Patents by Inventor Tom Chen

Tom Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080209122
    Abstract: A method of automatically adjusting a size of a copy-on-write (COW) disk space of a snapshot device is provided. A first disk space of a snapshot device is initialized, and a COW operation is performed on a chunk of the first disk space. Next, it is determined whether a chunk sequence number of a write request is in the first disk space. Then, if the chuck sequence number of the write request is in the first disk space, the first disk space is maintained. Then, if the chuck sequence number of the write request is not in the first disk space, a second disk space is initialized, and the number of chunks of the second disk space is the same as the number of maximum successive chunks of the first disk space, and then, the COW operation is performed on the chunk of the second disk space.
    Type: Application
    Filed: February 26, 2007
    Publication date: August 28, 2008
    Inventors: Lei Li, Jian-Feng Guo, Tom Chen, Win-Harn Liu
  • Publication number: 20080209261
    Abstract: A data repair and synchronization method of dual flash ROM is provided, which includes a first flash ROM and a second flash ROM that store the same system data, wherein one of the first flash ROM and the second flash ROM is used to perform a data repair on the other flash ROM with damaged data and perform a data synchronization between the two flash ROMs, thereby ensuring that once the data in one flash ROM is damaged during the system operation, the complete system data stored in the other flash ROM is used to recover the damaged operating system and the files in the system. Meanwhile, through performing the data synchronization periodically, important configuration files in the system stored in the two flash ROMs are kept to be updated and completed.
    Type: Application
    Filed: February 26, 2007
    Publication date: August 28, 2008
    Applicant: Inventec Corporation
    Inventors: Nan Zhang, Yan-Peng Yang, Tom Chen, Win-Harn Liu
  • Publication number: 20080209100
    Abstract: A hard disk testing method under an extensible firmware interface (EFI) is provided, which includes the following steps. A system file is backed up from the EFI of the hard disk into a storage area of a memory. The backup area of the system file is mapped as a real hard disk. A non-system file storage area is established in the memory, so as to store the non-system files of a hard disk test. Information of the system and non-system files of the hard disk test is acquired, so as to generate a system and a non-system file link table. When performing the test, the non-system files are backed up into the non-system file storage area. The system file link table and/or the non-system file link table is accessed, so as to load the system file and/or the non-system files directly from the storage area of the memory.
    Type: Application
    Filed: February 26, 2007
    Publication date: August 28, 2008
    Inventors: Zhi Wang, Tom Chen, Win-Harn Liu
  • Publication number: 20080209032
    Abstract: An alarm method for insufficient storage space of a network storage system is provided. The method includes the following steps. Preset a time alarm threshold value according to a current operation state of the system when allocating storage spaces to users. Estimate a time that written data fully occupy a current remaining space according to a data writing speed to the storage space, a current idle memory of the system, total dirty data in a cache of the system, and the current remaining space in the storage space. Compare the estimated time value and the time alarm threshold value. And, send alarm information when the estimated time value is smaller than the time alarm threshold value. By setting the alarm threshold value of a time concept, a timely alarm of insufficient storage space is realized, which enhances the effective management of the storage space.
    Type: Application
    Filed: February 22, 2007
    Publication date: August 28, 2008
    Applicant: INVENTEC CORPORATION
    Inventors: Jian-Feng Guo, Lei Li, Tom Chen, Win-Harn Liu
  • Publication number: 20080209418
    Abstract: A method of dynamically adjusting the number of task requests is provided, which is applicable to an Internet Small Computer System Interface (iSCSI) protocol. When a target receives a task request transmitted by an initiator or the target completes the task request, the number of transmissible tasks is calculated according to an average access data volume, an current access data volume, and an allowable access data volume in the target, and returned to the initiator, such that the number of the task requests transmitted simultaneously by the initiator does not exceed the number of transmissible tasks, thereby achieving flow control. The allowable access data volume is obtained through interactive and dynamic adjustment between the target and the initiator.
    Type: Application
    Filed: February 26, 2007
    Publication date: August 28, 2008
    Applicant: Inventec Corporation
    Inventors: Hong-Liang Liu, Ho Zhang, Tom Chen, Win-Harn Liu
  • Publication number: 20080198740
    Abstract: A service take-over system of a multi-host system and a method therefor are provided, in which the multi-host system includes a service host and at least one standby host with their operating state monitored mutually via a heartbeat mechanism. When the service host for providing a service externally fails, an external public IP address for providing a service externally of the service host is taken over to a standby host. A service environment required for taking over the service of the service host to the standby host is prepared. The preparation state of the service environment is detected, and access request data packets via the external public IP address to the service are dropped before the service environment gets ready. The service is taken over after the service environment is ready, and the access request data packets to the service are received, so as to provide the service externally.
    Type: Application
    Filed: February 20, 2007
    Publication date: August 21, 2008
    Inventors: Hong-Liang Liu, Tom Chen, Win-Harn Liu
  • Publication number: 20080201551
    Abstract: A virtual disk (VD) router system, a VD access system, and a method therefor, applied to a dual-controller system including a first controller and a second controller, are provided. First, a mapping virtual block device (VBD) corresponding to a VD of the second controller and/or the first controller is established in the first controller and/or the second controller, and a mapping relation list and a data transmission channel of the VD and the corresponding VBD thereof are established. When the first controller/the second controller issues an access request to the VD of the second controller/the first controller, the data transmission channel is used to transmit the access request to the VD and transmit the response data to the access request from the VD. Therefore, the overall access to all the VDs in the dual-controller system can be achieved.
    Type: Application
    Filed: February 20, 2007
    Publication date: August 21, 2008
    Applicant: INVENTEC CORPORATION
    Inventors: Nan Zhang, Rui Zhang, Tom Chen, Win-Harn Liu
  • Publication number: 20080201610
    Abstract: An integrated test method on a multi-operation system (OS) platform for performing an integrated test of a file system and disk performance in a computer with an extended firmware interface (EFI) system environment on multiple OS platforms is provided. The method includes the following steps. Scan sectors of an entire physical hard disk and perform a hardware underlying test of a disk device in the EFI environment; select and load an OS, then enter the OS environment to test the file system and the disk performance in the system environment; exit from the OS and return to the EFI environment to summarize a test result; determine whether it is necessary to load other OSes, if necessary, return and load other OSes, and if not, send the summarized test result to a server terminal for analysis and processing.
    Type: Application
    Filed: February 20, 2007
    Publication date: August 21, 2008
    Applicant: INVENTEC CORPORATION
    Inventors: Town Chen, Kai Wang, Tom Chen, Win-Harn Liu
  • Publication number: 20080198762
    Abstract: A cross-subnet-nodes network node device detection method is provided, including the steps of disposing a boot module in each network node devices in an arbitrary subnet of a network; activating the first subnet node device to be a registry server and recording its registry information; activating other network node devices in the subnet, and dispatching the registry information of these devices to the registry server and recording it; searching for the IP address of the first available network node device in the subnet; issuing a command for searching the registry server, issuing a registry information command by the first available network node device, and obtaining the IP address of the registry server and sending it back to the discovery server; and upon receiving a command for searching the network node devices by the registry server, transmitting the information of the node devices in a subnet back to the discovery server.
    Type: Application
    Filed: February 20, 2007
    Publication date: August 21, 2008
    Applicant: INVENTEC CORPORATION
    Inventors: Yuan Bai, Tom Chen, Win-Harn Liu
  • Publication number: 20080201614
    Abstract: A peripheral component interconnect (PCI) bus test system and method therefor, that is applied in a PCI test card. The PCI test card includes a static random-access-memory (SRAM). In the method, the data transaction of the PCI bus signal is disintegrated into a separate data operation, while eliminating the waveform interfering transaction. Through comparing the waveform of the data operation as separated from a PCI bus signal with the standard PCI bus waveform, the quality of the PCI bus signals can be precisely analyzed, thus realizing the hardware test of PCI bus.
    Type: Application
    Filed: February 21, 2007
    Publication date: August 21, 2008
    Applicant: INVENTEC CORPORATION
    Inventors: Tao Liu, Qi Zhao, Tom Chen, Win-Harn Liu
  • Publication number: 20080201514
    Abstract: A method of locating peripheral component interconnect (PCI) devices is provided. The method includes analyzing peripheral component interconnect spaces (PCI spaces) of peripheral component interconnect-peripheral component interconnect bridges (PCI-PCI bridges) of a 0-numbered bus, so as to obtain a bus number of a next bus connected to each of PCI-PCI bridges and record the bus number in a linked list; continuing to record a bus number of a next bus connected to the PCI-PCI bridges corresponding to the bus number recorded in the linked list; and when no next bus number is found, traversing and locating the PCI devices according to all of the bus numbers recorded in the linked list.
    Type: Application
    Filed: February 21, 2007
    Publication date: August 21, 2008
    Applicant: INVENTEC CORPORATION
    Inventors: Tao Liu, Gang Zhou, Tom Chen, Win-Harn Liu
  • Publication number: 20080198846
    Abstract: A data transmission system and method and a method of selecting a communication path for a dual-controller system are provided, which are applied in a first controller and a second controller of the dual-controller system. First of all, a corresponding transmission medium is selected according to a feature of a data request issued by a controller, then the data request is converted into a data format compatible with a medium interface corresponding to the selected transmission medium and is sent to a corresponding medium driving portion connected with the medium interface, and the data request is sent to another controller through the medium driving portion and a connected corresponding medium controller, so as to select a path of the highest transmission performance, and realize the data transmission between the two controllers.
    Type: Application
    Filed: February 21, 2007
    Publication date: August 21, 2008
    Applicant: INVENTEC CORPORATION
    Inventors: Xiang-Bin Meng, Tom Chen, Win-Harn Liu
  • Publication number: 20080201605
    Abstract: A Dead man timer detecting method, a multiprocessor switching method, and a processor hot plug support method are provided. A hot spare boot control register communicated with the Dead man timer is used to detect functions of the Dead man timer, such as enabling, timing, disabling, and responding. After an operation system is booted, the Dead man timer is used to achieve automatic switch among multiple processors and the support for the processor hot plug. The method can detect various functions of the Dead man timer, and be switched among multiple processors automatically and periodically, without being limited by the type of operation systems and processors, and realize the support to the processor hot plug, thereby improving the safety for the hot plug operation.
    Type: Application
    Filed: February 21, 2007
    Publication date: August 21, 2008
    Applicant: INVENTEC CORPORATION
    Inventors: Qiu-Yue Duan, Tom Chen, Win-Harn Liu
  • Patent number: 7360016
    Abstract: A method of protecting data in the cache memory of a storage system is used to protect the data stored in the cache memory of a first storage system and a second storage system coupled together and with the battery backed function. When the first storage system and the second storage system function normally, the data in their cache memory are mutually backed up. When any of the storage system has a power failure situation, the other normal storage system takes over the malfunctioned storage device. The data in its own cache memory are protected using the battery backed function. After the malfunctioned storage system restarts, the two storage systems keep backing up the data in the cache memory of each other. This provides a thorough protection of the data in the cache memory of the storage systems, increasing the reliability thereof.
    Type: Grant
    Filed: April 20, 2006
    Date of Patent: April 15, 2008
    Assignee: Inventec Corporation
    Inventors: Cang-Mou Cao, Xing-Jia Wang, Jian-Feng Guo, Yi Chen, Tom Chen, Win-Harn Liu
  • Publication number: 20080062189
    Abstract: According to a method for automatically unfolding a computer monitor when starting a notebook, the opening speed of the computer monitor is determined, according to a predetermined starting time needed for a computer starting program (for example, the average time needed for the operating system initialization after activating the notebook) and a predetermined opening angle of the computer monitor, after the notebook is started. Meanwhile, a shaft coupled to the computer monitor is controlled through an on-off device according to the opening speed of the computer monitor, to unfold the computer monitor to a using position. This greatly facilitates the usage of a notebook upon its starting and activating. Further, its design is more convenient.
    Type: Application
    Filed: September 12, 2006
    Publication date: March 13, 2008
    Inventors: Liang Zhao, Tom Chen, Win-Harn Liu
  • Publication number: 20080016274
    Abstract: A method of protecting the cache memory data in a storage system is used to protect the data in the cache memory of a battery backed storage system. The method provides a preserved area in the random access memory (RAM) of the system for storing the information of disk cache items. When the storage system has a power failure, the battery backed function provides power to protect the data stored in the RAM of the system being lost. When the storage system resumes, the information stored in the preserved area preserves the data stored in the disk cache of the system RAM. After the storage system resumes, the data stored in the disk cache of the RAM of the system are written into the corresponding block device. These implement the power failure protection for the data stored in the disk cache of the RAM of the system.
    Type: Application
    Filed: July 13, 2006
    Publication date: January 17, 2008
    Inventors: Xing-Jia Wang, Jian-Feng Guo, Cang-Mou Cao, Yi Chen, Tom Chen, Win-Harn Liu
  • Publication number: 20080010421
    Abstract: A snapshot expansion system and a method, applicable to a logical volume manager, are provided. A snapshot space is allocated in a volume group space of a logical volume (LV) to create a snapshot. When a data write request is sent to the LV, the total capacity of the snapshot is compared with the current stored data volume of the snapshot space, thereby obtaining a difference representing the size of the remaining capacity of the snapshot space. Then, whether the difference is smaller than a preset value is detected. When the difference is smaller than the preset value, a capacity space is measured off in the volume group space to expand the capacity of the snapshot space through a standard expansion algorithm. The snapshot expansion system and method are capable of ensuring sufficient snapshot space to accommodate backup data, thereby ensuring availability of the snapshot.
    Type: Application
    Filed: July 10, 2006
    Publication date: January 10, 2008
    Inventors: Yuen-Hong Chen, Tom Chen, Win-Harn Liu
  • Publication number: 20070291704
    Abstract: An Internet protocol (IP) address take-over system in a local area network and a method thereof are provided. The IP address take-over system takes over the IP addresses in a server connecting with a plurality of clients and containing a plurality of network interface cards, and automatically updates the media access control (MAC) addresses stored in the address resolution protocol (ARP) caches of the clients and corresponding to the IP address of the server, so as to guarantee the continuity of the network communication between the clients and the server, and improve the reliability of the server.
    Type: Application
    Filed: June 14, 2006
    Publication date: December 20, 2007
    Inventors: Jian-Feng Guo, Xing-Jia Wang, Cang-Mou Cao, Yi Chen, Tom Chen, Win-Harn Liu
  • Publication number: 20070294600
    Abstract: A method of detecting heartbeats and the device thereof are applied to a cluster server. It includes a first controller, a second controller, and a detecting module. The detecting module does the counting according to a first predetermined period. If the detecting module receives a first reset signal of the first controller before the first predetermined period, it determines that the operation of the first controller is normal. If the detecting module has not receive the first reset signal of the first controller before the first predetermined period, then the operation of the first controller is determined to be abnormal. The detecting module sends out a control signal to start the second controller. The second controller communicates with the first controller to execute the corresponding failure transfer program and to interrupt the operation of the first controller.
    Type: Application
    Filed: May 8, 2006
    Publication date: December 20, 2007
    Inventors: Xing-Jia Wang, Tom Chen, Win-Ham Liu
  • Publication number: 20070288711
    Abstract: A logic volume snapshot copy management method used for a logic volume manager. When there is a data write-in request, the plurality of snapshot copies established in the logic volume corresponding to the various time points are utilized to search in the logic volume for the data address of the data to be written. Then the data are copied into the snapshot copy of the last time point, at the data address of the data to be written in the logic volume, by Copy-On-Write (COW) operation. When there is a snapshot copy read request, the snapshot copy data at the requested data address is to be retrieved. Through the method, the function of a high-speed snapshot copy can be realized. In addition, the storage space used for a snapshot copy can be reduced.
    Type: Application
    Filed: June 8, 2006
    Publication date: December 13, 2007
    Inventors: Yuen-Hong Chen, Tom Chen, Win-Harn Liu