Patents by Inventor Tom Chen

Tom Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8074037
    Abstract: A storage service device with a dual controller and a backup method thereof are applicable to provide the same view service to an event-login log and a configuration file of a server. The storage service device includes a first control module, a second control module, a battery unit, a basic input/output system (BIOS), and a backup procedure. Once a power failure occurs to the server, the following backup procedure is performed a hardware interrupt signal is sent to the battery unit, so as to provide an operation power to a first memory module and a second memory module; an index page of the first memory module is synchronized with that of the second memory module; and the updated index pages are recorded into a first flash memory and a second flash memory respectively.
    Type: Grant
    Filed: March 30, 2009
    Date of Patent: December 6, 2011
    Assignee: Inventec Corporation
    Inventors: Xu-Ming Zhang, Tom Chen
  • Patent number: 8060706
    Abstract: A method of allocating a physical memory in a specified address range under a Linux system platform is applied in a testing process of a physical memory under a Linux operating system. In this method, according to a specified address range and a size of a memory to be allocated, a large amount of physical memories in the system are allocated in a specified address range, and then the information about the allocated memories is transmitted, so as to map, inspect, and release the memories, thereby effectively supporting the test for physical memories under the Linux operating system.
    Type: Grant
    Filed: March 28, 2008
    Date of Patent: November 15, 2011
    Assignee: Inventec Corporation
    Inventors: Bo Wu, Tom Chen, Win-Harn Liu
  • Patent number: 8055869
    Abstract: A data manipulation method of a logical volume manager is applicable to data management of dependent snapshot volumes (SVs) of a logical volume manager. The data management method includes the following steps generating a plurality of SVs, defining the SV generated at first as a first SV, defining the SV generated at last as a last SV, and defining the rest SVs as middle SVs; selecting a middle SV; combining content stored in the selected middle SV into a neighboring SV; according to the combined SV, combining meta-data of the selected middle SV into meta-data of the middle SV; deleting the selected middle SV. The logical volume manager does not need copy the data again, thereby saving access time in data management.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: November 8, 2011
    Assignee: Inventec Corporation
    Inventors: Hai-Ting Yao, Tom Chen
  • Patent number: 8051419
    Abstract: A method of dynamically adjusting the number of task requests is provided, which is applicable to an Internet Small Computer System Interface (iSCSI) protocol. When a target receives a task request transmitted by an initiator or the target completes the task request, the number of transmissible tasks is calculated according to an average access data volume, an current access data volume, and an allowable access data volume in the target, and returned to the initiator, such that the number of the task requests transmitted simultaneously by the initiator does not exceed the number of transmissible tasks, thereby achieving flow control. The allowable access data volume is obtained through interactive and dynamic adjustment between the target and the initiator.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: November 1, 2011
    Assignee: Inventec Corporation
    Inventors: Hong-Liang Liu, Ho Zhang, Tom Chen, Win-Harn Liu
  • Patent number: 7908522
    Abstract: A network card testing method, used to test if the network card is capable of functioning normally in a computer having Extended Firmware Interface (EFI) system. Wherein, in a protocol assignment table is recorded the connection relations of a network protocol of Extended Firmware Interface, and a driver program corresponding to a network driver interface specification (NDIS) layer. In addition, the driver corresponding to the network card is loaded at the NDIS layer. In implementing the network card test program, though the utilization of an additionally written EFI pseudo program as a medium of transmitting data for the network card testing program, and also though the utilization of an additionally written intermediate filter driver in invoking a driver suitable for the network card, the hardware testing of network card can be realized, thus increasing the category and scope of the network card testing supported by an EFI system.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: March 15, 2011
    Assignee: Inventec Corporation
    Inventors: Zhi Wang, Tom Chen, Win-Harn Liu
  • Patent number: 7904942
    Abstract: A method of updating intrusion detection rules through a link data packet is used to dynamically update rules storages of Snort system hosts. Firstly, an update sponsor in the network transmits a link data packet with an intrusion detection rule to the Snort system host. The Snort system host acquires the intrusion detection rule from the received link data packet, and parses an operation type of the intrusion detection rule. Then, the Snort system host verifies the validity of the intrusion detection rule. Subsequently, the rules storage is updated according to the type of the valid intrusion detection rule and a rules tree.
    Type: Grant
    Filed: February 22, 2008
    Date of Patent: March 8, 2011
    Assignee: Inventec Corporation
    Inventors: Meng Sun, Tom Chen, Win-Harn Liu
  • Patent number: 7861033
    Abstract: A system architecture for implementing a virtual disk service (VDS) equipment is applicable for implementing an overall management on multiple service request objects in a VDS system. The system architecture includes a VDS interface, a subsystem management module, an object management module, a virtual disk management module, and a specific management module. The VDS interface receives a service request, and renders the service request to the subsystem management module for judging a type of the service request. The virtual disk management module generates a plurality of virtual interfaces for being invoked by the subsystem management module, so as to execute the service request of a public operation type. When the service request requires for supporting an asynchronous processing, the specific management module is further invoked to process the service request, and generates a feedback result to respond the service request via the VDS interface.
    Type: Grant
    Filed: March 17, 2008
    Date of Patent: December 28, 2010
    Assignee: Inventec Corporation
    Inventors: Hai-Yan Chang, Tom Chen, Win-Harn Liu
  • Publication number: 20100256637
    Abstract: A laparoscopic nephrectomy device is disclosed. The device has an upper jaw and a lower jaw designed to clamp a portion of an organ, such as a kidney, so as to cut off blood flow locally to a portion of that organ. The upper jaw includes a mid-jaw piece and a top jaw piece, with each piece separately articulated. The mid-jaw piece is pivotably connected to the lower jaw. A top jaw piece is pivotably connected to the mid-jaw piece. The mid-jaw and top jaw pieces include a mechanism to fix the angular orientation of the mid-jaw and top jaw pieces with respect to one another, including a retractable slide piece that is carried by the mid-jaw piece and received in a slot in the top jaw piece. The jaws have insulated troughs that carry electrode structure for applying coagulative therapies.
    Type: Application
    Filed: April 2, 2010
    Publication date: October 7, 2010
    Applicant: DEVICE EVOLUTIONS, LLC
    Inventors: Francisco Contijoch, Michelle Harran, Carolyn Purington, Tom Chen, Smita Mohan, Aubri Gillespie
  • Publication number: 20100251355
    Abstract: A method for obtaining data for intrusion detection obtains data after forward chain filtering of a firewall. Modes of obtaining the data include a socket communication mode and a character device work mode. The method for obtaining the data for intrusion detection obtains the data filtered by the firewall, and reduces false alarms. Moreover, the method obtains the data after a network address translation (NAT) operation, so as to locate an attacker and a victim correctly. The method further obtains a decrypted Internet Protocol Security (IPsec) data packet, so as to process an IPsec data stream normally.
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Yan LI, Gui-Dong Liu, Tom Chen
  • Publication number: 20100250651
    Abstract: A data access method for making an asynchronous request to a block device is adapted to access a block device in a server end and perform corresponding processing according to a plurality of data access requests. The data access method includes the steps. A current request is received from a client. A virtual device of the block device is invoked. The current request is compared with a request queue storing a plurality of requests to be processed. The requests to be processed are selected from the request queue according to an access address of the current request. A request merging program is performed on the requests to be processed with adjacent access addresses and the current request to generate a merged request. The merged request is submitted to the request queue. The requests having low access capacities is merged, so as to improve the access efficiency of the block device.
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Ming-Hao Bi, Tom Chen
  • Publication number: 20100250832
    Abstract: A storage service device with a dual controller and a backup method thereof are applicable to provide the same view service to an event-login log and a configuration file of a server. The storage service device includes a first control module, a second control module, a battery unit, a basic input/output system (BIOS), and a backup procedure. Once a power failure occurs to the server, the following backup procedure is performed a hardware interrupt signal is sent to the battery unit, so as to provide an operation power to a first memory module and a second memory module; an index page of the first memory module is synchronized with that of the second memory module; and the updated index pages are recorded into a first flash memory and a second flash memory respectively.
    Type: Application
    Filed: March 30, 2009
    Publication date: September 30, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Xu Ming Zhang, Tom Chen
  • Publication number: 20100251370
    Abstract: A network intrusion detection system applied to detect and monitor network packets. The network intrusion detection system decides to load and operate detection rules according to a current load. The network intrusion detection system includes a network connection unit, a storage unit, and a processing unit. The processing unit operates an alert correlation program, a plurality of detection rules, and a plurality of operation policies according to the received network packets. The alert correlation program applied to detect whether contents of the network packets conform to the detection rules, assign a resource consumption level to each detection rule, and categorize the detection rules to the operation policies according to the resource consumption levels. A loading level of the processing unit is decided according to a device load and an access load. The operation policies and the alert correlation program that the processing unit operates are decided according to the loading-level.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: Inventec Corporation
    Inventors: Meng Sun, Tom Chen
  • Publication number: 20100250728
    Abstract: A method for controlling a web page operation in browser/server architecture is adapted to prevent the same page from being operated by more than one people at the same time. The method includes establishing a status record table for recording a usage status of web page by server; checking usage status of web page in status record table after server receiving a request for operating the web page from a second browser; accepting request and submitting an operation control right of the web page to second browser if the usage status is idle; sending a check message to first browser to check whether first browser is still using the web page or not if usage status in status record table indicates that web page is used by first browser; rejecting request and transmitting usage status of web page to second browser if first browser is still using the web page.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: Inventec Corporation
    Inventors: Xue Min Zhang, Tom Chen
  • Publication number: 20100250879
    Abstract: A data manipulation method of a logical volume manager is applicable to data management of dependent snapshot volumes (SVs) of a logical volume manager. The data management method includes the following steps generating a plurality of SVs, defining the SV generated at first as a first SV, defining the SV generated at last as a last SV, and defining the rest SVs as middle SVs; selecting a middle SV; combining content stored in the selected middle SV into a neighboring SV; according to the combined SV, combining meta-data of the selected middle SV into meta-data of the middle SV; deleting the selected middle SV. The logical volume manager does not need copy the data again, thereby saving access time in data management.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Hai Ting Yao, Tom Chen
  • Publication number: 20100251013
    Abstract: A method for processing a bad block in a redundant array of independent disks (RAID) is presented, which is characterized by a software RAID constructed by a scale computer interface disk, and adapted to backup data in a bad block in the software RAID. The method includes invoking an access error program to intercept an access instruction for a data block in the software RAID when the data block is a bad block; searching a disk number and a logical block address of the data block in the software RAID according to the access instruction; selecting the scale computer interface disk; and mapping data stored in the data block, the disk number, and the logical block address to a reserved local memory of the scale computer interface disk. Through the above steps, the data in the bad block can be mapped to a normal block, thus maintaining the data integrity.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: Inventec Corporation
    Inventors: Hai-Ting Yao, Qing-Xiu Wu, Tom Chen
  • Publication number: 20100246592
    Abstract: A load balancing method for network intrusion detection includes the following steps. Packets are received from a client. The data packets include a protocol type and a protocol property. An intrusion detection procedure is loaded on a receiving end. A corresponding request queue is set for each intrusion detection procedure. The request queue is used for storing the data packets. The data packets are processed a separation procedure, and are categorized into data packets of a chain type and data packets of a non-chain type according to the protocol type. The data packets of the chain type are processed by a first distribution procedure. The data packets of the non-chain type are processed by a second distribution procedure. The distribution procedures distribute the data packets to the corresponding request queues according to the protocol property. The corresponding intrusion detection procedure is performed on the data packets in each request queue.
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: Inventec Corporation
    Inventors: Xiao-Qian Li, Tom Chen
  • Publication number: 20100215052
    Abstract: An iSCSI network interface card with an ARP/ICMP resolution function is applicable to provide a communication interface between a host and a client, and includes a first connection interface, an ARP procedure, an ICMP procedure, a storage unit, and a processor. The first connection interface is connected to the host. The ARP procedure queries an IP address of the client. The ICMP procedure transfers a message of failing to reach the IP address of the client and detects a connecting status to the Internet. The storage unit is connected to the first connection interface and stores the network packet, the ARP procedure, and the ICMP procedure. The processor is connected to the first connection interface and the storage unit, and executes the ARP procedure and the ICMP procedure according to a service request.
    Type: Application
    Filed: February 20, 2009
    Publication date: August 26, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Wei LIU, Yun-Song WANG, Tom CHEN
  • Publication number: 20100211943
    Abstract: A method for simplifying a process for installing an application of a Windows operating system is applied. The method includes the following steps. An answer file is created, in which an installation profile is created according to an installation sequence of installation packages of the Windows operating system and a configuration file is created according to environment parameters of the Windows operating system. The answer file is loaded. An original Windows Preinstallation Environment Image (WIM) file is read, and is stored into a memory unit, and the original WIM file defined as a target WIM file. The answer file is added and modified into a Windows image file of the target WIM file. The target WIM file is initiated and an installation procedure of the Windows operating system is performed.
    Type: Application
    Filed: February 18, 2009
    Publication date: August 19, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Tao Chu, Tom Chen
  • Publication number: 20100205600
    Abstract: A simulation method for realizing large batches and different kinds of baseboard management controllers using a single server includes providing a virtual baseboard management controller by a target terminal according to different customized virtual baseboard management controller resources correspondingly. The simulation method includes initializing large batches and different kinds of virtual baseboard controller programs according to a customizable virtual baseboard controller resource. If a client requests to access one baseboard controller or multiple baseboard controllers, which virtual baseboard controller will provide a service is determined according to the information of the accessing request of the client. Then an output result is generated according to the behaviors defined in the customized resource. Finally, the output result is transferred to the client. Therein, the client may connect to the target terminal through Internet or a bus.
    Type: Application
    Filed: February 6, 2009
    Publication date: August 12, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Guo-Hong TU, Jin-Cheng LIU, Tom CHEN
  • Publication number: 20100205420
    Abstract: A system and a method for realizing a remote test on a computer apparatus without a storage device are described, in which a client is enabled to select a desired operating system image file from a server and use the operating system image file to provide an initial processing on an operating system of the client. The testing method includes initializing a virtual disk in the client, registering the virtual disk to a basic input and output system (BIOS) of the client, connecting to a server over network according to connection information in the virtual disk, loading boot information into the client from the server, and performing a boot procedure on the client according to the boot information. Therefore, during a booting process of the client, a virtual disk is initialized in the server, so as to be used for booting the client.
    Type: Application
    Filed: February 9, 2009
    Publication date: August 12, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Town Chen, Qiu-Yue Duan, Tom Chen