Patents by Inventor Yi-Hung Shen

Yi-Hung Shen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060252372
    Abstract: A Bluetooth transmission system and a Bluetooth transmission method are provided. The system utilizes an embedded controller with an independent power supply for setting up and storing a plurality of preset Bluetooth input devices. A Bluetooth module receives identification signals transmitted by the Bluetooth input devices and determine whether the identification signals contain a set of preset identification codes. According to the determination, the Bluetooth input device is connected to the controller. Next, a continuative action is executed in accordance with the received data which is transmitted by the Bluetooth input device.
    Type: Application
    Filed: August 9, 2005
    Publication date: November 9, 2006
    Inventors: Ming-Feng Liu, Yi-Hung Shen
  • Publication number: 20060236171
    Abstract: A method for detecting and correcting the error of an electronic apparatus is provided. An embedded controller whose power is independently supplied is used to detect and store the error code from the internal devices of the electronic apparatus. First, the error status of the electronic apparatus is detected to obtain an error code corresponding thereto. Then, the error code is stored in either an external memory or an internal memory unit of the controller. When the controller receives a control signal, the error code is accessed through a wireless transmission apparatus. Moreover, the error status of the electronic apparatus is analyzed according to the error code to determine a corresponding debug method. For example, a correcting program code is programmed into the electronic apparatus by a wireless transmission method to achieve the debug purpose.
    Type: Application
    Filed: July 20, 2005
    Publication date: October 19, 2006
    Inventors: Che-Hsien Hu, Yi-Hung Shen
  • Publication number: 20060234677
    Abstract: A method for channel control with wireless transmission is provided, in which a receiver is adopted to collect identification signals sent by a plurality of different wireless controllers. Because of the wireless transmission structure, the method automatically switches the setting of the channel list within an authorized range. According to the identification codes corresponding to the received identification signals, the authorization ranges of a plurality of users are compared to provide an appropriate channel list for the viewers. In addition, the method allows users to set a plurality of different channel lists to achieve the purpose of diversity, protection, and convenience.
    Type: Application
    Filed: July 28, 2005
    Publication date: October 19, 2006
    Inventors: Chun-Gu Lin, Yi-Hung Shen
  • Publication number: 20060208853
    Abstract: A radio frequency identification (RFID) security system includes an RFID tag and a portable electronic device. The RFID tag has a user ID code. The portable electronic device has a reader, an identification memory and an identification controller. The reader is used to communicate with the RFID tag and to receive the user ID code. The identification memory is used to store a user password. The identification controller is electrically connected to the reader and the identification memory and is used to compare the user ID code and the user password. When the user ID code is the same as the user password, the identification controller is arranged to transmit an enable signal to grant the access of the portable electronic device.
    Type: Application
    Filed: October 6, 2005
    Publication date: September 21, 2006
    Applicant: COMPAL ELECTRONICS, INC.
    Inventors: Shao-Tsu Kung, Yi-Hung Shen
  • Publication number: 20060197653
    Abstract: Several readers are disposed in different positions within a region for receiving a tag ID code of a radio frequency identification (RFID) tag. The RFID tag has a power supply and a lock circuit, and the lock circuit switches the power supply. When one of the readers receives the tag ID code, the tag ID code is compared to an assigned ID code. If the tag ID code is the same as the assigned ID code, the power supply is enabled to provide electrical power for repeatedly sending the tag ID code. Then, the position of the RFID tag is identified by the readers which receive the tag ID code.
    Type: Application
    Filed: September 15, 2005
    Publication date: September 7, 2006
    Applicant: COMPAL ELECTRONICS, INC.
    Inventors: Shao-Tsu Kung, Yi-Hung Shen
  • Publication number: 20060190832
    Abstract: A method and apparatus for displaying real-time messages by a mouse cursor are disclosed. A setting unit sets a trigger condition for an event, and a monitoring unit monitors the event according to the trigger condition and thus generates a monitor result. A determining unit determines whether the event is triggered according to the conditions and the monitor result. When the event is triggered, a displaying unit displays a message on or near a mouse cursor to remind a user of the triggered event.
    Type: Application
    Filed: August 22, 2005
    Publication date: August 24, 2006
    Inventors: Chih-Sih Lin, Yi-Hung Shen
  • Publication number: 20060186994
    Abstract: A predetermined ID code is set in a server, and a radio frequency identification (RFID) tag is configured on an electronic device. A tag ID code of the RFID tag is received by a reader and then is transmitted to the server. The server is used to compare the tag ID code and the predetermined ID code. When the tag ID code is the same as the predetermined ID code, the server is arranged to transmit an enable signal to grant the access of the electronic device. When the tag ID code is different from the predetermined ID code, the server is arranged to send a disable signal to deny the access of the electronic device.
    Type: Application
    Filed: October 25, 2005
    Publication date: August 24, 2006
    Applicant: COMPAL ELECTRONICS, INC.
    Inventors: Hsiang-Chang Lin, Yi-Hung Shen
  • Publication number: 20060176026
    Abstract: A method for charging and maintaining a rechargeable battery is provided. A time basis and a charging level are predetermined in the method. When the unused period of the battery does not exceeds the time basis, if the electric potential of the battery is more than the charging level, the battery will not be charged; otherwise, the battery will be charged. When the unused period of the battery exceeds the time basis, if the electric potential of the battery is more than the charging level, the battery will be discharged at first and then charged; otherwise, the battery will be directly charged.
    Type: Application
    Filed: July 15, 2005
    Publication date: August 10, 2006
    Applicant: COMPAL ELECTRONICS, INC.
    Inventors: Yi-Hung Shen, Chun-De Lin
  • Publication number: 20060111096
    Abstract: A security activation method for wireless identification for controlling an electronic device system boot up includes the following steps: receiving a first identification signal, designating a corresponding first identification code as a pre-established account, transmitting a confirmation signal to a wireless transmission device corresponding to the pre-established account, receiving an authorization signal from the device, receiving a second identification signal, and comparing a corresponding second identification code with the pre-established account; if the second identification signal is the same as the pre-established account, determine whether the system accesses a boot buffer inside the electronic device; and having the following corresponding implemented actions: if the system accesses the boot buffer inside the electronic device, the system boots and transitions into operational mode; and if the system doesn't access the boot buffer, the system is shut down and receives an automatic command for sy
    Type: Application
    Filed: July 25, 2005
    Publication date: May 25, 2006
    Inventors: Chia-Cheng Chen, Yi-Hung Shen
  • Publication number: 20060047948
    Abstract: A security system for data processing applied to a data transmission processing architecture is provided, which includes an encoding/decoding module, a processing unit, and a local memory unit. The encoding/decoding module is used to encode transmission data packets to be transmitted, decode received data according to a particular encoding/decoding algorithm and data transfer protocol, and/or perform hash function operations on the encoded/decoded data. The processing unit is coupled to the encoding/decoding module and provides the particular encoding/decoding algorithm and data transfer protocol for the encoding/decoding module to code/decode the data. The local memory unit is coupled to the encoding/decoding module and the processing unit, and provides temporary storage of processing data for the encoding/decoding module and the processing unit.
    Type: Application
    Filed: March 25, 2005
    Publication date: March 2, 2006
    Applicant: RDC Semiconductor Co., Ltd.
    Inventors: Yi-Hung Shen, Chih-Ching Chao, Yu-Tsun Hsieh
  • Publication number: 20060026297
    Abstract: A computer system with multiple data access channels is provided. The computer system is suitable for transmitting data between a communication module and a host module. The multiple data access channels mainly comprise a first data access channel, a controller, and a second data access channel. Wherein, the first data access channel is connected between the communication module and the host module for transmitting the data. In addition, the controller is connected to the host module to transmit the data to/from the host module. Moreover, the second data access channel is connected between the controller and the communication module. When the host module enters a power-saving mode, the first channel is in an off state, and the communication module can transmit the data to/from the controller via the second channel.
    Type: Application
    Filed: May 31, 2005
    Publication date: February 2, 2006
    Inventors: Shao-Tsu Kung, Yi-Hung Shen, Shu-Hua Tsai
  • Patent number: 6336195
    Abstract: In a computer-implemented method for debugging keyboard basic input/output system (KB-BIOS) in a development notebook computing system, a serial PS/2 port, that is connected to a KB-BIOS processor and that serves as a communications channel, of the development notebook computing system is coupled to a host computer so as to establish communication between the KB-BIOS and the host computer. Thereafter, a debug command is sent from the host computer to the development notebook computing system via the serial PS/2 port. Subsequently, at the development notebook computing system, the debug command sent by the host computer via the serial PS/2 port is directed to the KB-BIOS processor so as to enable the latter to execute the debug command according to program instructions in a debug engine module that resides in a memory of the KB-BIOS, and to send debug data associated with the development notebook computing system to the host computer via the serial PS/2 port in response to execution of the debug command.
    Type: Grant
    Filed: April 14, 1999
    Date of Patent: January 1, 2002
    Assignee: Compal Electronics, Inc.
    Inventors: Yi-Hung Shen, Tzu-Wen Lin