Patents by Inventor Chien Yang Hsu

Chien Yang Hsu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11941610
    Abstract: The present disclosure provides a cryptocurrency securing system and a cryptocurrency securing method thereof. The system receives a cryptocurrency transaction information from a user device, and determines whether a policy data corresponding to the cryptocurrency transaction information is legal. When the policy data corresponding to the cryptocurrency transaction information is legal, the system derives a cryptocurrency private key information via a personal identification number of the user device. The system then encrypts the cryptocurrency transaction information via the cryptocurrency private key information for deriving an encrypted cryptocurrency transaction information, and broadcasts the encrypted cryptocurrency transaction information to a blockchain network.
    Type: Grant
    Filed: July 12, 2019
    Date of Patent: March 26, 2024
    Assignee: CIRCLE INTERNET FINANCIAL, LTD
    Inventors: Chi-Huang Fan, Chien-Yang Hsu, Ming-Chang Shih
  • Patent number: 11108806
    Abstract: A system for managing information security attack and defense planning includes a hacker end, an observer end, and a manager end. The hacker end conducts a real-word hacking exercise to hack a targeted website through a monitoring and control server. The observer end monitors the hacker end. The manager end provides an analysis platform communicatively connected to the monitoring and control server. The hacker end and the observer end generate a first independent report and a second independent report respectively according to logged information during the real-world hacking exercise and respectively transmit the first independent report and the second independent report to the analysis platform through the targeted institution for analysis, allowing the manager end to generate a summary report including flaws and vulnerabilities in information security and transmit the summary report to the targeted institution for the targeted institution to objectively and effectively assess the summary report.
    Type: Grant
    Filed: May 13, 2019
    Date of Patent: August 31, 2021
    Assignee: KLICKKLACK INFORMATION SECURITY CO., LTD.
    Inventors: Chien-Yang Hsu, Ju-We Chen, Yi Lin
  • Patent number: 11108800
    Abstract: A penetration test monitoring system includes an attacking host for performing a hacking exercise on a target website; a monitoring server electrically connected to the target website and the attacking host and including a virtual platform and an analysis platform, wherein the virtual platform provides a virtual account for the attacking host to perform the hacking exercise on the target website through the virtual platform after logging in, and the analysis platform is electrically connected to the virtual platform to record the hacking exercise executed by the attacking host; and a monitoring host electrically connected to the monitoring server and the attacking host for monitoring the attacking host. The monitoring server monitors and records the attack behavior of the attacking host, thereby preventing the attacker from arbitrarily implanting virus programs during the security test and improving the protection quality during security testing.
    Type: Grant
    Filed: February 18, 2020
    Date of Patent: August 31, 2021
    Assignee: Klickklack Information Security Co., Ltd.
    Inventors: Chien-Yang Hsu, Ju-We Chen, Yi Lin
  • Publication number: 20210258331
    Abstract: A penetration test monitoring system includes an attacking host for performing a hacking exercise on a target website; a monitoring server electrically connected to the target website and the attacking host and including a virtual platform and an analysis platform, wherein the virtual platform provides a virtual account for the attacking host to perform the hacking exercise on the target website through the virtual platform after logging in, and the analysis platform is electrically connected to the virtual platform to record the hacking exercise executed by the attacking host; and a monitoring host electrically connected to the monitoring server and the attacking host for monitoring the attacking host. The monitoring server monitors and records the attack behavior of the attacking host, thereby preventing the attacker from arbitrarily implanting virus programs during the security test and improving the protection quality during security testing.
    Type: Application
    Filed: February 18, 2020
    Publication date: August 19, 2021
    Inventors: Chien-Yang Hsu, Ju-We Chen, Yi Lin
  • Publication number: 20200366703
    Abstract: A system for managing information security attack and defense planning includes a hacker end, an observer end, and a manager end. The hacker end conducts a real-word hacking exercise to hack a targeted website through a monitoring and control server. The observer end monitors the hacker end. The manager end provides an analysis platform communicatively connected to the monitoring and control server. The hacker end and the observer end generate a first independent report and a second independent report respectively according to logged information during the real-world hacking exercise and respectively transmit the first independent report and the second independent report to the analysis platform through the targeted institution for analysis, allowing the manager end to generate a summary report including flaws and vulnerabilities in information security and transmit the summary report to the targeted institution for the targeted institution to objectively and effectively assess the summary report.
    Type: Application
    Filed: May 13, 2019
    Publication date: November 19, 2020
    Inventors: Chien-Yang HSU, Ju-We CHEN, Yi LIN
  • Publication number: 20200019959
    Abstract: The present disclosure provides a cryptocurrency securing system and a cryptocurrency securing method thereof. The system receives a cryptocurrency transaction information from a user device, and determines whether a policy data corresponding to the cryptocurrency transaction information is legal. When the policy data corresponding to the cryptocurrency transaction information is legal, the system derives a cryptocurrency private key information via a personal identification number of the user device. The system then encrypts the cryptocurrency transaction information via the cryptocurrency private key information for deriving an encrypted cryptocurrency transaction information, and broadcasts the encrypted cryptocurrency transaction information to a blockchain network.
    Type: Application
    Filed: July 12, 2019
    Publication date: January 16, 2020
    Inventors: CHI-HUANG FAN, CHIEN-YANG HSU, MING-CHANG SHIH
  • Patent number: 10091238
    Abstract: Methods and systems for deception using distributed threat detection are provided. Exemplary methods by an enforcement point, the enforcement point communicatively coupled to a first data network and a second data network, the enforcement point not providing services in the second data network, include: receiving, from a first workload in the second data network, a data packet addressed to a second workload in the second data network, the data packet requesting a service from the second workload; determining the data packet is for unauthorized access of the second workload, the determining using at least some of a 5-tuple of the data packet; identifying a deception point using the service, the deception point being in the first data network and including a decoy for the service; and redirecting the data packet to the deception point in the first data network.
    Type: Grant
    Filed: March 2, 2017
    Date of Patent: October 2, 2018
    Assignee: vArmour Networks, Inc.
    Inventors: Choung-Yaw Shieh, Marc Woolward, Zhiping Liu, Cheng-Lin Hou, Matthew M. Williamson, Yi Hung Cheng, Chien Yang Hsu, Hsin Tien Tseng
  • Publication number: 20180191779
    Abstract: Methods and systems for are provided. Exemplary methods include: getting an image for the application; creating an instance of the application in a container using the image; receiving a network communication, the network communication including an instruction for the application; processing the instruction using the instance; responding to the network communication using the processing; and monitoring behavior from the processing, the monitoring including intercepting library calls, function calls, messages, and events from the container.
    Type: Application
    Filed: December 29, 2016
    Publication date: July 5, 2018
    Inventors: Choung-Yaw Shieh, Zhiping Liu, Yi Hung Cheng, Chien Yang Hsu, Hsin Tien Tseng
  • Publication number: 20170180421
    Abstract: Methods and systems for deception using distributed threat detection are provided. Exemplary methods by an enforcement point, the enforcement point communicatively coupled to a first data network and a second data network, the enforcement point not providing services in the second data network, include: receiving, from a first workload in the second data network, a data packet addressed to a second workload in the second data network, the data packet requesting a service from the second workload; determining the data packet is for unauthorized access of the second workload, the determining using at least some of a 5-tuple of the data packet; identifying a deception point using the service, the deception point being in the first data network and including a decoy for the service; and redirecting the data packet to the deception point in the first data network.
    Type: Application
    Filed: March 2, 2017
    Publication date: June 22, 2017
    Inventors: Choung-Yaw Shieh, Marc Woolward, Zhiping Liu, Cheng-Lin Hou, Matthew M. Williamson, Yi Hung Cheng, Chien Yang Hsu, Hsin Tien Tseng