Patents by Inventor Yi-Hung Cheng
Yi-Hung Cheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11996165Abstract: A memory chip includes a first decoding device and a memory device. The first decoding device is configured to generate multiple word line signals. The memory device is configured to generate a third data signal based on a first data signal and a second data signal. The memory device includes a first memory circuit and a second memory circuit. The first memory circuit is configured to generate the first data signal at a first node according to the word line signals during a first period. The second memory circuit is configured to generate the second data signal at a second node different from the first node according to the word line signals during a second period after the first period. A method of operating a memory chip is also disclosed herein.Type: GrantFiled: May 17, 2022Date of Patent: May 28, 2024Assignee: AU OPTRONICS CORPORATIONInventors: Hsiang-Chi Cheng, Shyh-Bin Kuo, Yi-Cheng Lai, Chung-Hung Chen, Shih-Hsien Yang, Yu-Chih Wang, Kuo-Hsiang Chen
-
Publication number: 20240157063Abstract: A drug delivery device including a main housing and a drug delivery module is provided. The main housing has an internal space. The drug delivery module is disposed in the internal space so as to be isolated from an external environment. The drug delivery module includes a drug bottle that contains a liquid drug and a driver that is connected to the drug bottle. The driver is configured to push the liquid drug to pass through a drug nebulization structure of the drug bottle such that the liquid drug is nebulized into a nebulized drug.Type: ApplicationFiled: November 14, 2023Publication date: May 16, 2024Inventors: Chieh-Sheng Cheng, JUI-SHUI CHEN, YI-HUNG WANG
-
Patent number: 11983475Abstract: A semiconductor device includes: M*1st conductors in a first layer of metallization (M*1st layer) and being aligned correspondingly along different corresponding ones of alpha tracks and representing corresponding inputs of a cell region in the semiconductor device; and M*2nd conductors in a second layer of metallization (M*2nd layer) aligned correspondingly along beta tracks, and the M*2nd conductors including at least one power grid (PG) segment and one or more of an output pin or a routing segment; and each of first and second ones of the input pins having a length sufficient to accommodate at most two access points; each of the access points of the first and second input pins being aligned to a corresponding different one of first to fourth beta tracks; and the PG segment being aligned with one of the first to fourth beta tracks.Type: GrantFiled: February 7, 2023Date of Patent: May 14, 2024Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING COMPANY, LTD.Inventors: Pin-Dai Sue, Po-Hsiang Huang, Fong-Yuan Chang, Chi-Yu Lu, Sheng-Hsiung Chen, Chin-Chou Liu, Lee-Chung Lu, Yen-Hung Lin, Li-Chun Tien, Yi-Kan Cheng
-
Publication number: 20240145691Abstract: The present invention is related to a novel positive electrode active material for lithium-ion battery. The positive electrode active material is expressed by the following formula: Li1.2NixMn0.8-x-yZnyO2, wherein x and y satisfy 0<x?0.8 and 0<y?0.1. In addition, the present invention provides a method of manufacturing the positive electrode active material. The present invention further provides a lithium-ion battery which uses said positive electrode active material.Type: ApplicationFiled: March 14, 2023Publication date: May 2, 2024Inventors: CHUAN-PU LIU, YIN-WEI CHENG, SHIH-AN WANG, BO-LIANG PENG, CHUN-HUNG CHEN, JUN-HAN HUANG, YI-CHANG LI
-
Patent number: 11955460Abstract: In accordance with some embodiments, a package-on-package (PoP) structure includes a first semiconductor package having a first side and a second side opposing the first side, a second semiconductor package having a first side and a second side opposing the first side, and a plurality of inter-package connector coupled between the first side of the first semiconductor package and the first side of the second semiconductor package. The PoP structure further includes a first molding material on the second side of the first semiconductor package. The second side of the second semiconductor package is substantially free of the first molding material.Type: GrantFiled: October 5, 2020Date of Patent: April 9, 2024Assignee: Taiwan Semiconductor Manufacturing Company, Ltd.Inventors: Yi-Da Tsai, Meng-Tse Chen, Sheng-Feng Weng, Sheng-Hsiang Chiu, Wei-Hung Lin, Ming-Da Cheng, Ching-Hua Hsieh, Chung-Shi Liu
-
Patent number: 10091238Abstract: Methods and systems for deception using distributed threat detection are provided. Exemplary methods by an enforcement point, the enforcement point communicatively coupled to a first data network and a second data network, the enforcement point not providing services in the second data network, include: receiving, from a first workload in the second data network, a data packet addressed to a second workload in the second data network, the data packet requesting a service from the second workload; determining the data packet is for unauthorized access of the second workload, the determining using at least some of a 5-tuple of the data packet; identifying a deception point using the service, the deception point being in the first data network and including a decoy for the service; and redirecting the data packet to the deception point in the first data network.Type: GrantFiled: March 2, 2017Date of Patent: October 2, 2018Assignee: vArmour Networks, Inc.Inventors: Choung-Yaw Shieh, Marc Woolward, Zhiping Liu, Cheng-Lin Hou, Matthew M. Williamson, Yi Hung Cheng, Chien Yang Hsu, Hsin Tien Tseng
-
Publication number: 20180191779Abstract: Methods and systems for are provided. Exemplary methods include: getting an image for the application; creating an instance of the application in a container using the image; receiving a network communication, the network communication including an instruction for the application; processing the instruction using the instance; responding to the network communication using the processing; and monitoring behavior from the processing, the monitoring including intercepting library calls, function calls, messages, and events from the container.Type: ApplicationFiled: December 29, 2016Publication date: July 5, 2018Inventors: Choung-Yaw Shieh, Zhiping Liu, Yi Hung Cheng, Chien Yang Hsu, Hsin Tien Tseng
-
Publication number: 20170180421Abstract: Methods and systems for deception using distributed threat detection are provided. Exemplary methods by an enforcement point, the enforcement point communicatively coupled to a first data network and a second data network, the enforcement point not providing services in the second data network, include: receiving, from a first workload in the second data network, a data packet addressed to a second workload in the second data network, the data packet requesting a service from the second workload; determining the data packet is for unauthorized access of the second workload, the determining using at least some of a 5-tuple of the data packet; identifying a deception point using the service, the deception point being in the first data network and including a decoy for the service; and redirecting the data packet to the deception point in the first data network.Type: ApplicationFiled: March 2, 2017Publication date: June 22, 2017Inventors: Choung-Yaw Shieh, Marc Woolward, Zhiping Liu, Cheng-Lin Hou, Matthew M. Williamson, Yi Hung Cheng, Chien Yang Hsu, Hsin Tien Tseng
-
Patent number: 9378369Abstract: File modifications performed by malicious codes are detected by detecting a file modification for an original file before the file modification is performed on the original file. In response to detecting the file modification, a corresponding shadow file is created. The shadow file represents the original file as modified by the file modification. Before allowing the file modification to be performed on the original file, the original file is compared to the shadow file to determine if the file modification is being performed by malicious codes. The file modification may be deemed to be performed by malicious codes when the file modification involves, for example, entry point append, entry point prepend, entry point obfuscation, cavity, overwriting, or mal-tattoo.Type: GrantFiled: December 11, 2012Date of Patent: June 28, 2016Assignee: Trend Micro IncorporatedInventor: Yi-Hung Cheng
-
Patent number: 8443449Abstract: Upon detection of a suspicious file, a client computer sends feedback data to an anti-malware service over the Internet. Files that are not suspicious or that are known clean are not reported; files that are known malware are acted upon immediately without needing to report them to the anti-malware service. Upon detection, no alert or warning is provided to the user of the client computer. The anti-malware service correlates data from other detection engines on the client computer or from other client computers and determines whether the file is malware or not. A new virus pattern is generated if the file is malware and includes the virus signature of the file; the new virus pattern is distributed back to the client computers. If not malware, no action need be taken, or, the virus signature of the file is removed from existing pattern files.Type: GrantFiled: November 9, 2009Date of Patent: May 14, 2013Assignee: Trend Micro, Inc.Inventors: Chi-Huang Fan, Chang-Hsing Ho, Yi-Hung Cheng, Kun-Wei Lee
-
Patent number: 8352522Abstract: File modifications performed by malicious codes are detected by detecting a file modification for an original file before the file modification is performed on the original file. In response to detecting the file modification, a corresponding shadow file is created. The shadow file represents the original file as modified by the file modification. Before allowing the file modification to be performed on the original file, the original file is compared to the shadow file to determine if the file modification is being performed by malicious codes. The file modification may be deemed to be performed by malicious codes when the file modification involves, for example, entry point append, entry point prepend, entry point obfuscation, cavity, overwriting, or mal-tattoo.Type: GrantFiled: September 1, 2010Date of Patent: January 8, 2013Assignee: Trend Micro IncorporatedInventor: Yi-Hung Cheng