Patents by Inventor Chih-Chung Lu

Chih-Chung Lu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080094330
    Abstract: The present invention discloses a structure for storing overdrive image data and a method thereof, which divide image data into non-video data and video data and respectively store them in a non-video data storage region and a video data storage region of a memory unit, wherein the RGB data of the non-video data is directly stored in the video data storage region; the RGB data of the video data is transformed into YCbCr data; via checking a lookup table, the RGB data of the present video data is compared with the RGB data of the preceding frame to obtain overdrive YCbCr data; the YCbCr data and the overdrive YCbCr data are sampled, compressed and synthesized according to a video data compression standard and then stored in the video data storage region. Thereby, the memory space required by the overdrive technology can be reduced.
    Type: Application
    Filed: October 18, 2006
    Publication date: April 24, 2008
    Inventors: Wei-Yeh Sun, Chih-Chung Lu
  • Publication number: 20070291935
    Abstract: An apparatus for supporting advanced encryption standard encryption and decryption combines bytes substitution and inverse bytes substitution operations, and includes first and second matrix operation devices, first and second exclusive-OR operation modules, first and second multiplexers, and a table-look-up device. The first multiplexer selects one from the outputs of the first matrix operation device and first exclusive-OR operation module. The second multiplexer selects one from the outputs of the second matrix operation device and second exclusive-OR operation module. The table-look-up device applies a common look-up table so as to save operation resources. In addition, the elements of the encryption apparatus are connected in a way such that the entire critical paths and complexity are reduced, thus improving the speed of the apparatus.
    Type: Application
    Filed: August 23, 2007
    Publication date: December 20, 2007
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventor: Chih-Chung Lu
  • Patent number: 7236593
    Abstract: An apparatus for encryption and decryption, capable of use in encryption and decryption of advanced encryption standard. Byte substitution operation and inverse byte substitution operation are to be combined. Byte substitution operation can be expressed as y=M*multiplicative_inverse(x)+c while inverse byte substitution operation can be expressed as x=multiplicative_inverse(M?1*(y+c)), wherein M and M?1 are inverse matrix of each other and c is a constant matrix. Since the two equations employ a look-up table, that is, multiplicative_inverse(x), the lookup tables for use in byte substitution and inverse byte substitution operations are to be combined according to the invention so as to lower hardware complexity of the implementation. In addition, main operations of column mixing operation and inverse column mixing operation are to be rearranged to combine the two operations in part, resulting in simplified hardware implementation.
    Type: Grant
    Filed: March 29, 2002
    Date of Patent: June 26, 2007
    Assignee: Industrial Technology Research Institute
    Inventors: Chih-Chung Lu, Shau-Yin Tseng
  • Publication number: 20060010486
    Abstract: A network security active detecting system for connecting to at least one client end and a server end in a network system includes a networking-judging unit for judging whether a networking request of a client end is sent to an authorized network, a security condition detecting unit for determining the security level of the client end after the networking-judging unit confirms the networking request of the client end is sent to the authorized network, a configuration exchange unit for controlling the client and server ends to negotiate for a communication protocol identified during the networking so as to determine a security service routine, a Layer 3 packet process unit for processing packets transmitted between the client end and the server end with the security service routine according to the communication protocol, and a negotiating mechanism for confirming the networking between the client and server ends for releasing system resources.
    Type: Application
    Filed: November 16, 2004
    Publication date: January 12, 2006
    Inventors: Chih-Chung Lu, He-Ren Lin
  • Publication number: 20050149721
    Abstract: A method of speeding up packet filtering that utilizes a search filter in compliance with the rules of the firewall, includes the following steps of presenting a mask characteristic value set in a first hash space with regard to all specific masks in need of being filtered in the firewall rules; presenting a packet characteristic value set in a second hash space with regard to each packet received by the firewall; performing a specific Boolean operation in use of the first and second hash spaces with the same size; and as long as the result of the specific Boolean operation determine that the packet characteristic value set is out of the mask characteristic value set, rapidly allowing the packet to pass through the firewall so as to reduce calculation time of all of the firewall rules, decrease system loading and prevent network congestion.
    Type: Application
    Filed: May 5, 2004
    Publication date: July 7, 2005
    Inventor: Chih-Chung Lu
  • Publication number: 20050149746
    Abstract: A system for actively updating a cryptography module in a security gateway and related method is used in a security gateway, such as a VPN gateway according to an IPSEC protocol, which is connected between at least one user computer system and a network system. The system includes a Web GUI, a module update unit, a defined module unit, and an extended library. A user can easily update or add decryption/encryption modules into the extended library of the gateway through the Web GUI and the module update unit instead of updating the decryption/encryption modules along with the entire kernel firmware. This can reduce the setting time, increase the efficiency of operation, reduce the maintenance cost, and promote the expansion of decryption/encryption modules of the gateway so that network transmission can become much safer.
    Type: Application
    Filed: May 19, 2004
    Publication date: July 7, 2005
    Inventors: Chih-Chung Lu, Hong-Wei Tzeng
  • Publication number: 20040202318
    Abstract: An apparatus for supporting advanced encryption standard encryption and decryption combines bytes substitution and inverse bytes substitution operations, and includes first and second matrix operation devices, first and second exclusive-OR operation modules, first and second multiplexers, and a table-look-up device. The first multiplexer selects one from the outputs of the first matrix operation device and first exclusive-OR operation module. The second multiplexer selects one from the outputs of the second matrix operation device and second exclusive-OR operation module. The table-look-up device applies a common look-up table so as to save operation resources. In addition, the elements of the encryption apparatus are connected in a way such that the entire critical paths and complexity are reduced, thus improving the speed of the apparatus.
    Type: Application
    Filed: May 6, 2004
    Publication date: October 14, 2004
    Inventor: Chih-chung Lu
  • Publication number: 20040125950
    Abstract: The present invention provides a method for protecting public key schemes from timing, power and fault attacks. In general, this is accomplished by implementing critical operations using “branchless” or fixed execution path routines whereby the execution path does not vary in any manner that can reveal new information about the secret key during subsequent operations. More particularly, the present invention provides a modular exponentiation algorithm without any redundant computation so that it can protect the secret key from C safe error attacks. The improved method also provides an algorithm that doesn't have a store operation with non-certain destination so that the secret key is immune from M safe error attacks.
    Type: Application
    Filed: July 8, 2003
    Publication date: July 1, 2004
    Inventors: Sung-Ming Yen, Chih-Chung Lu, Shau-Yin Tseng
  • Publication number: 20030099352
    Abstract: An apparatus for encryption and decryption, capable of use in encryption and decryption of advanced encryption standard. Byte substitution operation and inverse byte substitution operation are to be combined. Byte substitution operation can be expressed as y=M*multiplicative_inverse(x)+c while inverse byte substitution operation can be expressed as x=multiplicative_inverse(M−1*(y+c)), wherein M and M−1 are inverse matrix of each other and c is a constant matrix. Since the two equations employ a look-up table, that is, multiplicative_inverse(x), the lookup tables for use in byte substitution and inverse byte substitution operations are to be combined according to the invention so as to lower hardware complexity of the implementation. In addition, main operations of column mixing operation and inverse column mixing operation are to be rearranged to combine the two operations in part, resulting in simplified hardware implementation.
    Type: Application
    Filed: March 29, 2002
    Publication date: May 29, 2003
    Inventors: Chih-Chung Lu, Shau-Yin Tseng
  • Publication number: 20020172355
    Abstract: There is disclosed a high-performance Booth-encoded Montgomery module for performing the computation of A*B*r−1 (mod N). A Booth encoder is provided for receiving two bits of A to perform a Booth encoding process, so as to produce a Booth code. A multiplicand selector is provided for receiving B and the Booth code so as to select a multiplicand. A first carry propagate adder is provided for adding the output of the multiplicand selector and a previous computation result to output. A multiplexer is provided for receiving four inputs 0, N, 2N, and 3N from a lookup table and selecting one of the inputs to output. A second carry propagate adder is provided for adding the outputs of the first carry propagate adder and the multiplexer to output. A shifter is provided for shifting the output from the second carry propagate adder to right by two bits, so as to produce a computation result.
    Type: Application
    Filed: April 4, 2001
    Publication date: November 21, 2002
    Inventors: Chih-Chung Lu, An-Yeu Wu, Shau-Yin Tseng