Patents by Inventor Shin-Yan Chiou
Shin-Yan Chiou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11806088Abstract: A method includes providing medical images of a subject for selecting a target image from thereamong, building a 3D image model based on the medical images and the target image with a surgical target site assigned, performing image registration to superimpose the 3D image model on a real-time image of the subject so as to result in a combined image, determining a virtual entry site located on the combined image, connecting the surgical target site and the virtual entry site with a straight line, generating a guiding path extending from the virtual entry site, in a direction away from the surgical target site and along the straight line, and displaying the guiding path for guiding a surgical instrument.Type: GrantFiled: March 30, 2021Date of Patent: November 7, 2023Assignees: CHANG GUNG UNIVERSITY, CHANG GUNG MEMORIAL HOSPITAL, KEELUNGInventors: Shin-Yan Chiou, Pin-Yuan Chen, Hao-Li Liu, Kuo-Chen Wei
-
Publication number: 20210386483Abstract: A method includes providing medical images of a subject for selecting a target image from thereamong, building a 3D image model based on the medical images and the target image with a surgical target site assigned, performing image registration to superimpose the 3D image model on a real-time image of the subject so as to result in a combined image, determining a virtual entry site located on the combined image, connecting the surgical target site and the virtual entry site with a straight line, generating a guiding path extending from the virtual entry site, in a direction away from the surgical target site and along the straight line, and displaying the guiding path for guiding a surgical instrument.Type: ApplicationFiled: March 30, 2021Publication date: December 16, 2021Inventors: Shin-Yan Chiou, Pin-Yuan Chen, Hao-Li Liu, Kuo-Chen Wei
-
Patent number: 10820945Abstract: A system includes an image capturing device, a subject reference marker disposed adjacent to a subject, a tool reference marker disposed on a treatment tool, a display device mounted on an operator, an operator reference marker disposed on the display device, and a processor. The image capturing device includes two image capturing modules that simultaneously and respectively capture two images of the operator, the subject, and the treatment tool. The processor receives the images, analyzes the images to obtain spatial locations of the reference markers, and transmits coordinate information and auxiliary information.Type: GrantFiled: November 2, 2018Date of Patent: November 3, 2020Assignees: CHANG GUNG UNIVERSITYInventors: Hao-Li Liu, Shin-Yan Chiou, Chen-Yuan Liao, Wen-Yen Lin, Pin-Yuan Chen, Kuo-Chen Wei
-
Publication number: 20190388177Abstract: In a proposed surgical navigation method for a surgical operation to be performed on an operation target, a mobile device stores 3D imaging information that relates to the operation target before the surgical operation. Then, an optical positioning system is used to acquire spatial coordinate information relating to the mobile device and the operation target, so that the mobile device can obtain a relative coordinate which is a vector from the operation target to the mobile device, obtain a 3D image based on the relative coordinate and the 3D imaging information, and display the 3D image based on the relative coordinate, such that visual perception of the operation target through the mobile device has the 3D image superimposed thereon.Type: ApplicationFiled: April 4, 2019Publication date: December 26, 2019Inventors: Shin-Yan Chiou, Hao-Li Liu, Chen-Yuan Liao, Pin-Yuan Chen, Kuo-Chen Wei
-
Publication number: 20190328462Abstract: A system includes an image capturing device, a subject reference marker disposed adjacent to a subject, a tool reference marker disposed on a treatment tool, a display device mounted on an operator, an operator reference marker disposed on the display device, and a processor. The image capturing device includes two image capturing modules that simultaneously and respectively capture two images of the operator, the subject, and the treatment tool. The processor receives the images, analyzes the images to obtain spatial locations of the reference markers, and transmits coordinate information and auxiliary information.Type: ApplicationFiled: November 2, 2018Publication date: October 31, 2019Inventors: Hao-Li LIU, Shin-Yan CHIOU, Chen-Yuan LIAO, Wen-Yen LIN, Pin-Yuan CHEN, Kuo-Chen WEI
-
Publication number: 20130024693Abstract: A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.Type: ApplicationFiled: September 14, 2012Publication date: January 24, 2013Applicant: Industrial Technology Research InstituteInventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
-
Patent number: 8312290Abstract: A biometric method, a biometric apparatus, and a biometric data encryption method thereof are disclosed. In the biometric method and the biometric apparatus, a biometric data is quantified to obtain a quantified data. A one-way function is then performed to convert the quantified data into an encrypted data. In the present invention, the biometric data is protected through a cryptography system so as to prevent the biometric features from being stolen or misappropriated. Moreover, in the present invention, a biometric technique can be integrated with a cryptography technique.Type: GrantFiled: January 22, 2008Date of Patent: November 13, 2012Assignee: Industrial Technology Research InstituteInventors: Shin-Yan Chiou, Yen-Hsueh Chen
-
Patent number: 8312276Abstract: A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.Type: GrantFiled: March 26, 2009Date of Patent: November 13, 2012Assignee: Industrial Technology Research InstituteInventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
-
Patent number: 8188857Abstract: An authentication system for a wireless network is disclosed. The authentication system includes a card, a card reader, an end-user device, and a wireless access device. The card reader is coupled to the wireless access device. The card records a data, and the card reader reads the data recorded in the card. The wireless access device receives the data read by the card reader and performs authentication between the wireless access device and the end-user device according to the data.Type: GrantFiled: October 24, 2007Date of Patent: May 29, 2012Assignee: Industrial Technology Research InstituteInventors: Yu-Tso Chen, Teng-Jui Shih, Shin-Yan Chiou
-
Patent number: 8131296Abstract: A handover authentication method includes performing, by a wireless network server, a first authentication between a client and the wireless network server via a first network gateway; obtaining first authentication keys for the wireless network server and the client based on the first authentication; determining, by the wireless network server, a need to handover the client from the first network gateway to a second network gateway; deriving, by the wireless network server and from the first authentication keys, a handover authentication key shared by the client and the wireless network server; obtaining, by the wireless network server, second authentication keys for the network server and the client; and serving, by the wireless network server, the client via the second network gateway.Type: GrantFiled: August 21, 2008Date of Patent: March 6, 2012Assignee: Industrial Technology Research InstituteInventors: Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin
-
Patent number: 7805601Abstract: Disclosed is a computerized apparatus and method for version control and management. The apparatus includes a cryptography boot loader, a control module on key usage, and one or more agents. After the user's device is powered on, the cryptography boot loader stores a user key, and checks an operating system (OS) certificate for an OS and an application certificate for an application to determine whether these certificates are valid. Then, a right object is obtained with a user certificate through an agent. The control module on key usage compares the OS version and the application version with the version required by the right object. The permission access to the user key is determined by the comparison result. This invention associates the cryptography component with the boot loader to develop a security mechanism performed by OS and application for using a secret key.Type: GrantFiled: July 23, 2007Date of Patent: September 28, 2010Assignee: Industrial Technology Research InstituteInventors: Yaudeh Tseng, Shin-Yan Chiou
-
Publication number: 20100205430Abstract: A network reputation system and its controlling method are provided. A credentials and exchange component permits a user to generate credentials and exchange matching keys with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.Type: ApplicationFiled: March 26, 2009Publication date: August 12, 2010Inventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
-
Publication number: 20100169183Abstract: A web transaction system and a controlling method thereof are provided. The controlling method of web transaction system includes the following steps. The translating information of a temporary unit is provided to a first service unit by a web transaction system. Whether the temporary unit has received a first transaction element of the first service unit is determined. The translating information of the first service unit is provided to a second service unit. Whether the first service unit has received a second transaction element is determined. If the first service unit has received the second transaction element and the temporary unit has received the first transaction element, then the first transaction element is sent to the second service unit from the temporary unit.Type: ApplicationFiled: April 24, 2009Publication date: July 1, 2010Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Shin-Yan Chiou, Jun-Bin Shi
-
Publication number: 20100046467Abstract: A handover authentication method includes performing, by a wireless network server, a first authentication between a client and the wireless network server via a first network gateway; obtaining first authentication keys for the wireless network server and the client based on the first authentication; determining, by the wireless network server, a need to handover the client from the first network gateway to a second network gateway; deriving, by the wireless network server and from the first authentication keys, a handover authentication key shared by the client and the wireless network server; obtaining, by the wireless network server, second authentication keys for the network server and the client; and serving, by the wireless network server, the client via the second network gateway.Type: ApplicationFiled: August 21, 2008Publication date: February 25, 2010Inventors: Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin
-
Publication number: 20090207766Abstract: Provided are a wireless network management system and a method thereof based on a positioning system. By the positioning system, whether there are available wireless access points (WAPs, or APs) at the vicinity of a communication device is identified, so the communication device needn't hold the search for the APs and the power thereof is saved. Besides, by path programming, the possible path of the communication device is known and the next available AP for wireless communication is identified, so the communication to the current AP can be quickly switched to the next AP if necessary.Type: ApplicationFiled: April 28, 2008Publication date: August 20, 2009Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Wei-Chung Hwang, Shin-Yan Chiou
-
Publication number: 20090138724Abstract: A biometric method, a biometric apparatus, and a biometric data encryption method thereof are disclosed. In the biometric method and the biometric apparatus, a biometric data is quantified to obtain a quantified data. A one-way function is then performed to convert the quantified data into an encrypted data. In the present invention, the biometric data is protected through a cryptography system so as to prevent the biometric features from being stolen or misappropriated. Moreover, in the present invention, a biometric technique can be integrated with a cryptography technique.Type: ApplicationFiled: January 22, 2008Publication date: May 28, 2009Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Shin-Yan Chiou, Yen-Hsueh Chen
-
Publication number: 20090045943Abstract: An authentication system for a wireless network is disclosed. The authentication system includes a card, a card reader, an end-user device, and a wireless access device. The card reader is coupled to the wireless access device. The card records a data, and the card reader reads the data recorded in the card. The wireless access device receives the data read by the card reader and performs authentication between the wireless access device and the end-user device according to the data.Type: ApplicationFiled: October 24, 2007Publication date: February 19, 2009Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Yu-Tso Chen, Teng-Jui Shih, Shin-Yan Chiou
-
Publication number: 20080189542Abstract: Disclosed is a computerized apparatus and method for version control and management. The apparatus includes a cryptography boot loader, a control module on key usage, and one or more agents. After the user's device is powered on, the cryptography boot loader stores a user key, and checks an operating system (OS) certificate for an OS and an application certificate for an application to determine whether these certificates are valid. Then, a right object is obtained with a user certificate through an agent. The control module on key usage compares the OS version and the application version with the version required by the right object. The permission access to the user key is determined by the comparison result. This invention associates the cryptography component with the boot loader to develop a security mechanism performed by OS and application for using a secret key.Type: ApplicationFiled: July 23, 2007Publication date: August 7, 2008Inventors: Yaudeh Tseng, Shin-Yan Chiou