy-protected data file includes a plurality of sequentially arranged groups of data block and overwrite module. With the overwrite modules, data blocks read out by a readout device are repeatedly overwritten by subsequent data blocks in a specified register, so that no data file from the optical storage media will be stored in the specified register and be illegally copied or pirated.Type: ApplicationFiled: August 31, 2011Publication date: March 8, 2012Inventor: Ko Cheng FANG
-
Patent number: 8060933Abstract: This computer data protection method of the present invention requires a user to enter a correct password for modifying any data. If wrong passwords are typed, this method forbids modification of any program modules. Further, if any program module is detected having unauthenticated modification, that program module is deleted and an original image of that program module is loaded to recover normal operation of the operation system. Additionally, a common password is also provided in the protection method. Some special function can use this common password to pass the detection of this method to perform any modification.Type: GrantFiled: February 9, 2005Date of Patent: November 15, 2011Inventor: Ko-Cheng Fang
-
Patent number: 7930745Abstract: A network security system and method for reacting to unauthorized data access in an inner data system by combining a redirect system is described. The examples of the redirect system include modified firewalls, IP sharing devices and gateways with examining mechanism. A user request is transmitted to the inner data system via the redirect system if the user request satisfies a certain safety condition. Otherwise, the user request is transmitted to a reaction system which provides virtual data similar to real data so that unauthorized users have the illusion of successfully hacking the inner data system. Meanwhile, the illegal activities are recorded and certain programs like Trojan programs can be used for executing reactions.Type: GrantFiled: April 28, 2003Date of Patent: April 19, 2011Inventor: Ko-Cheng Fang
-
Publication number: 20090051757Abstract: A video information apparatus for displaying a ring-filed image is composed of computer system and display apparatus. The computer system is composed of the master control system and at least a controlled system. The master control system separates the ring-filed image into plural visual angle images, and the controlled system is electrically connected to the master control system to process these visual angle images. The display apparatus is electrically connected to the computer system to display the ring-filed image.Type: ApplicationFiled: April 3, 2006Publication date: February 26, 2009Inventor: Ko-Cheng Fang
-
Publication number: 20070063823Abstract: A burglarproof apparatus is provided, wherein the apparatus includes a processing means and a transceiver, and the transceiver is connected to and used for controlling an engine. The processing means and the transceiver are connected without any wires, and the processing means is used to transmit signals to the transceiver for controlling the engine. In addition, the processing means is identified by an identification code. By using the identification code, a user can control the processing means to set a password, after which when the user inputs the password to the processing means, the user can use the processing means to start the engine. On the other hand, if an incorrect password is input into the processing means, the engine cannot be started by the processing means.Type: ApplicationFiled: September 20, 2005Publication date: March 22, 2007Inventor: Ko-Cheng Fang
-
Publication number: 20060041757Abstract: This computer data protection method of the present invention requires a user to enter a correct password for modifying any data. If wrong passwords are typed, this method forbids modification of any program modules. Further, if any program module is detected having unauthenticated modification, that program module is deleted and an original image of that program module is loaded to recover normal operation of the operation system. Additionally, a common password is also provided in the protection method. Some special function can use this common password to pass the detection of this method to perform any modification.Type: ApplicationFiled: February 9, 2005Publication date: February 23, 2006Inventor: Ko-Cheng Fang
-
Publication number: 20060041940Abstract: This computer data protection method of the present invention requires a user to enter a correct password for modifying any data. If wrong passwords are typed, this method forbids modification of any program modules. Further, if any program module is detected having unauthenticated modification, that program module is deleted and an original image of that program module is loaded to recover normal operation of the operation system. Additionally, a common password is also provided in the protection method. Some special function can use this common password to pass the detection of this method to perform any modification.Type: ApplicationFiled: August 21, 2004Publication date: February 23, 2006Inventor: Ko-Cheng Fang
-
Patent number: 6847936Abstract: An on-line sales and profit or discount sharing method is executed by a sales center having a web site, and includes: a plan launching step, in which a sales plan is promoted through Internet media and/or conventional media, including goods descriptions, prices, specific time limits for placement of orders, quantities supplied, payment deadlines, discount sharing rules; an order managing step, in which a computer will automatically encode according to when an order was received; an order confirming step, in which orders are validated, removed, and substituted automatically according to the order received; a profit or discount sharing step, in which the profit or discount sharing amount, and/or special sharer amount are determined; and a notification and/or announcement step, in which the profit or discount sharing amount is individually provided and goods are delivered.Type: GrantFiled: January 14, 2002Date of Patent: January 25, 2005Inventor: Ko-Cheng Fang
-
Publication number: 20030208694Abstract: A network security system and method for reacting to unauthorized data access in an inner data system by combining a redirect system is described. The examples of the redirect system include modified firewalls, IP sharing devices and gateways with examining mechanism. A user request is transmitted to the inner data system via the redirect system if the user request satisfies a certain safety condition. Otherwise, the user request is transmitted to a reaction system which provides virtual data similar to real data so that unauthorized users have the illusion of successfully hacking the inner data system. Meanwhile, the illegal activities are recorded and certain programs like Trojan programs can be used for executing reactions.Type: ApplicationFiled: April 28, 2003Publication date: November 6, 2003Inventor: Ko-Cheng Fang
-
Transfer and copy prevention digital recording media protection and master disk manufacturing method
Publication number: 20030149885Abstract: A transfer and copy prevention digital recording media protection and master disk manufacturing method (the digital recording media referring to standard specification recording methods such as CD, VDC, DVD, MO, and flashdisks, etc.), the procedure of which involves the following steps. When digital recording media is press fabricated, an encrypted protection program and various protective schemes that constitute the content are imposed to produced a standard original disks (protected disks with built-in transfer and copy prevention technology). The protection program and protective scheme are not started if such original disks are placed in a conventional player, but play normally. When placed into a computer and read, the encrypted protection program is started and executed, and the disk will play normally if it is not unlawfully transferred and copied.Type: ApplicationFiled: April 3, 2002Publication date: August 7, 2003Applicant: Ko-Cheng FANGInventors: Ko-Cheng Fang, Chun-Chieh Lee -
Publication number: 20030101101Abstract: An on-line sales and profit or discount sharing method is executed by a sales center having a web site, and includes: a plan launching step, in which the sales center promotes a sales plan through Internet media and/or conventional media and puts up a digital promotional literature on the web site, which includes goods descriptions, prices, specific time limits for placement of orders, quantities supplied, payment deadlines, discount sharing rules, and/or fields for filling in of the customer's data; an order managing step, in which after the promotional literature center has received orders in the form of web pages or e-mail, according to the sequence of the orders received by a computer, the computer will automatically encode according to the sequence and the identity data of the customer for confirmation; an order confirming step, in which after the stipulated time limit has expired, those orders for which payments are not made are removed and substituted automatically by others according to the valid ordeType: ApplicationFiled: January 14, 2002Publication date: May 29, 2003Inventor: Ko-Cheng Fang