Patents by Inventor Chien-Ting Kuo
Chien-Ting Kuo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11942550Abstract: A method for manufacturing a nanosheet semiconductor device includes forming a poly gate on a nanosheet stack which includes at least one first nanosheet and at least one second nanosheet alternating with the at least one first nanosheet; recessing the nanosheet stack to form a source/drain recess proximate to the poly gate; forming an inner spacer laterally covering the at least one first nanosheet; and selectively etching the at least one second nanosheet.Type: GrantFiled: February 24, 2021Date of Patent: March 26, 2024Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING COMPANY, LTD.Inventors: Chien-Chang Su, Yan-Ting Lin, Chien-Wei Lee, Bang-Ting Yan, Chih Teng Hsu, Chih-Chiang Chang, Chien-I Kuo, Chii-Horng Li, Yee-Chia Yeo
-
Patent number: 10162957Abstract: An authentication method includes sending out a first authentication request; receiving first authentication information of a first authentication item; determining whether the first authentication information is correct; determining whether a first weighting value is equal to or is larger than a threshold value; sending out a second authentication request when the first authentication information is correct and the first weighting value is smaller than the threshold value; receiving second authentication information of a second authentication item; determining whether the second authentication information is correct; determining whether a first sum value of the first weighting value and a second weighting value is equal to or is larger than the threshold value; and permitting a web system to be logged in when the second authentication information is correct and the first sum value is equal to or is larger than the threshold value.Type: GrantFiled: December 6, 2016Date of Patent: December 25, 2018Assignee: INSTITUTE FOR INFORMATION INDUSTRYInventors: Chuan-Yen Fan, Chien-Ting Kuo
-
Publication number: 20180157821Abstract: An authentication method includes sending out a first authentication request; receiving first authentication information of a first authentication item; determining whether the first authentication information is correct; determining whether a first weighting value is equal to or is larger than a threshold value; sending out a second authentication request when the first authentication information is correct and the first weighting value is smaller than the threshold value; receiving second authentication information of a second authentication item; determining whether the second authentication information is correct; determining whether a first sum value of the first weighting value and a second weighting value is equal to or is larger than the threshold value; and permitting a web system to be logged in when the second authentication information is correct and the first sum value is equal to or is larger than the threshold value.Type: ApplicationFiled: December 6, 2016Publication date: June 7, 2018Inventors: Chuan-Yen FAN, Chien-Ting KUO
-
Patent number: 9965646Abstract: An exemplary embodiment of the present disclosure illustrates a sensitive data discrimination method executed in a data loss prevention system to determine whether a file has the least one sensitive data during a file generation proceeding. Steps of the sensitive data discrimination method are illustrated as follows. Multiple characters inputted via a keyboard are recorded. The recorded characters are trimmed to generate a trimmed data. The trimmed data and at least one predefined term related to the at least one sensitive data are compared, to determine whether the trimmed data has the at least one sensitive data.Type: GrantFiled: November 3, 2014Date of Patent: May 8, 2018Assignee: Institute For Information IndustryInventors: Jain-Shing Wu, Song-Kong Chong, Chien-Ting Kuo
-
Patent number: 9830252Abstract: A software test method used in a software test system that includes a memory that stores a plurality of computer executable instructions and a processing unit coupled to the memory is provided. The software test method includes the steps outlined below. The processing unit detects input and output parameters of under-test software. The processing unit detects inner operation parameters of the under-test software. The processing unit establishes parameter variance probability of each parameter variances between any two functions included in the under-test software to generate test case including test parameters accordingly. The processing unit transmits test parameters of the test case to the under-test software to perform test.Type: GrantFiled: February 18, 2016Date of Patent: November 28, 2017Assignee: INSTITUTE FOR INFORMATION INDUSTRYInventors: Chien-Ting Kuo, Shih-Jen Chen
-
Publication number: 20170139811Abstract: A software test method used in a software test system that includes a memory that stores a plurality of computer executable instructions and a processing unit coupled to the memory is provided. The software test method includes the steps outlined below. The processing unit detects input and output parameters of under-test software. The processing unit detects inner operation parameters of the under-test software. The processing unit establishes parameter variance probability of each parameter variances between any two functions included in the under-test software to generate test case including test parameters accordingly. The processing unit transmits test parameters of the test case to the under-test software to perform test.Type: ApplicationFiled: February 18, 2016Publication date: May 18, 2017Inventors: Chien-Ting KUO, Shih-Jen CHEN
-
Publication number: 20160132420Abstract: A pre-testing method adapted for environment updating is illustrated. The pre-testing method comprises following steps: while detecting an environment updating process should be performed to an operating system environment, determining whether an environment test should be executed; while the environment test is executed, selecting a plurality of pieces of system and software information of the operating system environment, wherein the system and software information of the operating system environment is extracted from the operating system environment; generating a virtual machine having a first clone environment according to the system and software information; performing the environment updating process to the first clone environment so as to cause the first clone environment to become a second clone environment of the virtual machine; and executing the environment test for the second clone environment.Type: ApplicationFiled: November 10, 2014Publication date: May 12, 2016Inventors: CHIEN-TING KUO, SHIH-JEN CHEN
-
Patent number: 9146839Abstract: A method for pre-testing software compatibility is illustrated. A system and software information of an operating system is extracted. While that a patch or new software will be installed in the operating system is detected, whether a compatibility test should be executed is determined. While that the compatibility test should be executed is detected, a virtual machine with a first clone system is generated, wherein the first clone system is generated according to the system and software information. The patch or the new software is installed in the first clone system to generate a second clone system. The compatibility test for the second clone system is executed. According to a result of the compatibility test, whether the patch or new software can be installed in the operating system or the second clone system can be switched to be used is determined.Type: GrantFiled: November 13, 2013Date of Patent: September 29, 2015Assignee: INSTITUTE FOR INFORMATION INDUSTRYInventors: Shih-Jen Chen, Chien-Ting Kuo
-
Publication number: 20150268838Abstract: A method, system, electronic device, and non-transitory computer readable storage medium for behavior based user interface layout display are provided. The method includes: displaying service information on an user interface in the form of a first layout arrangement with a first set of components, receiving a service information request from the user interface, establishing an user profile based on the service information request, reconfiguring the service information based on the user profile, and displaying the reconfigured service information on the user interface in the form of a second layout arrangement with a second set of components. A size of each of the first set and the second set of the components is variable.Type: ApplicationFiled: March 20, 2014Publication date: September 24, 2015Applicant: Institute For Information IndustryInventors: Wen-Nan WANG, Chien-Ting KUO, Cheng-Yuan HO, Feng-Sheng WANG, Ai Ting CHANG, Stephen HSU, Louis Lu-Chen HSU
-
Publication number: 20150154420Abstract: An exemplary embodiment of the present disclosure illustrates a sensitive data discrimination method executed in a data loss prevention system to determine whether a file has the least one sensitive data during a file generation proceeding. Steps of the sensitive data discrimination method are illustrated as follows. Multiple characters inputted via a keyboard are recorded. The recorded characters are trimmed to generate a trimmed data. The trimmed data and at least one predefined term related to the at least one sensitive data are compared, to determine whether the trimmed data has the at least one sensitive data.Type: ApplicationFiled: November 3, 2014Publication date: June 4, 2015Inventors: JAIN-SHING WU, SONG-KONG CHONG, CHIEN-TING KUO
-
Publication number: 20150089479Abstract: A method for pre-testing software compatibility is illustrated. A system and software information of an operating system is extracted. While that a patch or new software will be installed in the operating system is detected, whether a compatibility test should be executed is determined. While that the compatibility test should be executed is detected, a virtual machine with a first clone system is generated, wherein the first clone system is generated according to the system and software information. The patch or the new software is installed in the first clone system to generate a second clone system. The compatibility test for the second clone system is executed. According to a result of the compatibility test, whether the patch or new software can be installed in the operating system or the second clone system can be switched to be used is determined.Type: ApplicationFiled: November 13, 2013Publication date: March 26, 2015Applicant: INSTITUTE FOR INFORMATION INDUSTRYInventors: SHIH-JEN CHEN, CHIEN-TING KUO
-
Patent number: 8776220Abstract: A phishing detecting method includes: a web-page accessing request for accessing a target web page at a target address is received; the target web page from the target address is obtained; the target web page is snapshotted to obtain a present page snapshot; the present page snapshot is compared with several pre-stored page snapshots stored in a database, wherein each of the pre-stored page snapshots corresponds to a pre-stored address; if the present page snapshot matches one of the pre-stored page snapshots, the target address is compared with the pre-stored address, corresponding pre-stored page snapshot of which matches the present page snapshot; if the target address does not match the pre-stored address, the corresponding pre-stored page snapshot of which matches the present page snapshot, it is determined that the target web page is a phishing web page.Type: GrantFiled: December 8, 2011Date of Patent: July 8, 2014Assignee: Institute for Information IndustryInventors: Shih-Jen Chen, Chien-Ting Kuo
-
Publication number: 20140130170Abstract: An information security audit method used in an information security audit system is provided. The information security audit method comprises the steps outlined below. A normalized weighting of each of a plurality of members of an organization is computed according to a level and at least one feature of each of the members. A plurality of risk evaluation values corresponding to a plurality of audit items are computed and a normalized risk evaluation value of each of the members is further computed according to the risk evaluation values and the normalized weighting. A relation of the normalized risk evaluation value and a plurality of threshold value intervals are determined to dynamically adjust an audit period and/or a number of the audit items according to the relation.Type: ApplicationFiled: November 27, 2012Publication date: May 8, 2014Applicant: INSTITUTE FOR INFORMATION INDUSTRYInventors: Chien-Ting KUO, He-Ming RUAN, Chin-Laung LEI
-
Patent number: 8516581Abstract: A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.Type: GrantFiled: December 13, 2011Date of Patent: August 20, 2013Assignee: Institute for Information IndustryInventors: Fu-Hau Hsu, Shih-Jen Chen, Chien-Ting Kuo, Jain-Shing Wu, Chuan-Sheng Wang
-
Publication number: 20130145462Abstract: A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.Type: ApplicationFiled: December 13, 2011Publication date: June 6, 2013Applicant: INSTITUTE FOR INFORMATION INDUSTRYInventors: Fu-Hau Hsu, Shih-Jen Chen, Chien-Ting Kuo, Jain-Shing Wu, Chuan-Sheng Wang
-
Publication number: 20130097700Abstract: A phishing detecting method includes: a web-page accessing request for accessing a target web page at a target address is received; the target web page from the target address is obtained; the target web page is snapshotted to obtain a present page snapshot; the present page snapshot is compared with several pre-stored page snapshots stored in a database, wherein each of the pre-stored page snapshots corresponds to a pre-stored address; if the present page snapshot matches one of the pre-stored page snapshots, the target address is compared with the pre-stored address, corresponding pre-stored page snapshot of which matches the present page snapshot; if the target address does not match the pre-stored address, the corresponding pre-stored page snapshot of which matches the present page snapshot, it is determined that the target web page is a phishing web page.Type: ApplicationFiled: December 8, 2011Publication date: April 18, 2013Applicant: INSTITUTE FOR INFORMATION INDUSTRYInventors: Shih-Jen Chen, Chien-Ting Kuo