Patents by Inventor Hung-Min Sun

Hung-Min Sun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120180125
    Abstract: A method for preventing domain name system cache poisoning attacks comprises steps of inputting a domain name by an internet application program of an Internet communication device, determining in which area the Internet communication device is located, randomly selecting at least two domain name system resolvers of the area, retrieving at least one Internet protocol address from the domain name system resolvers and evaluating the Internet protocol addresses to generate at least one security score, selecting a trustworthy Internet protocol address based on the security scores, comparing the security score of the selected Internet protocol address with a predetermined security score threshold, and sending the trustworthy Internet protocol address to the Internet application program of the Internet communication device when the security score is greater than the security score threshold.
    Type: Application
    Filed: February 16, 2011
    Publication date: July 12, 2012
    Applicant: NATIONAL TSING HUA UNIVERSITY
    Inventors: Hung-Min Sun, Jain-Ming Jeng
  • Publication number: 20120131407
    Abstract: A layer-aware Forward Error Correction (FEC) encoding and decoding method for encoding and decoding an information content, an encoding apparatus, a decoding apparatus, and a system thereof are provided, wherein the information content has a plurality of layer source symbol sets. In the encoding method, source symbols of each layer are encoded into encoding symbols corresponding to the layer by using an FEC encoder. In addition, final encoding symbols of an upper layer are generated by aggregating encoding symbols of both the upper layer and a lower layer. Thereby, the layer-aware FEC encoding method can maintain the encoding/decoding dependency between different layers of data without increasing the complexity of the encoding/decoding operations.
    Type: Application
    Filed: April 2, 2011
    Publication date: May 24, 2012
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Hsin-Ta Chiao, Hung-Min Sun, Shih-Ying Chang
  • Patent number: 8131296
    Abstract: A handover authentication method includes performing, by a wireless network server, a first authentication between a client and the wireless network server via a first network gateway; obtaining first authentication keys for the wireless network server and the client based on the first authentication; determining, by the wireless network server, a need to handover the client from the first network gateway to a second network gateway; deriving, by the wireless network server and from the first authentication keys, a handover authentication key shared by the client and the wireless network server; obtaining, by the wireless network server, second authentication keys for the network server and the client; and serving, by the wireless network server, the client via the second network gateway.
    Type: Grant
    Filed: August 21, 2008
    Date of Patent: March 6, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin
  • Patent number: 8127276
    Abstract: Apparatus, method, and computer readable medium for generating and utilizing a feature code to monitor a program are provided. The program is run in a secure environment at the beginning. The program calls a function through an application program interface. A return address of the application program interface is used to generate the feature code. When the application runs again at another time, the feature code is utilized to monitor the program. According to the aforementioned arrangement and steps, the application program interface can be monitored dynamically. Consequently, any program can be monitored by this approach, which results in a more secure environment. Further, fewer application program interfaces are required to be monitored, so the required computer resource is less.
    Type: Grant
    Filed: April 3, 2007
    Date of Patent: February 28, 2012
    Assignee: Institute for Information Industry
    Inventors: Cheng-Kai Chen, Hung Min Sun, Kang-Chiao Lin, Shih-Ying Chang, Shuai-Min Chen
  • Patent number: 8117447
    Abstract: Disclosed is an authentication method employing elliptic curve cryptography (ECC), applicable to a mobile broadcast TV system having one or more head end systems, at least a transmitter, and at least a mobile set. The authentication method comprises at least one request message from mobile sets simultaneously or in a short period of time arriving at a head end system for authentication; manipulating each broadcast authentication message by ECC; manipulating each service request message by ECC and pairing operation; performing a mutual authentication between the head end system and mobile sets by ECC and pairing operation; and broadcasting one group of authentication messages to all the mobile sets of many requests arrived at the head end system simultaneously or in a short period of time for the same service.
    Type: Grant
    Filed: July 15, 2008
    Date of Patent: February 14, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Muh-Chyi Leu, Hung-Min Sun
  • Patent number: 7907888
    Abstract: The present invention relates to a mobile jamming attack method applied in a wireless sensor network (WSN) and method defending the same. The mobile jamming attack method is a power exhaustion denial-of-service attack, possesses mobility and self-learning capability and is unable to be defended with existing defending scheme due to its attack to the routing layer of the WSN; the mobile jamming defending method employs multi-topologies scheme to defend the mobile jamming attack so that the affected area is reduced, the base station can still receive reply packets under the attack, and the jammed area can be roughly located and the track of the mobile jammer can be traced.
    Type: Grant
    Filed: April 29, 2008
    Date of Patent: March 15, 2011
    Assignee: National Tsing Hua University
    Inventors: Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen
  • Publication number: 20100205430
    Abstract: A network reputation system and its controlling method are provided. A credentials and exchange component permits a user to generate credentials and exchange matching keys with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.
    Type: Application
    Filed: March 26, 2009
    Publication date: August 12, 2010
    Inventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
  • Publication number: 20100138661
    Abstract: A mobile station, an access point, a gateway apparatus, a base station, and a handshake method thereof for use in a wireless network framework are provided. The wireless network framework comprises a first wireless network comprising the access point, and a second wireless network comprising the gateway apparatus and base station. There is an IP security tunnel between the access point and the gateway apparatus. When the mobile station handovers from the first wireless network to the second wireless network, it transmits a master session key to the gateway apparatus via the access point and the IP security tunnel. Additionally, when the mobile station handovers from the second wireless network to the first wireless network, it transmits a master session key to the access point. As a result, the authentication time, which is needed in handover procedure between the first wireless network and the second wireless network, is reduced effectively.
    Type: Application
    Filed: January 28, 2009
    Publication date: June 3, 2010
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Frank Chee-Da TSAI, Chien-Chien CHIU, I-Hung LIN, Hung-Min SUN, Shuai-Min CHEN, Yao-Hsin CHEN, Heng-Jeng CHUNG
  • Publication number: 20100105357
    Abstract: An apparatus and method for renewing a key, a computer readable media thereof, and a wireless network comprising the same are provided. The method is adapted to the first base station. The first base station belongs to a wireless network. The first base station uses a first key and has a first coverage. The method comprises the following steps: determining that the mobile device moves from the first coverage to the second coverage of a second base station; determining that the login time of the mobile device is later than the renewing time of the first key; renewing the first key; and sending the first key to the mobile device.
    Type: Application
    Filed: December 17, 2008
    Publication date: April 29, 2010
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: FRANK CHEE-DA TSAI, CHIEN-CHIEN CHIU, I-HUNG LIN, HUNG-MIN SUN, SHIH-YING CHANG, CHIEH HSING, CHI-YI KAO
  • Publication number: 20100074438
    Abstract: A method for key management for a broadcasting system includes generating a receiver group key (RGK) seed and a plurality of parameters for a receiver group provided by the broadcasting system; and calculating an RGK for the receiver group based on the RGK seed and the plurality of parameters.
    Type: Application
    Filed: September 24, 2008
    Publication date: March 25, 2010
    Inventors: King-Hang WANG, Chin-Te Chen, Hung-Min Sun, Yih-Sien Kao
  • Publication number: 20100054479
    Abstract: A key management system is provided. The key management system includes a key server. The key server generates secret keys by constructing a rights hierarchy and a resource hierarchy, associating the rights hierarchy with the resource hierarchy, and converting a rights-resource relationship into a node in a service hierarchy. The rights hierarchy includes a rights node and the resource hierarchy includes a resource node. The rights hierarchy is set above the resource hierarchy. The right hierarchy and the resource hierarchy are in a partial order relationship.
    Type: Application
    Filed: September 2, 2008
    Publication date: March 4, 2010
    Inventors: Yih-Sien Kao, Muh-Chyi Leu, Hung-Min Sun, King-Hang Wang
  • Publication number: 20100046467
    Abstract: A handover authentication method includes performing, by a wireless network server, a first authentication between a client and the wireless network server via a first network gateway; obtaining first authentication keys for the wireless network server and the client based on the first authentication; determining, by the wireless network server, a need to handover the client from the first network gateway to a second network gateway; deriving, by the wireless network server and from the first authentication keys, a handover authentication key shared by the client and the wireless network server; obtaining, by the wireless network server, second authentication keys for the network server and the client; and serving, by the wireless network server, the client via the second network gateway.
    Type: Application
    Filed: August 21, 2008
    Publication date: February 25, 2010
    Inventors: Shin-Yan Chiou, Hung-Min Sun, Shih-Ying Chang, Yue-Hsun Lin
  • Publication number: 20100050204
    Abstract: A method for assigning a plurality of users of a broadcasting system, wherein each of the plurality of users subscribes to at least one of a plurality of receiver groups provided by the broadcasting system. The method includes dividing the plurality of users into a plurality of temporary groups each including ones of the plurality of users that subscribe to a same one of the plurality of receiver groups; and assigning the ones of the plurality of users to at least one user group.
    Type: Application
    Filed: August 22, 2008
    Publication date: February 25, 2010
    Inventors: King-Hang Wang, Yung-Hsuan Chao, Hung-Min Sun, Yih-Sien Kao, Wan-Shan Wu
  • Publication number: 20090325478
    Abstract: Mobile jamming attack method in wireless sensor network and method defending the same The present invention relates to a mobile jamming attack method applied in a wireless sensor network (WSN) and method defending the same. The mobile jamming attack method is a power exhaustion denial-of-service attack, possesses mobility and self-learning capability and is unable to be defended with existing defending scheme due to its attack to the routing layer of the WSN; the mobile jamming defending method employs multi-topologies scheme to defend the mobile jamming attack so that the affected area is reduced, the base station can still receive reply packets under the attack, and the jammed area can be roughly located and the track of the mobile jammer can be traced.
    Type: Application
    Filed: April 29, 2008
    Publication date: December 31, 2009
    Applicant: National Tsing Hua University
    Inventors: Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen
  • Publication number: 20090180612
    Abstract: Disclosed is an authentication method employing elliptic curve cryptography (ECC), applicable to a mobile broadcast TV system having one or more head end systems, at least a transmitter, and at least a mobile set. The authentication method comprises at least one request message from mobile sets simultaneously or in a short period of time arriving at a head end system for authentication; manipulating each broadcast authentication message by ECC; manipulating each service request message by ECC and pairing operation; performing a mutual authentication between the head end system and mobile sets by ECC and pairing operation; and broadcasting one group of authentication messages to all the mobile sets of many requests arrived at the head end system simultaneously or in a short period of time for the same service.
    Type: Application
    Filed: July 15, 2008
    Publication date: July 16, 2009
    Inventors: Muh-Chyi Leu, Hung-Min Sun
  • Publication number: 20090164617
    Abstract: A network apparatus having a database, a management method and a tangible machine-readable medium for managing internet protocol (IP) connection rules of the database are provided. The database stores at least one first IP connection rule. The management method comprises the following steps: writing a second IP connection rule through one of a plurality of management programs; determining there is a conflict between the at least one first IP connection rule and the second IP connection rule, and eliminating the conflict according to a weight value of the at least one first IP connection rule and a weight value of the second IP connection rule. The at least one first IP connection rule and the second IP connection rule are used in one network connection.
    Type: Application
    Filed: March 20, 2008
    Publication date: June 25, 2009
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Cheng-Kai Chen, Hung Min Sun, Shih-Ying Chang, Yao-Hsin Chen, Bing-Zhe He
  • Publication number: 20090158045
    Abstract: The present invention relates to a wireless sensor message authentication method, which is characterized by an authentication scheme of any message authentication code applied to any secure message authentication code (MAC); an authentication scheme using the concept of error correcting code (ECC) and applied to any binary ECC to provide different feature; flexible technique tuning required throughput and faulty data detection capability by adjusting the ECC in use; end-to-end authentication; and XOR operation conducted to original MAC to secure light overhead.
    Type: Application
    Filed: February 1, 2008
    Publication date: June 18, 2009
    Inventors: Hung-Min Sun, Shih-Ying Chang
  • Publication number: 20090110196
    Abstract: A key management method for wireless networks is disclosed. Before a mobile station residing in a first ASN switches to a neighboring second ASN, an authentication process between the mobile station and the second ASN is implemented. Thus, the authentication process is not required when the mobile station is switching to the second ASN.
    Type: Application
    Filed: March 25, 2008
    Publication date: April 30, 2009
    Inventors: Frank Chee-Da Tsai, Yi-Chung Shen, Jian-Chian Chiou, Hung-Min Sun, Shuai-Min Chen, Yue-Hsun Lin, Ying-Chu Hsiao
  • Publication number: 20080148226
    Abstract: Apparatus, method, and computer readable medium for generating and utilizing a feature code to monitor a program are provided. The program is run in a secure environment at the beginning. The program calls a function through an application program interface. A return address of the application program interface is used to generate the feature code. When the application runs again at another time, the feature code is utilized to monitor the program. According to the aforementioned arrangement and steps, the application program interface can be monitored dynamically. Consequently, any program can be monitored by this approach, which results in a more secure environment. Further, fewer application program interfaces are required to be monitored, so the required computer resource is less.
    Type: Application
    Filed: April 3, 2007
    Publication date: June 19, 2008
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Cheng-Kai Chen, Hung Min Sun, Kang-Chiao Lin, Shih-Ying Chang, Shuai-Min Chen
  • Publication number: 20080044028
    Abstract: The present invention provides a method regarding key deployment in wireless sensor networks, that is, with random anticipated disposition mechanism as basis, a key management mechanism is designed.
    Type: Application
    Filed: November 15, 2006
    Publication date: February 21, 2008
    Applicant: National Tsing Hua University
    Inventors: Hung-Min Sun, Yue-Hsun Lin