Yi-Li
Yi-Li Chen, Chungho City TW
Patent application number | Description | Published |
---|---|---|
20100064278 | PROGRAMMING SYSTEM AND PROGRAM EXPANDING METHOD - The invention provides a programming system comprising a software component, a client side, and N expanding module. The software component comprises a receiving/processing interface and N first link interface; the client side could be used for transferring client information to the software component through the receiving/processing interface; and each expanding module is corresponding to one of the first link interface and comprises an expanding content. Accordingly, a connecting relation could be built between the software component and one expanding module, corresponding to the client information, of the N expanding module through the first link module, so that the software component can communicate with the expanding module to obtain the expanding content. | 03-11-2010 |
Yi-Li Huang, Taichung City TW
Patent application number | Description | Published |
---|---|---|
20120189122 | METHOD WITH DYNAMIC KEYS FOR MUTUAL AUTHENTICATION IN WIRELESS COMMUNICATION ENVIRONMENTS WITHOUT PRIOR AUTHENTICATION CONNECTION - A mutual authentication method with which a base station and a subscriber station can mutually authentication with each other is proposed. In this method, dynamic keys are employed, and SS and BS individually input random numbers to the Diffie-Hellman Public Key Distribution System (DH-PKDS for short) to generate a set of public keys and a set of common secret keys as the strong data connection for authentication (DCA for short) between the two stations. An addition function (ADR) which is more secure than that of an exclusive OR function in key transmission is used as a data carrier. SS and BS authenticate each other by using the identity certification keys. Plaintext is encrypted by a two-dimensional stream cipher method so that ciphertext can be more securely, also efficiently, transmitted. Further, dynamic keys and all other security parameters transmitted through wireless channels are only used once to further improve system security. | 07-26-2012 |
20130223629 | METHOD OF SECURE KEY EXCHANGE IN WIRELESS/WIRED ENVIRONMENTS - A method of safe key exchange in wireless/wired environment prevents communication messages from being intercepted or sniffed by hackers. The method includes a public key protection technique based on the combination of RSA and Diffie-Hellman PKDS, a binary operation key protection technique, and a multivariable operation key protection technique. The method allows both parties of wireless/wired communication use these three techniques alternately to create linked key groups between both parties and thereby effectively and efficiently ensure the safety of subsequent communication. | 08-29-2013 |
20130315387 | ENCRYPTION METHOD CHARACTERIZED BY THREE DIMENSIONAL COMPUTATION, FEEDBACK CONTROL, AND DYNAMIC TRANSITION BOX - An encryption method adopts an encryption principle based on sequential logic and involves performing three dimensional computation on a plaintext data unit having undergone non-linear transition through a dynamic child transition box, system keys, and dynamic feedback keys together to generate dynamic keys. After undergoing non-linear transition through different dynamic child transition boxes respectively, the dynamic keys undergo the three dimensional computation together with the system keys to generate a ciphertext data unit. Content values of the dynamic feedback keys and dynamic child transition box operating under a feedback control mechanism vary with each instance of feedback, and thus the dynamic keys and the ciphertext data are difficult to crack but effective in resisting violent attacks. | 11-28-2013 |
Yi-Li Lin, Taipei TW
Patent application number | Description | Published |
---|---|---|
20100109692 | APPARATUS, SYSTEM AND METHOD FOR TESTING ELECTRONIC ELEMENTS - An electronic element testing apparatus for use with a number of probes. Each probe has a lower pole and an upper pole. The apparatus includes: a first plate having a first side and a second side, the first side having an array of lower pole regions disposed thereabout, each lower pole region configured to receive a lower pole of a probe; and a plurality of signal conductor regions disposed proximate the array of lower pole regions, each signal conductor region arranged to provide a non-cable electrical path between a lower pole region and a switching circuit. The switching circuits are operable to sequentially connect each electronic element to a testing circuit via the upper and lower poles. | 05-06-2010 |
Yi-Li Lin, Taoyuan County TW
Patent application number | Description | Published |
---|---|---|
20130252674 | Power Saving Method and Related Mobile Device - A power saving method for a mobile device in a wireless communication system is disclosed. The power saving method comprises detecting a screen status of the mobile device and switching to different connection states according to the screen status of the mobile device when the mobile device has no data transmission and reception. | 09-26-2013 |
Yi-Li Liu, Taipei City TW
Patent application number | Description | Published |
---|---|---|
20100023660 | KVM SYSTEM - A keyboard-video-mouse (KVM) system is disclosed. The KVM system comprises a module, a KVM switch and a signal cable. The module transmits a single-ended video signal from a computer, converts a universal asynchronous receiver/transmitter (UART) signal to an input/output (IO) signal, and transmits the IO signal to the computer. The KVM switch receives the single-ended video signal from the module and outputs the UART signal to the module. The signal cable transmits the single-ended video signal from the module to the KVM switch and transmits the UART signal from the KVM switch to the first module. | 01-28-2010 |
Yi-Li Liu, Richmond CA
Patent application number | Description | Published |
---|---|---|
20140101562 | VIRTUAL MEDIA WITH FOLDER-MOUNT FUNCTION AND GRAPHICAL USER INTERFACE FOR MOUNTING ONE OR MORE FILES OR FOLDERS - A graphical user interface used in a virtual media system for allowing a server computer to access objects (files and folders) on storage devices of a client computer. The server is controlled by input signals from the client. The desktop of the client displays a first file management window showing objects on the storage devices, and a second window representing a desktop of the server. Using input devices connected to the client, a user selects objects in the first window and drags and drops them on the second window. In response, the client performs a virtual media mounting process to present the selected objects to the server as objects on a local drive of the server, without presenting any unselected content on the storage devices. The local drive is shown in the second window on the client's desktop to allow the user to explore its content. | 04-10-2014 |
20140108471 | VIRTUAL MEDIA WITH FOLDER-MOUNT FUNCTION - A virtual media (VM) method for mounting one or more folders in one or more storage devices of a client for accessed by a server as a virtual drive. The client assigns virtual cluster indices to each file, and creates a file-cluster index table to store the assigned virtual cluster indices. The client also creates a VM file system complying with the FAT file system standard except that only subdirectories and no data files are stored in the VM FAT file system. The VM FAT table uses virtual cluster indices rather than actual cluster indices. Data written by the server are stored in a temporary data area without modifying the actual file systems of the storage devices. The virtual sectors requested to be written are “dirty”, and the dirty sector numbers and corresponding temporary sector numbers are stored in a dirty sector index table for use in a write-back step. | 04-17-2014 |
Yi-Li Liu, Taipei TW
Patent application number | Description | Published |
---|---|---|
20090010155 | NETWORK COMMUNICATION CONTROL METHODS AND SYSTEMS - Network communication control methods and systems are provided. The length of a sub-time slice is determined according to a network bandwidth, and a transmission threshold of the sub-time slice is determined according to the length of the sub-time slice and the network bandwidth. At least one network transmission is performed within the sub-time slice if a transmission amount of the network transmission within the sub-time slice does not exceed the transmission threshold. | 01-08-2009 |
Yi-Li Zhang, Taichung City TW
Patent application number | Description | Published |
---|---|---|
20140361654 | BRUSHLESS PERMANENT-MAGNET MOTOR - A brushless permanent-magnet motor includes a rotor, a magnet set mounted at the rotor, a stator coaxially surrounding the magnet set in a coaxial manner relative to the rotor, and a bushing set between the magnet set and the stator in a coaxial manner relative to the rotor and the stator. The stator has a plurality of teeth spaced around the inner perimeter thereof and a retaining crevice defined between the distal front end portions of each two adjacent teeth remote from the inner perimeter. The bushing has a plurality of locating ribs respectively engaged into the retaining crevices of the stator. Thus, the brushless permanent-magnet motor has a high level of structural stability, and can effectively reduce the air-gap flux density variation and instant cogging torque and torque ripples and solve vibration and noise problems. | 12-11-2014 |