Patents by Inventor Chien-Chao Tseng

Chien-Chao Tseng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130132809
    Abstract: The present invention provides a structure and method for widget personalization and widget interaction, wherein user preference keys and user preference values are generated according to user profiles and binding configurations of a plurality of widgets, and wherein the keys and values of a widget are added to URL of the widget, whereby a personalized widget is attained after the widget is reloaded. The setting data of a widget, including a plurality of element values, are stored in a document object model (DOM). When relativities exist between widgets, the related element values are transferred from one widget to other widgets through a transfer module to replace the element values in DOM of the other widgets and update the other widgets.
    Type: Application
    Filed: March 20, 2012
    Publication date: May 23, 2013
    Applicant: NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: CHIEN-CHAO TSENG, YU-HUA LU, CHENG-YUAN HO, YU-CHIEN HUANG
  • Publication number: 20130117437
    Abstract: The present invention is to provide a method for establishing TCP connection according to NAT (Network Address Translation) behaviors, which is applied to a network system having a NBA (NAT Behavior Aware Server) located in the Internet and connected to two NATs in two private networks respectively. The method enables two network devices in the respective private networks to send testing messages to the NBA via the respective NATs. In response, the NBA sends reply messages to each network device to test the behaviors of the NATs respectively. Afterward, each network device generates a test result message according to each behavior of the corresponding NAT and sends the same to the NBA. Based on the test result messages, the NBA selects an optimal traversal technique from candidate traversal techniques, thereby allowing the network devices to respectively and directly traverse the NATs and establish a direct TCP connection therebetween.
    Type: Application
    Filed: January 11, 2012
    Publication date: May 9, 2013
    Applicant: D-Link Corporation
    Inventors: Chien-Chao TSENG, Chia-Liang Lin, Kun-Ying Liu, Cheng-Yuan Ho
  • Patent number: 8427992
    Abstract: The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network.
    Type: Grant
    Filed: July 28, 2010
    Date of Patent: April 23, 2013
    Assignee: National Chiao Tung University
    Inventors: Kuei-Li Huang, Chao-Nan Wu, Jui-Tang Wang, Chien-Chao Tseng
  • Patent number: 8385549
    Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.
    Type: Grant
    Filed: July 19, 2010
    Date of Patent: February 26, 2013
    Assignee: Industrial Technology Research Institute
    Inventors: Jui-Tang Wang, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
  • Publication number: 20120331295
    Abstract: The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps: assigning each member an identification vector containing common group identification vector elements and an individual identification vector element, and generating an authentication vector and an access control vector for each member according to the identification vector; using the identification vector elements to generate public key elements and establish an authentication public key and an access control public key; and using a polynomial and the identification vector to generate a private key. The present invention uses these public keys and private keys, which are generated from the identification vectors, to implement serverless member authentication and data access control, whereby is protected privacy of members and promoted security of communication.
    Type: Application
    Filed: May 15, 2012
    Publication date: December 27, 2012
    Inventors: Chien-Chao TSENG, Tzu-Hsin Ho
  • Patent number: 8289912
    Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: October 16, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Kuei-Li Huang, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng
  • Patent number: 8204066
    Abstract: We propose a method for predicting a port number of a NAT equipment according to results of inquiring a STUN server twice in this invention. A network terminal device A in a private network sends an inquiry packet to the STUN server before and after sending a hole punching request, acquires two endpoint mappings of the NAT equipment used respectively in the two inquiries from the STUN server, and delivers the endpoint mappings to another network terminal device B in another private network through a SIP server. The network terminal device B predicts a range of port numbers of the NAT equipment probably used when the hole punching request was sent, according to the endpoint mappings and a port differential of the NAT equipment, and sends packets to the predicted port numbers sequentially until a response packet is received from the network terminal device A. Hence, a connection channel is established.
    Type: Grant
    Filed: August 27, 2008
    Date of Patent: June 19, 2012
    Assignee: D-Link Corporation
    Inventors: Yi-Wei Chen, Chin-Han Lin, Ying-Dar Lin, Chien-Chao Tseng
  • Publication number: 20120131430
    Abstract: The present invention discloses a multimedia bookmark method and a system thereof. The method of the present invention comprises steps: providing a plurality of digital annotations for an information object; creating a bookmark containing an ordered set organized according to a time relativity, a file relativity or a user-defined attribute of the digital annotations; and presenting the bookmark and the information object corresponding to the bookmark. Thereby, the present invention provides complete, meaningful and multi-aspect bookmarks, enabling users to easily understand and conveniently use the annotations.
    Type: Application
    Filed: April 13, 2011
    Publication date: May 24, 2012
    Applicant: NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: D.J. CHEN, CHEN-YU LEE, LIANG-HSIAO CHAO, SANG-HUE YEN, CHIA-HUNG HSIAO, CHIEN-CHAO TSENG, TI CHUANG CHIANG
  • Patent number: 8060741
    Abstract: A method for operating a wireless communication system including a mobile relay station group, a base station group, and an authentication server, includes: configuring, by the authentication server, group information into the mobile relay station group and the base station group; requesting, by the base station group, group authentication data for the mobile relay station group from the authentication server; and performing authentication between a member of the mobile relay station group and a member of the base station group and generating an authentication key individually by the member of the mobile relay station group and the member of the base station group. Also disclosed is a system for carrying out the method.
    Type: Grant
    Filed: August 13, 2007
    Date of Patent: November 15, 2011
    Assignees: Industrial Technology Research Institute, Telcordia Applied Research Center Taiwan Company
    Inventors: Jui-Tang Wang, Yuan-Ying Hsu, Jen-Shun Yang, Chien-Chao Tseng
  • Patent number: 8059593
    Abstract: A distributed channel allocation method and a wireless mesh network with the same are provided herein. By the distributed channel allocation, interference situations are avoided in a wireless network communication, and the allocated bandwidth can then be fully utilized. Besides, unnecessary depletion of an allocated bandwidth due to the interference can be avoided. By this method, a time division technique is applied for dividing a transmission time of each wireless NIC, and different non-overlapping channels can be assigned to different timeslots. Different from other researches that require a symmetrical number of the NICs between a receiving node and a transmitting node, in this method, a unique wireless NIC may communicate with the wireless NICs. The method provides the feature that the number of the NICs on a certain node can be adjusted to meet a communication requirement, by which the efficiency of a network flow is also significantly improved.
    Type: Grant
    Filed: July 29, 2007
    Date of Patent: November 15, 2011
    Assignee: Industrial Technology Research Institute
    Inventors: Yung-Chien Shih, Jen-Shun Yang, Chien-Chao Tseng
  • Patent number: 8005460
    Abstract: A group authentication method adaptable to a communication system is disclosed. The communication system includes a user group, a serving network, and a home network. The user group includes at least one mobile station. The home network pre-distributes a group authentication key to itself and all the mobile stations in the same user group and generates a mobile station authentication key for each mobile station. The home network generates a group list for recording related information of the user group. The home network has a database for recording the group list. The serving network has a database for recording the group list and a group authentication data received from the home network. The group authentication method includes following steps. The serving network performs an identification action to a mobile station. The communication system performs a full authentication action or a local authentication action according to the result of the identification action.
    Type: Grant
    Filed: February 5, 2008
    Date of Patent: August 23, 2011
    Assignees: Industrial Technology Research Institute, National Chiao Tung University
    Inventors: Yu-Wen Chen, Jui-Tang Wang, Chien-Chao Tseng
  • Patent number: 7996558
    Abstract: A method for routing data, using a stateless routing protocol includes communicating data between a source host and a destination host in a network with a plurality of hosts. Each host in the network has a unique numerical address. The method comprises determining a least common ancestor host of the source host and the destination host using the unique numerical address of each of the source and destination hosts. The data is sent from the source host to the least common ancestor host, and then sent from the least common ancestor host to the destination host. Alternatively, the data can be routed using a stateful routing protocol in which each host records the address of its neighbors and forwards the data to the neighbor host that is closest to the destination host.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: August 9, 2011
    Assignee: Industrial Technology Research Institute
    Inventors: Yuan-Ying Hsu, Jen-Shun Yang, Chien-Chao Tseng
  • Patent number: 7983207
    Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.
    Type: Grant
    Filed: June 16, 2009
    Date of Patent: July 19, 2011
    Assignee: National Chiao Tung University
    Inventors: Jun-Yu Lai, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu
  • Publication number: 20110051644
    Abstract: The present invention discloses a power-efficient backbone-oriented wireless sensor network, a method for constructing the same and a method for repairing the same, wherein energy-rich nodes are used to form backbones linking to a server, and wherein regular nodes having limited energy storage link to the backbones. When one energy-rich node malfunctions, the energy-rich node, which is posterior to the malfunctioning energy-rich node, searches for and links to a linkable neighboring energy-rich node on the backbone. If there is none linkable neighboring energy-rich node, the regular nodes are used to form a temporary tunnel until the malfunctioning energy-rich node has been repaired. The present invention can relieve the influence of hot spots, increase the robustness of the wireless sensor network, and prolong the service life of the wireless sensor network.
    Type: Application
    Filed: July 28, 2010
    Publication date: March 3, 2011
    Applicant: NATIONAL CHIAO TUNG UNIVERSITY
    Inventors: Kuei-Li Huang, Chao-Nan Wu, Jui-Tang Wang, Chien-Chao Tseng
  • Publication number: 20110047382
    Abstract: A method for preparing for handover of an apparatus from a first wireless network to a second, different wireless network, a master session key (MSK) having been generated during establishment of a connectivity of the apparatus to the first wireless network includes detecting signals of the second wireless network. In response thereto, establishing a connectivity of the apparatus to the second wireless network, using a pairwise master key (PMK) derived from the MSK generated during establishment of the connectivity to the first wireless network, one or more encryption keys being derivable from the PMK to support secure communication over the second wireless network.
    Type: Application
    Filed: July 19, 2010
    Publication date: February 24, 2011
    Applicant: Industrial Technology Research Institute
    Inventors: Jui-Tang WANG, Chi-Chung Chen, Kuei-Li Huang, Chien-Chao Tseng, Cheng-Yuan Ho
  • Publication number: 20100260071
    Abstract: The present invention discloses an asymmetric routing method and routing path recovery mechanism. The wireless sensor network environment includes at least a management unit, at least a gateway, and mobile nodes. When joining, each mobile node obtains an unique ID code and, additionally, a depth as the gradient to the management unit. Accordingly, a mobile node sends an uplink packet via a nearby node with lower depth to the management unit; while the management unit transmits a downlink packet to a mobile node by utilizing the source route method. When the parent node of a mobile node is damaged or moves to another position or said mobile node with its sub-tree descendants changes their position together, the uplink routing path is recovered via selecting a nearby node of the sub-tree as relay node and the downlink routing path is recovered via sending a control message to the management unit.
    Type: Application
    Filed: June 16, 2009
    Publication date: October 14, 2010
    Inventors: Jun-Yu LAI, Kuei-Li Huang, Jui-Tang Wang, Chien-Chao Tseng, Chao-Nan Wu
  • Publication number: 20100110963
    Abstract: A wireless communication method for providing zone boundary detection performed by a controller managing communications within a multicast/broadcast service (MBS) zone. The method includes assigning to a boundary paging group a first base station communicating within the MBS zone and near a boundary of the MBS zone. The method further includes transmitting, through a second base station which covers a mobile station, to the mobile station information indicating that the boundary paging group corresponds to locations near the boundary of the MBS zone.
    Type: Application
    Filed: September 30, 2009
    Publication date: May 6, 2010
    Inventors: Kuei-Li HUANG, Jen-Shun Yang, Jui-Tang Wang, Chien-Chao Tseng
  • Patent number: 7649896
    Abstract: The present invention provides a system using label switching techniques to support QoS for mobile ad-hoc networks and its label distributing and switching method. The system includes plural clusters, each having plural mobile nodes. At least one mobile node in a cluster is selected as a routing agent. One routing agent in a cluster is selected as a core routing agent. Each core routing agent is capable of obtaining an unique seed for generating an label L=f(S, i, j)=S×3i×2j to a new LSP, where S is an unique seed that is an unique prime number, except 2 and 3, obtained by the core routing agent, i represents one of different kinds of LSP, and j represents one of different numbers for the same kind of LSP. Through the interconnecting of core routing agents, the virtual backbones can be constructed for bandwidth sharing.
    Type: Grant
    Filed: May 25, 2004
    Date of Patent: January 19, 2010
    Assignee: Industrial Technology Research Institute
    Inventors: Jen-Shun Yang, Pei-Hsuan Wu, Chien-Chao Tseng, Vincent Feng
  • Publication number: 20090323559
    Abstract: We propose a method for predicting a port number of a NAT equipment according to results of inquiring a STUN server twice in this invention. A network terminal device A in a private network sends an inquiry packet to the STUN server before and after sending a hole punching request, acquires two endpoint mappings of the NAT equipment used respectively in the two inquiries from the STUN server, and delivers the endpoint mappings to another network terminal device B in another private network through a SIP server. The network terminal device B predicts a range of port numbers of the NAT equipment probably used when the hole punching request was sent, according to the endpoint mappings and a port differential of the NAT equipment, and sends packets to the predicted port numbers sequentially until a response packet is received from the network terminal device A. Hence, a connection channel is established.
    Type: Application
    Filed: August 27, 2008
    Publication date: December 31, 2009
    Applicant: D-Link Corporation
    Inventors: Yi-Wei Chen, Chin-Han Lin, Ying-Dar Lin, Chien-Chao Tseng
  • Patent number: 7624267
    Abstract: The invention relates to a SIM-based authentication method capable of supporting inter-AP fast handover, which can decrease the number of authentication procedures without negatively influencing the security of the wireless LAN by establishing an encrypted channel for each mobile node and using method 1: an aggressive key pre-distribution and method 2: probe request triggering passive key pre-query technique, thereby reducing the time of inter-AP handover for the mobile node. Furthermore, a re-authentication procedure is started to update the key after the key is used for a long time so as to ensure that the key is safe, thereby effectively achieving a fast and safe wireless LAN environment.
    Type: Grant
    Filed: July 6, 2004
    Date of Patent: November 24, 2009
    Assignee: Industrial Technology Research Institute
    Inventors: Yu-Ren Huang, Jen-Shun Yang, Chien-Chao Tseng, Jui-Tang Wang