Patents by Inventor Shin-Yan Chiou

Shin-Yan Chiou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11806088
    Abstract: A method includes providing medical images of a subject for selecting a target image from thereamong, building a 3D image model based on the medical images and the target image with a surgical target site assigned, performing image registration to superimpose the 3D image model on a real-time image of the subject so as to result in a combined image, determining a virtual entry site located on the combined image, connecting the surgical target site and the virtual entry site with a straight line, generating a guiding path extending from the virtual entry site, in a direction away from the surgical target site and along the straight line, and displaying the guiding path for guiding a surgical instrument.
    Type: Grant
    Filed: March 30, 2021
    Date of Patent: November 7, 2023
    Assignees: CHANG GUNG UNIVERSITY, CHANG GUNG MEMORIAL HOSPITAL, KEELUNG
    Inventors: Shin-Yan Chiou, Pin-Yuan Chen, Hao-Li Liu, Kuo-Chen Wei
  • Publication number: 20210386483
    Abstract: A method includes providing medical images of a subject for selecting a target image from thereamong, building a 3D image model based on the medical images and the target image with a surgical target site assigned, performing image registration to superimpose the 3D image model on a real-time image of the subject so as to result in a combined image, determining a virtual entry site located on the combined image, connecting the surgical target site and the virtual entry site with a straight line, generating a guiding path extending from the virtual entry site, in a direction away from the surgical target site and along the straight line, and displaying the guiding path for guiding a surgical instrument.
    Type: Application
    Filed: March 30, 2021
    Publication date: December 16, 2021
    Inventors: Shin-Yan Chiou, Pin-Yuan Chen, Hao-Li Liu, Kuo-Chen Wei
  • Patent number: 10820945
    Abstract: A system includes an image capturing device, a subject reference marker disposed adjacent to a subject, a tool reference marker disposed on a treatment tool, a display device mounted on an operator, an operator reference marker disposed on the display device, and a processor. The image capturing device includes two image capturing modules that simultaneously and respectively capture two images of the operator, the subject, and the treatment tool. The processor receives the images, analyzes the images to obtain spatial locations of the reference markers, and transmits coordinate information and auxiliary information.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: November 3, 2020
    Assignees: CHANG GUNG UNIVERSITY
    Inventors: Hao-Li Liu, Shin-Yan Chiou, Chen-Yuan Liao, Wen-Yen Lin, Pin-Yuan Chen, Kuo-Chen Wei
  • Publication number: 20190388177
    Abstract: In a proposed surgical navigation method for a surgical operation to be performed on an operation target, a mobile device stores 3D imaging information that relates to the operation target before the surgical operation. Then, an optical positioning system is used to acquire spatial coordinate information relating to the mobile device and the operation target, so that the mobile device can obtain a relative coordinate which is a vector from the operation target to the mobile device, obtain a 3D image based on the relative coordinate and the 3D imaging information, and display the 3D image based on the relative coordinate, such that visual perception of the operation target through the mobile device has the 3D image superimposed thereon.
    Type: Application
    Filed: April 4, 2019
    Publication date: December 26, 2019
    Inventors: Shin-Yan Chiou, Hao-Li Liu, Chen-Yuan Liao, Pin-Yuan Chen, Kuo-Chen Wei
  • Publication number: 20190328462
    Abstract: A system includes an image capturing device, a subject reference marker disposed adjacent to a subject, a tool reference marker disposed on a treatment tool, a display device mounted on an operator, an operator reference marker disposed on the display device, and a processor. The image capturing device includes two image capturing modules that simultaneously and respectively capture two images of the operator, the subject, and the treatment tool. The processor receives the images, analyzes the images to obtain spatial locations of the reference markers, and transmits coordinate information and auxiliary information.
    Type: Application
    Filed: November 2, 2018
    Publication date: October 31, 2019
    Inventors: Hao-Li LIU, Shin-Yan CHIOU, Chen-Yuan LIAO, Wen-Yen LIN, Pin-Yuan CHEN, Kuo-Chen WEI
  • Publication number: 20130024693
    Abstract: A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 24, 2013
    Applicant: Industrial Technology Research Institute
    Inventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
  • Patent number: 8312290
    Abstract: A biometric method, a biometric apparatus, and a biometric data encryption method thereof are disclosed. In the biometric method and the biometric apparatus, a biometric data is quantified to obtain a quantified data. A one-way function is then performed to convert the quantified data into an encrypted data. In the present invention, the biometric data is protected through a cryptography system so as to prevent the biometric features from being stolen or misappropriated. Moreover, in the present invention, a biometric technique can be integrated with a cryptography technique.
    Type: Grant
    Filed: January 22, 2008
    Date of Patent: November 13, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Shin-Yan Chiou, Yen-Hsueh Chen
  • Patent number: 8312276
    Abstract: A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: November 13, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
  • Patent number: 8188857
    Abstract: An authentication system for a wireless network is disclosed. The authentication system includes a card, a card reader, an end-user device, and a wireless access device. The card reader is coupled to the wireless access device. The card records a data, and the card reader reads the data recorded in the card. The wireless access device receives the data read by the card reader and performs authentication between the wireless access device and the end-user device according to the data.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: May 29, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Yu-Tso Chen, Teng-Jui Shih, Shin-Yan Chiou
  • Patent number: 8131296
    Abstract: A handover authentication method includes performing, by a wireless network server, a first authentication between a client and the wireless network server via a first network gateway; obtaining first authentication keys for the wireless network server and the client based on the first authentication; determining, by the wireless network server, a need to handover the client from the first network gateway to a second network gateway; deriving, by the wireless network server and from the first authentication keys, a handover authentication key shared by the client and the wireless network server; obtaining, by the wireless network server, second authentication keys for the network server and the client; and serving, by the wireless network server, the client via the second network gateway.
    Type: Grant
    Filed: August 21, 2008
    Date of Patent: March 6, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin
  • Patent number: 7805601
    Abstract: Disclosed is a computerized apparatus and method for version control and management. The apparatus includes a cryptography boot loader, a control module on key usage, and one or more agents. After the user's device is powered on, the cryptography boot loader stores a user key, and checks an operating system (OS) certificate for an OS and an application certificate for an application to determine whether these certificates are valid. Then, a right object is obtained with a user certificate through an agent. The control module on key usage compares the OS version and the application version with the version required by the right object. The permission access to the user key is determined by the comparison result. This invention associates the cryptography component with the boot loader to develop a security mechanism performed by OS and application for using a secret key.
    Type: Grant
    Filed: July 23, 2007
    Date of Patent: September 28, 2010
    Assignee: Industrial Technology Research Institute
    Inventors: Yaudeh Tseng, Shin-Yan Chiou
  • Publication number: 20100205430
    Abstract: A network reputation system and its controlling method are provided. A credentials and exchange component permits a user to generate credentials and exchange matching keys with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.
    Type: Application
    Filed: March 26, 2009
    Publication date: August 12, 2010
    Inventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
  • Publication number: 20100169183
    Abstract: A web transaction system and a controlling method thereof are provided. The controlling method of web transaction system includes the following steps. The translating information of a temporary unit is provided to a first service unit by a web transaction system. Whether the temporary unit has received a first transaction element of the first service unit is determined. The translating information of the first service unit is provided to a second service unit. Whether the first service unit has received a second transaction element is determined. If the first service unit has received the second transaction element and the temporary unit has received the first transaction element, then the first transaction element is sent to the second service unit from the temporary unit.
    Type: Application
    Filed: April 24, 2009
    Publication date: July 1, 2010
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Shin-Yan Chiou, Jun-Bin Shi
  • Publication number: 20100046467
    Abstract: A handover authentication method includes performing, by a wireless network server, a first authentication between a client and the wireless network server via a first network gateway; obtaining first authentication keys for the wireless network server and the client based on the first authentication; determining, by the wireless network server, a need to handover the client from the first network gateway to a second network gateway; deriving, by the wireless network server and from the first authentication keys, a handover authentication key shared by the client and the wireless network server; obtaining, by the wireless network server, second authentication keys for the network server and the client; and serving, by the wireless network server, the client via the second network gateway.
    Type: Application
    Filed: August 21, 2008
    Publication date: February 25, 2010
    Inventors: Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin
  • Publication number: 20090207766
    Abstract: Provided are a wireless network management system and a method thereof based on a positioning system. By the positioning system, whether there are available wireless access points (WAPs, or APs) at the vicinity of a communication device is identified, so the communication device needn't hold the search for the APs and the power thereof is saved. Besides, by path programming, the possible path of the communication device is known and the next available AP for wireless communication is identified, so the communication to the current AP can be quickly switched to the next AP if necessary.
    Type: Application
    Filed: April 28, 2008
    Publication date: August 20, 2009
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Wei-Chung Hwang, Shin-Yan Chiou
  • Publication number: 20090138724
    Abstract: A biometric method, a biometric apparatus, and a biometric data encryption method thereof are disclosed. In the biometric method and the biometric apparatus, a biometric data is quantified to obtain a quantified data. A one-way function is then performed to convert the quantified data into an encrypted data. In the present invention, the biometric data is protected through a cryptography system so as to prevent the biometric features from being stolen or misappropriated. Moreover, in the present invention, a biometric technique can be integrated with a cryptography technique.
    Type: Application
    Filed: January 22, 2008
    Publication date: May 28, 2009
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Shin-Yan Chiou, Yen-Hsueh Chen
  • Publication number: 20090045943
    Abstract: An authentication system for a wireless network is disclosed. The authentication system includes a card, a card reader, an end-user device, and a wireless access device. The card reader is coupled to the wireless access device. The card records a data, and the card reader reads the data recorded in the card. The wireless access device receives the data read by the card reader and performs authentication between the wireless access device and the end-user device according to the data.
    Type: Application
    Filed: October 24, 2007
    Publication date: February 19, 2009
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Yu-Tso Chen, Teng-Jui Shih, Shin-Yan Chiou
  • Publication number: 20080189542
    Abstract: Disclosed is a computerized apparatus and method for version control and management. The apparatus includes a cryptography boot loader, a control module on key usage, and one or more agents. After the user's device is powered on, the cryptography boot loader stores a user key, and checks an operating system (OS) certificate for an OS and an application certificate for an application to determine whether these certificates are valid. Then, a right object is obtained with a user certificate through an agent. The control module on key usage compares the OS version and the application version with the version required by the right object. The permission access to the user key is determined by the comparison result. This invention associates the cryptography component with the boot loader to develop a security mechanism performed by OS and application for using a secret key.
    Type: Application
    Filed: July 23, 2007
    Publication date: August 7, 2008
    Inventors: Yaudeh Tseng, Shin-Yan Chiou