Patents by Inventor Shao Cheng

Shao Cheng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8582378
    Abstract: A threshold voltage measurement device is disclosed. The device is coupled to a 6T SRAM. The SRAM comprises two inverters each coupled to a FET. Power terminals of one inverter are in a floating state; the drain and source of the FET coupled to the inverter are short-circuited. Two voltage selectors, a resistor, an amplifier and the SRAM are connected in a negative feedback way. Different bias voltages are applied to the SRAM for measuring threshold voltages of two FETs of the other inverter and the FET coupled to the other inverter. The present invention uses a single circuit to measure the threshold voltages of the three FETs without changing the physical structure of the SRAM. Thereby is accelerated the measurement and decreased the cost of the fabrication process and measurement instruments.
    Type: Grant
    Filed: August 29, 2012
    Date of Patent: November 12, 2013
    Assignee: National Chiao Tung University
    Inventors: Ching-Te Chuang, Shyh-Jye Jou, Geng-Cing Lin, Shao-Cheng Wang, Yi-Wei Lin, Ming-Chien Tsai, Wei-Chiang Shih, Nan-Chun Lien, Kuen-Di Lee, Jyun-Kai Chu
  • Publication number: 20130268986
    Abstract: To reduce overloading of broadband networks, unicast streams containing the same live Internet content can be identified. Then unicast streams may be combined into a multicast stream.
    Type: Application
    Filed: March 29, 2012
    Publication date: October 10, 2013
    Inventors: Muthaiah Venkatachalam, Shao-Cheng Wang
  • Publication number: 20130064177
    Abstract: Embodiments of the present disclosure describe methods, apparatuses, and systems for payload header reduction classification for multiprotocol convergence sublayer.
    Type: Application
    Filed: September 8, 2011
    Publication date: March 14, 2013
    Inventors: Muthaiah Venkatachalam, Shantidev Mohanty, Shao-Cheng Wang
  • Publication number: 20110225626
    Abstract: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call.
    Type: Application
    Filed: May 23, 2011
    Publication date: September 15, 2011
    Inventors: Michael J. Covington, Manoj R. Sastry, Farid Adrangi, Deepak J. Manohar, Shao-Cheng Wang
  • Patent number: 7965702
    Abstract: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call.
    Type: Grant
    Filed: March 3, 2006
    Date of Patent: June 21, 2011
    Assignee: Intel Corporation
    Inventors: Michael J. Covington, Manoj R. Sastry, Farid Adrangi, Deepak J. Manohar, Shao-Cheng Wang
  • Publication number: 20070157025
    Abstract: Some embodiments of a method and system for providing secure and reliable collaborative applications are described. In some embodiments, a collaborative application may be separated into critical and non-critical components. The critical components may be run on a secure domain on a virtual machine, apart from the non-critical components, according to some embodiments. Other embodiments are described.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Manoj Sastry, Deepak Manohar, Michael Covington, Farid Adrangi, Shao-Cheng Wang
  • Publication number: 20070153715
    Abstract: A machine, such as a mobile device having telephony features, such as a voice over Internet Protocol (VoIP) telephony application, is configured with a secure environment in which a location provider within (more reliable) or external to (less reliable) the machine may determine location data for the machine and securely provide it to a telephony application program for incorporation into a call setup for calling a callee. The secure environment may be created through use of one or more of Intel's LaGrande Technology™ (LT), Vanderpool Technology (VT), or a Trusted Platform Module (TPM). The LT and VT allow defining secure independent components within the machine, such as by instantiating them as Virtual Machines, and the TPM allows components to cryptographically sign data, such as to facilitate ensuring the location data is not tampered with. A recipient of a telephone call setup including cryptographically secured location data may validate the location data and accept the call.
    Type: Application
    Filed: March 3, 2006
    Publication date: July 5, 2007
    Inventors: Michael J. Covington, Manoj R. Sastry, Farid Adrangi, Deepak J. Manohar, Shao-Cheng Wang
  • Publication number: 20070155366
    Abstract: Various methods and apparatuses are described for a portable computing device cooperating with a wireless phone handset. The portable computing device has a first wireless communication module that causes the portable computing device to act as a wireless base station. The portable computing device also has a biometric authentication module to authenticate access rights to applications and data files on the portable computing device based on one or more biometric features of the user of a wireless phone. The wireless phone may be a handset separate from the portable computing device. The wireless phone has a second wireless communication module configured to act as a wireless access device. The wireless phone also has a biometric sensor to convey the biometric features of the user of the wireless phone to the portable computing device.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: Deepak Manohar, Michael Covington, Manoj Sastry, Farid Adrangi, Shao-Cheng Wang
  • Publication number: 20060240765
    Abstract: A closure device includes an outer sash fixedly secured between the sill and the head members of a frame and having a number of orifices formed in a sheet member, and a slidable inner sash slidably disposed between the sill and the head members and having a number of apertures arranged to be selectively offset from the orifices of the fixed sash, or selectively aligned with the orifices of the fixed sash and to allow air to selectively flow through the apertures of the sheet member of the slidable sash. A number of plugs may be attached to the orifices of the fixed sash and each has a hole for selectively offsetting from and aligning with the apertures of the sheet member of the slidable sash.
    Type: Application
    Filed: April 20, 2005
    Publication date: October 26, 2006
    Inventor: Shao Cheng
  • Publication number: 20050167307
    Abstract: A cosmetic container includes a base housing for receiving cosmetic materials and having a pattern applied on an outer peripheral surface and having a narrowed sleeve to form an outer peripheral shoulder. A cover is attached onto the base housing and includes an outer pattern, and engaged onto the sleeve and engaged with the outer peripheral shoulder of the base housing, and includes a bore for receiving the sleeve of the base housing, and includes an upper end having a curled flange. A panel is engaged and fitted into the bore of the base housing, and engaged with the curled flange, to form the cover.
    Type: Application
    Filed: January 25, 2005
    Publication date: August 4, 2005
    Inventor: Shao Cheng
  • Publication number: 20050096768
    Abstract: A system for formulating and redacting bending procedures used in manufacturing includes an application server (12), designing computers (10), a corporation website (13), a local database (16), and a production management system database (17). The application server is for generating guidance documents for bending machine operations. The designing computer is for providing a user interface for users. The corporation website is for providing an operation platform for formulating and redacting bending procedures. The local database is for storing information on bending procedures. The production management system database is for storing tool lists and bending tool information. A related method is also disclosed.
    Type: Application
    Filed: October 27, 2004
    Publication date: May 5, 2005
    Inventors: Kuo Huang, Chung-Shao Cheng, Feng-Ping Tsai, Zejun Dai, Wei Shao, Qi-Guo Tao, Xiaobing Gao, Yang Hu