Patents by Inventor Chin-Wei Tien

Chin-Wei Tien has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240088030
    Abstract: Provided are semiconductor devices that include a first gate structure having a first end cap portion, a second gate structure having a second end cap portion coaxial with the first gate structure, a first dielectric region separating the first end cap portion and the second end cap portion, a first conductive element extending over the first gate structure, a second conductive element extending over the second gate structure, and a gate via electrically connecting the second gate structure and the second conductive element, with the first dielectric region having a first width and being positioned at least partially under the first conductive element and defines a spacing between the gate via and an end of the second end cap portion that exceeds a predetermined distance.
    Type: Application
    Filed: January 23, 2023
    Publication date: March 14, 2024
    Inventors: Chin-Liang CHEN, Chi-Yu LU, Ching-Wei TSAI, Chun-Yuan CHEN, Li-Chun TIEN
  • Patent number: 11693973
    Abstract: A file vulnerability detection method includes: translating a binary file into an intermediate file; analyzing the intermediate file to obtain multiple functions to be tested; establishing function characteristic data of each of the functions to be tested; and comparing correlations between the function characteristic data of each of the functions to be tested and at least one pair of characteristic data with vulnerability of at least one vulnerability function and characteristic data without vulnerability of the at least one vulnerability function in a vulnerability database based on a characteristic model to determine whether each of the functions to be tested corresponding to each function characteristic data has a vulnerability, wherein the characteristic model has information representing multiple back-end binary files generated by multiple back-end platforms, wherein the characteristic data with vulnerability has the vulnerability, and the characteristic data without vulnerability does not have the vuln
    Type: Grant
    Filed: March 19, 2021
    Date of Patent: July 4, 2023
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Jian Wei Liao, Chihwei Chen, Chin Wei Tien, Tsung Ta Tsai
  • Patent number: 11502928
    Abstract: A fuzz testing apparatus transmits a plurality of packets to the device under test (DUT), and calculates a probability of abnormal state, a normal response time and an abnormal-state-processing time of the DUT for the packets. Then, the fuzz testing apparatus estimates a maximum quantity of packets that can be sent to the DUT according to the probability of abnormal state the normal response time and the abnormal-state-processing time corresponding to the standby time of the DUT. Finally, the fuzz testing apparatus determines a plurality of test packets from a plurality of candidate test packets according to the maximum quantity of packets.
    Type: Grant
    Filed: December 8, 2020
    Date of Patent: November 15, 2022
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Pei-Yi Lin, Chih-Wei Chen, Chia-Wei Tien, Chin-Wei Tien
  • Publication number: 20220269793
    Abstract: A file vulnerability detection method includes: translating a binary file into an intermediate file; analyzing the intermediate file to obtain multiple functions to be tested; establishing function characteristic data of each of the functions to be tested; and comparing correlations between the function characteristic data of each of the functions to be tested and at least one pair of characteristic data with vulnerability of at least one vulnerability function and characteristic data without vulnerability of the at least one vulnerability function in a vulnerability database based on a characteristic model to determine whether each of the functions to be tested corresponding to each function characteristic data has a vulnerability, wherein the characteristic model has information representing multiple back-end binary files generated by multiple back-end platforms, wherein the characteristic data with vulnerability has the vulnerability, and the characteristic data without vulnerability does not have the vuln
    Type: Application
    Filed: March 19, 2021
    Publication date: August 25, 2022
    Inventors: Jian Wei Liao, Chihwei Chen, CHIN WEI TIEN, Tsung Ta Tsai
  • Publication number: 20220166699
    Abstract: A fuzz testing apparatus transmits a plurality of packets to the device under test (DUT), and calculates a probability of abnormal state, a normal response time and an abnormal-state-processing time of the DUT for the packets. Then, the fuzz testing apparatus estimates a maximum quantity of packets that can be sent to the DUT according to the probability of abnormal state the normal response time and the abnormal-state-processing time corresponding to the standby time of the DUT. Finally, the fuzz testing apparatus determines a plurality of test packets from a plurality of candidate test packets according to the maximum quantity of packets.
    Type: Application
    Filed: December 8, 2020
    Publication date: May 26, 2022
    Inventors: Pei-Yi LIN, Chih-Wei CHEN, Chia-Wei TIEN, Chin-Wei TIEN
  • Patent number: 11263485
    Abstract: A system for training transfer models that includes a memory and a processor coupling to each other. The memory stores instructions. The processor accesses the instructions to retrieve raw datasets from a first-type device and train a feature extraction model, a transfer feature and a preliminary classify model based on the raw datasets. The processor further transfers the feature extraction model, the transfer feature and the preliminary classify model to a host of a manufacturer so that the host directly applies the feature extraction model and the transfer feature, and retrains the preliminary classify model as an adapted classify model based on practical datasets.
    Type: Grant
    Filed: December 2, 2019
    Date of Patent: March 1, 2022
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Tse-Yung Huang, Chin-Wei Tien, Shang-Wen Chen
  • Publication number: 20210150271
    Abstract: A system for training transfer models that includes a memory and a processor coupling to each other. The memory stores instructions. The processor accesses the instructions to retrieve raw datasets from a first-type device and train a feature extraction model, a transfer feature and a preliminary classify model based on the raw datasets. The processor further transfers the feature extraction model, the transfer feature and the preliminary classify model to a host of a manufacturer so that the host directly applies the feature extraction model and the transfer feature, and retrains the preliminary classify model as an adapted classify model based on practical datasets.
    Type: Application
    Filed: December 2, 2019
    Publication date: May 20, 2021
    Inventors: Tse-Yung HUANG, Chin-Wei TIEN, Shang-Wen CHEN
  • Patent number: 10846188
    Abstract: A device for producing test data stores a plurality of simulated test data each of which substantially conforms to the data format accepted by a device under test (DUT). The data format includes different data blocks. The device for producing test data also mutates each of the simulated test data in one of a plurality of mutation forms to generate a plurality of first test data for testing the DUT. Each of the mutation forms refers to mutating one of the data blocks in one of a plurality of mutation ways.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: November 24, 2020
    Assignee: Institute For Information Industry
    Inventors: Chia-Wei Tien, Pei-Yi Lin, Chin-Wei Tien
  • Patent number: 10846114
    Abstract: A virtual time control apparatus, method, and non-transitory computer readable storage medium thereof are provided. The virtual time control apparatus includes a system timer, a real time clock, and a processing unit, wherein the processing unit is electrically connected to the system timer and the real time clock. The system timer has an original timer period, while the real time clock has an original tick period. The processing unit executes a hypervisor. The hypervisor generates a virtual timer period according to an adjustment ratio and the original timer period. The hypervisor generates a virtual tick period according to the adjustment ratio and the original tick period.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: November 24, 2020
    Assignee: Institute For Information Industry
    Inventors: Sheng-Hao Wang, Jian-De Jiang, Chin-Wei Tien, Chih-Hung Lin
  • Patent number: 10726124
    Abstract: A computer device and a method of identifying whether container behavior thereof is abnormal are provided. The computer device detects container behavior of a container in a time interval, and identifies whether the container behavior of the container is abnormal according to a container behavior identification module, thereby determining whether there is an intrusion. In addition, a decoy container can be installed in the computer device to attract attacking or invading from a third party so as to reduce the risk of the container being attacked, and the container behavior identification module can be updated according to the container behavior of the decoy container.
    Type: Grant
    Filed: December 7, 2017
    Date of Patent: July 28, 2020
    Assignee: Institute For Information Industry
    Inventors: Chia-Wei Tien, Tse-Yung Huang, Chin-Wei Tien
  • Publication number: 20200142794
    Abstract: A device for producing test data stores a plurality of simulated test data each of which substantially conforms to the data format accepted by a device under test (DUT). The data format includes different data blocks. The device for producing test data also mutates each of the simulated test data in one of a plurality of mutation forms to generate a plurality of first test data for testing the DUT. Each of the mutation forms refers to mutating one of the data blocks in one of a plurality of mutation ways.
    Type: Application
    Filed: November 30, 2018
    Publication date: May 7, 2020
    Inventors: Chia-Wei TIEN, Pei-Yi LIN, Chin-Wei TIEN
  • Patent number: 10621339
    Abstract: A monitor apparatus, method, and non-transitory computer readable storage medium thereof are provided. The monitor method is adapted for an electronic computing apparatus, wherein the electronic computing apparatus stores a smart contract and a blockchain ledger of a blockchain system. The monitor method periodically executes the following steps: (a) obtaining a piece of behavior information of a first electronic apparatus at a time point, (b) retrieving, via the smart contract, a plurality of pieces of previous behavior information within a time interval from the blockchain ledger, wherein the time interval is defined by the time point, and each piece of previous behavior information corresponds to one of a plurality of second electronic apparatuses and the first electronic apparatus, (c) determining a legality of the piece of behavior information according to the pieces of previous behavior information, and (d) writing the behavior information into the blockchain ledger.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: April 14, 2020
    Assignee: Institute For Information Industry
    Inventors: Jian-Wei Liao, Chin-Wei Tien, Chia-Kang Ho
  • Patent number: 10489591
    Abstract: A detection system and method thereof are provided. The detection method comprises the following steps: decompiling a first application package file to generate a plurality of first decompiled files, and the first decompiled files comprising a first decompiled code; comparing the first decompiled code with a second decompiled code of a second application package file to analyze a different code segment between the first decompiled code and the second decompiled code; classifying a changed code type corresponding to the different code segment according to a function call flow of the first decompiled code; loading a correspondence table and selecting at least one detection rule corresponding to the changed code type in the correspondence table; confirming a detection region of the first decompiled code according to the at least one detection rule; and detecting the detection region to generate a security detection result.
    Type: Grant
    Filed: June 19, 2016
    Date of Patent: November 26, 2019
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Chih-Hung Lin, Chia-Wei Tien, Tse-Yung Huang, Chin-Wei Tien
  • Patent number: 10318731
    Abstract: A detection method comprising: (A) transmitting a to-be tested file to a first testing machine by the processing device; wherein the first testing machine uses for executing the to-be tested file; (B) monitoring that whether a component usage of the first testing machine is higher than a default threshold during a period of executing the to-be tested file by the processing device; and (C) when the component usage of the first testing machine is higher than the default threshold, the memory forensics module analyzes the memory space of the first testing machine to determine that whether the to-be tested file comprises a malware program and generate an analyzing result.
    Type: Grant
    Filed: December 5, 2016
    Date of Patent: June 11, 2019
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Jian-Wei Liao, Chin-Wei Tien, Shun-Chieh Chang
  • Publication number: 20190163901
    Abstract: A computer device and a method of identifying whether container behavior thereof is abnormal are provided. The computer device detects container behavior of a container in a time interval, and identifies whether the container behavior of the container is abnormal according to a container behavior identification module, thereby determining whether there is an intrusion. In addition, a decoy container can be installed in the computer device to attract attacking or invading from a third party so as to reduce the risk of the container being attacked, and the container behavior identification module can be updated according to the container behavior of the decoy container.
    Type: Application
    Filed: December 7, 2017
    Publication date: May 30, 2019
    Inventors: Chia-Wei TIEN, Tse-Yung HUANG, Chin-Wei TIEN
  • Publication number: 20190156026
    Abstract: A monitor apparatus, method, and non-transitory computer readable storage medium thereof are provided. The monitor method is adapted for an electronic computing apparatus, wherein the electronic computing apparatus stores a smart contract and a blockchain ledger of a blockchain system. The monitor method periodically executes the following steps: (a) obtaining a piece of behavior information of a first electronic apparatus at a time point, (b) retrieving, via the smart contract, a plurality of pieces of previous behavior information within a time interval from the blockchain ledger, wherein the time interval is defined by the time point, and each piece of previous behavior information corresponds to one of a plurality of second electronic apparatuses and the first electronic apparatus, (c) determining a legality of the piece of behavior information according to the pieces of previous behavior information, and (d) writing the behavior information into the blockchain ledger.
    Type: Application
    Filed: December 12, 2017
    Publication date: May 23, 2019
    Inventors: Jian-Wei LIAO, Chin-Wei TIEN, Chia-Kang HO
  • Publication number: 20180144134
    Abstract: A detection method comprising: (A) transmitting a to-be tested file to a first testing machine by the processing device; wherein the first testing machine uses for executing the to-be tested file; (B) monitoring that whether a component usage of the first testing machine is higher than a default threshold during a period of executing the to-be tested file by the processing device; and (C) when the component usage of the first testing machine is higher than the default threshold, the memory forensics module analyzes the memory space of the first testing machine to determine that whether the to-be tested file comprises a malware program and generate an analyzing result.
    Type: Application
    Filed: December 5, 2016
    Publication date: May 24, 2018
    Inventors: Jian-Wei LIAO, Chin-Wei TIEN, Shun-Chieh CHANG
  • Publication number: 20170169223
    Abstract: A detection system and method thereof are provided. The detection method comprises the following steps: decompiling a first application package file to generate a plurality of first decompiled files, and the first decompiled files comprising a first decompiled code; comparing the first decompiled code with a second decompiled code of a second application package file to analyze a different code segment between the first decompiled code and the second decompiled code; classifying a changed code type corresponding to the different code segment according to a function call flow of the first decompiled code; loading a correspondence table and selecting at least one detection rule corresponding to the changed code type in the correspondence table; confirming a detection region of the first decompiled code according to the at least one detection rule; and detecting the detection region to generate a security detection result.
    Type: Application
    Filed: June 19, 2016
    Publication date: June 15, 2017
    Inventors: Chih-Hung LIN, Chia-Wei TIEN, Tse-Yung HUANG, Chin-Wei TIEN
  • Publication number: 20150067673
    Abstract: A virtual time control apparatus, method, and non-transitory computer readable storage medium thereof are provided. The virtual time control apparatus includes a system timer, a real time clock, and a processing unit, wherein the processing unit is electrically connected to the system timer and the real time clock. The system timer has an original timer period, while the real time clock has an original tick period. The processing unit executes a hypervisor. The hypervisor generates a virtual timer period according to an adjustment ratio and the original timer period. The hypervisor generates a virtual tick period according to the adjustment ratio and the original tick period.
    Type: Application
    Filed: November 11, 2013
    Publication date: March 5, 2015
    Applicant: Institute For Information Industry
    Inventors: Sheng-Hao WANG, Jian-De JIANG, Chin-Wei TIEN, Chih-Hung LIN
  • Publication number: 20140157412
    Abstract: A method for performing anonymous testing on electronic digital data is provided. The method comprises the steps outlined below. At least one electronic digital data is received. A type of the electronic digital data is identified to retrieve a plurality of data fields according to the type of the electronic digital data, in which the data fields further comprises a plurality of data blocks. The data fields and the data blocks are analyzed such that they are categorized as at least one logic operation part and at least one data content part. A data-hiding process is performed on the data content part only to generate output electronic digital data and a subsequent analysis is performed on the output electronic digital data.
    Type: Application
    Filed: February 22, 2013
    Publication date: June 5, 2014
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Zhi-Wei CHEN, Chia-Wei TIEN, Chin-Wei TIEN, Chih-Hung LIN