Patents by Inventor Tom Chen
Tom Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100256637Abstract: A laparoscopic nephrectomy device is disclosed. The device has an upper jaw and a lower jaw designed to clamp a portion of an organ, such as a kidney, so as to cut off blood flow locally to a portion of that organ. The upper jaw includes a mid-jaw piece and a top jaw piece, with each piece separately articulated. The mid-jaw piece is pivotably connected to the lower jaw. A top jaw piece is pivotably connected to the mid-jaw piece. The mid-jaw and top jaw pieces include a mechanism to fix the angular orientation of the mid-jaw and top jaw pieces with respect to one another, including a retractable slide piece that is carried by the mid-jaw piece and received in a slot in the top jaw piece. The jaws have insulated troughs that carry electrode structure for applying coagulative therapies.Type: ApplicationFiled: April 2, 2010Publication date: October 7, 2010Applicant: DEVICE EVOLUTIONS, LLCInventors: Francisco Contijoch, Michelle Harran, Carolyn Purington, Tom Chen, Smita Mohan, Aubri Gillespie
-
Publication number: 20100251370Abstract: A network intrusion detection system applied to detect and monitor network packets. The network intrusion detection system decides to load and operate detection rules according to a current load. The network intrusion detection system includes a network connection unit, a storage unit, and a processing unit. The processing unit operates an alert correlation program, a plurality of detection rules, and a plurality of operation policies according to the received network packets. The alert correlation program applied to detect whether contents of the network packets conform to the detection rules, assign a resource consumption level to each detection rule, and categorize the detection rules to the operation policies according to the resource consumption levels. A loading level of the processing unit is decided according to a device load and an access load. The operation policies and the alert correlation program that the processing unit operates are decided according to the loading-level.Type: ApplicationFiled: March 26, 2009Publication date: September 30, 2010Applicant: Inventec CorporationInventors: Meng Sun, Tom Chen
-
Publication number: 20100251013Abstract: A method for processing a bad block in a redundant array of independent disks (RAID) is presented, which is characterized by a software RAID constructed by a scale computer interface disk, and adapted to backup data in a bad block in the software RAID. The method includes invoking an access error program to intercept an access instruction for a data block in the software RAID when the data block is a bad block; searching a disk number and a logical block address of the data block in the software RAID according to the access instruction; selecting the scale computer interface disk; and mapping data stored in the data block, the disk number, and the logical block address to a reserved local memory of the scale computer interface disk. Through the above steps, the data in the bad block can be mapped to a normal block, thus maintaining the data integrity.Type: ApplicationFiled: March 26, 2009Publication date: September 30, 2010Applicant: Inventec CorporationInventors: Hai-Ting Yao, Qing-Xiu Wu, Tom Chen
-
Publication number: 20100251355Abstract: A method for obtaining data for intrusion detection obtains data after forward chain filtering of a firewall. Modes of obtaining the data include a socket communication mode and a character device work mode. The method for obtaining the data for intrusion detection obtains the data filtered by the firewall, and reduces false alarms. Moreover, the method obtains the data after a network address translation (NAT) operation, so as to locate an attacker and a victim correctly. The method further obtains a decrypted Internet Protocol Security (IPsec) data packet, so as to process an IPsec data stream normally.Type: ApplicationFiled: March 31, 2009Publication date: September 30, 2010Applicant: INVENTEC CORPORATIONInventors: Yan LI, Gui-Dong Liu, Tom Chen
-
Publication number: 20100250879Abstract: A data manipulation method of a logical volume manager is applicable to data management of dependent snapshot volumes (SVs) of a logical volume manager. The data management method includes the following steps generating a plurality of SVs, defining the SV generated at first as a first SV, defining the SV generated at last as a last SV, and defining the rest SVs as middle SVs; selecting a middle SV; combining content stored in the selected middle SV into a neighboring SV; according to the combined SV, combining meta-data of the selected middle SV into meta-data of the middle SV; deleting the selected middle SV. The logical volume manager does not need copy the data again, thereby saving access time in data management.Type: ApplicationFiled: March 26, 2009Publication date: September 30, 2010Applicant: INVENTEC CORPORATIONInventors: Hai Ting Yao, Tom Chen
-
Publication number: 20100250728Abstract: A method for controlling a web page operation in browser/server architecture is adapted to prevent the same page from being operated by more than one people at the same time. The method includes establishing a status record table for recording a usage status of web page by server; checking usage status of web page in status record table after server receiving a request for operating the web page from a second browser; accepting request and submitting an operation control right of the web page to second browser if the usage status is idle; sending a check message to first browser to check whether first browser is still using the web page or not if usage status in status record table indicates that web page is used by first browser; rejecting request and transmitting usage status of web page to second browser if first browser is still using the web page.Type: ApplicationFiled: March 26, 2009Publication date: September 30, 2010Applicant: Inventec CorporationInventors: Xue Min Zhang, Tom Chen
-
Publication number: 20100250651Abstract: A data access method for making an asynchronous request to a block device is adapted to access a block device in a server end and perform corresponding processing according to a plurality of data access requests. The data access method includes the steps. A current request is received from a client. A virtual device of the block device is invoked. The current request is compared with a request queue storing a plurality of requests to be processed. The requests to be processed are selected from the request queue according to an access address of the current request. A request merging program is performed on the requests to be processed with adjacent access addresses and the current request to generate a merged request. The merged request is submitted to the request queue. The requests having low access capacities is merged, so as to improve the access efficiency of the block device.Type: ApplicationFiled: March 31, 2009Publication date: September 30, 2010Applicant: INVENTEC CORPORATIONInventors: Ming-Hao Bi, Tom Chen
-
Publication number: 20100250832Abstract: A storage service device with a dual controller and a backup method thereof are applicable to provide the same view service to an event-login log and a configuration file of a server. The storage service device includes a first control module, a second control module, a battery unit, a basic input/output system (BIOS), and a backup procedure. Once a power failure occurs to the server, the following backup procedure is performed a hardware interrupt signal is sent to the battery unit, so as to provide an operation power to a first memory module and a second memory module; an index page of the first memory module is synchronized with that of the second memory module; and the updated index pages are recorded into a first flash memory and a second flash memory respectively.Type: ApplicationFiled: March 30, 2009Publication date: September 30, 2010Applicant: INVENTEC CORPORATIONInventors: Xu Ming Zhang, Tom Chen
-
Publication number: 20100246592Abstract: A load balancing method for network intrusion detection includes the following steps. Packets are received from a client. The data packets include a protocol type and a protocol property. An intrusion detection procedure is loaded on a receiving end. A corresponding request queue is set for each intrusion detection procedure. The request queue is used for storing the data packets. The data packets are processed a separation procedure, and are categorized into data packets of a chain type and data packets of a non-chain type according to the protocol type. The data packets of the chain type are processed by a first distribution procedure. The data packets of the non-chain type are processed by a second distribution procedure. The distribution procedures distribute the data packets to the corresponding request queues according to the protocol property. The corresponding intrusion detection procedure is performed on the data packets in each request queue.Type: ApplicationFiled: March 31, 2009Publication date: September 30, 2010Applicant: Inventec CorporationInventors: Xiao-Qian Li, Tom Chen
-
Publication number: 20100215052Abstract: An iSCSI network interface card with an ARP/ICMP resolution function is applicable to provide a communication interface between a host and a client, and includes a first connection interface, an ARP procedure, an ICMP procedure, a storage unit, and a processor. The first connection interface is connected to the host. The ARP procedure queries an IP address of the client. The ICMP procedure transfers a message of failing to reach the IP address of the client and detects a connecting status to the Internet. The storage unit is connected to the first connection interface and stores the network packet, the ARP procedure, and the ICMP procedure. The processor is connected to the first connection interface and the storage unit, and executes the ARP procedure and the ICMP procedure according to a service request.Type: ApplicationFiled: February 20, 2009Publication date: August 26, 2010Applicant: INVENTEC CORPORATIONInventors: Wei LIU, Yun-Song WANG, Tom CHEN
-
Publication number: 20100211943Abstract: A method for simplifying a process for installing an application of a Windows operating system is applied. The method includes the following steps. An answer file is created, in which an installation profile is created according to an installation sequence of installation packages of the Windows operating system and a configuration file is created according to environment parameters of the Windows operating system. The answer file is loaded. An original Windows Preinstallation Environment Image (WIM) file is read, and is stored into a memory unit, and the original WIM file defined as a target WIM file. The answer file is added and modified into a Windows image file of the target WIM file. The target WIM file is initiated and an installation procedure of the Windows operating system is performed.Type: ApplicationFiled: February 18, 2009Publication date: August 19, 2010Applicant: INVENTEC CORPORATIONInventors: Tao Chu, Tom Chen
-
Publication number: 20100205420Abstract: A system and a method for realizing a remote test on a computer apparatus without a storage device are described, in which a client is enabled to select a desired operating system image file from a server and use the operating system image file to provide an initial processing on an operating system of the client. The testing method includes initializing a virtual disk in the client, registering the virtual disk to a basic input and output system (BIOS) of the client, connecting to a server over network according to connection information in the virtual disk, loading boot information into the client from the server, and performing a boot procedure on the client according to the boot information. Therefore, during a booting process of the client, a virtual disk is initialized in the server, so as to be used for booting the client.Type: ApplicationFiled: February 9, 2009Publication date: August 12, 2010Applicant: INVENTEC CORPORATIONInventors: Town Chen, Qiu-Yue Duan, Tom Chen
-
Publication number: 20100205600Abstract: A simulation method for realizing large batches and different kinds of baseboard management controllers using a single server includes providing a virtual baseboard management controller by a target terminal according to different customized virtual baseboard management controller resources correspondingly. The simulation method includes initializing large batches and different kinds of virtual baseboard controller programs according to a customizable virtual baseboard controller resource. If a client requests to access one baseboard controller or multiple baseboard controllers, which virtual baseboard controller will provide a service is determined according to the information of the accessing request of the client. Then an output result is generated according to the behaviors defined in the customized resource. Finally, the output result is transferred to the client. Therein, the client may connect to the target terminal through Internet or a bus.Type: ApplicationFiled: February 6, 2009Publication date: August 12, 2010Applicant: INVENTEC CORPORATIONInventors: Guo-Hong TU, Jin-Cheng LIU, Tom CHEN
-
Patent number: 7770065Abstract: A file data restoring system and method of a computer operating system and software thereof are applied in the installation of an operating system into a client computer. Divide the file data corresponding to the operating system into data blocks according to an appointed data size. Generate a check code for each of the data blocks to form a sequence list of original check codes and a sequence list of target check codes. Compare the sequence list of original check codes with the sequence list of target check codes, after installing the operating system into the computer. If the comparison result is inconsistent, a restoring call information is sent out. The position of the inconsistent check code is acquired through the restoring call information and the comparison result. The original file data corresponding to the position of the check code is read and restored to a corresponding target file.Type: GrantFiled: February 6, 2008Date of Patent: August 3, 2010Assignee: Inventec CorporationInventors: Yue Zhang, Tom Chen, Win-Harn Liu
-
Publication number: 20100180087Abstract: A communication method for accelerating Internet small computer system interface data and a processing system thereof are used for sending a plurality of data packets to a plurality of storage devices by a target of the Internet small computer system interface. The communication method includes the following steps. An access request for accessing the storage devices is received by the target. A plurality of small computer interface commands is generated according to the access request. The small computer interface commands are read by an egress packet generator in the target. An address resolving procedure is performed by the egress packet generator for converting the small computer interface commands to a plurality of network packets. A first check code is generated according to a storage content in each network packet. The first check codes are added to the network packets.Type: ApplicationFiled: January 13, 2009Publication date: July 15, 2010Applicant: INVENTEC CORPORATIONInventors: Ming-Sheng Zhu, Yun-Song Wang, Tom Chen
-
Publication number: 20100175073Abstract: A network device for accelerating internet small computer systems interface (iSCSI) packet processing is described, which includes a host and a network card. The host includes an online command descriptor block queue, an iSCSI host manager, and an SCSI module. SCSI commands in a CDB are processed through these modules. The network card includes an LLP module and a microprocessor. Through a protocol data unit descriptor, a PDU generator and an iSCSI network card manager in the microprocessor, protocol data units in network packets can be resolved in advance, so that the host can concentrate on executing SCSI commands, thereby accelerating the network packet processing efficiency of the network device.Type: ApplicationFiled: January 7, 2009Publication date: July 8, 2010Applicant: INVENTEC CORPORATIONInventors: Zhi-Jiang Hu, Qian Zhang, Tom Chen
-
Publication number: 20100157800Abstract: A method for processing network traffic loading balance is adapted for balancing the load of a session of various data packet processing threads in a network equipment. The method includes the following steps. First, a plurality of data packet processing threads is executed, a queue is assigned to each thread for storing the received data packets, and the data packet is read from the queue by the thread for processing. Then, it is determined whether the number of the data packets in the queue satisfies a traffic threshold value. If the number of the data packets in a certain queue satisfies an operating threshold value, new data packets are allocated by the network equipment to other queues without affecting the integrity of the session. Therefore, the present method not only maintains the integrity of the session, but also ensures the uniformity in load among the data packet processing threads.Type: ApplicationFiled: December 19, 2008Publication date: June 24, 2010Applicant: INVENTEC CORPORATIONInventors: Gui-Dong Liu, Tom Chen
-
Publication number: 20100161786Abstract: A QoS control method for iSCSI supports QoS control between an initiator device and a target device, and includes the following steps. Preset two variables bucket and bucket_used. Receive a PDU sent from a connection. If the PDU carries or requests data, add lengths of data carried or requested by the PDU in the current one second and store the result to bucket_used. Determine whether bucket_used is larger than bucket or not. Rf yes, suspend the current QoS control object for iSCSI and accept no additional new PDU handling until the end of the current one second. Or otherwise, forward the PDU to an iSCSI PDU handler for subsequent execution. The QoS control method can perform a QoS control on different QoS control objects for iSCSI with a unified control granularity in the iSCSI service level, so that the complexity of the QoS control is greatly reduced.Type: ApplicationFiled: December 22, 2008Publication date: June 24, 2010Applicant: INVENTEC CORPORATIONInventors: Cang-Mou CAO, Tom Chen
-
Publication number: 20100157806Abstract: A method for processing data packet load balancing and a network equipment thereof, which are for balancing the load of a plurality of controllers in a network equipment. The method comprises the steps. A plurality of data packets is received. A storage queue is assigned for storing the data packets. The data packets in the storage queue are read by an allocation controller. The allocation controller assigns the data packets to different work sequences according to a work attribute of the data packets. A processing controller is commanded to perform a packet processing procedure, and at least one work queue is assigned to the processing controller for processing the data packets. After completing the packet processing procedure, the processing controller sends a completion message to a completion queue. If the allocation controller detects that the completion queue contains the completion message, the allocation controller sends the processed data packets back.Type: ApplicationFiled: December 23, 2008Publication date: June 24, 2010Applicant: INVENTEC CORPORATIONInventors: Xian-Guang Song, Tom Chen
-
Publication number: 20100158244Abstract: A communication encryption method for supporting a remote monitoring and control system includes establishing a communication network between a server and a remote host, encrypting a data to be transmitted/received, and testing terminal equipment connected to the remote host. The method includes the steps. The server sequentially partitions a test data, and performs a compression program and an encryption program to produce a plurality of first partitioned data, a compressed data, and a plurality of encrypted data respectively; next, the server transmits the encrypted data to the remote host; the remote host performs a decryption program sequentially to restore the encrypted data into the second partitioned data, then combines the second partitioned data into the compressed data, and performs a decompression program on the compressed data to restore the data into the first partitioned data, then recombines the first partitioned data to restore the data into the test data.Type: ApplicationFiled: December 23, 2008Publication date: June 24, 2010Applicant: INVENTEC CORPORATIONInventors: Zhen-Bao Sun, Ping Song, Tom Chen