Patents by Inventor Chin-Wei Tien
Chin-Wei Tien has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240088030Abstract: Provided are semiconductor devices that include a first gate structure having a first end cap portion, a second gate structure having a second end cap portion coaxial with the first gate structure, a first dielectric region separating the first end cap portion and the second end cap portion, a first conductive element extending over the first gate structure, a second conductive element extending over the second gate structure, and a gate via electrically connecting the second gate structure and the second conductive element, with the first dielectric region having a first width and being positioned at least partially under the first conductive element and defines a spacing between the gate via and an end of the second end cap portion that exceeds a predetermined distance.Type: ApplicationFiled: January 23, 2023Publication date: March 14, 2024Inventors: Chin-Liang CHEN, Chi-Yu LU, Ching-Wei TSAI, Chun-Yuan CHEN, Li-Chun TIEN
-
Patent number: 11693973Abstract: A file vulnerability detection method includes: translating a binary file into an intermediate file; analyzing the intermediate file to obtain multiple functions to be tested; establishing function characteristic data of each of the functions to be tested; and comparing correlations between the function characteristic data of each of the functions to be tested and at least one pair of characteristic data with vulnerability of at least one vulnerability function and characteristic data without vulnerability of the at least one vulnerability function in a vulnerability database based on a characteristic model to determine whether each of the functions to be tested corresponding to each function characteristic data has a vulnerability, wherein the characteristic model has information representing multiple back-end binary files generated by multiple back-end platforms, wherein the characteristic data with vulnerability has the vulnerability, and the characteristic data without vulnerability does not have the vulnType: GrantFiled: March 19, 2021Date of Patent: July 4, 2023Assignee: INSTITUTE FOR INFORMATION INDUSTRYInventors: Jian Wei Liao, Chihwei Chen, Chin Wei Tien, Tsung Ta Tsai
-
Patent number: 11502928Abstract: A fuzz testing apparatus transmits a plurality of packets to the device under test (DUT), and calculates a probability of abnormal state, a normal response time and an abnormal-state-processing time of the DUT for the packets. Then, the fuzz testing apparatus estimates a maximum quantity of packets that can be sent to the DUT according to the probability of abnormal state the normal response time and the abnormal-state-processing time corresponding to the standby time of the DUT. Finally, the fuzz testing apparatus determines a plurality of test packets from a plurality of candidate test packets according to the maximum quantity of packets.Type: GrantFiled: December 8, 2020Date of Patent: November 15, 2022Assignee: INSTITUTE FOR INFORMATION INDUSTRYInventors: Pei-Yi Lin, Chih-Wei Chen, Chia-Wei Tien, Chin-Wei Tien
-
Publication number: 20220269793Abstract: A file vulnerability detection method includes: translating a binary file into an intermediate file; analyzing the intermediate file to obtain multiple functions to be tested; establishing function characteristic data of each of the functions to be tested; and comparing correlations between the function characteristic data of each of the functions to be tested and at least one pair of characteristic data with vulnerability of at least one vulnerability function and characteristic data without vulnerability of the at least one vulnerability function in a vulnerability database based on a characteristic model to determine whether each of the functions to be tested corresponding to each function characteristic data has a vulnerability, wherein the characteristic model has information representing multiple back-end binary files generated by multiple back-end platforms, wherein the characteristic data with vulnerability has the vulnerability, and the characteristic data without vulnerability does not have the vulnType: ApplicationFiled: March 19, 2021Publication date: August 25, 2022Inventors: Jian Wei Liao, Chihwei Chen, CHIN WEI TIEN, Tsung Ta Tsai
-
Publication number: 20220166699Abstract: A fuzz testing apparatus transmits a plurality of packets to the device under test (DUT), and calculates a probability of abnormal state, a normal response time and an abnormal-state-processing time of the DUT for the packets. Then, the fuzz testing apparatus estimates a maximum quantity of packets that can be sent to the DUT according to the probability of abnormal state the normal response time and the abnormal-state-processing time corresponding to the standby time of the DUT. Finally, the fuzz testing apparatus determines a plurality of test packets from a plurality of candidate test packets according to the maximum quantity of packets.Type: ApplicationFiled: December 8, 2020Publication date: May 26, 2022Inventors: Pei-Yi LIN, Chih-Wei CHEN, Chia-Wei TIEN, Chin-Wei TIEN
-
Patent number: 11263485Abstract: A system for training transfer models that includes a memory and a processor coupling to each other. The memory stores instructions. The processor accesses the instructions to retrieve raw datasets from a first-type device and train a feature extraction model, a transfer feature and a preliminary classify model based on the raw datasets. The processor further transfers the feature extraction model, the transfer feature and the preliminary classify model to a host of a manufacturer so that the host directly applies the feature extraction model and the transfer feature, and retrains the preliminary classify model as an adapted classify model based on practical datasets.Type: GrantFiled: December 2, 2019Date of Patent: March 1, 2022Assignee: INSTITUTE FOR INFORMATION INDUSTRYInventors: Tse-Yung Huang, Chin-Wei Tien, Shang-Wen Chen
-
Publication number: 20210150271Abstract: A system for training transfer models that includes a memory and a processor coupling to each other. The memory stores instructions. The processor accesses the instructions to retrieve raw datasets from a first-type device and train a feature extraction model, a transfer feature and a preliminary classify model based on the raw datasets. The processor further transfers the feature extraction model, the transfer feature and the preliminary classify model to a host of a manufacturer so that the host directly applies the feature extraction model and the transfer feature, and retrains the preliminary classify model as an adapted classify model based on practical datasets.Type: ApplicationFiled: December 2, 2019Publication date: May 20, 2021Inventors: Tse-Yung HUANG, Chin-Wei TIEN, Shang-Wen CHEN
-
Patent number: 10846188Abstract: A device for producing test data stores a plurality of simulated test data each of which substantially conforms to the data format accepted by a device under test (DUT). The data format includes different data blocks. The device for producing test data also mutates each of the simulated test data in one of a plurality of mutation forms to generate a plurality of first test data for testing the DUT. Each of the mutation forms refers to mutating one of the data blocks in one of a plurality of mutation ways.Type: GrantFiled: November 30, 2018Date of Patent: November 24, 2020Assignee: Institute For Information IndustryInventors: Chia-Wei Tien, Pei-Yi Lin, Chin-Wei Tien
-
Patent number: 10846114Abstract: A virtual time control apparatus, method, and non-transitory computer readable storage medium thereof are provided. The virtual time control apparatus includes a system timer, a real time clock, and a processing unit, wherein the processing unit is electrically connected to the system timer and the real time clock. The system timer has an original timer period, while the real time clock has an original tick period. The processing unit executes a hypervisor. The hypervisor generates a virtual timer period according to an adjustment ratio and the original timer period. The hypervisor generates a virtual tick period according to the adjustment ratio and the original tick period.Type: GrantFiled: November 11, 2013Date of Patent: November 24, 2020Assignee: Institute For Information IndustryInventors: Sheng-Hao Wang, Jian-De Jiang, Chin-Wei Tien, Chih-Hung Lin
-
Patent number: 10726124Abstract: A computer device and a method of identifying whether container behavior thereof is abnormal are provided. The computer device detects container behavior of a container in a time interval, and identifies whether the container behavior of the container is abnormal according to a container behavior identification module, thereby determining whether there is an intrusion. In addition, a decoy container can be installed in the computer device to attract attacking or invading from a third party so as to reduce the risk of the container being attacked, and the container behavior identification module can be updated according to the container behavior of the decoy container.Type: GrantFiled: December 7, 2017Date of Patent: July 28, 2020Assignee: Institute For Information IndustryInventors: Chia-Wei Tien, Tse-Yung Huang, Chin-Wei Tien
-
Publication number: 20200142794Abstract: A device for producing test data stores a plurality of simulated test data each of which substantially conforms to the data format accepted by a device under test (DUT). The data format includes different data blocks. The device for producing test data also mutates each of the simulated test data in one of a plurality of mutation forms to generate a plurality of first test data for testing the DUT. Each of the mutation forms refers to mutating one of the data blocks in one of a plurality of mutation ways.Type: ApplicationFiled: November 30, 2018Publication date: May 7, 2020Inventors: Chia-Wei TIEN, Pei-Yi LIN, Chin-Wei TIEN
-
Patent number: 10621339Abstract: A monitor apparatus, method, and non-transitory computer readable storage medium thereof are provided. The monitor method is adapted for an electronic computing apparatus, wherein the electronic computing apparatus stores a smart contract and a blockchain ledger of a blockchain system. The monitor method periodically executes the following steps: (a) obtaining a piece of behavior information of a first electronic apparatus at a time point, (b) retrieving, via the smart contract, a plurality of pieces of previous behavior information within a time interval from the blockchain ledger, wherein the time interval is defined by the time point, and each piece of previous behavior information corresponds to one of a plurality of second electronic apparatuses and the first electronic apparatus, (c) determining a legality of the piece of behavior information according to the pieces of previous behavior information, and (d) writing the behavior information into the blockchain ledger.Type: GrantFiled: December 12, 2017Date of Patent: April 14, 2020Assignee: Institute For Information IndustryInventors: Jian-Wei Liao, Chin-Wei Tien, Chia-Kang Ho
-
Patent number: 10489591Abstract: A detection system and method thereof are provided. The detection method comprises the following steps: decompiling a first application package file to generate a plurality of first decompiled files, and the first decompiled files comprising a first decompiled code; comparing the first decompiled code with a second decompiled code of a second application package file to analyze a different code segment between the first decompiled code and the second decompiled code; classifying a changed code type corresponding to the different code segment according to a function call flow of the first decompiled code; loading a correspondence table and selecting at least one detection rule corresponding to the changed code type in the correspondence table; confirming a detection region of the first decompiled code according to the at least one detection rule; and detecting the detection region to generate a security detection result.Type: GrantFiled: June 19, 2016Date of Patent: November 26, 2019Assignee: INSTITUTE FOR INFORMATION INDUSTRYInventors: Chih-Hung Lin, Chia-Wei Tien, Tse-Yung Huang, Chin-Wei Tien
-
Patent number: 10318731Abstract: A detection method comprising: (A) transmitting a to-be tested file to a first testing machine by the processing device; wherein the first testing machine uses for executing the to-be tested file; (B) monitoring that whether a component usage of the first testing machine is higher than a default threshold during a period of executing the to-be tested file by the processing device; and (C) when the component usage of the first testing machine is higher than the default threshold, the memory forensics module analyzes the memory space of the first testing machine to determine that whether the to-be tested file comprises a malware program and generate an analyzing result.Type: GrantFiled: December 5, 2016Date of Patent: June 11, 2019Assignee: INSTITUTE FOR INFORMATION INDUSTRYInventors: Jian-Wei Liao, Chin-Wei Tien, Shun-Chieh Chang
-
Publication number: 20190163901Abstract: A computer device and a method of identifying whether container behavior thereof is abnormal are provided. The computer device detects container behavior of a container in a time interval, and identifies whether the container behavior of the container is abnormal according to a container behavior identification module, thereby determining whether there is an intrusion. In addition, a decoy container can be installed in the computer device to attract attacking or invading from a third party so as to reduce the risk of the container being attacked, and the container behavior identification module can be updated according to the container behavior of the decoy container.Type: ApplicationFiled: December 7, 2017Publication date: May 30, 2019Inventors: Chia-Wei TIEN, Tse-Yung HUANG, Chin-Wei TIEN
-
Publication number: 20190156026Abstract: A monitor apparatus, method, and non-transitory computer readable storage medium thereof are provided. The monitor method is adapted for an electronic computing apparatus, wherein the electronic computing apparatus stores a smart contract and a blockchain ledger of a blockchain system. The monitor method periodically executes the following steps: (a) obtaining a piece of behavior information of a first electronic apparatus at a time point, (b) retrieving, via the smart contract, a plurality of pieces of previous behavior information within a time interval from the blockchain ledger, wherein the time interval is defined by the time point, and each piece of previous behavior information corresponds to one of a plurality of second electronic apparatuses and the first electronic apparatus, (c) determining a legality of the piece of behavior information according to the pieces of previous behavior information, and (d) writing the behavior information into the blockchain ledger.Type: ApplicationFiled: December 12, 2017Publication date: May 23, 2019Inventors: Jian-Wei LIAO, Chin-Wei TIEN, Chia-Kang HO
-
Publication number: 20180144134Abstract: A detection method comprising: (A) transmitting a to-be tested file to a first testing machine by the processing device; wherein the first testing machine uses for executing the to-be tested file; (B) monitoring that whether a component usage of the first testing machine is higher than a default threshold during a period of executing the to-be tested file by the processing device; and (C) when the component usage of the first testing machine is higher than the default threshold, the memory forensics module analyzes the memory space of the first testing machine to determine that whether the to-be tested file comprises a malware program and generate an analyzing result.Type: ApplicationFiled: December 5, 2016Publication date: May 24, 2018Inventors: Jian-Wei LIAO, Chin-Wei TIEN, Shun-Chieh CHANG
-
Publication number: 20170169223Abstract: A detection system and method thereof are provided. The detection method comprises the following steps: decompiling a first application package file to generate a plurality of first decompiled files, and the first decompiled files comprising a first decompiled code; comparing the first decompiled code with a second decompiled code of a second application package file to analyze a different code segment between the first decompiled code and the second decompiled code; classifying a changed code type corresponding to the different code segment according to a function call flow of the first decompiled code; loading a correspondence table and selecting at least one detection rule corresponding to the changed code type in the correspondence table; confirming a detection region of the first decompiled code according to the at least one detection rule; and detecting the detection region to generate a security detection result.Type: ApplicationFiled: June 19, 2016Publication date: June 15, 2017Inventors: Chih-Hung LIN, Chia-Wei TIEN, Tse-Yung HUANG, Chin-Wei TIEN
-
Publication number: 20150067673Abstract: A virtual time control apparatus, method, and non-transitory computer readable storage medium thereof are provided. The virtual time control apparatus includes a system timer, a real time clock, and a processing unit, wherein the processing unit is electrically connected to the system timer and the real time clock. The system timer has an original timer period, while the real time clock has an original tick period. The processing unit executes a hypervisor. The hypervisor generates a virtual timer period according to an adjustment ratio and the original timer period. The hypervisor generates a virtual tick period according to the adjustment ratio and the original tick period.Type: ApplicationFiled: November 11, 2013Publication date: March 5, 2015Applicant: Institute For Information IndustryInventors: Sheng-Hao WANG, Jian-De JIANG, Chin-Wei TIEN, Chih-Hung LIN
-
Publication number: 20140157412Abstract: A method for performing anonymous testing on electronic digital data is provided. The method comprises the steps outlined below. At least one electronic digital data is received. A type of the electronic digital data is identified to retrieve a plurality of data fields according to the type of the electronic digital data, in which the data fields further comprises a plurality of data blocks. The data fields and the data blocks are analyzed such that they are categorized as at least one logic operation part and at least one data content part. A data-hiding process is performed on the data content part only to generate output electronic digital data and a subsequent analysis is performed on the output electronic digital data.Type: ApplicationFiled: February 22, 2013Publication date: June 5, 2014Applicant: INSTITUTE FOR INFORMATION INDUSTRYInventors: Zhi-Wei CHEN, Chia-Wei TIEN, Chin-Wei TIEN, Chih-Hung LIN