Patents by Inventor Yin-Hung Tseng

Yin-Hung Tseng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200074356
    Abstract: An electronic ticket admission verification anti-counterfeiting system includes a ticket database for storing a ticket identifier to be downloaded and stored to a user-end device including a display screen and a sound receiving device; at least one admission determination device including a sound broadcasting device and a barcode reader for sequentially scanning a the first QR code and a second QR code displayed on the display screen. When analyzing that the first QR code is valid, the admission determination device controls the sound broadcasting device to broadcast a notification sound, and then analyzes the second QR code to determine whether to admit the user holding the user-end device. The first or second QR code is associated with the encrypted ticket identifier, and the second QR code is generated after the notification sound is received. The first QR code is different from the second QR code.
    Type: Application
    Filed: September 3, 2019
    Publication date: March 5, 2020
    Inventors: Yin-Hung Tseng, Chun-Ming Lin, Sheng-Chang Liu, Jan-Hui Wang, Ying-Chiang Cho
  • Patent number: 9858736
    Abstract: A password setting method includes the following steps of: providing a lock body, which is configured with identification data; providing a reset device including a RFID, which has characteristic data; accessing the RFID to obtain the characteristic data; transmitting the characteristic data to the lock body; comparing the characteristic data and the identification data; and when the characteristic data matches the identification data, enabling a password setting function of the lock body. In addition, a password setting system and a lockset matching method and system are also disclosed.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: January 2, 2018
    Assignee: Userstar Information System Co., Ltd.
    Inventors: Yin-Hung Tseng, Chun-Ming Lin, Yu-Tsun Chen
  • Patent number: 9609512
    Abstract: A wireless authentication system includes an execution end device and a control end device. When the execution end device and the control end device receive an activation signal, the execution end device generates a time related random code, and transmits the time related random code to the control end device; and the control end device generates a comparison authentication code according to the time related random code, a fixed password and a variable password. When the execution end device determines that the comparison authentication code corresponds to a set of data stored in the execution end device, the execution end device performs a predetermined operation, and the variable password is changed.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: March 28, 2017
    Assignee: USERSTAR INFORMATION SYSTEM CO., LTD.
    Inventors: Yin-Hung Tseng, Chung-Ming Lin, Sheng-Chang Liu
  • Publication number: 20170046893
    Abstract: A password setting method includes the following steps of: providing a lock body, which is configured with identification data; providing a reset device including a RFID, which has characteristic data; accessing the RFID to obtain the characteristic data; transmitting the characteristic data to the lock body; comparing the characteristic data and the identification data; and when the characteristic data matches the identification data, enabling a password setting function of the lock body. In addition, a password setting system and a lockset matching method and system are also disclosed.
    Type: Application
    Filed: August 12, 2016
    Publication date: February 16, 2017
    Inventors: Yin-Hung TSENG, Chun-Ming LIN, Yu-Tsun CHEN
  • Publication number: 20150026783
    Abstract: A wireless authentication system includes an execution end device and a control end device. When the execution end device and the control end device receive an activation signal, the execution end device generates a time related random code, and transmits the time related random code to the control end device; and the control end device generates a comparison authentication code according to the time related random code, a fixed password and a variable password. When the execution end device determines that the comparison authentication code corresponds to a set of data stored in the execution end device, the execution end device performs a predetermined operation, and the variable password is changed.
    Type: Application
    Filed: October 9, 2014
    Publication date: January 22, 2015
    Inventors: Yin-Hung Tseng, Chung-Ming Lin, Sheng-Chang Liu
  • Publication number: 20140346074
    Abstract: A packaging structure to package a target includes: a tag with a first portion being adhered to the target and a second portion wrapping the target; and a film wrapping and sticking the second portion of the tag. When the film is torn, the second portion of the tag is torn as well and the tag cannot be used to re-package.
    Type: Application
    Filed: May 16, 2014
    Publication date: November 27, 2014
    Applicant: USERSTAR INFORMATION SYSTEM CO., LTD.
    Inventor: YIN-HUNG TSENG
  • Publication number: 20120262280
    Abstract: A control system includes a portable electronic device and a controlled device. The portable electronic device includes a user input unit, a first processing unit, and a transmitting unit. The controlled device includes a controlled module and an RFID tag. The RFID tag includes a receiving unit, a tag memory unit storing a first code, and a second processing unit. The portable electronic device generates and wirelessly transmits a first key and a control command according to user operation of the user input unit. The second processing unit of the controlled device is configured to determine, with reference to the first key received by the receiving unit and the first code, whether or not to output a control signal for controlling the controlled module to perform an action that corresponds to the control command received by the receiving unit.
    Type: Application
    Filed: April 14, 2011
    Publication date: October 18, 2012
    Inventors: Yin-Hung Tseng, Chih-Hao Hsu
  • Patent number: 8188840
    Abstract: An authenticating method includes enabling a transponder to receive a read request that contains an authentication code, enabling the transponder to extract the authentication code from the read request, enabling the transponder to generate and wirelessly transmit a reply signal that contains the authentication code, and enabling a reader to authenticate the transponder based on the authentication code contained in the reply signal. An identification system, which includes the transponder and the reader is also disclosed.
    Type: Grant
    Filed: September 19, 2008
    Date of Patent: May 29, 2012
    Assignee: Userstar Information System Co., Ltd.
    Inventors: Yin-Hung Tseng, Sheng-Chun Hsu
  • Publication number: 20110175706
    Abstract: An RFID tag includes a substrate, a chip, a conductive unit, and an antenna. The substrate is attached to an article. The chip is disposed on the substrate to partition the substrate into a first region on one side of the chip and a second region on the other side of the chip. The conductive unit is coupled electrically to the chip, and is disposed on the substrate to form a loop in cooperation with the chip. The antenna is disposed on the substrate and coupled electrically to the chip. The loop and an area of the substrate encompassed thereby are disposed in the first region, and the antenna is disposed in the second region. Removal of the substrate from the article results in a break in the conductive unit, and the chip is operable to detect the break in the conductive unit.
    Type: Application
    Filed: January 19, 2010
    Publication date: July 21, 2011
    Inventors: Yin-Hung TSENG, Sheng-Chun Hsu
  • Publication number: 20100306112
    Abstract: An online trading method includes: configuring a marketplace server to receive a product verification request from a first user terminal and to send an authentication request to a second user terminal; configuring the second user terminal to receive the authentication request and to send a code request to a transponder that is associated with a product; configuring the transponder to receive the code request and to send a response signal that includes a unique identification (UID) code of the transponder, the second user terminal sending out the UID code of the transponder; and configuring an authentication center to receive the UID code of the transponder, to generate a verification result based on the UID code of the transponder, and to send out the verification result for notifying the first party accordingly. An online trading system for implementing the online trading method is also disclosed.
    Type: Application
    Filed: June 1, 2009
    Publication date: December 2, 2010
    Inventor: Yin-Hung Tseng
  • Publication number: 20100073140
    Abstract: An authenticating method includes enabling a transponder to receive a read request that contains an authentication code, enabling the transponder to extract the authentication code from the read request, enabling the transponder to generate and wirelessly transmit a reply signal that contains the authentication code, and enabling a reader to authenticate the transponder based on the authentication code contained in the reply signal. An identification system, which includes the transponder and the reader is also disclosed.
    Type: Application
    Filed: September 19, 2008
    Publication date: March 25, 2010
    Inventors: Yin-Hung TSENG, Sheng-Chun Hsu
  • Patent number: 7602291
    Abstract: A method for verifying authenticity of an object includes the steps of: enabling an electronic device to generate and transmit a request signal; in response to the request signal, enabling an RFID tag to generate a first authentication code based on a varying secret key, a second authentication code based on a unique identification code of the RFID tag and the varying secret key, and a third authentication code that is based on the unique identification code of the RFID tag and the first and second authentication codes, and to wirelessly transmit the third authentication code for reception by the electronic device; and enabling the electronic device to forward the third authentication code received from the RFID tag to an authenticating center for verification. A system, which includes the RFID tag, the electronic device, and the authenticating center, and which performs the method is also disclosed.
    Type: Grant
    Filed: September 14, 2006
    Date of Patent: October 13, 2009
    Assignee: Userstar Information System Co., Ltd.
    Inventors: Yin-Hung Tseng, Sheng-Chun Hsu
  • Publication number: 20090066512
    Abstract: A transponder device includes a mode selector and a transponder. The transponder, such as a radio frequency identification (RFID) tag, is coupled to the mode selector, such as a mechanical switch, and has a function that is switched selectively between enabled and disabled states upon receipt by the transponder of a wirelessly transmitted switch command when the mode selector is actuated.
    Type: Application
    Filed: September 10, 2007
    Publication date: March 12, 2009
    Inventors: Yin-Hung Tseng, Sheng-Chun Hsu
  • Publication number: 20080106371
    Abstract: A method for verifying authenticity of an object includes the steps of: enabling a code-generating device to generate and show a symbol based on at least two of a unique identification code of the code-generating device, and first and second authentication codes generated by the code-generating device based on a varying secret key; and enabling an electronic device to forward an image of the symbol to an authenticating device for verification. A system, which includes the code-generating device, the electronic device, and the authenticating device, and which performs the method is also disclosed.
    Type: Application
    Filed: October 20, 2006
    Publication date: May 8, 2008
    Inventors: Yin-Hung Tseng, Sheng-Chun Hsu
  • Publication number: 20080079535
    Abstract: A method for verifying authenticity of an object includes the steps of: enabling an electronic device to generate and transmit a request signal; in response to the request signal, enabling an RFID tag to generate a first authentication code based on a varying secret key, a second authentication code based on a unique identification code of the RFID tag and the varying secret key, and a third authentication code that is based on the unique identification code of the RFID tag and the first and second authentication codes, and to wirelessly transmit the third authentication code for reception by the electronic device; and enabling the electronic device to forward the third authentication code received from the RFID tag to an authenticating center for verification. A system, which includes the RFID tag, the electronic device, and the authenticating center, and which performs the method is also disclosed.
    Type: Application
    Filed: September 14, 2006
    Publication date: April 3, 2008
    Inventors: Yin-Hung Tseng, Sheng-Chun Hsu
  • Publication number: 20060005027
    Abstract: A method for verifying authenticity of an object that has a unique identification number includes the steps of: generating a varying secret key, a first authentication code based on the varying secret key, and a second authentication code based on the unique identification number of the object and the varying secret key; and generating a verifying code that is based on two of the first and second authentication codes and the unique identification number of the object and that can be matched to the remaining one of the first and second authentication codes and the unique identification number of the object in order to verify authenticity of the object. A system that performs the method is also disclosed.
    Type: Application
    Filed: May 6, 2005
    Publication date: January 5, 2006
    Inventor: Yin-Hung Tseng