Patents by Inventor Chien Fu Lee

Chien Fu Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8667485
    Abstract: A file executing method for executing a computer executable code set stored in a hidden storage area of a storage device in an operating system of a computer host is provided. The method includes connecting the storage device to the computer host and providing a loader for managing the computer executable code set. The method also includes running the loader in a main memory of the computer host, requesting the operating system to allocate a first address segment in the main memory for running the loader, loading the computer executable code set from the hidden storage area into the first address segment by using the loader, transforming the computer executable code set into an executable content of the operation system by using the loader and storing the executable content into the first address segment; and establishing a derivative execution procedure by using the loader to execute the executable content.
    Type: Grant
    Filed: August 17, 2009
    Date of Patent: March 4, 2014
    Assignee: Phison Electronics Corp.
    Inventor: Chien-Fu Lee
  • Publication number: 20140013287
    Abstract: The present disclosure describes an OPC method of preparing data for forming a mask. The method includes setting a plurality of dissection points at the main feature and further includes setting a target point at the main feature. The method includes arranging the two dissection points crossing the main feature symmetrically each other. The method includes separating two adjacent dissection points at one side of the main feature by a maximum resolution of the mask writer. The method includes dividing the main feature into a plurality of segments using the dissection points. The method includes performing an OPC convergence simulation to a target point. The method includes correcting the segments belonging to an ambit of the target point and further includes correcting the segment shared by two ambits.
    Type: Application
    Filed: July 9, 2012
    Publication date: January 9, 2014
    Applicant: TAIWAN SEMICONDUCTOR MANUFACTURING COMPANY, LTD.
    Inventors: Nian-Fuh Cheng, Yu-Po Tang, Chien-Fu Lee, Sheng-Wen Lin, Yong-Cheng Lin, Wen-Chun Huang, Ru-Gun Liu
  • Patent number: 8595418
    Abstract: A memory configuring method for a memory storage apparatus is provided, wherein a rewritable non-volatile memory module of the memory storage apparatus has a plurality of physical blocks. The method includes recording pattern information corresponding to a plurality of various operation system platforms in an initial session table. The method also includes receiving a plurality of handshaking query commands from a host system, identifying a pattern corresponding to the handshaking query commands and recognizing a type of an operation system executed on the host system according the pattern corresponding to the handshaking query commands and the patter information stored in the initial session table. The method further includes configuring the rewritable non-volatile memory module according to the type of the operation system and announcing a configuration of the memory storage apparatus to the host system.
    Type: Grant
    Filed: May 23, 2011
    Date of Patent: November 26, 2013
    Assignee: Phison Electronics Corp.
    Inventor: Chien-Fu Lee
  • Patent number: 8595417
    Abstract: A memory configuring method for a memory storage apparatus is provided, wherein a rewritable non-volatile memory module of the memory storage apparatus has a plurality of physical blocks. The method includes receiving a plurality of query commands from a host system, identifying a pattern corresponding to the query commands and recognizing a type of an operating system executed on the host system. The method further includes configuring the rewritable non-volatile memory module according to the type of the operating system and announcing a configuration of the memory storage apparatus to the host system. Accordingly, the method can configure the non-volatile memory module according different operating systems, and thereby the memory storage apparatus can successfully receive commands and re-set according to user's demand.
    Type: Grant
    Filed: May 23, 2011
    Date of Patent: November 26, 2013
    Assignee: Phison Electronics Corp.
    Inventor: Chien-Fu Lee
  • Publication number: 20130311708
    Abstract: A file protecting method and system and a memory controller and a memory storage apparatus using the same are provided. The file protecting method includes performing a file protection enabling procedure for a file to generate an entry value backup according to at least one entry value corresponding to at least one cluster storing the file, which is recorded in a file allocation document, store the entry value backup in a secure storage area and change the entry value corresponding to the cluster storing the file in the file allocation document, wherein the file cannot be read according to the changed entry value. Accordingly, the file stored in the memory storage apparatus the can be effectively protected from being accessed by an un-authorized person.
    Type: Application
    Filed: July 17, 2012
    Publication date: November 21, 2013
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Publication number: 20130290609
    Abstract: A memory formatting method adapted to a memory storage apparatus is provided. The memory formatting method includes configuring a plurality of logical block addresses to be mapped to a portion of a plurality of physical blocks, generating a first file system data and a second file system data according to the size of the logical block addresses, and storing the first file system data into a first physical block, and the first physical block is mapped to a first logical block address among the logical block addresses. The memory formatting method also includes selecting a second physical block among the physical blocks, storing the second file system data into the second physical block, determining whether a format command is received, and when the format command is received, re-mapping the first logical block address to the second physical block.
    Type: Application
    Filed: July 11, 2012
    Publication date: October 31, 2013
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Patent number: 8561194
    Abstract: A memory storage device, a memory controller, and a virus scanning method are provided. In the method, a virus signature database recording a predetermined file segment and a corresponding virus signature is provided. A plurality of logical addresses is mapped to a part of a plurality of physical addresses in a rewritable non-volatile memory chip of the memory storage device, a host system accesses the logical addresses by using a file system including a file allocation table (FAT). At lease one binary code is received. The FAT is analyzed to identify a file segment containing the at least one binary code. If the file segment matches the predetermined file segment, the at least one binary code is not written into the memory storage device or transmitted back to the host system when the at least one binary code matches the virus signature corresponding to the predetermined file segment.
    Type: Grant
    Filed: May 17, 2011
    Date of Patent: October 15, 2013
    Assignee: Phison Electronics Corp.
    Inventor: Chien-Fu Lee
  • Publication number: 20130080787
    Abstract: A memory storage apparatus including a connector, a rewritable non-volatile memory module and a memory controller is provided. The memory controller receives a password to be verified, transforms the password into a data stream by using a first unit, generates a cipher text to be verified according to a predetermined data stream and the transformed data stream by using a second unit, and determines whether the cipher text to be verified is the same to a predetermined cipher text stored in the rewritable non-volatile memory module. When the cipher text to be verified is the same to the predetermined cipher text, the memory controller identifies that the password to be verified is validated. Accordingly, the memory storage apparatus can effectively verify a password input by a user, thereby protecting data stored in the rewritable non-volatile memory module.
    Type: Application
    Filed: December 19, 2011
    Publication date: March 28, 2013
    Applicant: PHISON ELECTRONICS CORP.
    Inventors: Chien-Fu Lee, Shu-Hua Wang
  • Patent number: 8338960
    Abstract: A method of manufacturing a photomask is described. The graphic data of the photomask are provided, and than an optical proximity correction is performed to the graphic data. A process rule check is then performed to the graphic data with the optical proximity correction. When at least one failed pattern not passing the process rule check is found in the graphic data, a repair procedure is performed only to the failed pattern so that the failed pattern can pass the process rule check. The patterns of the photomask are then formed according to the corrected and repaired graphic data.
    Type: Grant
    Filed: April 2, 2012
    Date of Patent: December 25, 2012
    Assignee: United Microelectronics Corp.
    Inventors: Ling-Chieh Lin, Chien-Fu Lee, I-Hsiung Huang
  • Publication number: 20120254537
    Abstract: A memory configuring method for a memory storage apparatus is provided, wherein a rewritable non-volatile memory module of the memory storage apparatus has a plurality of physical blocks. The method includes recording pattern information corresponding to a plurality of various operation system platforms in an initial session table. The method also includes receiving a plurality of handshaking query commands from a host system, identifying a pattern corresponding to the handshaking query commands and recognizing a type of an operation system executed on the host system according the pattern corresponding to the handshaking query commands and the patter information stored in the initial session table. The method further includes configuring the rewritable non-volatile memory module according to the type of the operation system and announcing a configuration of the memory storage apparatus to the host system.
    Type: Application
    Filed: May 23, 2011
    Publication date: October 4, 2012
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Publication number: 20120254512
    Abstract: A memory configuring method for a memory storage apparatus is provided, wherein a rewritable non-volatile memory module of the memory storage apparatus has a plurality of physical blocks. The method includes receiving a plurality of query commands from a host system, identifying a pattern corresponding to the query commands and recognizing a type of an operating system executed on the host system. The method further includes configuring the rewritable non-volatile memory module according to the type of the operating system and announcing a configuration of the memory storage apparatus to the host system. Accordingly, the method can configure the non-volatile memory module according different operating systems, and thereby the memory storage apparatus can successfully receive commands and re-set according to user's demand.
    Type: Application
    Filed: May 23, 2011
    Publication date: October 4, 2012
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Patent number: 8278762
    Abstract: A method of manufacturing a photomask is described. The graphic data of the photomask are provided, and than an optical proximity correction is performed to the graphic data. A process rule check is then performed to the graphic data with the optical proximity correction. When at least one failed pattern not passing the process rule check is found in the graphic data, a repair procedure is performed only to the failed pattern so that the failed pattern can pass the process rule check. The patterns of the photomask are then formed according to the corrected and repaired graphic data.
    Type: Grant
    Filed: September 28, 2009
    Date of Patent: October 2, 2012
    Assignee: United Microelectronics Corp.
    Inventors: Ling-Chieh Lin, Chien-Fu Lee, I-Hsiung Huang
  • Publication number: 20120240230
    Abstract: A memory storage device, a memory controller, and a virus scanning method are provided. In the method, a virus signature database recording a predetermined file segment and a corresponding virus signature is provided. A plurality of logical addresses is mapped to a part of a plurality of physical addresses in a rewritable non-volatile memory chip of the memory storage device, a host system accesses the logical addresses by using a file system including a file allocation table (FAT). At lease one binary code is received. The FAT is analyzed to identify a file segment containing the at least one binary code. If the file segment matches the predetermined file segment, the at least one binary code is not written into the memory storage device or transmitted back to the host system when the at least one binary code matches the virus signature corresponding to the predetermined file segment.
    Type: Application
    Filed: May 17, 2011
    Publication date: September 20, 2012
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Publication number: 20120187571
    Abstract: A method of manufacturing a photomask is described. The graphic data of the photomask are provided, and than an optical proximity correction is performed to the graphic data. A process rule check is then performed to the graphic data with the optical proximity correction. When at least one failed pattern not passing the process rule check is found in the graphic data, a repair procedure is performed only to the failed pattern so that the failed pattern can pass the process rule check. The patterns of the photomask are then formed according to the corrected and repaired graphic data.
    Type: Application
    Filed: April 2, 2012
    Publication date: July 26, 2012
    Applicant: UNITED MICROELECTRONICS CORP.
    Inventors: Ling-Chieh Lin, Chien-Fu Lee, I-Hsiung Huang
  • Patent number: 8090927
    Abstract: An application executing method for automatically executing an application stored in a storage unit of an external storage device in an operating system (OS) of a computer host is provided. The method includes dividing the storage unit into a first partition and a second partition; emulating the first partition as compact disc-read only memory (CR-ROM); storing a switch program in the first partition; and storing the application in the second partition. The method also includes providing only the first partition to be accessed by the OS and automatically executing the switch program by the OS to decouple and re-couple the external storage device to the computer host. Additionally, the method further includes providing only the second partition to be accessed by the OS and executing the application when the external storage device is re-coupled to the computer host.
    Type: Grant
    Filed: October 2, 2009
    Date of Patent: January 3, 2012
    Assignee: Phison Electronics Corp.
    Inventor: Chien-Fu Lee
  • Publication number: 20110252209
    Abstract: A data access method for writing data into a storage apparatus is provided, wherein the storage apparatus has a storage unit, the storage unit has a partition, the storage property of the partition is set as a write protect mode and the storage apparatus is coupled to a host system having an operation system. The data access method includes transmitting a command from the host system to the storage apparatus through a human interface device path and setting the storage property of the first partition as a writable mode in response the command. The data access method also includes storing data into the partition by using built-in commands of the operation system. Accordingly, the data access method can write data into a partition that has been at the write protect mode when a user logins the operation system with a limited user authority mode.
    Type: Application
    Filed: May 25, 2010
    Publication date: October 13, 2011
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Publication number: 20110202715
    Abstract: A management partitionable storage system, a use method for the management partitionable storage system, a management method and a controller thereof are provided. Herein, whether the management-partitionable storage system is connected into a host is determined. The management-partitionable storage system includes a simulated compact disc (CD) partition and a data storage partition. When the management-partitionable storage system is coupled to the host, the simulated compact disc partition is mounted on a mount point of the host. A command is received from the mount point, wherein the command includes an identification code corresponding to the data storage partition. The command is executed to the data storage partition according to the identification code.
    Type: Application
    Filed: April 13, 2010
    Publication date: August 18, 2011
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Publication number: 20110055513
    Abstract: An application executing method for automatically executing an application stored in a storage unit of an external storage device in an operating system (OS) of a computer host is provided. The method includes dividing the storage unit into a first partition and a second partition; emulating the first partition as compact disc-read only memory (CR-ROM); storing a switch program in the first partition; and storing the application in the second partition. The method also includes providing only the first partition to be accessed by the OS and automatically executing the switch program by the OS to decouple and re-couple the external storage device to the computer host. Additionally, the method further includes providing only the second partition to be accessed by the OS and executing the application when the external storage device is re-coupled to the computer host.
    Type: Application
    Filed: October 2, 2009
    Publication date: March 3, 2011
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Publication number: 20100325180
    Abstract: A file executing method for executing a computer executable code set stored in a hidden storage area of a storage device in an operating system of a computer host is provided. The method includes connecting the storage device to the computer host and providing a loader for managing the computer executable code set. The method also includes running the loader in a main memory of the computer host, requesting the operating system to allocate a first address segment in the main memory for running the loader, loading the computer executable code set from the hidden storage area into the first address segment by using the loader, transforming the computer executable code set into an executable content of the operation system by using the loader and storing the executable content into the first address segment; and establishing a derivative execution procedure by using the loader to execute the executable content.
    Type: Application
    Filed: August 17, 2009
    Publication date: December 23, 2010
    Applicant: PHISON ELECTRONICS CORP.
    Inventor: Chien-Fu Lee
  • Publication number: 20100287616
    Abstract: A controller capable of preventing spread of computer viruses is provided. The controller includes a microprocessor unit, and a first interface unit, a second interface unit, a comparing unit and a filter unit which are coupled to the microprocessor unit. The first interface unit is coupled to a storage medium, and the second interface unit is coupled to a computer host. The comparing unit determines whether data read form the storage medium by the computer host is an automatic executing file. And, the filter unit replaces the read data with a predetermined data and transmit the predetermined data to the computer host when the read data is the automatic executing file. Accordingly, the controller is capable of preventing the spread of the computer viruses designed in an automatic executing file.
    Type: Application
    Filed: July 17, 2009
    Publication date: November 11, 2010
    Applicant: PHISON ELECTRONICS CORP.
    Inventors: Jiunn-Yeong Yang, Chien-Fu Lee, Ming-Chou Wu