Patents by Inventor Chien-Chao Tseng
Chien-Chao Tseng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130132809Abstract: The present invention provides a structure and method for widget personalization and widget interaction, wherein user preference keys and user preference values are generated according to user profiles and binding configurations of a plurality of widgets, and wherein the keys and values of a widget are added to URL of the widget, whereby a personalized widget is attained after the widget is reloaded. The setting data of a widget, including a plurality of element values, are stored in a document object model (DOM). When relativities exist between widgets, the related element values are transferred from one widget to other widgets through a transfer module to replace the element values in DOM of the other widgets and update the other widgets.Type: ApplicationFiled: March 20, 2012Publication date: May 23, 2013Applicant: NATIONAL CHIAO TUNG UNIVERSITYInventors: CHIEN-CHAO TSENG, YU-HUA LU, CHENG-YUAN HO, YU-CHIEN HUANG
-
Publication number: 20130117437Abstract: The present invention is to provide a method for establishing TCP connection according to NAT (Network Address Translation) behaviors, which is applied to a network system having a NBA (NAT Behavior Aware Server) located in the Internet and connected to two NATs in two private networks respectively. The method enables two network devices in the respective private networks to send testing messages to the NBA via the respective NATs. In response, the NBA sends reply messages to each network device to test the behaviors of the NATs respectively. Afterward, each network device generates a test result message according to each behavior of the corresponding NAT and sends the same to the NBA. Based on the test result messages, the NBA selects an optimal traversal technique from candidate traversal techniques, thereby allowing the network devices to respectively and directly traverse the NATs and establish a direct TCP connection therebetween.Type: ApplicationFiled: January 11, 2012Publication date: May 9, 2013Applicant: D-Link CorporationInventors: Chien-Chao TSENG, Chia-Liang Lin, Kun-Ying Liu, Cheng-Yuan Ho
-
Patent number: 8427992Abstract: The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network.Type: GrantFiled: July 28, 2010Date of Patent: April 23, 2013Assignee: National Chiao Tung UniversityInventors: Kuei-Li Huang, Chao-Nan Wu, Jui-Tang Wang, Chien-Chao Tseng
-
Patent number: 8385549Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.Type: GrantFiled: July 19, 2010Date of Patent: February 26, 2013Assignee: Industrial Technology Research InstituteInventors: Jui-Tang Wang, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
-
Publication number: 20120331295Abstract: The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps: assigning each member an identification vector containing common group identification vector elements and an individual identification vector element, and generating an authentication vector and an access control vector for each member according to the identification vector; using the identification vector elements to generate public key elements and establish an authentication public key and an access control public key; and using a polynomial and the identification vector to generate a private key. The present invention uses these public keys and private keys, which are generated from the identification vectors, to implement serverless member authentication and data access control, whereby is protected privacy of members and promoted security of communication.Type: ApplicationFiled: May 15, 2012Publication date: December 27, 2012Inventors: Chien-Chao TSENG, Tzu-Hsin Ho
-
Patent number: 8289912Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.Type: GrantFiled: September 30, 2009Date of Patent: October 16, 2012Assignee: Industrial Technology Research InstituteInventors: Kuei-Li Huang, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng
-
Patent number: 8204066Abstract: We propose a method for predicting a port number of a NAT equipment according to results of inquiring a STUN server twice in this invention. A network terminal device A in a private network sends an inquiry packet to the STUN server before and after sending a hole punching request, acquires two endpoint mappings of the NAT equipment used respectively in the two inquiries from the STUN server, and delivers the endpoint mappings to another network terminal device B in another private network through a SIP server. The network terminal device B predicts a range of port numbers of the NAT equipment probably used when the hole punching request was sent, according to the endpoint mappings and a port differential of the NAT equipment, and sends packets to the predicted port numbers sequentially until a response packet is received from the network terminal device A. Hence, a connection channel is established.Type: GrantFiled: August 27, 2008Date of Patent: June 19, 2012Assignee: D-Link CorporationInventors: Yi-Wei Chen, Chin-Han Lin, Ying-Dar Lin, Chien-Chao Tseng
-
Publication number: 20120131430Abstract: The present invention discloses a multimedia bookmark method and a system thereof. The method of the present invention comprises steps: providing a plurality of digital annotations for an information object; creating a bookmark containing an ordered set organized according to a time relativity, a file relativity or a user-defined attribute of the digital annotations; and presenting the bookmark and the information object corresponding to the bookmark. Thereby, the present invention provides complete, meaningful and multi-aspect bookmarks, enabling users to easily understand and conveniently use the annotations.Type: ApplicationFiled: April 13, 2011Publication date: May 24, 2012Applicant: NATIONAL CHIAO TUNG UNIVERSITYInventors: D.J. CHEN, CHEN-YU LEE, LIANG-HSIAO CHAO, SANG-HUE YEN, CHIA-HUNG HSIAO, CHIEN-CHAO TSENG, TI CHUANG CHIANG
-
Patent number: 8060741Abstract: A method for operating a wireless communication system including a mobile relay station group, a base station group, and an authentication server, includes: configuring, by the authentication server, group information into the mobile relay station group and the base station group; requesting, by the base station group, group authentication data for the mobile relay station group from the authentication server; and performing authentication between a member of the mobile relay station group and a member of the base station group and generating an authentication key individually by the member of the mobile relay station group and the member of the base station group. Also disclosed is a system for carrying out the method.Type: GrantFiled: August 13, 2007Date of Patent: November 15, 2011Assignees: Industrial Technology Research Institute, Telcordia Applied Research Center Taiwan CompanyInventors: Jui-Tang Wang, Yuan-Ying Hsu, Jen-Shun Yang, Chien-Chao Tseng
-
Patent number: 8059593Abstract: A distributed channel allocation method and a wireless mesh network with the same are provided herein. By the distributed channel allocation, interference situations are avoided in a wireless network communication, and the allocated bandwidth can then be fully utilized. Besides, unnecessary depletion of an allocated bandwidth due to the interference can be avoided. By this method, a time division technique is applied for dividing a transmission time of each wireless NIC, and different non-overlapping channels can be assigned to different timeslots. Different from other researches that require a symmetrical number of the NICs between a receiving node and a transmitting node, in this method, a unique wireless NIC may communicate with the wireless NICs. The method provides the feature that the number of the NICs on a certain node can be adjusted to meet a communication requirement, by which the efficiency of a network flow is also significantly improved.Type: GrantFiled: July 29, 2007Date of Patent: November 15, 2011Assignee: Industrial Technology Research InstituteInventors: Yung-Chien Shih, Jen-Shun Yang, Chien-Chao Tseng
-
Patent number: 8005460Abstract: A group authentication method adaptable to a communication system is disclosed. The communication system includes a user group, a serving network, and a home network. The user group includes at least one mobile station. The home network pre-distributes a group authentication key to itself and all the mobile stations in the same user group and generates a mobile station authentication key for each mobile station. The home network generates a group list for recording related information of the user group. The home network has a database for recording the group list. The serving network has a database for recording the group list and a group authentication data received from the home network. The group authentication method includes following steps. The serving network performs an identification action to a mobile station. The communication system performs a full authentication action or a local authentication action according to the result of the identification action.Type: GrantFiled: February 5, 2008Date of Patent: August 23, 2011Assignees: Industrial Technology Research Institute, National Chiao Tung UniversityInventors: Yu-Wen Chen, Jui-Tang Wang, Chien-Chao Tseng
-
Patent number: 7996558Abstract: A method for routing data, using a stateless routing protocol includes communicating data between a source host and a destination host in a network with a plurality of hosts. Each host in the network has a unique numerical address. The method comprises determining a least common ancestor host of the source host and the destination host using the unique numerical address of each of the source and destination hosts. The data is sent from the source host to the least common ancestor host, and then sent from the least common ancestor host to the destination host. Alternatively, the data can be routed using a stateful routing protocol in which each host records the address of its neighbors and forwards the data to the neighbor host that is closest to the destination host.Type: GrantFiled: July 31, 2007Date of Patent: August 9, 2011Assignee: Industrial Technology Research InstituteInventors: Yuan-Ying Hsu, Jen-Shun Yang, Chien-Chao Tseng
-
Patent number: 7983207Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.Type: GrantFiled: June 16, 2009Date of Patent: July 19, 2011Assignee: National Chiao Tung UniversityInventors: Jun-Yu Lai, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu
-
Publication number: 20110051644Abstract: The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network.Type: ApplicationFiled: July 28, 2010Publication date: March 3, 2011Applicant: NATIONAL CHIAO TUNG UNIVERSITYInventors: Kuei-Li Huang, Chao-Nan Wu, Jui-Tang Wang, Chien-Chao Tseng
-
Publication number: 20110047382Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.Type: ApplicationFiled: July 19, 2010Publication date: February 24, 2011Applicant: Industrial Technology Research InstituteInventors: Jui-Tang WANG, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
-
Publication number: 20100260071Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.Type: ApplicationFiled: June 16, 2009Publication date: October 14, 2010Inventors: Jun-Yu LAI, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu
-
Publication number: 20100110963Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.Type: ApplicationFiled: September 30, 2009Publication date: May 6, 2010Inventors: Kuei-Li HUANG, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng
-
Patent number: 7649896Abstract: The present invention provides a system using label switching techniques to support QoS for mobile ad-hoc networks and its label distributing and switching method. The system includes plural clusters, each having plural mobile nodes. At least one mobile node in a cluster is selected as a routing agent. One routing agent in a cluster is selected as a core routing agent. Each core routing agent is capable of obtaining an unique seed for generating an label L=f(S, i, j)=S×3i×2j to a new LSP, where S is an unique seed that is an unique prime number, except 2 and 3, obtained by the core routing agent, i represents one of different kinds of LSP, and j represents one of different numbers for the same kind of LSP. Through the interconnecting of core routing agents, the virtual backbones can be constructed for bandwidth sharing.Type: GrantFiled: May 25, 2004Date of Patent: January 19, 2010Assignee: Industrial Technology Research InstituteInventors: Jen-Shun Yang, Pei-Hsuan Wu, Chien-Chao Tseng, Vincent Feng
-
Publication number: 20090323559Abstract: We propose a method for predicting a port number of a NAT equipment according to results of inquiring a STUN server twice in this invention. A network terminal device A in a private network sends an inquiry packet to the STUN server before and after sending a hole punching request, acquires two endpoint mappings of the NAT equipment used respectively in the two inquiries from the STUN server, and delivers the endpoint mappings to another network terminal device B in another private network through a SIP server. The network terminal device B predicts a range of port numbers of the NAT equipment probably used when the hole punching request was sent, according to the endpoint mappings and a port differential of the NAT equipment, and sends packets to the predicted port numbers sequentially until a response packet is received from the network terminal device A. Hence, a connection channel is established.Type: ApplicationFiled: August 27, 2008Publication date: December 31, 2009Applicant: D-Link CorporationInventors: Yi-Wei Chen, Chin-Han Lin, Ying-Dar Lin, Chien-Chao Tseng
-
Patent number: 7624267Abstract: The invention relates to a SIM-based authentication method capable of supporting inter-AP fast handover, which can decrease the number of authentication procedures without negatively influencing the security of the wireless LAN by establishing an encrypted channel for each mobile node and using method 1: an aggressive key pre-distribution and method 2: probe request triggering passive key pre-query technique, thereby reducing the time of inter-AP handover for the mobile node. Furthermore, a re-authentication procedure is started to update the key after the key is used for a long time so as to ensure that the key is safe, thereby effectively achieving a fast and safe wireless LAN environment.Type: GrantFiled: July 6, 2004Date of Patent: November 24, 2009Assignee: Industrial Technology Research InstituteInventors: Yu-Ren Huang, Jen-Shun Yang, Chien-Chao Tseng, Jui-Tang Wang