Patents by Inventor Yao-Hsin Chen
Yao-Hsin Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190158293Abstract: A key storage device comprises a one-way receiving interface, a key calculation unit, and a one-way outputting interface. The key calculation unit includes a signature unit. The one-way receiving interface receives a transaction message of an external electronic device in a single direction. The signature unit encrypts the transaction message by a private key to generate a signature message. And, the one-way outputting interface transmits the signature message to the external electronic device in a single direction.Type: ApplicationFiled: December 14, 2017Publication date: May 23, 2019Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Yao-Hsin CHEN, Jui-Ting WU, Hsuan-Tung CHEN
-
Patent number: 9645887Abstract: A system and method for firmware upgrade in an AMI are provided. A remote server provides a firmware image file. After receiving the firmware image file and verifying the remote server, a data concentrator transmits at least one encoding symbol generated from the firmware image file to at least one meter through broadcasting and a retransmission mechanism of minimum retransmission contents. Upon receiving a predetermined number of encoding symbols, each meter recovers the original firmware image file from the received encoding symbols. Then, each meter receives and verifies an activation code generated by the remote server before carrying out the firmware upgrade.Type: GrantFiled: September 16, 2014Date of Patent: May 9, 2017Assignee: Industrial Technology Research InstituteInventors: Yao-Hsin Chen, Ping-Hai Hsu
-
Publication number: 20150149991Abstract: A system and method for firmware upgrade in an AMI are provided. A remote server provides a firmware image file. After receiving the firmware image file and verifying the remote server, a data concentrator transmits at least one encoding symbol generated from the firmware image file to at least one meter through broadcasting and a retransmission mechanism of minimum retransmission contents. Upon receiving a predetermined number of encoding symbols, each meter recovers the original firmware image file from the received encoding symbols. Then, each meter receives and verifies an activation code generated by the remote server before carrying out the firmware upgrade.Type: ApplicationFiled: September 16, 2014Publication date: May 28, 2015Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Yao-Hsin Chen, Ping-Hai Hsu
-
Patent number: 8948146Abstract: A femtocell, a femtocell gateway and an access rejection method thereof are provided. A wireless network system comprises a wireless device, a plurality of the femtocells, the femtocell gateway and a core network server. The wireless device has a Subscriber Identification and the core network server stores a Closed Subscribers Group Identification of the femtocells. The femtocell gateway receives an access rejection message corresponding to the Subscriber Identification of the wireless device from the core network server, and transmits the access rejection message to the femtocells. Each femtocell records the Subscriber Identification in a rejection list thereof, and it is capable of adding/deleting Subscriber Identifications in its rejection list.Type: GrantFiled: August 1, 2011Date of Patent: February 3, 2015Assignee: Institute For Information IndustryInventors: Ching Lun Lin, Jian-Chian Chiou, Li-Wei Huang, Yao-Hsin Chen, Chun-Hao Yeh, Shao-Wei Huang
-
Patent number: 8774412Abstract: The present disclosure relates to a verification method and system. The method comprises: applying an encryption algorithm to a secret information so as to generate at least two images; transmitting a first image of the at least two images to a first device; and aligning and overlaying a second image of the at least two images with the first image during the proceeding of a verification process for recovering and revealing the secret information.Type: GrantFiled: November 4, 2011Date of Patent: July 8, 2014Assignee: Industrial Technology Research InstituteInventors: Hung-Min Sun, Man-Ting Kuo, Yao-Hsin Chen, Shih-Ying Chang
-
Patent number: 8607331Abstract: The present disclosure relates to a Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) image authentication method and system. The CAPTCHA image authentication method comprises the steps of: collecting a plurality of first objects; defining a plurality of variables so as to be used as basis for classifying and dividing the plural first objects into M groups accordingly while allowing each group in the M groups to correspond to at least one variable selected from the plural variables; selecting at least one group from the M groups while further grading and dividing the first objects in the selected group into subgroups of N grades based upon a standard unit of the variable corresponding to the selected group; sorting and storing the subgroups of N grades; and selecting a plurality of authentication objects from the subgroups of N grades to be used in an authentication process.Type: GrantFiled: September 13, 2011Date of Patent: December 10, 2013Assignee: Industrial Technology Research InstituteInventors: Hung-Min Sun, Chun-Hao Yeh, Yao-Hsin Chen
-
Patent number: 8527768Abstract: A mobile station, an access point, a gateway apparatus, a base station, and a handshake method thereof for use in a wireless network framework are provided. The wireless network framework comprises a first wireless network comprising the access point, and a second wireless network comprising the gateway apparatus and base station. There is an IP security tunnel between the access point and the gateway apparatus. When the mobile station handovers from the first wireless network to the second wireless network, it transmits a master session key to the gateway apparatus via the access point and the IP security tunnel. Additionally, when the mobile station handovers from the second wireless network to the first wireless network, it transmits a master session key to the access point. As a result, the authentication time, which is needed in handover procedure between the first wireless network and the second wireless network, is reduced effectively.Type: GrantFiled: January 28, 2009Date of Patent: September 3, 2013Assignee: Institute For Information IndustryInventors: Frank Chee-Da Tsai, Chien-Chien Chiu, I-Hung Lin, Hung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung
-
Publication number: 20130039484Abstract: The present disclosure relates to a verification method and system. The method comprises: applying an encryption algorithm to a secret information so as to generate at least two images; transmitting a first image of the at least two images to a first device; and aligning and overlaying a second image of the at least two images with the first image during the proceeding of a verification process for recovering and revealing the secret information.Type: ApplicationFiled: November 4, 2011Publication date: February 14, 2013Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Hung-Min Sun, Man-Ting Kuo, Yao-Hsin Chen, Shih-Ying Chang
-
Publication number: 20130019278Abstract: The present disclosure relates to a Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) image authentication method and system. The CAPTCHA image authentication method comprises the steps of: collecting a plurality of first objects; defining a plurality of variables so as to be used as basis for classifying and dividing the plural first objects into M groups accordingly while allowing each group in the M groups to correspond to at least one variable selected from the plural variables; selecting at least one group from the M groups while further grading and dividing the first objects in the selected group into subgroups of N grades based upon a standard unit of the variable corresponding to the selected group; sorting and storing the subgroups of N grades; and selecting a plurality of authentication objects from the subgroups of N grades to be used in an authentication process.Type: ApplicationFiled: September 13, 2011Publication date: January 17, 2013Applicant: Industrial Technology Research InstituteInventors: HUNG-MIN SUN, CHUN-HAO YEH, YAO-HSIN CHEN
-
Publication number: 20120300757Abstract: A femtocell, a femtocell gateway and an access rejection method thereof are provided. A wireless network system comprises a wireless device, a plurality of the femtocells, the femtocell gateway and a core network server. The wireless device has a Subscriber Identification and the core network server stores a Closed Subscribers Group Identification of the femtocells. The femtocell gateway receives an access rejection message corresponding to the Subscriber Identification of the wireless device from the core network server, and transmits the access rejection message to the femtocells. Each femtocell records the Subscriber Identification in a rejection list thereof, and it is capable of adding/deleting Subscriber Identifications in its rejection list.Type: ApplicationFiled: August 1, 2011Publication date: November 29, 2012Applicant: INSTITUTE FOR INFORMATION INDUSTRYInventors: Ching Lun LIN, Jian-Chian CHIOU, Li-Wei HUANG, Yao-Hsin CHEN, Chun-Hao YEH, Shao-Wei HUANG
-
Publication number: 20100138661Abstract: A mobile station, an access point, a gateway apparatus, a base station, and a handshake method thereof for use in a wireless network framework are provided. The wireless network framework comprises a first wireless network comprising the access point, and a second wireless network comprising the gateway apparatus and base station. There is an IP security tunnel between the access point and the gateway apparatus. When the mobile station handovers from the first wireless network to the second wireless network, it transmits a master session key to the gateway apparatus via the access point and the IP security tunnel. Additionally, when the mobile station handovers from the second wireless network to the first wireless network, it transmits a master session key to the access point. As a result, the authentication time, which is needed in handover procedure between the first wireless network and the second wireless network, is reduced effectively.Type: ApplicationFiled: January 28, 2009Publication date: June 3, 2010Applicant: INSTITUTE FOR INFORMATION INDUSTRYInventors: Frank Chee-Da TSAI, Chien-Chien CHIU, I-Hung LIN, Hung-Min SUN, Shuai-Min CHEN, Yao-Hsin CHEN, Heng-Jeng CHUNG
-
Publication number: 20090164617Abstract: A network apparatus having a database, a management method and a tangible machine-readable medium for managing internet protocol (IP) connection rules of the database are provided. The database stores at least one first IP connection rule. The management method comprises the following steps: writing a second IP connection rule through one of a plurality of management programs; determining there is a conflict between the at least one first IP connection rule and the second IP connection rule, and eliminating the conflict according to a weight value of the at least one first IP connection rule and a weight value of the second IP connection rule. The at least one first IP connection rule and the second IP connection rule are used in one network connection.Type: ApplicationFiled: March 20, 2008Publication date: June 25, 2009Applicant: INSTITUTE FOR INFORMATION INDUSTRYInventors: Cheng-Kai Chen, Hung Min Sun, Shih-Ying Chang, Yao-Hsin Chen, Bing-Zhe He