Patents by Inventor Hung-Chien Chou

Hung-Chien Chou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11948721
    Abstract: An apparatus includes a laminate, the laminate including a dielectric layer having a first surface and a second surface opposed to the first surface, and a conductive layer forming a circuit element overlying the first surface of the dielectric layer. The apparatus further includes a magnetic layer over the conductive layer. A first edge surface of the magnetic layer is coplanar with a first edge surface of the laminate, and a second edge surface of the magnetic layer is coplanar with a second edge surface of the laminate.
    Type: Grant
    Filed: May 26, 2020
    Date of Patent: April 2, 2024
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Ying-Chuan Kao, Hung-Yu Chou, Dong-Ren Peng, Jun Jie Kuo, Kenji Otake, Chih-Chien Ho
  • Patent number: 10678895
    Abstract: A data input method is implemented by an electronic device that includes a storage component, a display device and a processor. The storage component stores an application to be executed by the processor, in response to user-input selection of the application, to implement the data input method for entering data in an input field displayed on the display device. The data input method includes controlling the display device to display at least one hotkey that is associated with pre-stored data, and in response to user-input interaction associated with the at least one hotkey, entering the pre-stored data in the input field.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: June 9, 2020
    Inventor: Hung-Chien Chou
  • Publication number: 20180332040
    Abstract: A method of login control is to be implemented by an authentication server terminal. The method includes steps of: after receiving a request for connection from a vendor server terminal, generating, storing, and transmitting a reference server identifier to the vendor server terminal; after receiving from a user terminal an encrypted server identifier that results from an encryption performed on the reference server identifier, determining whether a combination of a user-end serial number and the encrypted server identifier is authorized; and when a result of the determination is positive, transmitting a confirmation of authorization and an entry of user data to the vendor server terminal.
    Type: Application
    Filed: May 4, 2018
    Publication date: November 15, 2018
    Inventor: Hung-Chien Chou
  • Publication number: 20180309744
    Abstract: An operation method of a storage device includes: obtaining a user-input password based on input password data received from an electronic device over a preset communication network; when the user-input password matches an access password pre-stored in the storage device, transmitting to the electronic device over the preset communication network a verification code and login information that is pre-stored in the storage device for accessing the storage device over a private communication network; and when an access code received from the electronic device over the private communication network matches the verification code, allowing the electronic device to access a classified storage region over the private communication network.
    Type: Application
    Filed: April 18, 2018
    Publication date: October 25, 2018
    Inventor: Hung-Chien CHOU
  • Publication number: 20180196929
    Abstract: A data input method is implemented by an electronic device that includes a storage component, a display device and a processor. The storage component stores an application to be executed by the processor, in response to user-input selection of the application, to implement the data input method for entering data in an input field displayed on the display device. The data input method includes controlling the display device to display at least one hotkey that is associated with pre-stored data, and in response to user-input interaction associated with the at least one hotkey, entering the pre-stored data in the input field.
    Type: Application
    Filed: October 27, 2017
    Publication date: July 12, 2018
    Inventor: Hung-Chien CHOU
  • Patent number: 9871890
    Abstract: A network authentication method includes: by a user terminal, through execution of an application, connecting to a network server and sending a server verification request to a card device coupled to the user terminal; by the card device, generating a server dynamic link program based on a server verification code, encrypting the server dynamic link program, and transmitting the encrypted server dynamic linking program to the network server through the user terminal; by the user terminal, sending a server code data received from the network server to the card device as generated by the network server based on the server dynamic link program; and by the card device, verifying the network server based on the server code data and the server verification code.
    Type: Grant
    Filed: November 5, 2015
    Date of Patent: January 16, 2018
    Inventor: Hung-Chien Chou
  • Patent number: 9660986
    Abstract: A secure access method for an application (app) program is to be implemented by a secure access device, which includes first authentication data and a first control regulation. The secure access method includes the steps of making a determination as to whether a to-be-authenticated app program, which is executed in an operating system, is provided with the first authentication data and the first control regulation; and, when a result of the determination is negative, identifying the to-be-authenticated app program as an unauthenticated illegitimate app program, and disallowing the illegitimate app program to access a to-be-accessed device.
    Type: Grant
    Filed: January 16, 2015
    Date of Patent: May 23, 2017
    Inventor: Hung-Chien Chou
  • Patent number: 9501236
    Abstract: A data access system includes a storage device, an instruction management device, and a host device. The host device is configured to transmit an access instruction associated with an access operation directed to an intended physical address of the storage device to the instruction management device, which compares the access instruction with a specified instruction list. When the instruction management device determines that the access instruction conforms with an instruction included in the specified instruction list, the instruction management device is configured to generate a modified access instruction associated with an access operation directed to a target physical address that is different from the intended physical address of the storage device.
    Type: Grant
    Filed: September 19, 2014
    Date of Patent: November 22, 2016
    Inventor: Hung-Chien Chou
  • Publication number: 20160149870
    Abstract: A network authentication method includes: by a user terminal, through execution of an application, connecting to a network server and sending a server verification request to a card device coupled to the user terminal; by the card device, generating a server dynamic link program based on a server verification code, encrypting the server dynamic link program, and transmitting the encrypted server dynamic linking program to the network server through the user terminal; by the user terminal, sending a server code data received from the network server to the card device as generated by the network server based on the server dynamic link program; and by the card device, verifying the network server based on the server code data and the server verification code.
    Type: Application
    Filed: November 5, 2015
    Publication date: May 26, 2016
    Inventor: Hung-Chien Chou
  • Publication number: 20150294103
    Abstract: In a method for verifying an input password, a password verifying device coupled between a electronic device and an input device is configured to: in response to a password input request from the electronic device, generating image data associated with a virtual keyboard and transmitting the image data to the electronic device; in response to password data from the electronic device, composing an input password according to the password data; and in response to a password confirm request from the input device, comparing the input password and a preset password stored therein.
    Type: Application
    Filed: April 1, 2015
    Publication date: October 15, 2015
    Inventor: Hung-Chien Chou
  • Publication number: 20150207792
    Abstract: A secure access method for an application (app) program is to be implemented by a secure access device, which includes first authentication data and a first control regulation. The secure access method includes the steps of making a determination as to whether a to-be-authenticated app program, which is executed in an operating system, is provided with the first authentication data and the first control regulation; and, when a result of the determination is negative, identifying the to-be-authenticated app program as an unauthenticated illegitimate app program, and disallowing the illegitimate app program to access a to-be-accessed device.
    Type: Application
    Filed: January 16, 2015
    Publication date: July 23, 2015
    Inventor: Hung-Chien Chou
  • Publication number: 20150186640
    Abstract: A method for safe data access is to be implemented using a system that may include master and slave processing units and a storage medium. The storage mediummay include a trusted section, a monitored section and a hidden section. Upon execution of an authenticated program file, the slave processing unit generates a current digital fingerprint of the authenticated program file, and compares the current digital fingerprint with an original digital fingerprint. When it is determined that the current digital fingerprint does not correspond with the original digital fingerprint, the slave processing unit inspects an access record that is associated with the authenticated program file and moves the authenticated program file and any program file recorded in the access record thus inspected to the monitored section.
    Type: Application
    Filed: December 29, 2014
    Publication date: July 2, 2015
    Inventor: Hung-Chien CHOU
  • Publication number: 20150089174
    Abstract: A data access system includes a storage device, an instruction management device, and a host device. The host device is configured to transmit an access instruction associated with an access operation directed to an intended physical address of the storage device to the instruction management device, which compares the access instruction with a specified instruction list. When the instruction management device determines that the access instruction conforms with an instruction included in the specified instruction list, the instruction management device is configured to generate a modified access instruction associated with an access operation directed to a target physical address that is different from the intended physical address of the storage device.
    Type: Application
    Filed: September 19, 2014
    Publication date: March 26, 2015
    Inventor: Hung-Chien Chou
  • Patent number: 8973145
    Abstract: An antivirus computing system includes: a storage device having an operating partition that has stored therein a to-be-scanned file, and a hidden partition that has stored therein a virus code; and an antivirus device operatively associated with the storage device, and configured to perform a virus scan on the to-be-scanned file in the operating partition based on the virus code in the hidden partition.
    Type: Grant
    Filed: April 19, 2012
    Date of Patent: March 3, 2015
    Inventor: Hung-Chien Chou
  • Publication number: 20140201016
    Abstract: A portable electronic device is provided for conducting an electronic transaction with a point-of-sale (POS) terminal, and includes a device processor, and a memory card module. The memory card module includes a transceiver unit to receive transaction data from the POS terminal, a storage unit including a working zone and a hidden zone that stores the transaction data, and a processing unit. The transaction data stored in the hidden zone is accessible only to the processing unit. The processing unit is responsive to control by the device processor that executes a read-only control application stored in the working zone for accessing the transaction data stored in the hidden zone.
    Type: Application
    Filed: January 13, 2014
    Publication date: July 17, 2014
    Inventor: Hung-Chien Chou
  • Publication number: 20140177831
    Abstract: A key protecting method includes the steps of: in response to receipt of an access request, configuring a control application program to generate a key confirmation request; in response to receipt of the key confirmation request, configuring a key protecting device to generate a key input request to prompt a user for a key input; upon receipt of the key input, the key protecting device determining if the key input matches a predefined key preset therein; the key protecting device entering an execution mode if it is determined that the key input matches the predefined key; and the key protecting device entering a failure mode if it is determined that the key input does not match the predefined key.
    Type: Application
    Filed: February 25, 2014
    Publication date: June 26, 2014
    Inventor: Hung-Chien Chou
  • Publication number: 20120304264
    Abstract: A key protecting method includes the steps of: (a) in response to receipt of an access request, configuring a control application program module to generate a key confirmation request; (b) in response to receipt of the key confirmation request, configuring a hardware control module to generate, via the control application program module, a key input request to prompt a user for a key input; (c) upon receipt of the key input, configuring the hardware control module to determine if the key input matches a predefined key preset in the hardware control module; (d) configuring the hardware control module to enter an execution mode if it is determined in step (c) that the key input matches the predefined key; and (e) configuring the hardware control module to enter a failure mode if it is determined in step (c) that the key input does not match the predefined key.
    Type: Application
    Filed: July 26, 2012
    Publication date: November 29, 2012
    Inventor: Hung-Chien CHOU
  • Publication number: 20120272321
    Abstract: An antivirus computing system includes: a storage device having an operating partition that has stored therein a to-be-scanned file, and a hidden partition that has stored therein a virus code; and an antivirus device operatively associated with the storage device, and configured to perform a virus scan on the to-be-scanned file in the operating partition based on the virus code in the hidden partition.
    Type: Application
    Filed: April 19, 2012
    Publication date: October 25, 2012
    Inventor: Hung-Chien Chou
  • Patent number: 7856687
    Abstract: An adjustable pillow device includes a base adapted to be disposed on a supporting surface, a pillow unit disposed above the base and movable vertically relative to the base, and an adjustable supporting unit mounted on the base, disposed between the base and the pillow unit and operable so as to support the pillow unit in a desired state.
    Type: Grant
    Filed: April 30, 2009
    Date of Patent: December 28, 2010
    Inventor: Hung-Chien Chou
  • Publication number: 20100270871
    Abstract: An electric generating system includes a vehicle having at least two mechanical components which are capable of reciprocating movements relative to each other; and an electric generator connected to the mechanical components and including a magnet unit and a conductor winding unit. The reciprocating movements include an interaction of the conductor winding unit and magnetic flux lines of the magnet unit to generate electricity. The electricity can be produced from vibration energy induced by shock.
    Type: Application
    Filed: November 12, 2009
    Publication date: October 28, 2010
    Inventor: Hung-Chien Chou