Patents by Inventor LIANG-TE CHIU
LIANG-TE CHIU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11899776Abstract: A method for authenticating a software based on a blockchain implemented in an electronic device. The method includes obtaining a first identification code and a first hash value of a first software; generating a first authentication code; writing the first identification code, the first hash value, and the first authentication code into a blockchain; obtaining a second identification code of a second software to be identified and calculating a second hash value of the second software; determining whether the second hash value of the second software is the same as the first hash value; if the second hash value is the same as the first hash value, generating a second authentication code; determine whether the second authentication code is the same as the first authentication code; and if so determining that the second software is copyrighted.Type: GrantFiled: August 4, 2021Date of Patent: February 13, 2024Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventor: Liang-Te Chiu
-
Publication number: 20230219522Abstract: A method for monitoring internal environment of a vehicle implemented in an electronic device includes detecting environment data of internal of the vehicle, and detecting whether an engine of the vehicle is running; when the engine of the vehicle is running and the environment data does not meet a preset threshold, issuing a first alarm; when the engine of the vehicle is not running, obtaining location information of the vehicle, activating a camera device to capture images or shoot a video of internal of the vehicle, and determining whether at least one living creature is inside the vehicle; when the at least one living creature is inside the vehicle, transmitting the location information, and the images or the video and the environment data to a terminal device; and displaying the location information, the images or the video and the environment data, and issuing a second alarm.Type: ApplicationFiled: January 13, 2023Publication date: July 13, 2023Inventor: LIANG-TE CHIU
-
Publication number: 20220209935Abstract: A file encryption and decryption method used in an electronic device generates a symmetric key and asymmetric keys, according to the number of sharers who are to receive the file. The asymmetric keys comprise public and private keys. An original file is encrypted by the symmetric key to generate a first encrypted file, encrypt the symmetric key with the public key to generate a first ciphertext, calculates an MD5 value of the original file, and calculates a first total length of the MD5 value, the public key, and the first ciphertext. The first total length is taken as a header file of the first encrypted file, the header file, the public key, and the first ciphertext are added to the first encrypted file to generate a second encrypted file, the procedure being repeated for each of the number of sharers.Type: ApplicationFiled: December 18, 2021Publication date: June 30, 2022Inventors: LIANG-TE CHIU, WUN-CING LAI
-
Publication number: 20220198051Abstract: A method of protecting data applied in a computer device is provided. A designated file is encrypted by using a symmetric key to obtain an encrypted file. The symmetric key is encrypted by using a first public key of a first pair of keys and a first ciphertext is obtained. Information related to the designated file is obtained, and the related information of the designated file is uploaded to a blockchain. When decrypting the encrypted file, the related information of the designated file is downloaded from the blockchain to obtain the related information of the designated file. The symmetric key is obtained by decrypting a first ciphertext of the related information by using a first private key of the first pair of keys, and a decrypted file is obtained by decrypting the encrypted file by using the symmetric key.Type: ApplicationFiled: December 16, 2021Publication date: June 23, 2022Inventors: LIANG-TE CHIU, WUN-CING LAI
-
Patent number: 11258583Abstract: A method for storing data establishes a blockchain network, a plurality of data blocks being stored on nodes of the blockchain network. The plurality of data blocks is stored in batches to form a plurality of data segments according to a preset storage period. Each data segment written to the blockchain network is encrypted and newly added data blocks are synchronized with the data blocks which are not stored in the data segment. The newly added data blocks, together with the data blocks not yet stored as the data segment are stored after the commencement of the storage period. A data storage device is also provided.Type: GrantFiled: April 23, 2019Date of Patent: February 22, 2022Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: Liang-Te Chiu, Chi-Jsung Lee
-
Publication number: 20220043899Abstract: A method for authenticating a software based on a blockchain implemented in an electronic device. The method includes obtaining a first identification code and a first hash value of a first software; generating a first authentication code; writing the first identification code, the first hash value, and the first authentication code into a blockchain; obtaining a second identification code of a second software to be identified and calculating a second hash value of the second software; determining whether the second hash value of the second software is the same as the first hash value; if the second hash value is the same as the first hash value, generating a second authentication code; determine whether the second authentication code is the same as the first authentication code; and if so determining that the second software is copyrighted.Type: ApplicationFiled: August 4, 2021Publication date: February 10, 2022Inventor: LIANG-TE CHIU
-
Patent number: 11227051Abstract: A method for detecting computer virus applied in a computing device includes obtaining a list of clean files each with file storage path and calculating a hash value of the file name corresponding to each storage path. An original status list according to the hash value and the storage path is generated, and the original status list is written in to a blockchain network. After the computing device becomes connected to a network and therefore exposed to viruses a second list of the files can be obtained and hash value of the file name is compared to the hash value in the original status list. Differences in hash values are deemed the result of a virus and the user is warned. A computing device and storage medium are also disclosed.Type: GrantFiled: October 30, 2019Date of Patent: January 18, 2022Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventor: Liang-Te Chiu
-
Publication number: 20210383371Abstract: A method of recording transactions of recording trades based on blockchain and implemented in a server causes the server to receive transactions sent by a terminal device, and extract a transaction category, an associated account number, and a transaction status from the transactions. When the transaction is a currency transfer, the server accesses a trading pool and/or a blockchain through a chain node. When target transactions are filtered out from the trading pool and/or the blockchain, the server calculates results of the target transactions and determines whether the transactions are correct, marks the transaction status of correct transactions as a pending chain status, and sends the marked transactions to the terminal device for confirmation. When receiving transaction information as to a successful transaction, the server marks the transaction status of the transactions as confirmed status, packages the transactions into blocks, and transmits the blocks to the blockchain.Type: ApplicationFiled: June 1, 2021Publication date: December 9, 2021Inventor: LIANG-TE CHIU
-
Patent number: 11089018Abstract: A global unique device identification code distribution method includes obtaining a public key and device information of at least one Internet of things (IoT) device after the blockchain node establishes communication with the at least one IoT device, generating a random code and combining the random code with the public key and device information of the at least one IoT device to generate a global unique device identification code, and sending the global unique device identification code to the IoT device and writing the global unique device identification code and the public key of the IoT device as a pair into the blockchain network. The method is implemented in a blockchain node of a blockchain network.Type: GrantFiled: January 24, 2019Date of Patent: August 10, 2021Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: Young-Way Liu, Chi-Jsung Lee, Liang-Te Chiu
-
Publication number: 20200334358Abstract: A method for detecting computer virus applied in a computing device includes obtaining a list of clean files each with file storage path and calculating a hash value of the file name corresponding to each storage path. An original status list according to the hash value and the storage path is generated, and the original status list is written in to a blockchain network. After the computing device becomes connected to a network and therefore exposed to viruses a second list of the files can be obtained and hash value of the file name is compared to the hash value in the original status list. Differences in hash values are deemed the result of a virus and the user is warned. A computing device and storage medium are also disclosed.Type: ApplicationFiled: October 30, 2019Publication date: October 22, 2020Inventor: Liang-Te CHIU
-
Publication number: 20200213084Abstract: A method for storing data establishes a blockchain network, a plurality of data blocks being stored on nodes of the blockchain network. The plurality of data blocks is stored in batches to form a plurality of data segments according to a preset storage period. Each data segment written to the blockchain network is encrypted and newly added data blocks are synchronized with the data blocks which are not stored in the data segment. The newly added data blocks, together with the data blocks not yet stored as the data segment are stored after the commencement of the storage period. A data storage device is also provided.Type: ApplicationFiled: April 23, 2019Publication date: July 2, 2020Inventors: LIANG-TE CHIU, CHI-JSUNG LEE
-
Publication number: 20190386990Abstract: A global unique device identification code distribution method includes obtaining a public key and device information of at least one Internet of things (IoT) device after the blockchain node establishes communication with the at least one IoT device, generating a random code and combining the random code with the public key and device information of the at least one IoT device to generate a global unique device identification code, and sending the global unique device identification code to the IoT device and writing the global unique device identification code and the public key of the IoT device as a pair into the blockchain network. The method is implemented in a blockchain node of a blockchain network.Type: ApplicationFiled: January 24, 2019Publication date: December 19, 2019Inventors: YOUNG-WAY LIU, CHI-JSUNG LEE, LIANG-TE CHIU
-
Patent number: 9904402Abstract: A method for controlling input in a mobile terminal can first set multiple operation modes for the mobile terminal and set multiple relation lists each of which defines a relationship between multiple predetermined functions to be executed in a corresponding operation mode and information regarding multiple predetermined touch operations input in the corresponding operation mode, and switches the operation mode of the mobile terminal among multiple operation modes, and controls the mobile terminal to execute multiple predetermined functions associated with multiple predetermined touch operations applied to a touch screen of the mobile terminal.Type: GrantFiled: May 26, 2015Date of Patent: February 27, 2018Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: Liang-Te Chiu, Chia-Hao Kang, Hsin-Wei Huang, Sheng-Feng Weng, Bing-Ju Tu
-
Publication number: 20160188080Abstract: A method for controlling input in a mobile terminal can first set multiple operation modes for the mobile terminal and set multiple relation lists each of which defines a relationship between multiple predetermined functions to be executed in a corresponding operation mode and information regarding multiple predetermined touch operations input in the corresponding operation mode, and switches the operation mode of the mobile terminal among multiple operation modes, and controls the mobile terminal to execute multiple predetermined functions associated with multiple predetermined touch operations applied to a touch screen of the mobile terminal.Type: ApplicationFiled: May 26, 2015Publication date: June 30, 2016Inventors: LIANG-TE CHIU, CHIA-HAO KANG, HSIN-WEI HUANG, SHENG-FENG WENG, BING-JU TU
-
Patent number: 9338809Abstract: A method for coupling a mobile device with a host computer of a vehicle includes establishing a connection relationship between the mobile device and the host computer, sending an invitation to the mobile device according to the established connection relationship, and coupling the mobile device to the host computer after accepting the invitation. The invitation is sent by the host computer automatically after the host computer is turned on. The mobile device couples to the host computer automatically through a corresponding coupling mechanism after accepting the invitation.Type: GrantFiled: November 24, 2014Date of Patent: May 10, 2016Assignee: HON HAI PRECISION INDUSTRY CO., LTD.Inventors: Liang-Te Chiu, Chia-Hao Kang, Hsin-Wei Huang, Sheng-Feng Weng, Bing-Ju Tu
-
Publication number: 20160105793Abstract: A computer-implemented method for updating a currently active system mode is disclosed. The method includes: receiving, from an electronic device at a mobile phone, a command that requests deactivation of a first mode and activation a second mode in the mobile phone, wherein the first mode is a currently active mode, and each of the first mode and the second mode includes at least one system parameter; determining, at the mobile phone, whether the first mode is consistent with the second; and deactivating, at the mobile phone, the currently active system mode and activating the second if the currently active mode is inconsistent with the second.Type: ApplicationFiled: March 16, 2015Publication date: April 14, 2016Inventors: CHIA-HAO KANG, LIANG-TE CHIU
-
Publication number: 20160105922Abstract: A method for coupling a mobile device with a host computer of a vehicle includes establishing a connection relationship between the mobile device and the host computer, sending an invitation to the mobile device according to the established connection relationship, and coupling the mobile device to the host computer after accepting the invitation. The invitation is sent by the host computer automatically after the host computer is turned on. The mobile device couples to the host computer automatically through a corresponding coupling mechanism after accepting the invitation.Type: ApplicationFiled: November 24, 2014Publication date: April 14, 2016Inventors: LIANG-TE CHIU, CHIA-HAO KANG, HSIN-WEI HUANG, SHENG-FENG WENG, BING-JU TU