Patents by Inventor Fu-Hau Hsu

Fu-Hau Hsu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230269236
    Abstract: The present disclosure provides an automatic proxy method includes steps as follows. A controller selects one proxy host as a first designated proxy host from a plurality of proxy hosts and uses the Internet protocol address of the first designated proxy host as an external Internet protocol address of a main server; then, the controller communicates with a domain name system, so that the domain name system can update a record of a mapping between a domain name of the main server and the Internet protocol address of the first designated proxy host.
    Type: Application
    Filed: August 12, 2022
    Publication date: August 24, 2023
    Inventor: Fu-Hau HSU
  • Patent number: 11677721
    Abstract: A packet transmission method is disclosed herein. The packet transmission method includes the following operations. The first packet is transmitted to a first proxy server terminal by a first user terminal. A header of received first packet is changed to generate a first header, and the first packet with the first header is transmitted to a gateway terminal by the first proxy server terminal. The first header of the received first packet is changed to generate a second header, and the first packet with the second header is transmitted to a server terminal by the gateway terminal. The header of the first packet includes a source address field and a destination address field.
    Type: Grant
    Filed: August 4, 2020
    Date of Patent: June 13, 2023
    Inventor: Fu-Hau Hsu
  • Publication number: 20220253528
    Abstract: The present disclosure provides a system and a method of fileless malware detection, and the method of the fileless malware detection includes steps as follows. The execution of the writable section in the memory is intercepted; the executable code corresponding to the execution is extracted from the writable section; whether the executable code is malicious is analyzed.
    Type: Application
    Filed: March 24, 2021
    Publication date: August 11, 2022
    Inventors: Fu-Hau HSU, Teng-Chuan HSIAO, Chia-Hao LEE
  • Publication number: 20210044570
    Abstract: A packet transmission method is disclosed herein. The packet transmission method includes the following operations: transmitting a first packet to a first proxy server terminal by a first user terminal; changing a header of received first packet to generate a first header, and transmitting the first packet with the first header to a gateway terminal by the first proxy server terminal; changing the header of received first packet to generate a second header, and transmitting the first packet with the second header to a server terminal by the gateway terminal, wherein the header of the first packet includes a source address field and a destination address field.
    Type: Application
    Filed: August 4, 2020
    Publication date: February 11, 2021
    Inventor: Fu-Hau HSU
  • Publication number: 20180159867
    Abstract: A data protection method includes: detecting whether a web transmission behavior occurs or not; analyzing a transmitter and a first file of the web transmission behavior, wherein the transmitter is corresponding to a first application program, and the first file is corresponding to a first file characteristic; extracting a historical accessing record of the transmitter from a memory; extracting a second file characteristic of a second file from the memory in a state that the historical accessing record indicates that the transmitter accesses the second file of a second application program; comparing the first file characteristic with the second file characteristic, to generate a first similarity degree; and blocking the web transmission behavior according to the first similarity degree.
    Type: Application
    Filed: December 6, 2016
    Publication date: June 7, 2018
    Inventors: Wei-Chao HSU, Fu-Hau HSU, Ting LUO, Chi-Yu YOU
  • Patent number: 9898319
    Abstract: A method for live migrating a virtual machine includes connecting to a virtual machine operated in a first host by a client; transmitting condition data of the virtual machine to a second host by the first host during a transmitting time, the first host and the second host being located at different net domains; transmitting a variance of condition data of the virtual machine generated in the transmitting time to the second host by the first host; providing a notification to the client to reconnect to the second host by the first host; modifying a network packets transmitting rule by the client based on the notification of the first host, and activating the virtual machine by the second host based on the condition data of the virtual machine and the variance of the condition data of the virtual machine thereby maintaining the connection between the client and the virtual machine.
    Type: Grant
    Filed: June 9, 2015
    Date of Patent: February 20, 2018
    Assignee: National Central University
    Inventors: Fu-Hau Hsu, Tzung-Ting Lin, Wei-Tai Cai, Chia-Hao Lee
  • Publication number: 20160239329
    Abstract: A method for live migrating a virtual machine includes connecting to a virtual machine operated in a first host by a client; transmitting condition data of the virtual machine to a second host by the first host during a transmitting time, the first host and the second host being located at different net domains; transmitting a variance of condition data of the virtual machine generated in the transmitting time to the second host by the first host; providing a notification to the client to reconnect to the second host by the first host; modifying a network packets transmitting rule by the client based on the notification of the first host, and activating the virtual machine by the second host based on the condition data of the virtual machine and the variance of the condition data of the virtual machine thereby maintaining the connection between the client and the virtual machine.
    Type: Application
    Filed: June 9, 2015
    Publication date: August 18, 2016
    Inventors: Fu-Hau HSU, Tzung-Ting LIN, Wei-Tai CAI, Chia-Hao LEE
  • Patent number: 8832838
    Abstract: A computer worm curing system includes a string receiving module, a string generating module and a string replying module. The string receiving module receives an infected string, which is generated by a computer worm, from an infected host, which is infected by the computer worm, through a network. The infected string includes a shellcode, and the shellcode is executed utilizing a vulnerable process. The string generating module generates a curing code for curing the computer worm, and replaces the shellcode in the infected string with the curing code to generate a curing string, such that the curing string can be executed utilizing the vulnerable process. The string replying module replies the curing string to the infected host, such that the curing code of the curing string can be executed utilizing the vulnerable process of the infected host to cure the infected host of the computer worm.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: September 9, 2014
    Assignee: Institute for Information Industry
    Inventors: Shih-Jen Chen, Jain-Shing Wu, Fu-Hau Hsu, Chia-Jun Lin
  • Publication number: 20140157411
    Abstract: A safety protection method which is performed with a controller includes steps of providing an index table, calling one of the APIs (API), filtering the called API based on a predetermined condition, and blocking the API if the API confirms the predetermined condition. Furthermore, a safety protection device is also disclosed herein.
    Type: Application
    Filed: December 17, 2012
    Publication date: June 5, 2014
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Wei-Chao HSU, Fu-Hau HSU, Chieh-Wen CHEN, Ju-Hsuan HE
  • Patent number: 8516581
    Abstract: A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: August 20, 2013
    Assignee: Institute for Information Industry
    Inventors: Fu-Hau Hsu, Shih-Jen Chen, Chien-Ting Kuo, Jain-Shing Wu, Chuan-Sheng Wang
  • Publication number: 20130145462
    Abstract: A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 6, 2013
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Fu-Hau Hsu, Shih-Jen Chen, Chien-Ting Kuo, Jain-Shing Wu, Chuan-Sheng Wang
  • Publication number: 20120117647
    Abstract: A computer worm curing system includes a string receiving module, a string generating module and a string replying module. The string receiving module receives an infected string, which is generated by a computer worm, from an infected host, which is infected by the computer worm, through a network. The infected string includes a shellcode, and the shellcode is executed utilizing a vulnerable process. The string generating module generates a curing code for curing the computer worm, and replaces the shellcode in the infected string with the curing code to generate a curing string, such that the curing string can be executed utilizing the vulnerable process. The string replying module replies the curing string to the infected host, such that the curing code of the curing string can be executed utilizing the vulnerable process of the infected host to cure the infected host of the computer worm.
    Type: Application
    Filed: December 7, 2010
    Publication date: May 10, 2012
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Jen Chen, Jain-Shing Wu, Fu-Hau Hsu, Chia-Jun Lin