Patents by Inventor Tom Chen

Tom Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100256637
    Abstract: A laparoscopic nephrectomy device is disclosed. The device has an upper jaw and a lower jaw designed to clamp a portion of an organ, such as a kidney, so as to cut off blood flow locally to a portion of that organ. The upper jaw includes a mid-jaw piece and a top jaw piece, with each piece separately articulated. The mid-jaw piece is pivotably connected to the lower jaw. A top jaw piece is pivotably connected to the mid-jaw piece. The mid-jaw and top jaw pieces include a mechanism to fix the angular orientation of the mid-jaw and top jaw pieces with respect to one another, including a retractable slide piece that is carried by the mid-jaw piece and received in a slot in the top jaw piece. The jaws have insulated troughs that carry electrode structure for applying coagulative therapies.
    Type: Application
    Filed: April 2, 2010
    Publication date: October 7, 2010
    Applicant: DEVICE EVOLUTIONS, LLC
    Inventors: Francisco Contijoch, Michelle Harran, Carolyn Purington, Tom Chen, Smita Mohan, Aubri Gillespie
  • Publication number: 20100251370
    Abstract: A network intrusion detection system applied to detect and monitor network packets. The network intrusion detection system decides to load and operate detection rules according to a current load. The network intrusion detection system includes a network connection unit, a storage unit, and a processing unit. The processing unit operates an alert correlation program, a plurality of detection rules, and a plurality of operation policies according to the received network packets. The alert correlation program applied to detect whether contents of the network packets conform to the detection rules, assign a resource consumption level to each detection rule, and categorize the detection rules to the operation policies according to the resource consumption levels. A loading level of the processing unit is decided according to a device load and an access load. The operation policies and the alert correlation program that the processing unit operates are decided according to the loading-level.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: Inventec Corporation
    Inventors: Meng Sun, Tom Chen
  • Publication number: 20100251013
    Abstract: A method for processing a bad block in a redundant array of independent disks (RAID) is presented, which is characterized by a software RAID constructed by a scale computer interface disk, and adapted to backup data in a bad block in the software RAID. The method includes invoking an access error program to intercept an access instruction for a data block in the software RAID when the data block is a bad block; searching a disk number and a logical block address of the data block in the software RAID according to the access instruction; selecting the scale computer interface disk; and mapping data stored in the data block, the disk number, and the logical block address to a reserved local memory of the scale computer interface disk. Through the above steps, the data in the bad block can be mapped to a normal block, thus maintaining the data integrity.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: Inventec Corporation
    Inventors: Hai-Ting Yao, Qing-Xiu Wu, Tom Chen
  • Publication number: 20100251355
    Abstract: A method for obtaining data for intrusion detection obtains data after forward chain filtering of a firewall. Modes of obtaining the data include a socket communication mode and a character device work mode. The method for obtaining the data for intrusion detection obtains the data filtered by the firewall, and reduces false alarms. Moreover, the method obtains the data after a network address translation (NAT) operation, so as to locate an attacker and a victim correctly. The method further obtains a decrypted Internet Protocol Security (IPsec) data packet, so as to process an IPsec data stream normally.
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Yan LI, Gui-Dong Liu, Tom Chen
  • Publication number: 20100250879
    Abstract: A data manipulation method of a logical volume manager is applicable to data management of dependent snapshot volumes (SVs) of a logical volume manager. The data management method includes the following steps generating a plurality of SVs, defining the SV generated at first as a first SV, defining the SV generated at last as a last SV, and defining the rest SVs as middle SVs; selecting a middle SV; combining content stored in the selected middle SV into a neighboring SV; according to the combined SV, combining meta-data of the selected middle SV into meta-data of the middle SV; deleting the selected middle SV. The logical volume manager does not need copy the data again, thereby saving access time in data management.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Hai Ting Yao, Tom Chen
  • Publication number: 20100250728
    Abstract: A method for controlling a web page operation in browser/server architecture is adapted to prevent the same page from being operated by more than one people at the same time. The method includes establishing a status record table for recording a usage status of web page by server; checking usage status of web page in status record table after server receiving a request for operating the web page from a second browser; accepting request and submitting an operation control right of the web page to second browser if the usage status is idle; sending a check message to first browser to check whether first browser is still using the web page or not if usage status in status record table indicates that web page is used by first browser; rejecting request and transmitting usage status of web page to second browser if first browser is still using the web page.
    Type: Application
    Filed: March 26, 2009
    Publication date: September 30, 2010
    Applicant: Inventec Corporation
    Inventors: Xue Min Zhang, Tom Chen
  • Publication number: 20100250651
    Abstract: A data access method for making an asynchronous request to a block device is adapted to access a block device in a server end and perform corresponding processing according to a plurality of data access requests. The data access method includes the steps. A current request is received from a client. A virtual device of the block device is invoked. The current request is compared with a request queue storing a plurality of requests to be processed. The requests to be processed are selected from the request queue according to an access address of the current request. A request merging program is performed on the requests to be processed with adjacent access addresses and the current request to generate a merged request. The merged request is submitted to the request queue. The requests having low access capacities is merged, so as to improve the access efficiency of the block device.
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Ming-Hao Bi, Tom Chen
  • Publication number: 20100250832
    Abstract: A storage service device with a dual controller and a backup method thereof are applicable to provide the same view service to an event-login log and a configuration file of a server. The storage service device includes a first control module, a second control module, a battery unit, a basic input/output system (BIOS), and a backup procedure. Once a power failure occurs to the server, the following backup procedure is performed a hardware interrupt signal is sent to the battery unit, so as to provide an operation power to a first memory module and a second memory module; an index page of the first memory module is synchronized with that of the second memory module; and the updated index pages are recorded into a first flash memory and a second flash memory respectively.
    Type: Application
    Filed: March 30, 2009
    Publication date: September 30, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Xu Ming Zhang, Tom Chen
  • Publication number: 20100246592
    Abstract: A load balancing method for network intrusion detection includes the following steps. Packets are received from a client. The data packets include a protocol type and a protocol property. An intrusion detection procedure is loaded on a receiving end. A corresponding request queue is set for each intrusion detection procedure. The request queue is used for storing the data packets. The data packets are processed a separation procedure, and are categorized into data packets of a chain type and data packets of a non-chain type according to the protocol type. The data packets of the chain type are processed by a first distribution procedure. The data packets of the non-chain type are processed by a second distribution procedure. The distribution procedures distribute the data packets to the corresponding request queues according to the protocol property. The corresponding intrusion detection procedure is performed on the data packets in each request queue.
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Applicant: Inventec Corporation
    Inventors: Xiao-Qian Li, Tom Chen
  • Publication number: 20100215052
    Abstract: An iSCSI network interface card with an ARP/ICMP resolution function is applicable to provide a communication interface between a host and a client, and includes a first connection interface, an ARP procedure, an ICMP procedure, a storage unit, and a processor. The first connection interface is connected to the host. The ARP procedure queries an IP address of the client. The ICMP procedure transfers a message of failing to reach the IP address of the client and detects a connecting status to the Internet. The storage unit is connected to the first connection interface and stores the network packet, the ARP procedure, and the ICMP procedure. The processor is connected to the first connection interface and the storage unit, and executes the ARP procedure and the ICMP procedure according to a service request.
    Type: Application
    Filed: February 20, 2009
    Publication date: August 26, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Wei LIU, Yun-Song WANG, Tom CHEN
  • Publication number: 20100211943
    Abstract: A method for simplifying a process for installing an application of a Windows operating system is applied. The method includes the following steps. An answer file is created, in which an installation profile is created according to an installation sequence of installation packages of the Windows operating system and a configuration file is created according to environment parameters of the Windows operating system. The answer file is loaded. An original Windows Preinstallation Environment Image (WIM) file is read, and is stored into a memory unit, and the original WIM file defined as a target WIM file. The answer file is added and modified into a Windows image file of the target WIM file. The target WIM file is initiated and an installation procedure of the Windows operating system is performed.
    Type: Application
    Filed: February 18, 2009
    Publication date: August 19, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Tao Chu, Tom Chen
  • Publication number: 20100205420
    Abstract: A system and a method for realizing a remote test on a computer apparatus without a storage device are described, in which a client is enabled to select a desired operating system image file from a server and use the operating system image file to provide an initial processing on an operating system of the client. The testing method includes initializing a virtual disk in the client, registering the virtual disk to a basic input and output system (BIOS) of the client, connecting to a server over network according to connection information in the virtual disk, loading boot information into the client from the server, and performing a boot procedure on the client according to the boot information. Therefore, during a booting process of the client, a virtual disk is initialized in the server, so as to be used for booting the client.
    Type: Application
    Filed: February 9, 2009
    Publication date: August 12, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Town Chen, Qiu-Yue Duan, Tom Chen
  • Publication number: 20100205600
    Abstract: A simulation method for realizing large batches and different kinds of baseboard management controllers using a single server includes providing a virtual baseboard management controller by a target terminal according to different customized virtual baseboard management controller resources correspondingly. The simulation method includes initializing large batches and different kinds of virtual baseboard controller programs according to a customizable virtual baseboard controller resource. If a client requests to access one baseboard controller or multiple baseboard controllers, which virtual baseboard controller will provide a service is determined according to the information of the accessing request of the client. Then an output result is generated according to the behaviors defined in the customized resource. Finally, the output result is transferred to the client. Therein, the client may connect to the target terminal through Internet or a bus.
    Type: Application
    Filed: February 6, 2009
    Publication date: August 12, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Guo-Hong TU, Jin-Cheng LIU, Tom CHEN
  • Patent number: 7770065
    Abstract: A file data restoring system and method of a computer operating system and software thereof are applied in the installation of an operating system into a client computer. Divide the file data corresponding to the operating system into data blocks according to an appointed data size. Generate a check code for each of the data blocks to form a sequence list of original check codes and a sequence list of target check codes. Compare the sequence list of original check codes with the sequence list of target check codes, after installing the operating system into the computer. If the comparison result is inconsistent, a restoring call information is sent out. The position of the inconsistent check code is acquired through the restoring call information and the comparison result. The original file data corresponding to the position of the check code is read and restored to a corresponding target file.
    Type: Grant
    Filed: February 6, 2008
    Date of Patent: August 3, 2010
    Assignee: Inventec Corporation
    Inventors: Yue Zhang, Tom Chen, Win-Harn Liu
  • Publication number: 20100180087
    Abstract: A communication method for accelerating Internet small computer system interface data and a processing system thereof are used for sending a plurality of data packets to a plurality of storage devices by a target of the Internet small computer system interface. The communication method includes the following steps. An access request for accessing the storage devices is received by the target. A plurality of small computer interface commands is generated according to the access request. The small computer interface commands are read by an egress packet generator in the target. An address resolving procedure is performed by the egress packet generator for converting the small computer interface commands to a plurality of network packets. A first check code is generated according to a storage content in each network packet. The first check codes are added to the network packets.
    Type: Application
    Filed: January 13, 2009
    Publication date: July 15, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Ming-Sheng Zhu, Yun-Song Wang, Tom Chen
  • Publication number: 20100175073
    Abstract: A network device for accelerating internet small computer systems interface (iSCSI) packet processing is described, which includes a host and a network card. The host includes an online command descriptor block queue, an iSCSI host manager, and an SCSI module. SCSI commands in a CDB are processed through these modules. The network card includes an LLP module and a microprocessor. Through a protocol data unit descriptor, a PDU generator and an iSCSI network card manager in the microprocessor, protocol data units in network packets can be resolved in advance, so that the host can concentrate on executing SCSI commands, thereby accelerating the network packet processing efficiency of the network device.
    Type: Application
    Filed: January 7, 2009
    Publication date: July 8, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Zhi-Jiang Hu, Qian Zhang, Tom Chen
  • Publication number: 20100157800
    Abstract: A method for processing network traffic loading balance is adapted for balancing the load of a session of various data packet processing threads in a network equipment. The method includes the following steps. First, a plurality of data packet processing threads is executed, a queue is assigned to each thread for storing the received data packets, and the data packet is read from the queue by the thread for processing. Then, it is determined whether the number of the data packets in the queue satisfies a traffic threshold value. If the number of the data packets in a certain queue satisfies an operating threshold value, new data packets are allocated by the network equipment to other queues without affecting the integrity of the session. Therefore, the present method not only maintains the integrity of the session, but also ensures the uniformity in load among the data packet processing threads.
    Type: Application
    Filed: December 19, 2008
    Publication date: June 24, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Gui-Dong Liu, Tom Chen
  • Publication number: 20100161786
    Abstract: A QoS control method for iSCSI supports QoS control between an initiator device and a target device, and includes the following steps. Preset two variables bucket and bucket_used. Receive a PDU sent from a connection. If the PDU carries or requests data, add lengths of data carried or requested by the PDU in the current one second and store the result to bucket_used. Determine whether bucket_used is larger than bucket or not. Rf yes, suspend the current QoS control object for iSCSI and accept no additional new PDU handling until the end of the current one second. Or otherwise, forward the PDU to an iSCSI PDU handler for subsequent execution. The QoS control method can perform a QoS control on different QoS control objects for iSCSI with a unified control granularity in the iSCSI service level, so that the complexity of the QoS control is greatly reduced.
    Type: Application
    Filed: December 22, 2008
    Publication date: June 24, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Cang-Mou CAO, Tom Chen
  • Publication number: 20100157806
    Abstract: A method for processing data packet load balancing and a network equipment thereof, which are for balancing the load of a plurality of controllers in a network equipment. The method comprises the steps. A plurality of data packets is received. A storage queue is assigned for storing the data packets. The data packets in the storage queue are read by an allocation controller. The allocation controller assigns the data packets to different work sequences according to a work attribute of the data packets. A processing controller is commanded to perform a packet processing procedure, and at least one work queue is assigned to the processing controller for processing the data packets. After completing the packet processing procedure, the processing controller sends a completion message to a completion queue. If the allocation controller detects that the completion queue contains the completion message, the allocation controller sends the processed data packets back.
    Type: Application
    Filed: December 23, 2008
    Publication date: June 24, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Xian-Guang Song, Tom Chen
  • Publication number: 20100158244
    Abstract: A communication encryption method for supporting a remote monitoring and control system includes establishing a communication network between a server and a remote host, encrypting a data to be transmitted/received, and testing terminal equipment connected to the remote host. The method includes the steps. The server sequentially partitions a test data, and performs a compression program and an encryption program to produce a plurality of first partitioned data, a compressed data, and a plurality of encrypted data respectively; next, the server transmits the encrypted data to the remote host; the remote host performs a decryption program sequentially to restore the encrypted data into the second partitioned data, then combines the second partitioned data into the compressed data, and performs a decompression program on the compressed data to restore the data into the first partitioned data, then recombines the first partitioned data to restore the data into the test data.
    Type: Application
    Filed: December 23, 2008
    Publication date: June 24, 2010
    Applicant: INVENTEC CORPORATION
    Inventors: Zhen-Bao Sun, Ping Song, Tom Chen