Patents by Inventor Chin-Laung Lei

Chin-Laung Lei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200204373
    Abstract: A network security system includes: a plurality of sub-nodes and an identity authentication device. The identity authentication device is configured to generate an initial dynamic subnet key, and group the sub-nodes into one or more subnets according to the initial dynamic subnet key and at least one preconfigured characteristic parameter. For each subnet of the one or more subnets, the identity authentication device respectively selects a virtual authenticator to manage each of the sub-nodes of each of the subnets. When a new member sub-node joins one subnet of the one or more subnets, each of the sub-nodes existed in the one subnet and the virtual authenticator of the one subnet each input a current version dynamic subnet key into a hash algorithm to update the current version dynamic subnet key for performing a consensus update process.
    Type: Application
    Filed: August 2, 2019
    Publication date: June 25, 2020
    Inventors: Shu-Ping LU, Cheng-Yun HO, Chin-Laung LEI, Szu-Hsien HUANG, Xin-Chen CHEN
  • Patent number: 9378155
    Abstract: A method for processing and verifying remote dynamic data is provided. The method includes providing a radix tree structure having N levels, obtaining and recording N initial values for representing the empty radix tree structure, wherein all nodes at the same level are assigned an identical initial value. When performing a data processing operation to the radix tree structure, determining a first leaf node and calculating and recording the value of each node in a shortest path from the first leaf node to the root node. When performing a verification of a specific data, obtaining a second leaf node corresponding to the specific data, a sibling node of each node in a shortest path from the second leaf node to the root node, and generating a verification result according to a digital signature for verifying the root node, the value of each obtained sibling node, and the specific data.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: June 28, 2016
    Assignee: Acer Incorporated
    Inventors: Yu-Shian Chen, Chin-Laung Lei
  • Patent number: 8909937
    Abstract: An access control system and an access control method thereof are provided. The access control system comprises a handheld device, an access control server and a terminal recording device. The handheld device has a user identification. The access control server is configured to store a user identification set, connect to the handheld device within a first time interval, determine that the user identification is included in the user identification set, generate a one-time password (OTP) seed set, and transmit the OTP seed set to the handheld device. The terminal recording device connects to the handhold device within a second time interval, and performs a two-way identification certification with the handheld device according to the OTP seed set so that the handheld device performs a data access to the terminal recording device after achieving the two-way identification certification.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: December 9, 2014
    Assignee: Institute for Information Industry
    Inventors: He-Ming Ruan, Chin-Laung Lei, Yung-Chih Liu
  • Publication number: 20140130170
    Abstract: An information security audit method used in an information security audit system is provided. The information security audit method comprises the steps outlined below. A normalized weighting of each of a plurality of members of an organization is computed according to a level and at least one feature of each of the members. A plurality of risk evaluation values corresponding to a plurality of audit items are computed and a normalized risk evaluation value of each of the members is further computed according to the risk evaluation values and the normalized weighting. A relation of the normalized risk evaluation value and a plurality of threshold value intervals are determined to dynamically adjust an audit period and/or a number of the audit items according to the relation.
    Type: Application
    Filed: November 27, 2012
    Publication date: May 8, 2014
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Chien-Ting KUO, He-Ming RUAN, Chin-Laung LEI
  • Publication number: 20140108817
    Abstract: A method for processing and verifying remote dynamic data is provided. The method includes providing a radix tree structure having N levels, obtaining and recording N initial values for representing the empty radix tree structure, wherein all nodes at the same level are assigned an identical initial value. When performing a data processing operation to the radix tree structure, determining a first leaf node and calculating and recording the value of each node in a shortest path from the first leaf node to the root node. When performing a verification of a specific data, obtaining a second leaf node corresponding to the specific data, a sibling node of each node in a shortest path from the second leaf node to the root node, and generating a verification result according to a digital signature for verifying the root node, the value of each obtained sibling node, and the specific data.
    Type: Application
    Filed: January 15, 2013
    Publication date: April 17, 2014
    Applicant: ACER INCORPORATED
    Inventors: Yu-Shian Chen, Chin-Laung Lei
  • Publication number: 20130132731
    Abstract: An access control system and an access control method thereof are provided. The access control system comprises a handheld device, an access control server and a terminal recording device. The handheld device has a user identification. The access control server is configured to store a user identification set, connect to the handheld device within a first time interval, determine that the user identification is included in the user identification set, generate a one-time password (OTP) seed set, and transmit the OTP seed set to the handheld device. The terminal recording device connects to the handhold device within a second time interval, and performs a two-way identification certification with the handheld device according to the OTP seed set so that the handheld device performs a data access to the terminal recording device after achieving the two-way identification certification.
    Type: Application
    Filed: December 13, 2011
    Publication date: May 23, 2013
    Inventors: He-Ming Ruan, Chin-Laung Lei, Yung-Chih Liu