Patents by Inventor Chen-Hwa Song

Chen-Hwa Song has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8957886
    Abstract: A context-showing and power-saving display information converting system and a corresponding apparatus are provided for lowering the power consumption of displaying images on a pixel self-emissive display device. The display information converting system includes a context-showing module and a power-saving conversion module. The context-showing module receives display information that describes the content of an image, wherein the display information includes one or more elements, and each element corresponds to a plurality of pixels displayed by a display device. In addition, the context-showing module determines a relevance of the one or more elements according to the viewing interest of the user. The power-saving conversion module converts the display information in unit of the one or more elements according to the relevance and provides the converted display information to the display device.
    Type: Grant
    Filed: January 13, 2011
    Date of Patent: February 17, 2015
    Assignee: Industrial Technology Research Institute
    Inventors: Tun-Hao You, Yi-Jui Wu, Hsiang-Tsung Kung, Koan-Sin Tan, Chen-Hwa Song, Yi-Jen Yeh
  • Patent number: 8706911
    Abstract: Display information to be displayed by a display device having a power consumption model is converted according to a power-saving conversion model and the power consumption model, such that the power consumption of the display device for displaying the converted display information is lower than that for displaying the original display information.
    Type: Grant
    Filed: January 11, 2011
    Date of Patent: April 22, 2014
    Assignee: Industrial Technology Research Institute
    Inventors: Tun-Hao You, Yi-Jui Wu, Hsiang-Tsung Kung, Koan-Sin Tan, Chen-Hwa Song, Yi-Jen Yeh
  • Publication number: 20120162101
    Abstract: A method for establishing a control response between a portable control device and a controlled device is provided. The portable control device includes a touch interface for receiving control instructions. The control instructions may be issued from a user, who does not have to keep his eyes on the portable control device during control. In an embodiment, the method is applied to a portable control device to remotely control a connected TV, which may include a preview function, so that the user can control the connected TV without keeping his eyes on the portable control device. Response from a preview window on the TV can guide the user to correctly issue his control instructions from the portable control device. The control instructions can be issued by, for example, contacting the touch interface or sliding the touch interface.
    Type: Application
    Filed: May 11, 2011
    Publication date: June 28, 2012
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Chen-Hwa Song, Ching-Sung Li, Hao-Yang Jian
  • Publication number: 20120120114
    Abstract: A graphic object browsing method includes the steps of: providing a Graphical User Interface (GUI) on a display, in which the GUI includes a main displaying area for displaying a plurality of graphic objects; receiving a tilt signal, in which the tilt signal includes a tilt direction and a tilt degree; displaying the plurality of graphic objects sliding on the main displaying area according to the tilt direction of the tilt signal; and controlling the sliding speed of the plurality of graphic objects according to the tilt degree of the tilt signal.
    Type: Application
    Filed: September 21, 2011
    Publication date: May 17, 2012
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Tun Hao YOU, Yi Jen Yeh, Tsung Pin Chiang, Chen Hwa Song
  • Publication number: 20110181628
    Abstract: A context-showing and power-saving display information converting system and a corresponding apparatus are provided for lowering the power consumption of displaying images on a pixel self-emissive display device. The display information converting system includes a context-showing module and a power-saving conversion module. The context-showing module receives display information that describes the content of an image, wherein the display information includes one or more elements, and each element corresponds to a plurality of pixels displayed by a display device. In addition, the context-showing module determines a relevance of the one or more elements according to the viewing interest of the user. The power-saving conversion module converts the display information in unit of the one or more elements according to the relevance and provides the converted display information to the display device.
    Type: Application
    Filed: January 13, 2011
    Publication date: July 28, 2011
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Tun-Hao You, Yi-Jui Wu, Hsiang-Tsung Kung, Koan-Sin Tan, Chen-Hwa Song, Yi-Jen Yeh
  • Publication number: 20110185205
    Abstract: Display information to be displayed by a display device having a power consumption model is converted according to a power-saving conversion model and the power consumption model, such that the power consumption of the display device for displaying the converted display information is lower than that for displaying the original display information.
    Type: Application
    Filed: January 11, 2011
    Publication date: July 28, 2011
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Tun-Hao YOU, Yi-Jui WU, Hsiang-Tsung KUNG, Koan-Sin TAN, Chen-Hwa SONG, Yi-Jen YEH
  • Patent number: 7849314
    Abstract: A method and a system for secure authentication in a wireless network are provided. The method comprises the following steps. First, a network device and a client device of a wireless network authenticate each other with EAP-TLS. Wherein, the network device mentioned above is a gateway or an access point. Then, the network device and the client device generate a TLS master secret jointly. In addition, the method uses a distributed mechanism to prevent the consequences of the failure of a single AAA server, and to alleviate the consequences resulting from a violated network device. Furthermore, the method includes a multiple time digital signature mechanism achieved by performing multiple times of one-way hash operation to enable verification and revocation of certificate.
    Type: Grant
    Filed: April 24, 2006
    Date of Patent: December 7, 2010
    Assignee: Industrial Technology Research Institute
    Inventors: Min-Chih Kao, Ya-Wen Lee, Yi-Shiung Yeh, Chen-Hwa Song
  • Patent number: 7779250
    Abstract: The invention is directed to a method for applying a certificate suitable for a portable telephone belonging to a user, wherein the portable telephone comprises a telephone number. The method comprises steps of generating a user key pair in the portable telephone, wherein the key pair comprises a user public key information and then transmitting an applying packet from the portable telephone to a certificate authority through a switching center by using a short message service, wherein the applying packet comprises at least the user public key information. The user is verified according to the telephone number received by the certificate authority from the switching center. A certificate packet is generated by the certificate authority, wherein the certificate packet comprises at least a serial number and a certificate authority signature. The certificate packet is transmitted to the portable telephone according to the telephone number by using the short message service.
    Type: Grant
    Filed: April 6, 2006
    Date of Patent: August 17, 2010
    Assignee: Industrial Technology Research Institute
    Inventors: Chen-Hwa Song, Chih-Yin Lin, Yau-Deh Tzeng
  • Patent number: 7665138
    Abstract: A detecting method and architecture thereof for malicious codes is provided, which is applicable to a computer system having at least a host. Each host executes at least a process. The method is implemented with a system call interposition module and an analysis module for malicious codes. The system call module intercepts all system calls of process calls and all related arguments of the system calls. The analysis module for malicious codes analyzes the input data of pre-determined system calls, and executes the suspicious malicious codes. Once the same behaviors between the analysis module and the suspicious malicious codes are found, a system-intrusion warning is immediately triggered. The method is not required to maintain huge signature databases, and can detect unknown attack-skills in a manner of high correct rate and low incorrect ruling.
    Type: Grant
    Filed: June 26, 2005
    Date of Patent: February 16, 2010
    Assignee: Industrial Technology Research Institute
    Inventors: Chen-Hwa Song, Ying-Yuan Huang
  • Publication number: 20090157654
    Abstract: Disclosed is directed to a system and method for presenting mixed media. The system at least comprises location component, time component, and event component. Event component provides specified records or incidents. Location component provides specified places or areas. Time component provides specified time or time intervals. Disclosed embodiments create the multi-dimensional information retrieval, which is useful for user to obtain the relevant location and time while inquiring about a specific interesting event. Disclosed embodiments also present the interaction and relation of multi-dimensional information retrieval.
    Type: Application
    Filed: March 21, 2008
    Publication date: June 18, 2009
    Inventors: Chen-Hwa Song, Wen-Hsi Yeh, Chin-Ta Lin, Shih-Fang Chang, Ko-Hsuan Chang, Yi-Jen Yeh
  • Publication number: 20070162742
    Abstract: The invention is directed to a method for applying a certificate suitable for a portable telephone belonging to a user, wherein the portable telephone comprises a telephone number. The method comprises steps of generating a user key pair in the portable telephone, wherein the key pair comprises a user public key information and then transmitting an applying packet from the portable telephone to a certificate authority through a switching center by using a short message service, wherein the applying packet comprises at least the user public key information. The user is verified according to the telephone number received by the certificate authority from the switching center. A certificate packet is generated by the certificate authority, wherein the certificate packet comprises at least a serial number and a certificate authority signature. The certificate packet is transmitted to the portable telephone according to the telephone number by using the short message service.
    Type: Application
    Filed: April 6, 2006
    Publication date: July 12, 2007
    Inventors: Chen-Hwa Song, Chih-Yin Lin, Yau-Deh Tzeng
  • Publication number: 20070162958
    Abstract: A method and a system for secure authentication in a wireless network are provided. The method comprises the following steps. First, a network device and a client device of a wireless network authenticate each other with EAP-TLS. Wherein, the network device mentioned above is a gateway or an access point. Then, the network device and the client device generate a TLS master secret jointly. In addition, the method uses a distributed mechanism to prevent the consequences of the failure of a single AAA server, and to alleviate the consequences resulting from a violated network device. Furthermore, the method includes a multiple time digital signature mechanism achieved by performing multiple times of one-way hash operation to enable verification and revocation of certificate.
    Type: Application
    Filed: April 24, 2006
    Publication date: July 12, 2007
    Inventors: Min-Chih Kao, Ya-Wen Lee, Yi-Shiung Yeh, Chen-Hwa Song
  • Publication number: 20070150481
    Abstract: A file access and management mechanism over Internet, and a method for distributing a file in arbitrary storage spaces and maintaining file security in the storage spaces are introduced herein. In addition, a method for maintaining file availability in the aforementioned storage spaces, a conversion manner between a network address and a virtual storage space address, and an addressing manner for determining addresses for placing file fragments are also introduced. The above storing manner also considers parameters at least including truth, availability, and size for choosing the storage space. And the present invention further provides a method for retrieving and deleting file fragments.
    Type: Application
    Filed: April 12, 2006
    Publication date: June 28, 2007
    Inventors: Chen-Hwa Song, Chih-Yin Lin
  • Publication number: 20060143707
    Abstract: A detecting method and architecture thereof for malicious codes is provided, which is applicable to a computer system having at least a host. Each host executes at least a process. The method is implemented with a system call interposition module and an analysis module for malicious codes. The system call module intercepts all system calls of process calls and all related arguments of the system calls. The analysis module for malicious codes analyzes the input data of pre-determined system calls, and executes the suspicious malicious codes. Once the same behaviors between the analysis module and the suspicious malicious codes are found, a system-intrusion warning is immediately triggered. The method is not required to maintain huge signature databases, and can detect unknown attack-skills in a manner of high correct rate and low incorrect ruling.
    Type: Application
    Filed: June 26, 2005
    Publication date: June 29, 2006
    Inventors: Chen-Hwa Song, Ying-Yuan Huang
  • Patent number: 6658114
    Abstract: A key management method to prevent illegal eavesdropping in a network system. Keys of the network system are divided into several family subkeys and several communication subkeys. A plurality of trusted-key centers are provided for respectively preserving a part of the family subkeys and one of the communication subkeys, and generating a one-way hash value involving the preserved communication subkey and an open information. Each of the trusted-key centers passes the hash value to an eavesdropper according to an authority certificate. Each of the trusted-key centers interchanges the preserved family subkeys according to the authority certificate to obtain a session key which is passed to the eavesdropper. The eavesdropper combines all the hash values from the trusted-key centers to obtain a corresponding communication key which is accompanied by the session key to eavesdrop an authorized communication.
    Type: Grant
    Filed: August 11, 1999
    Date of Patent: December 2, 2003
    Assignee: Industrial Technology Research Institute
    Inventors: Kwo-Jean Farn, Cheng-Tsung Chao, Chi-Kuo Hsu, Chen-Hwa Song