Patents by Inventor Ching-Hao Mao

Ching-Hao Mao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230141028
    Abstract: A traffic control method, adapted to a server, includes detecting a packet sent by user equipment and transmitted through a base station to obtain packet information of the packet, wherein the packet information comprises an Internet protocol address, determining whether the packet information is abnormal, tagging identification information corresponding to the Internet protocol address when the packet information is abnormal, and blocking a connection between the user equipment and a network based on the identification information.
    Type: Application
    Filed: November 30, 2021
    Publication date: May 11, 2023
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Po Ching HUANG, Kuan Lung HUANG, Yu Feng CHU, Ching Hao MAO, Chih Peng HSU
  • Publication number: 20230137661
    Abstract: A verification method and a verification system for an information and communication safety protection mechanism are provided. The verification methods includes: selecting a target malicious program, and collecting at least one behavioral trace of the target malicious program; providing a target machine and deploying a protection mechanism to be tested for the target machine; configuring the target machine to reproduce the at least one behavioral trace; and determining whether the protection mechanism to be tested detects an abnormal event, so as to verify an effectiveness of the protection mechanism to be tested.
    Type: Application
    Filed: November 25, 2021
    Publication date: May 4, 2023
    Inventors: CHAO-WEN LI, CHING-HAO MAO, WEN-YA LIN, WEN-HSI TU
  • Patent number: 10742668
    Abstract: A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access records. Each access record includes a network address, time stamp, and access content. Each attack pattern corresponds to at least one attack access relation. Each attack access relation is defined by a network address and access content. The apparatus retrieves several attack records according to at least one attack address. The network address of each attack record is one of the attack address(s). The apparatus divides the attack records into several groups according to the time stamps and performs the following operations for each group: (a) creating at least one access relation for each attack address included in the group and (b) determining that the group corresponds to one of the attack patterns according to the at least one access relation of the group.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: August 11, 2020
    Assignee: Institute For Information Industry
    Inventors: Chia-Min Lai, Ching-Hao Mao, Chih-Hung Hsieh, Te-En Wei, Chi-Ping Lai
  • Patent number: 10250626
    Abstract: An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus stores a plurality of access records of an application, wherein each access record includes a network address of a host and an access content. The attacking node detection apparatus filters the access records into a plurality of filtered access records according to a predetermined rule so that the access content of each filtered access record conforms to the predetermined rule. The attacking node detection apparatus creates at least one access relation of each of the network addresses according to the filtered access records, wherein each access relation is defined by one of the network addresses and one of the access contents. The attacking node detection apparatus identifies a specific network address as an attacking node according to the access relations.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: April 2, 2019
    Assignee: Institute For Information Industry
    Inventors: Chia-Min Lai, Ching-Hao Mao, Chih-Hung Hsieh, Te-En Wei, Chi-Ping Lai
  • Publication number: 20180159868
    Abstract: A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access records. Each access record includes a network address, time stamp, and access content. Each attack pattern corresponds to at least one attack access relation. Each attack access relation is defined by a network address and access content. The apparatus retrieves several attack records according to at least one attack address. The network address of each attack record is one of the attack address(s). The apparatus divides the attack records into several groups according to the time stamps and performs the following operations for each group: (a) creating at least one access relation for each attack address included in the group and (b) determining that the group corresponds to one of the attack patterns according to the at least one access relation of the group.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Chia-Min LAI, Ching-Hao MAO, Chih-Hung HSIEH, Te-EN WEI, Chi-Ping LAI
  • Publication number: 20180159878
    Abstract: An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus is stored with a plurality of access records of an application, wherein each access record includes a network address of a host and an access content. The attacking node detection apparatus filters the access records into a plurality of filtered access records according to a predetermined rule so that the access content of each filtered access record conforms to the predetermined rule. The attacking node detection apparatus creates at least one access relation of each of the network addresses according to the filtered access records, wherein each access relation is defined by one of the network addresses and one of the access contents. The attacking node detection apparatus identifies a specific network address as an attacking node according to the access relations.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Chia-Min LAI, Ching-Hao MAO, Chih-Hung HSIEH, Te-EN WEI, Chi-Ping LAI
  • Publication number: 20170149800
    Abstract: The instant disclosure illustrates a system and method for information security management based on application level log analysis. The system and method for information security management involve analyzing a plurality of application level logs of a user and modeling the continuative behaviors of the user. Furthermore, the system and method for information security management include the selection of models according to different environmental contexts, thereby efficiently determining whether the user has had an abnormal behavior occur.
    Type: Application
    Filed: December 4, 2015
    Publication date: May 25, 2017
    Inventors: CHIH-HUNG HSIEH, CHIA-MIN LAI, CHING-HAO MAO
  • Patent number: 9313222
    Abstract: A method, an electronic device, and a user interface for on-demand detecting a malware are provided and adapted for estimating whether an application has vulnerabilities or malicious behaviors. The method includes the following steps. Firstly, evaluating a risk level and a test time of the application which has vulnerabilities or malicious behaviors. Next, detecting the application by selection of user to estimate the risk level of the application which has vulnerabilities or malicious behaviors and then correspondingly generating a detection result. Therefore, the method, the electronic device, and the user interface for on-demand detecting the malware can detect the risk level of the application which has vulnerabilities or malicious behaviors before getting virus pattern of the variant or new malware.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: April 12, 2016
    Assignee: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Pei-Wen Huang, Hsiang-An Wen, Ching-Hao Mao, Yu-Te Chen, Pei Te Chen
  • Publication number: 20150319187
    Abstract: A method, an electronic device, and a user interface for on-demand detecting a malware are provided and adapted for estimating whether an application has vulnerabilities or malicious behaviors. The method includes the following steps. Firstly, evaluating a risk level and a test time of the application which has vulnerabilities or malicious behaviors. Next, detecting the application by selection of user to estimate the risk level of the application which has vulnerabilities or malicious behaviors and then correspondingly generating a detection result. Therefore, the method, the electronic device, and the user interface for on-demand detecting the malware can detect the risk level of the application which has vulnerabilities or malicious behaviors before getting virus pattern of the variant or new malware.
    Type: Application
    Filed: June 27, 2014
    Publication date: November 5, 2015
    Inventors: PEI-WEN HUANG, HSIANG-AN WEN, CHING-HAO MAO, YU-TE CHEN, PEI TE CHEN
  • Publication number: 20130268675
    Abstract: A method for tracing at least one domain name is disclosed. In the method, several DNS resource records of candidate domain names are queried from at least one DNS name server. The candidate domain names are domain names that need to be traced. Internet Protocol (IP) addresses associated with the candidate domain names are retrieved from the DNS resource records of the candidate domain names. At least one external resource server is connected to retrieve corresponding registration information of the respective IP addresses of the candidate domain names. A tracing weight of each of the candidate domain names is calculated according to the DNS resource records, the IP addresses and the corresponding registration information of the candidate domain names. The candidate domain names are traced according to their respective tracing weights. A system for tracing at least one domain name is also disclosed.
    Type: Application
    Filed: July 9, 2012
    Publication date: October 10, 2013
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Meng-Han Tsai, Chang-Cheng Lin, Kai-Chi Chang, Ching-Hao Mao
  • Patent number: 8505080
    Abstract: A method for generating a cross-site scripting attack is provided. An attack string sample is analyzed for obtaining a token sequence. A string word corresponding to each token is used to replace the token for generating a cross-site scripting attack string. Accordingly, a large number of cross-site scripting attacks are generated automatically, so as to execute a penetration test for a website.
    Type: Grant
    Filed: November 17, 2011
    Date of Patent: August 6, 2013
    Assignee: National Taiwan University of Science and Technology
    Inventors: Hahn-Ming Lee, Yi-Hsun Wang, Kuo-Ping Wu, Ching-Hao Mao, Jerome Yeh
  • Publication number: 20130055400
    Abstract: A method for generating a cross-site scripting attack is provided. An attack string sample is analyzed for obtaining a token sequence. A string word corresponding to each token is used to replace the token for generating a cross-site scripting attack string. Accordingly, a large number of cross-site scripting attacks are generated automatically, so as to execute a penetration test for a website.
    Type: Application
    Filed: November 17, 2011
    Publication date: February 28, 2013
    Applicant: National Taiwan University of Science and Technology
    Inventors: Hahn-Ming Lee, Yi-Hsun Wang, Kuo-Ping Wu, Ching-Hao Mao, Jerome Yeh
  • Patent number: 8341742
    Abstract: A network attack detection device is provided, including a spatial coordinate database for storing spatial coordinate data; a standard time zone database for storing standard time zone data; a domain name system packet collector for collecting a domain name system packet; a spatial snapshot feature extractor for extracting internet protocol address corresponding to the domain name system packet according to the domain name system packet, and generating spatial feature data corresponding to the internet protocol address according to the internet protocol address, the spatial coordinate data and the standard time zone data; and an attack detector for determining whether the domain name system packet is an attack according to the spatial feature data and a spatial snapshot detection model, and when determining that the domain name system packet is an attack, sending a warning to indicate the attack.
    Type: Grant
    Filed: July 16, 2010
    Date of Patent: December 25, 2012
    Assignee: National Taiwan University of Science and Technology
    Inventors: Hahn-Ming Lee, Si-Yu Huang, Jerome Yeh, Ching-Hao Mao
  • Patent number: 8307459
    Abstract: A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state.
    Type: Grant
    Filed: March 17, 2010
    Date of Patent: November 6, 2012
    Assignee: National Taiwan University of Science and Technology
    Inventors: Hahn-Ming Lee, Ching-Hao Mao, Yu-Jie Chen, Yi-Hsun Wang, Jerome Yeh, Tsu-Han Chen
  • Publication number: 20120159629
    Abstract: A method for detecting a malicious script is provided. A plurality of distribution eigenvalues are generated according to a plurality of function names of a web script. After the distribution eigenvalues are inputted to a hidden markov model (HMM), probabilities respectively corresponding to a normal state and an abnormal state are calculated. Accordingly, whether the web script is malicious or not can be determined according to the probabilities. Even an attacker attempts to change the event order, insert a new event or replace an event with a new one to avoid detection, the method can still recognize the intent hidden in the web script by using the HMM for event modeling. As such, the method may be applied in detection of obfuscated malicious scripts.
    Type: Application
    Filed: June 21, 2011
    Publication date: June 21, 2012
    Applicant: National Taiwan University of Science and Technology
    Inventors: Hahn-Ming Lee, Jerome Yeh, Hung-Chang Chen, Ching-Hao Mao
  • Patent number: 8175980
    Abstract: A hot video prediction system is provided. A video comments database stores video comments submitted by a plurality of users. A user social network constructor establishes a user social network according to the video comments. When new comments of a new video are received, a hot video predictor uses the user social network to determine a similar theme between the new video and hot videos that have been hot for a period of time, and predicts whether the new video will become popular accordingly. A social network adaptor checks the prediction, and modifies the user social network accordingly.
    Type: Grant
    Filed: November 4, 2009
    Date of Patent: May 8, 2012
    Assignee: National Taiwan University of Science and Technology
    Inventors: Hahn-Ming Lee, Hui-Ju Cheng, Ching-Hao Mao, Chao-Wen Li, Shou-Wei Ho, Jerome Yeh
  • Publication number: 20110185425
    Abstract: A network attack detection device is provided, including a spatial coordinate database for storing spatial coordinate data; a standard time zone database for storing standard time zone data; a domain name system packet collector for collecting a domain name system packet; a spatial snapshot feature extractor for extracting internet protocol address corresponding to the domain name system packet according to the domain name system packet, and generating spatial feature data corresponding to the internet protocol address according to the internet protocol address, the spatial coordinate data and the standard time zone data; and an attack detector for determining whether the domain name system packet is an attack according to the spatial feature data and a spatial snapshot detection model, and when determining that the domain name system packet is an attack, sending a warning to indicate the attack.
    Type: Application
    Filed: July 16, 2010
    Publication date: July 28, 2011
    Applicant: NATIONAL TAIWAN UNIVERSITY OF SCIENCE & TECHNOLOGY
    Inventors: Hahn-Ming LEE, Si-Yu HUANG, Jerome YEH, Ching-Hao MAO
  • Publication number: 20110185420
    Abstract: A web mimicry attack detection device is provided, including: a first token sequence collector receiving a hypertext transfer protocol request and extracting string content of the hypertext transfer protocol request according to a token collection method to generate a token sequence corresponding to the hypertext transfer protocol request, wherein the token sequence comprises a plurality of the tokens; and a mimicry attack detector generating a label and a confidence score corresponding individually to the tokens according to the tokens and a conditional random field probability model, summing the confidence score individually corresponding to the tokens in the token sequence by a summary rule to generate a summary confidence score, and determining whether the hypertext transfer protocol request is an attack according to the summary confidence score and the label individually corresponding to the tokens.
    Type: Application
    Filed: June 22, 2010
    Publication date: July 28, 2011
    Applicant: NATIONAL TAIWAN UNIVERSITY OF SCIENCE & TECHNOLOGY
    Inventors: Hahn-Ming LEE, En-Sih LIOU, Jerome YEH, Ching-Hao MAO
  • Publication number: 20110004936
    Abstract: A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state.
    Type: Application
    Filed: March 17, 2010
    Publication date: January 6, 2011
    Applicant: NATIONAL TAIWAN UNIVERSITY OF SCIENCE & TECHNOLOGY
    Inventors: Hahn-Ming Lee, Ching-Hao Mao, Yu-Jie Chen, Yi-Hsun Wang, Jerome Yeh, Tsu-Han Chen
  • Publication number: 20100319031
    Abstract: A hot video prediction system is provided. A video comments database stores video comments submitted by a plurality of users. A user social network constructor establishes a user social network according to the video comments. When new comments of a new video are received, a hot video predictor uses the user social network to determine a similar theme between the new video and hot videos that have been hot for a period of time, and predicts whether the new video will become popular accordingly. A social network adaptor checks the prediction, and modifies the user social network accordingly.
    Type: Application
    Filed: November 4, 2009
    Publication date: December 16, 2010
    Applicant: NATIONAL TAIWAN UNIVERSITY OF SCIENCE & TECHNOLOGY
    Inventors: Hahn-Ming Lee, Hui-Ju Cheng, Ching-Hao Mao, Chao-Wen Li, Shou-Wei Ho, Jerome Yeh