Patents by Inventor Chien-Ting Kuo

Chien-Ting Kuo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11942550
    Abstract: A method for manufacturing a nanosheet semiconductor device includes forming a poly gate on a nanosheet stack which includes at least one first nanosheet and at least one second nanosheet alternating with the at least one first nanosheet; recessing the nanosheet stack to form a source/drain recess proximate to the poly gate; forming an inner spacer laterally covering the at least one first nanosheet; and selectively etching the at least one second nanosheet.
    Type: Grant
    Filed: February 24, 2021
    Date of Patent: March 26, 2024
    Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING COMPANY, LTD.
    Inventors: Chien-Chang Su, Yan-Ting Lin, Chien-Wei Lee, Bang-Ting Yan, Chih Teng Hsu, Chih-Chiang Chang, Chien-I Kuo, Chii-Horng Li, Yee-Chia Yeo
  • Patent number: 10162957
    Abstract: An authentication method includes sending out a first authentication request; receiving first authentication information of a first authentication item; determining whether the first authentication information is correct; determining whether a first weighting value is equal to or is larger than a threshold value; sending out a second authentication request when the first authentication information is correct and the first weighting value is smaller than the threshold value; receiving second authentication information of a second authentication item; determining whether the second authentication information is correct; determining whether a first sum value of the first weighting value and a second weighting value is equal to or is larger than the threshold value; and permitting a web system to be logged in when the second authentication information is correct and the first sum value is equal to or is larger than the threshold value.
    Type: Grant
    Filed: December 6, 2016
    Date of Patent: December 25, 2018
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Chuan-Yen Fan, Chien-Ting Kuo
  • Publication number: 20180157821
    Abstract: An authentication method includes sending out a first authentication request; receiving first authentication information of a first authentication item; determining whether the first authentication information is correct; determining whether a first weighting value is equal to or is larger than a threshold value; sending out a second authentication request when the first authentication information is correct and the first weighting value is smaller than the threshold value; receiving second authentication information of a second authentication item; determining whether the second authentication information is correct; determining whether a first sum value of the first weighting value and a second weighting value is equal to or is larger than the threshold value; and permitting a web system to be logged in when the second authentication information is correct and the first sum value is equal to or is larger than the threshold value.
    Type: Application
    Filed: December 6, 2016
    Publication date: June 7, 2018
    Inventors: Chuan-Yen FAN, Chien-Ting KUO
  • Patent number: 9965646
    Abstract: An exemplary embodiment of the present disclosure illustrates a sensitive data discrimination method executed in a data loss prevention system to determine whether a file has the least one sensitive data during a file generation proceeding. Steps of the sensitive data discrimination method are illustrated as follows. Multiple characters inputted via a keyboard are recorded. The recorded characters are trimmed to generate a trimmed data. The trimmed data and at least one predefined term related to the at least one sensitive data are compared, to determine whether the trimmed data has the at least one sensitive data.
    Type: Grant
    Filed: November 3, 2014
    Date of Patent: May 8, 2018
    Assignee: Institute For Information Industry
    Inventors: Jain-Shing Wu, Song-Kong Chong, Chien-Ting Kuo
  • Patent number: 9830252
    Abstract: A software test method used in a software test system that includes a memory that stores a plurality of computer executable instructions and a processing unit coupled to the memory is provided. The software test method includes the steps outlined below. The processing unit detects input and output parameters of under-test software. The processing unit detects inner operation parameters of the under-test software. The processing unit establishes parameter variance probability of each parameter variances between any two functions included in the under-test software to generate test case including test parameters accordingly. The processing unit transmits test parameters of the test case to the under-test software to perform test.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: November 28, 2017
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Chien-Ting Kuo, Shih-Jen Chen
  • Publication number: 20170139811
    Abstract: A software test method used in a software test system that includes a memory that stores a plurality of computer executable instructions and a processing unit coupled to the memory is provided. The software test method includes the steps outlined below. The processing unit detects input and output parameters of under-test software. The processing unit detects inner operation parameters of the under-test software. The processing unit establishes parameter variance probability of each parameter variances between any two functions included in the under-test software to generate test case including test parameters accordingly. The processing unit transmits test parameters of the test case to the under-test software to perform test.
    Type: Application
    Filed: February 18, 2016
    Publication date: May 18, 2017
    Inventors: Chien-Ting KUO, Shih-Jen CHEN
  • Publication number: 20160132420
    Abstract: A pre-testing method adapted for environment updating is illustrated. The pre-testing method comprises following steps: while detecting an environment updating process should be performed to an operating system environment, determining whether an environment test should be executed; while the environment test is executed, selecting a plurality of pieces of system and software information of the operating system environment, wherein the system and software information of the operating system environment is extracted from the operating system environment; generating a virtual machine having a first clone environment according to the system and software information; performing the environment updating process to the first clone environment so as to cause the first clone environment to become a second clone environment of the virtual machine; and executing the environment test for the second clone environment.
    Type: Application
    Filed: November 10, 2014
    Publication date: May 12, 2016
    Inventors: CHIEN-TING KUO, SHIH-JEN CHEN
  • Patent number: 9146839
    Abstract: A method for pre-testing software compatibility is illustrated. A system and software information of an operating system is extracted. While that a patch or new software will be installed in the operating system is detected, whether a compatibility test should be executed is determined. While that the compatibility test should be executed is detected, a virtual machine with a first clone system is generated, wherein the first clone system is generated according to the system and software information. The patch or the new software is installed in the first clone system to generate a second clone system. The compatibility test for the second clone system is executed. According to a result of the compatibility test, whether the patch or new software can be installed in the operating system or the second clone system can be switched to be used is determined.
    Type: Grant
    Filed: November 13, 2013
    Date of Patent: September 29, 2015
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Jen Chen, Chien-Ting Kuo
  • Publication number: 20150268838
    Abstract: A method, system, electronic device, and non-transitory computer readable storage medium for behavior based user interface layout display are provided. The method includes: displaying service information on an user interface in the form of a first layout arrangement with a first set of components, receiving a service information request from the user interface, establishing an user profile based on the service information request, reconfiguring the service information based on the user profile, and displaying the reconfigured service information on the user interface in the form of a second layout arrangement with a second set of components. A size of each of the first set and the second set of the components is variable.
    Type: Application
    Filed: March 20, 2014
    Publication date: September 24, 2015
    Applicant: Institute For Information Industry
    Inventors: Wen-Nan WANG, Chien-Ting KUO, Cheng-Yuan HO, Feng-Sheng WANG, Ai Ting CHANG, Stephen HSU, Louis Lu-Chen HSU
  • Publication number: 20150154420
    Abstract: An exemplary embodiment of the present disclosure illustrates a sensitive data discrimination method executed in a data loss prevention system to determine whether a file has the least one sensitive data during a file generation proceeding. Steps of the sensitive data discrimination method are illustrated as follows. Multiple characters inputted via a keyboard are recorded. The recorded characters are trimmed to generate a trimmed data. The trimmed data and at least one predefined term related to the at least one sensitive data are compared, to determine whether the trimmed data has the at least one sensitive data.
    Type: Application
    Filed: November 3, 2014
    Publication date: June 4, 2015
    Inventors: JAIN-SHING WU, SONG-KONG CHONG, CHIEN-TING KUO
  • Publication number: 20150089479
    Abstract: A method for pre-testing software compatibility is illustrated. A system and software information of an operating system is extracted. While that a patch or new software will be installed in the operating system is detected, whether a compatibility test should be executed is determined. While that the compatibility test should be executed is detected, a virtual machine with a first clone system is generated, wherein the first clone system is generated according to the system and software information. The patch or the new software is installed in the first clone system to generate a second clone system. The compatibility test for the second clone system is executed. According to a result of the compatibility test, whether the patch or new software can be installed in the operating system or the second clone system can be switched to be used is determined.
    Type: Application
    Filed: November 13, 2013
    Publication date: March 26, 2015
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: SHIH-JEN CHEN, CHIEN-TING KUO
  • Patent number: 8776220
    Abstract: A phishing detecting method includes: a web-page accessing request for accessing a target web page at a target address is received; the target web page from the target address is obtained; the target web page is snapshotted to obtain a present page snapshot; the present page snapshot is compared with several pre-stored page snapshots stored in a database, wherein each of the pre-stored page snapshots corresponds to a pre-stored address; if the present page snapshot matches one of the pre-stored page snapshots, the target address is compared with the pre-stored address, corresponding pre-stored page snapshot of which matches the present page snapshot; if the target address does not match the pre-stored address, the corresponding pre-stored page snapshot of which matches the present page snapshot, it is determined that the target web page is a phishing web page.
    Type: Grant
    Filed: December 8, 2011
    Date of Patent: July 8, 2014
    Assignee: Institute for Information Industry
    Inventors: Shih-Jen Chen, Chien-Ting Kuo
  • Publication number: 20140130170
    Abstract: An information security audit method used in an information security audit system is provided. The information security audit method comprises the steps outlined below. A normalized weighting of each of a plurality of members of an organization is computed according to a level and at least one feature of each of the members. A plurality of risk evaluation values corresponding to a plurality of audit items are computed and a normalized risk evaluation value of each of the members is further computed according to the risk evaluation values and the normalized weighting. A relation of the normalized risk evaluation value and a plurality of threshold value intervals are determined to dynamically adjust an audit period and/or a number of the audit items according to the relation.
    Type: Application
    Filed: November 27, 2012
    Publication date: May 8, 2014
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Chien-Ting KUO, He-Ming RUAN, Chin-Laung LEI
  • Patent number: 8516581
    Abstract: A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: August 20, 2013
    Assignee: Institute for Information Industry
    Inventors: Fu-Hau Hsu, Shih-Jen Chen, Chien-Ting Kuo, Jain-Shing Wu, Chuan-Sheng Wang
  • Publication number: 20130145462
    Abstract: A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 6, 2013
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Fu-Hau Hsu, Shih-Jen Chen, Chien-Ting Kuo, Jain-Shing Wu, Chuan-Sheng Wang
  • Publication number: 20130097700
    Abstract: A phishing detecting method includes: a web-page accessing request for accessing a target web page at a target address is received; the target web page from the target address is obtained; the target web page is snapshotted to obtain a present page snapshot; the present page snapshot is compared with several pre-stored page snapshots stored in a database, wherein each of the pre-stored page snapshots corresponds to a pre-stored address; if the present page snapshot matches one of the pre-stored page snapshots, the target address is compared with the pre-stored address, corresponding pre-stored page snapshot of which matches the present page snapshot; if the target address does not match the pre-stored address, the corresponding pre-stored page snapshot of which matches the present page snapshot, it is determined that the target web page is a phishing web page.
    Type: Application
    Filed: December 8, 2011
    Publication date: April 18, 2013
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Jen Chen, Chien-Ting Kuo