Patents by Inventor Tom Chen
Tom Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20090235256Abstract: A system architecture for implementing a virtual disk service (VDS) equipment is applicable for implementing an overall management on multiple service request objects in a VDS system. The system architecture includes a VDS interface, a subsystem management module, an object management module, a virtual disk management module, and a specific management module. The VDS interface receives a service request, and renders the service request to the subsystem management module for judging a type of the service request. The virtual disk management module generates a plurality of virtual interfaces for being invoked by the subsystem management module, so as to execute the service request of a public operation type. When the service request requires for supporting an asynchronous processing, the specific management module is further invoked to process the service request, and generates a feedback result to respond the service request via the VDS interface.Type: ApplicationFiled: March 17, 2008Publication date: September 17, 2009Applicant: INVENTEC CORPORATIONInventors: Hai-Yan CHANG, Tom CHEN, Win-Harn LIU
-
Publication number: 20090234982Abstract: A method of identifying and dynamically updating storage device status at a target is applied for a storage area network (SAN) built by Linux system, for determining operating status of storage devices at a target through logic device identification numbers. First, a session is established between an initiator and the target, and allocated storage devices and corresponding logic unit numbers (LUNs) are obtained. Then, the initiator sends a CMD request packet with report LUN command to the target. Afterward, according to the LUNs in a received CMD response packet, operating status corresponding to the storage devices is determined. Thereby, timeout may be reduced by avoiding sending queries to those storage devices. When the device allocation is modified, the target may send an asynchronous message PDU to update a storage device status record at the target, so as to maintain the usability of the record.Type: ApplicationFiled: March 13, 2008Publication date: September 17, 2009Applicant: INVENTEC CORPORATIONInventors: Hong-Ming Li, Ming-Sheng Zhu, Tom Chen, Win-Harn Liu
-
Publication number: 20090235355Abstract: A network intrusion protection system (NIPS) is built at an important network node, for example, at a boundary router, for filtering network packets containing malicious intrusion/attacking behaviors. A network card of the NIPS includes a microprocessor, a network packet decode procedure and a malicious intrusion packet filtering procedure, for filtering malicious network packets in advance according to header information of the network packets. Then, a central processor of the NIPS is used to parse the contents in the rest network packets, and determine whether the network packets are malicious packets according to an intrusion behavior definition file. The network packets are discarded if the network packets are malicious. Otherwise, the network packets are transferred to computers in internal local area network if the network packets not malicious.Type: ApplicationFiled: March 17, 2008Publication date: September 17, 2009Applicant: INVENTEC CORPORATIONInventors: Yi CHEN, Tom CHEN, Win-Harn LIU
-
Publication number: 20090225767Abstract: A network packet capturing method for capturing a plurality of packets from a physical layer to an application layer by a network server through a network card is described. The packet capturing method includes the following steps. Capture packets by a new application interface (NAPI); set a ring queue in a kernel; provide a hook process for capturing the packets; store the captured packets into the ring queue; and map the packets stored in the ring queue into a memory space of a corresponding application through memory mapping, thereby reducing the number of interrupts of the system and the number of replications during the packets parsing.Type: ApplicationFiled: March 5, 2008Publication date: September 10, 2009Applicant: INVENTEC CORPORATIONInventors: Xian-Guang Song, Xing-Jia Wang, Tom Chen, Win-Harn Liu
-
Publication number: 20090228241Abstract: A system testing method through a subsystem performance-based generator is used to perform tests on a single module performance in a Linux system. The subsystem performance-based generator generates an initial performance testing parameter, and sets a memory occupying space, CPU occupation rate, and I/O performance of a module to be tested according to the testing parameter. After setting the testing parameter, the performance of the whole Linux system is tested through a performance testing tool. Next, another performance testing parameter is generated by the subsystem performance-based generator, and then the system performance test is performed after setting the module to be tested accordingly. Various performance value settings of the module to be tested are dynamically adjusted through the method, and then the performance test of the whole system is performed, so as to accurately find out the bottleneck problem of the performance, thereby improving reliability of the system test.Type: ApplicationFiled: March 7, 2008Publication date: September 10, 2009Applicant: INVENTEC CORPORATIONInventors: Miao MA, Tom CHEN, Win-Harn LIU
-
Publication number: 20090213736Abstract: A method of processing an external service request in a storage area network (SAN) is used for responding a service request in the SAN with multiple controllers, and the method includes the following steps. A first controller of the SAN receives a request packet of an external network. When the first controller determines that the request packet must be transmitted to a second controller actually providing service in an internal network, the request packet is transmitted to the second controller. The second controller receives the request packet, and parses a source address contained therein for recording. The second controller executes an operation instruction corresponding to the request packet, and then generates an acknowledge packet. The second controller takes the source address as a destination address of the acknowledge packet and directly transmits the acknowledge packet to an original request initiator.Type: ApplicationFiled: February 27, 2008Publication date: August 27, 2009Applicant: INVENTEC CORPORATIONInventors: Qing-Biao Liu, Xiao-Bin Gao, Tom Chen, Win-Harn Liu
-
Publication number: 20090217341Abstract: A method of updating intrusion detection rules through a link data packet is used to dynamically update rules storages of Snort system hosts. Firstly, an update sponsor in the network transmits a link data packet with an intrusion detection rule to the Snort system host. The Snort system host acquires the intrusion detection rule from the received link data packet, and parses an operation type of the intrusion detection rule. Then, the Snort system host verifies the validity of the intrusion detection rule. Subsequently, the rules storage is updated according to the type of the valid intrusion detection rule and a rules tree.Type: ApplicationFiled: February 22, 2008Publication date: August 27, 2009Applicant: INVENTEC CORPORATIONInventors: Meng Sun, Tom Chen, Win-Harn Liu
-
Publication number: 20090216886Abstract: A method of multi-path accessing a remote logic device under a Linux system is used to realize a multi-path access between an initiator and a target in a storage area network (SAN). Firstly, a communication is established between the initiator and the target. Next, the initiator requests to establish at least one link session with the target. Then, the initiator obtains an iSCSI-connected host assigned by the target, and also obtains a message about connected devices corresponding to the iSCSI-connected host through transmitting a report logic unit number (LUN) command. Then, the initiator configures a device mapper, and the device mapper generates information about redundant devices according to the connected devices and the corresponding LUNs, and the redundant connected devices are mapped into a unique mapping device.Type: ApplicationFiled: February 21, 2008Publication date: August 27, 2009Applicant: INVENTEC CORPORATIONInventors: Ming-Sheng Zhu, Ji-Dong Wang, Tom Chen, Win-Harn Liu
-
Patent number: 7581143Abstract: A peripheral component interconnect (PCI) bus test system and method therefor, that is applied in a PCI test card. The PCI test card includes a static random-access-memory (SRAM). In the method, the data transaction of the PCI bus signal is disintegrated into a separate data operation, while eliminating the waveform interfering transaction. Through comparing the waveform of the data operation as separated from a PCI bus signal with the standard PCI bus waveform, the quality of the PCI bus signals can be precisely analyzed, thus realizing the hardware test of PCI bus.Type: GrantFiled: February 21, 2007Date of Patent: August 25, 2009Assignee: Inventec CorporationInventors: Tao Liu, Qi Zhao, Tom Chen, Win-Harn Liu
-
Publication number: 20090204773Abstract: A method of writing device data in a dual controller network storage environment is described. According to the method, functions of a virtual data router (VD router) and a mirror technology are integrated, so as to efficiently transmit internal network data and write data into disk devices on different controllers in a dual controller network storage environment. Thereby, the internal network data transmission efficiency and actual internal network utilization can be improved.Type: ApplicationFiled: February 7, 2008Publication date: August 13, 2009Applicant: INVENTEC CORPORATIONInventors: Xu-Ming ZHANG, Tom CHEN, Win-Harn LIU
-
Patent number: 7574624Abstract: An integrated test method on a multi-operation system (OS) platform for performing an integrated test of a file system and disk performance in a computer with an extended firmware interface (EFI) system environment on multiple OS platforms is provided. The method includes the following steps. Scan sectors of an entire physical hard disk and perform a hardware underlying test of a disk device in the EFI environment; select and load an OS, then enter the OS environment to test the file system and the disk performance in the system environment; exit from the OS and return to the EFI environment to summarize a test result; determine whether it is necessary to load other OSes, if necessary, return and load other OSes, and if not, send the summarized test result to a server terminal for analysis and processing.Type: GrantFiled: February 20, 2007Date of Patent: August 11, 2009Assignee: Inventec CorporationInventors: Town Chen, Kai Wang, Tom Chen, Win-Harn Liu
-
Publication number: 20090198768Abstract: An asynchronous request-response communication method is applied in data transmission for applications running in a server. The asynchronous request-response method includes the following steps. Establish a socket and a connection port corresponding to a request in a request side; set an object pool in each request side respectively, for recording connection statuses of the sockets corresponding to different requests; wait till the server has finished the request; once the server has finished the received request, the server transmits a callback message to the corresponding socket of the request side; and search a corresponding process event in the object pool according to the callback message. The request side adopts the socket and the connection port to perform the asynchronous request-response operations, thereby reducing the connection load between the server and the request side.Type: ApplicationFiled: January 31, 2008Publication date: August 6, 2009Applicant: INVENTEC CORPORATIONInventors: Wei Gao, Tom Chen, Win-Harn Liu
-
Publication number: 20090198868Abstract: A method of accessing a virtual storage device through a virtual data router (VD router) is described. A virtual disk device on a controller may be accessed from various controllers through different paths based on asynchrony of data sending/receiving of a VD router. Moreover, the method is advantageous in having high access efficiency and consistency of data access via different paths at the same time.Type: ApplicationFiled: February 6, 2008Publication date: August 6, 2009Applicant: INVENTEC CORPORATIONInventors: Xu-Ming ZHANG, Tom CHEN, Win-Harn LIU
-
Publication number: 20090199039Abstract: A file data restoring system and method of a computer operating system and software thereof are applied in the installation of an operating system into a client computer. Divide the file data corresponding to the operating system into data blocks according to an appointed data size. Generate a check code for each of the data blocks to form a sequence list of original check codes and a sequence list of target check codes. Compare the sequence list of original check codes with the sequence list of target check codes, after installing the operating system into the computer. If the comparison result is inconsistent, a restoring call information is sent out. The position of the inconsistent check code is acquired through the restoring call information and the comparison result. The original file data corresponding to the position of the check code is read and restored to a corresponding target file.Type: ApplicationFiled: February 6, 2008Publication date: August 6, 2009Applicant: INVENTEC CORPORATIONInventors: Yue ZHANG, Tom CHEN, Win-Harn LIU
-
Publication number: 20090198830Abstract: A method of adjusting a network data sending speed according to a data processing speed at a client is described. Through calculating and feeding back a data processing speed of a client computer to a server; and then, controlling and adjusting a data sending speed at the server in real time according to the data processing speed, the server adjusts the data sending speed thereof in real time according to the requirement on speed control, and sends data to the client computer at an adjusted data sending speed. This method controls and adjusts the data sending speed at the server through a feedback mechanism of the data processing speed of the client computer, thereby avoiding problems in the conventional art, such as low network data transmission efficiency and data loss, caused by mismatching between the data processing speed at the client and the data sending speed at the server.Type: ApplicationFiled: February 6, 2008Publication date: August 6, 2009Applicant: INVENTEC CORPORATIONInventors: Yue ZHANG, Tom CHEN, Win-Harn LIU
-
Publication number: 20090198988Abstract: A method for verifying refreshed BIOS content includes the following steps. A virtual machine (VM) is established in a computer waiting for a system BIOS update by the use of a paravirtualization technique. The VM is booted. A new BIOS file content is copied to an address space in a designated range of a memory of a computer host. The computer host is booted with the content of the new BIOS file, and the paravirtual operating system runs on the same hardware platform of the computer host. And, whether the virtual operating system adopting the new BIOS file content runs normally or not is verified to confirm the correctness and safety of the content of the new BIOS file.Type: ApplicationFiled: January 31, 2008Publication date: August 6, 2009Applicant: INVENTEC CORPORATIONInventors: Yuan Bai, Tom Chen, Win-Harn Liu
-
Publication number: 20090193436Abstract: An alarm display system of a cluster storage system and a method thereof are described. A reasonable single abnormal event processing manner is adopted to classify the alarm priority through abnormal events detected by different nodes sharing a common device in the cluster storage system, and analyze load of each node. That is, nodes with lower loads are analyzed to obtain all the abnormal events of the common device and the node most affected by the abnormal events in the cluster storage system. Afterward, the analysis result is transmitted to each node, and each node then informs a subscriber with an alarm prompt, so as to reasonably and correctly alarm the subscriber with abnormal events of the common device and impacts thereof on the nodes.Type: ApplicationFiled: January 30, 2008Publication date: July 30, 2009Applicant: INVENTEC CORPORATIONInventors: Qi-Fei Du, Tom Chen, Win-Harn Liu
-
Publication number: 20090185761Abstract: A method of generating an image file may generate corresponding image files from data units in a first storage device of a source. The method of generating an image file includes generating an image file head according to hardware parameter information of the first storage device; partitioning the first storage device into a plurality of data units with the same size; performing a compression process to compress data in the data units, respectively, thereby generating corresponding compressed data blocks; sequentially storing the compressed data blocks in a data area of the image file; creating an index table to use an index value to record start positions of the data units in the first storage device and positions of the compressed data blocks in the data area into the index table; and creating a file foot information to mark a file length of the image file.Type: ApplicationFiled: January 18, 2008Publication date: July 23, 2009Applicant: INVENTEC CORPORATIONInventors: Jiang HE, Tom CHEN, Win-Harn LIU
-
Publication number: 20090187684Abstract: An automatic inspection system and method for a notebook computer keyboard interface are described. The method includes the following steps including scanning a notebook computer keyboard array to obtain a keyboard position corresponding table; running a testing software in the notebook computer to obtain a position value of a key under test from the keyboard position corresponding table; receiving a testing command from the testing software by an USB interface; constituting a virtual keyboard matrix with at least one matrix switching chip, for controlling the close action of a corresponding key position in the virtual keyboard matrix according to the testing command; transferring the actual key position value corresponding to the output close action to the notebook computer according to the configuration of the notebook computer keyboard interface; and receiving and comparing the actual key position value with the position value of the key under test.Type: ApplicationFiled: January 17, 2008Publication date: July 23, 2009Applicant: INVENTEC CORPORATIONInventors: Xue-Shan HAN, Juen LIOU, Tom CHEN, Win-Harn LIU
-
Publication number: 20090185762Abstract: A data structure for an image file includes an image file head, a data area, an index table, and file tail information. The image file head records hardware parameter information of a storage device and partitions the storage device into a plurality of data units. The data units are compressed to generate corresponding compressed data blocks. The generated compressed data blocks are stored in the data area. The index table uses an index value to record start positions of the data units and positions of the compressed data blocks in the image file into the index table. The file tail information marks a file length of the image file. During network transmission of the image file, a destination may restore the received compressed data blocks to the corresponding positions.Type: ApplicationFiled: January 18, 2008Publication date: July 23, 2009Applicant: INVENTEC CORPORATIONInventors: Jiang HE, Tom CHEN, Win-Harn LIU