Patents by Inventor Shih-Yao DAI

Shih-Yao DAI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160141125
    Abstract: A control device and a control method for controlling a physical switch are provided. The control device includes a bonding interface, a signal transceiving module, a control module and a driving module. The bonding interface is configured to bond the control device with the physical switch. The signal transceiving module is configured to receive a control signal. The control module is connected with the signal transceiving module and configured to generate a driving signal according to the control signal. The driving module is connected with the control module and configured to touch and control the physical switch according to the driving signal. The control method is applied to the control device to implement the operations.
    Type: Application
    Filed: January 20, 2015
    Publication date: May 19, 2016
    Inventors: Shih-Yao DAI, Joey Jenhui SYU, Hui-I HSIAO
  • Publication number: 20140152472
    Abstract: An object location confirmation system for use in an area is provided. The area includes a first zone and a second zone. The object location confirmation system includes a first retrieving device, a second retrieving device, and a data processing apparatus. The first retrieving device is disposed on a path of the area to retrieve a first datum of an object. The second retrieving device is disposed in a boundary region of the second zone. The data processing apparatus is configured to receive the first datum and identify the first datum so as to generate a piece of identification information related to the object. The data processing apparatus determines and records that the object is located in the first zone when the data processing apparatus receives the identification information related to the object and has not received a second datum of the object retrieved from the second retrieving device.
    Type: Application
    Filed: December 13, 2012
    Publication date: June 5, 2014
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Sheng-Po TSENG, Shih-Yao DAI
  • Patent number: 8490192
    Abstract: A method and a system for cleaning malicious software (malware), a computer program product, and a storage medium are provided. A relation graph is established to associate processes in an operating system and related elements. A node marking action is performed on the relation graph when a predetermined condition is satisfied. The node corresponding to a malicious process and its related nodes are marked with a first label. The nodes of other normal processes and their related nodes are marked with a second label. Then, those nodes marked with both the first label and the second label are screened, so that each of the nodes is marked with only the first label or the second label. Finally, the processes and elements corresponding to the nodes marked with the first label are removed.
    Type: Grant
    Filed: October 1, 2009
    Date of Patent: July 16, 2013
    Assignee: Institute for Information Industry
    Inventors: Shih-Yao Dai, Yu-Chen Chang, Jain-Shing Wu, Chih-Hung Lin, Yen-Nun Huang, Sy-Yen Kuo
  • Patent number: 8453244
    Abstract: A server, a user device, and a malware detection method thereof are provided. The server connects with the user device via a network, and records execution records of the user device. Based on the history of the execution records of the user device, the server can detect whether the user device has malwares or not accordingly.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: May 28, 2013
    Assignee: Institute for Information Industry
    Inventors: Shih-Yao Dai, Yu-Chen Chang, Jain-Shing Wu, Jui-Fa Chen, Sy-Yen Kuo
  • Publication number: 20120159628
    Abstract: A malware detection apparatus, a malware detection method, and a computer program product thereof are provided. The malware detection apparatus is used to detect a program. The program executes a first process. The malware detection apparatus comprises a storage unit and a processing unit. The storage unit is configured to store a malicious behavior profile of a malware. The processing unit is configured to construct a first behavior profile according to the first process, compare the first behavior profile with the malicious behavior profile and generate a comparison result. The processing unit updates a behavior record table according to the comparison result, and determines that the program is the malware according to the behavior record table.
    Type: Application
    Filed: May 25, 2011
    Publication date: June 21, 2012
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Yao DAI, Yao-Tung TSOU, Ting-Yu LEE, Castle YEN, Sy-Yen KUO, Jain-Shing WU
  • Publication number: 20120131675
    Abstract: A server, a user device, and a malware detection method thereof are provided. The server connects with the user device via a network, and records execution records of the user device. Based on the history of the execution records of the user device, the server can detect whether the user device has malwares or not accordingly.
    Type: Application
    Filed: December 15, 2010
    Publication date: May 24, 2012
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Yao DAI, Yu-Chen Chang, Jain-Shing Wu, Jui-Fa Chen, Sy-Yen Kuo
  • Publication number: 20110023120
    Abstract: A method and a system for cleaning malicious software (malware), a computer program product, and a storage medium are provided. A relation graph is established to associate processes in an operating system and related elements. A node marking action is performed on the relation graph when a predetermined condition is satisfied. The node corresponding to a malicious process and its related nodes are marked with a first label. The nodes of other normal processes and their related nodes are marked with a second label. Then, those nodes marked with both the first label and the second label are screened, so that each of the nodes is marked with only the first label or the second label. Finally, the processes and elements corresponding to the nodes marked with the first label are removed.
    Type: Application
    Filed: October 1, 2009
    Publication date: January 27, 2011
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Yao Dai, Yu-Chen Chang, Jain-Shing Wu, Chih-Hung Lin, Yen-Nun Huang, Sy-Yen Kuo
  • Publication number: 20100125909
    Abstract: A monitor device, a monitor method and a computer program product thereof for hardware are disclosed. The hardware comprises a central processing unit (CPU) and a storage module. The monitor device comprises a retrieval module and an analysis module. The retrieval module is configured to retrieve the entry point information of a process before the process is executed, wherein the process comprises at least one instruction from the hardware. The analysis module is configured to retrieve an address corresponding to the process according to the entry point information. When the CPU executes the at least one instruction, the storage module records the at least one instruction according to the address.
    Type: Application
    Filed: April 6, 2009
    Publication date: May 20, 2010
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Yao DAI, Chih-Hung LIN, Yen-Nun HUANG, Chia-Hsiang CHANG, Sy-Yen KUO