Patents by Inventor CHIA-MIN LAI

CHIA-MIN LAI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11985508
    Abstract: An RF fingerprint signal processing device configured for executing a machine learning algorithm on a plurality of input signals. The RF fingerprint signal processing device includes a receiver-feature determination circuit and a classifying determination circuit. The receiver-feature determination circuit is configured to compute on the plurality of input signals in a neural network. The classifying determination circuit is coupled with the receiver-feature determination circuit, and the classifying determination circuit is configured to send feedback information of a receiver-feature component to the receiver-feature determination circuit. The receiver-feature determination circuit decreases the receiver-feature weight of the neural network. The receiver-feature weight is associated with the receiver-feature component, and the receiver-feature weight which is decreased is applied for computing an output value of the neural network.
    Type: Grant
    Filed: November 17, 2020
    Date of Patent: May 14, 2024
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Ting-Yu Lin, Ping-Chun Chen, Chia-Min Lai
  • Patent number: 11368847
    Abstract: A networking behavior detector and a networking behavior detection method thereof for an indoor space are provided. The networking behavior detector receives a plurality of radio frequency (RF) signals in the indoor space and converts the RF signals to a plurality of digital signals. Next, the networking behavior detector calculates an energy value of each digital signal and filters out the digital signal, the energy value of which is smaller than a threshold, of the digital signals to generate an analysis signal. Finally, the networking behavior detector retrieves a plurality of energy feature values of each analysis signal to generate a feature datum, and analyzes the feature data through an identification model to generate an identification result. The identification result corresponds to one of a plurality of networking behaviors.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: June 21, 2022
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Chih-Wei Chen, Chia-Min Lai, Wei-Chen Tou
  • Publication number: 20220131832
    Abstract: A dynamic network feature processing device includes a storage device and a processor. The storage device is configured to store a plurality of malicious feature groups. Each of the malicious feature groups corresponds to a malicious feature, and each of the malicious feature groups includes a plurality of malicious network addresses. The processor is coupled to the storage device. The processor is configured to: acquire an unknown network address of an unknown packet; compare the unknown network address with the malicious feature of each of the malicious feature groups; and filter the unknown packet when determining that the unknown network address matches at least one of the malicious feature of the plurality of malicious feature groups.
    Type: Application
    Filed: November 17, 2020
    Publication date: April 28, 2022
    Inventors: Chia-Kang HO, Kuan-Lung HUANG, Chia-Min LAI
  • Publication number: 20220124487
    Abstract: An RF fingerprint signal processing device configured for executing a machine learning algorithm on a plurality of input signals. The RF fingerprint signal processing device includes a receiver-feature determination circuit and a classifying determination circuit. The receiver-feature determination circuit is configured to compute on the plurality of input signals in a neural network. The classifying determination circuit is coupled with the receiver-feature determination circuit, and the classifying determination circuit is configured to send feedback information of a receiver-feature component to the receiver-feature determination circuit. The receiver-feature determination circuit decreases the receiver-feature weight of the neural network. The receiver-feature weight is associated with the receiver-feature component, and the receiver-feature weight which is decreased is applied for computing an output value of the neural network.
    Type: Application
    Filed: November 17, 2020
    Publication date: April 21, 2022
    Inventors: Ting-Yu LIN, Ping-Chun CHEN, Chia-Min LAI
  • Publication number: 20210144556
    Abstract: A networking behavior detector and a networking behavior detection method thereof for an indoor space are provided. The networking behavior detector receives a plurality of radio frequency (RF) signals in the indoor space and converts the RF signals to a plurality of digital signals. Next, the networking behavior detector calculates an energy value of each digital signal and filters out the digital signal, the energy value of which is smaller than a threshold, of the digital signals to generate an analysis signal. Finally, the networking behavior detector retrieves a plurality of energy feature values of each analysis signal to generate a feature datum, and analyzes the feature data through an identification model to generate an identification result. The identification result corresponds to one of a plurality of networking behaviors.
    Type: Application
    Filed: December 3, 2019
    Publication date: May 13, 2021
    Inventors: Chih-Wei CHEN, Chia-Min LAI, Wei-Chen TOU
  • Patent number: 10742668
    Abstract: A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access records. Each access record includes a network address, time stamp, and access content. Each attack pattern corresponds to at least one attack access relation. Each attack access relation is defined by a network address and access content. The apparatus retrieves several attack records according to at least one attack address. The network address of each attack record is one of the attack address(s). The apparatus divides the attack records into several groups according to the time stamps and performs the following operations for each group: (a) creating at least one access relation for each attack address included in the group and (b) determining that the group corresponds to one of the attack patterns according to the at least one access relation of the group.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: August 11, 2020
    Assignee: Institute For Information Industry
    Inventors: Chia-Min Lai, Ching-Hao Mao, Chih-Hung Hsieh, Te-En Wei, Chi-Ping Lai
  • Patent number: 10733385
    Abstract: A behavior inference model building apparatus and a behavior inference model building method thereof are provided. The behavior inference model building apparatus converts a plurality of program operation sequences of a plurality of program operation sequence data into a plurality of word vectors through a word embedding model, and inputs the first M word vectors of the word vectors, corresponding to each program operation sequence data, into a generative adversarial network (GAN) model to train and optimize the GAN model. The behavior inference model building apparatus integrates the word embedding model and the generator of the optimized GAN model to build a behavior inference model.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: August 4, 2020
    Assignee: Institute For Information Industry
    Inventors: Chia-Min Lai, Chia-Yu Lu
  • Publication number: 20190179906
    Abstract: A behavior inference model building apparatus and a behavior inference model building method thereof are provided. The behavior inference model building apparatus converts a plurality of program operation sequences of a plurality of program operation sequence data into a plurality of word vectors through a word embedding model, and inputs the first M word vectors of the word vectors, corresponding to each program operation sequence data, into a generative adversarial network (GAN) model to train and optimize the GAN model. The behavior inference model building apparatus integrates the word embedding model and the generator of the optimized GAN model to build a behavior inference model.
    Type: Application
    Filed: December 12, 2017
    Publication date: June 13, 2019
    Inventors: Chia-Min LAI, Chia-Yu LU
  • Patent number: 10250626
    Abstract: An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus stores a plurality of access records of an application, wherein each access record includes a network address of a host and an access content. The attacking node detection apparatus filters the access records into a plurality of filtered access records according to a predetermined rule so that the access content of each filtered access record conforms to the predetermined rule. The attacking node detection apparatus creates at least one access relation of each of the network addresses according to the filtered access records, wherein each access relation is defined by one of the network addresses and one of the access contents. The attacking node detection apparatus identifies a specific network address as an attacking node according to the access relations.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: April 2, 2019
    Assignee: Institute For Information Industry
    Inventors: Chia-Min Lai, Ching-Hao Mao, Chih-Hung Hsieh, Te-En Wei, Chi-Ping Lai
  • Publication number: 20180159868
    Abstract: A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access records. Each access record includes a network address, time stamp, and access content. Each attack pattern corresponds to at least one attack access relation. Each attack access relation is defined by a network address and access content. The apparatus retrieves several attack records according to at least one attack address. The network address of each attack record is one of the attack address(s). The apparatus divides the attack records into several groups according to the time stamps and performs the following operations for each group: (a) creating at least one access relation for each attack address included in the group and (b) determining that the group corresponds to one of the attack patterns according to the at least one access relation of the group.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Chia-Min LAI, Ching-Hao MAO, Chih-Hung HSIEH, Te-EN WEI, Chi-Ping LAI
  • Publication number: 20180159878
    Abstract: An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus is stored with a plurality of access records of an application, wherein each access record includes a network address of a host and an access content. The attacking node detection apparatus filters the access records into a plurality of filtered access records according to a predetermined rule so that the access content of each filtered access record conforms to the predetermined rule. The attacking node detection apparatus creates at least one access relation of each of the network addresses according to the filtered access records, wherein each access relation is defined by one of the network addresses and one of the access contents. The attacking node detection apparatus identifies a specific network address as an attacking node according to the access relations.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Chia-Min LAI, Ching-Hao MAO, Chih-Hung HSIEH, Te-EN WEI, Chi-Ping LAI
  • Patent number: 9878193
    Abstract: A linear displacement damper structure includes a screw shaft, a metallic disk, a screw barrel, a controlling member, and a driving member. The screw shaft is fixed in a position, connected to the metallic disk, and threaded with the screw barrel. The screw barrel is connected to an external device and driven by the external device to perform a linear displacement along a length direction of the screw shaft relative to the screw shaft, so that the screw shaft drives the screw shaft and the metallic shaft. The controlling member has a permanent magnet and is disposed near to the metallic disk, so that the metallic disk generates a magnetic resistance to reduce the rotation speed of the metallic disk. The driving member drives the controlling member to move to change a distance between the controlling member and the metallic disk to adjust the magnitude of the magnetic resistance.
    Type: Grant
    Filed: November 21, 2016
    Date of Patent: January 30, 2018
    Assignee: Singularity Ltd.
    Inventor: Chia Min Lai
  • Publication number: 20170165515
    Abstract: A linear displacement damper structure includes a screw shaft, a metallic disk, a screw barrel, a controlling member, and a driving member. The screw shaft is fixed in a position, connected to the metallic disk, and threaded with the screw barrel. The screw barrel is connected to an external device and driven by the external device to perform a linear displacement along a length direction of the screw shaft relative to the screw shaft, so that the screw shaft drives the screw shaft and the metallic shaft. The controlling member has a permanent magnet and is disposed near to the metallic disk, so that the metallic disk generates a magnetic resistance to reduce the rotation speed of the metallic disk. The driving member drives the controlling member to move to change a distance between the controlling member and the metallic disk to adjust the magnitude of the magnetic resistance.
    Type: Application
    Filed: November 21, 2016
    Publication date: June 15, 2017
    Inventor: CHIA MIN LAI
  • Publication number: 20170149800
    Abstract: The instant disclosure illustrates a system and method for information security management based on application level log analysis. The system and method for information security management involve analyzing a plurality of application level logs of a user and modeling the continuative behaviors of the user. Furthermore, the system and method for information security management include the selection of models according to different environmental contexts, thereby efficiently determining whether the user has had an abnormal behavior occur.
    Type: Application
    Filed: December 4, 2015
    Publication date: May 25, 2017
    Inventors: CHIH-HUNG HSIEH, CHIA-MIN LAI, CHING-HAO MAO