Patents by Inventor Shao-Cheng Wang

Shao-Cheng Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130301343
    Abstract: A threshold voltage measurement device is disclosed. The device is coupled to a 6T SRAM. The SRAM comprises two inverters each coupled to a FET. Power terminals of one inverter are in a floating state; the drain and source of the FET coupled to the inverter are short-circuited. Two voltage selectors, a resistor, an amplifier and the SRAM are connected in a negative feedback way. Different bias voltages are applied to the SRAM for measuring threshold voltages of two FETs of the other inverter and the FET coupled to the other inverter. The present invention uses a single circuit to measure the threshold voltages of the three FETs without changing the physical structure of the SRAM. Thereby is accelerated the measurement and decreased the cost of the fabrication process and measurement instruments.
    Type: Application
    Filed: August 29, 2012
    Publication date: November 14, 2013
    Inventors: Ching-Te Chuang, Shyh-Jye Jou, Geng-Cing Lin, Shao-Cheng Wang, Yi-Wei Lin, Ming-Chien Tsai, Wei-Chiang Shih, Nan-Chun Lien, Kuen-Di Lee, Jyun-Kai Chu
  • Patent number: 8582378
    Abstract: A threshold voltage measurement device is disclosed. The device is coupled to a 6T SRAM. The SRAM comprises two inverters each coupled to a FET. Power terminals of one inverter are in a floating state; the drain and source of the FET coupled to the inverter are short-circuited. Two voltage selectors, a resistor, an amplifier and the SRAM are connected in a negative feedback way. Different bias voltages are applied to the SRAM for measuring threshold voltages of two FETs of the other inverter and the FET coupled to the other inverter. The present invention uses a single circuit to measure the threshold voltages of the three FETs without changing the physical structure of the SRAM. Thereby is accelerated the measurement and decreased the cost of the fabrication process and measurement instruments.
    Type: Grant
    Filed: August 29, 2012
    Date of Patent: November 12, 2013
    Assignee: National Chiao Tung University
    Inventors: Ching-Te Chuang, Shyh-Jye Jou, Geng-Cing Lin, Shao-Cheng Wang, Yi-Wei Lin, Ming-Chien Tsai, Wei-Chiang Shih, Nan-Chun Lien, Kuen-Di Lee, Jyun-Kai Chu
  • Publication number: 20130268986
    Abstract: To reduce overloading of broadband networks, unicast streams containing the same live Internet content can be identified. Then unicast streams may be combined into a multicast stream.
    Type: Application
    Filed: March 29, 2012
    Publication date: October 10, 2013
    Inventors: Muthaiah Venkatachalam, Shao-Cheng Wang
  • Publication number: 20130064177
    Abstract: Embodiments of the present disclosure describe methods, apparatuses, and systems for payload header reduction classification for multiprotocol convergence sublayer.
    Type: Application
    Filed: September 8, 2011
    Publication date: March 14, 2013
    Inventors: Muthaiah Venkatachalam, Shantidev Mohanty, Shao-Cheng Wang
  • Publication number: 20110225626
    Abstract: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call.
    Type: Application
    Filed: May 23, 2011
    Publication date: September 15, 2011
    Inventors: Michael J. Covington, Manoj R. Sastry, Farid Adrangi, Deepak J. Manohar, Shao-Cheng Wang
  • Patent number: 7965702
    Abstract: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call.
    Type: Grant
    Filed: March 3, 2006
    Date of Patent: June 21, 2011
    Assignee: Intel Corporation
    Inventors: Michael J. Covington, Manoj R. Sastry, Farid Adrangi, Deepak J. Manohar, Shao-Cheng Wang
  • Publication number: 20070157025
    Abstract: Some embodiments of a method and system for providing secure and reliable collaborative applications are described. In some embodiments, a collaborative application may be separated into critical and non-critical components. The critical components may be run on a secure domain on a virtual machine, apart from the non-critical components, according to some embodiments. Other embodiments are described.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Manoj Sastry, Deepak Manohar, Michael Covington, Farid Adrangi, Shao-Cheng Wang
  • Publication number: 20070153715
    Abstract: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call.
    Type: Application
    Filed: March 3, 2006
    Publication date: July 5, 2007
    Inventors: Michael J. Covington, Manoj R. Sastry, Farid Adrangi, Deepak J. Manohar, Shao-Cheng Wang
  • Publication number: 20070155366
    Abstract: Various methods and apparatuses are described for a portable computing device cooperating with a wireless phone handset. The portable computing device has a first wireless communication module that causes the portable computing device to act as a wireless base station. The portable computing device also has a biometric authentication module to authenticate access rights to applications and data files on the portable computing device based on one or more biometric features of the user of a wireless phone. The wireless phone may be a handset separate from the portable computing device. The wireless phone has a second wireless communication module configured to act as a wireless access device. The wireless phone also has a biometric sensor to convey the biometric features of the user of the wireless phone to the portable computing device.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Deepak Manohar, Michael Covington, Manoj Sastry, Farid Adrangi, Shao-Cheng Wang