Patents by Inventor Jain-Shing Wu

Jain-Shing Wu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230138458
    Abstract: A machine learning system and method are provided. The machine learning system includes a plurality of client apparatuses, and the client apparatuses include a first client apparatus and one or more second client apparatuses. The first client apparatus transmits a model update request to the one or more second client apparatuses, and the model update request corresponds to a malware type. The first client apparatus receives a second local model corresponding to each of the one or more second client apparatuses from each of the one or more second client apparatuses. The first client apparatus generates a plurality of node sequences based on a first local model and each of the second local models. The first client apparatus merges the first local model and each of the second local models based on the node sequences to generate a local model set.
    Type: Application
    Filed: November 24, 2021
    Publication date: May 4, 2023
    Inventors: Te-En Wei, Kun Wei Lee, Shin-Ying Huang, Hsiao-Hsien Chang, Jain-Shing Wu
  • Publication number: 20220179908
    Abstract: An information security device and method thereof are provided. The information security device includes a transceiver, a register and a processor. The transceiver configured to receive scenario information of a company; The register configured to store multiple instructions and multiple databases; and the processor coupled to the transceiver and the register, and configured to execute the multiple instructions to: read first vulnerability related information and first event information from the multiple databases; generate at least one first intelligent graph according to the first vulnerability related information and the first event information, and generate a second intelligent graph according to the scenario information; and compare the at least one first intelligent graph with the second intelligent graph to identify at least one similarity between the at least one first intelligent graph and the second intelligent graph for determining whether the company has information security threat.
    Type: Application
    Filed: December 3, 2020
    Publication date: June 9, 2022
    Inventors: Te-En WEI, Shin-Ying HUANG, Hsiao-Hsien CHANG, Jain-Shing WU
  • Patent number: 9965646
    Abstract: An exemplary embodiment of the present disclosure illustrates a sensitive data discrimination method executed in a data loss prevention system to determine whether a file has the least one sensitive data during a file generation proceeding. Steps of the sensitive data discrimination method are illustrated as follows. Multiple characters inputted via a keyboard are recorded. The recorded characters are trimmed to generate a trimmed data. The trimmed data and at least one predefined term related to the at least one sensitive data are compared, to determine whether the trimmed data has the at least one sensitive data.
    Type: Grant
    Filed: November 3, 2014
    Date of Patent: May 8, 2018
    Assignee: Institute For Information Industry
    Inventors: Jain-Shing Wu, Song-Kong Chong, Chien-Ting Kuo
  • Publication number: 20150154420
    Abstract: An exemplary embodiment of the present disclosure illustrates a sensitive data discrimination method executed in a data loss prevention system to determine whether a file has the least one sensitive data during a file generation proceeding. Steps of the sensitive data discrimination method are illustrated as follows. Multiple characters inputted via a keyboard are recorded. The recorded characters are trimmed to generate a trimmed data. The trimmed data and at least one predefined term related to the at least one sensitive data are compared, to determine whether the trimmed data has the at least one sensitive data.
    Type: Application
    Filed: November 3, 2014
    Publication date: June 4, 2015
    Inventors: JAIN-SHING WU, SONG-KONG CHONG, CHIEN-TING KUO
  • Patent number: 8832838
    Abstract: A computer worm curing system includes a string receiving module, a string generating module and a string replying module. The string receiving module receives an infected string, which is generated by a computer worm, from an infected host, which is infected by the computer worm, through a network. The infected string includes a shellcode, and the shellcode is executed utilizing a vulnerable process. The string generating module generates a curing code for curing the computer worm, and replaces the shellcode in the infected string with the curing code to generate a curing string, such that the curing string can be executed utilizing the vulnerable process. The string replying module replies the curing string to the infected host, such that the curing code of the curing string can be executed utilizing the vulnerable process of the infected host to cure the infected host of the computer worm.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: September 9, 2014
    Assignee: Institute for Information Industry
    Inventors: Shih-Jen Chen, Jain-Shing Wu, Fu-Hau Hsu, Chia-Jun Lin
  • Publication number: 20140164405
    Abstract: A dynamic data masking method, suitable for a database including plural data, is disclosed in this invention. Each of the data includes plural values and plural keys corresponding to the values. The dynamic data masking method includes steps of: determining whether values and keys of one data are sensitive contents when the data are requested to be written into the database; if one of the values/keys of the data is sensitive, setting a key corresponding to the sensitive value or the key itself as a sensitive key and dynamically establishing a filtering rule corresponding to the key; and then, saving the filtering rule and writing the data into the database. In addition, a database system is also disclosed herein.
    Type: Application
    Filed: February 3, 2013
    Publication date: June 12, 2014
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Lin-Jiun TSAI, Song-Kong CHONG, Jain-Shing WU
  • Patent number: 8516581
    Abstract: A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.
    Type: Grant
    Filed: December 13, 2011
    Date of Patent: August 20, 2013
    Assignee: Institute for Information Industry
    Inventors: Fu-Hau Hsu, Shih-Jen Chen, Chien-Ting Kuo, Jain-Shing Wu, Chuan-Sheng Wang
  • Patent number: 8490192
    Abstract: A method and a system for cleaning malicious software (malware), a computer program product, and a storage medium are provided. A relation graph is established to associate processes in an operating system and related elements. A node marking action is performed on the relation graph when a predetermined condition is satisfied. The node corresponding to a malicious process and its related nodes are marked with a first label. The nodes of other normal processes and their related nodes are marked with a second label. Then, those nodes marked with both the first label and the second label are screened, so that each of the nodes is marked with only the first label or the second label. Finally, the processes and elements corresponding to the nodes marked with the first label are removed.
    Type: Grant
    Filed: October 1, 2009
    Date of Patent: July 16, 2013
    Assignee: Institute for Information Industry
    Inventors: Shih-Yao Dai, Yu-Chen Chang, Jain-Shing Wu, Chih-Hung Lin, Yen-Nun Huang, Sy-Yen Kuo
  • Publication number: 20130145462
    Abstract: A phishing processing method includes: an information input web page comprising an information input interface, through which information is transmitted to an information receiving address, is received. Determine if the information input web page is a phishing web page. If it is determined that the information input web page is the phishing web page, fake input information is transmitted to the information receiving address. When information for verification is received from an information transmitting address, if the received information for verification is the fake input information is determined. If the received information for verification is the fake input information, it is determined that the information transmitting address is a malicious address.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 6, 2013
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Fu-Hau Hsu, Shih-Jen Chen, Chien-Ting Kuo, Jain-Shing Wu, Chuan-Sheng Wang
  • Patent number: 8453244
    Abstract: A server, a user device, and a malware detection method thereof are provided. The server connects with the user device via a network, and records execution records of the user device. Based on the history of the execution records of the user device, the server can detect whether the user device has malwares or not accordingly.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: May 28, 2013
    Assignee: Institute for Information Industry
    Inventors: Shih-Yao Dai, Yu-Chen Chang, Jain-Shing Wu, Jui-Fa Chen, Sy-Yen Kuo
  • Patent number: 8286258
    Abstract: A monitor method and a monitor apparatus for monitoring a data of hardware are provided. The data has private information, identification information and at least one first network transmission address. The monitor apparatus comprises a storage unit and a processing unit. The data is stored in the storage unit according to the identification information. The processing unit is configured to record the identification information and the at least one first network transmission address of the data in a mark information table. In response to a sending system call, when a transmission is arranged to transmit the private information of the data to a second network transmission address which is different from the at least one first network transmission address, the processing unit will output a signal to cease the transmission.
    Type: Grant
    Filed: December 4, 2009
    Date of Patent: October 9, 2012
    Assignee: Institute for Information Industry
    Inventors: Chin-Wei Tien, Yao-Ting Chung, Chih-Hung Lin, Jain-Shing Wu
  • Publication number: 20120159628
    Abstract: A malware detection apparatus, a malware detection method, and a computer program product thereof are provided. The malware detection apparatus is used to detect a program. The program executes a first process. The malware detection apparatus comprises a storage unit and a processing unit. The storage unit is configured to store a malicious behavior profile of a malware. The processing unit is configured to construct a first behavior profile according to the first process, compare the first behavior profile with the malicious behavior profile and generate a comparison result. The processing unit updates a behavior record table according to the comparison result, and determines that the program is the malware according to the behavior record table.
    Type: Application
    Filed: May 25, 2011
    Publication date: June 21, 2012
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Yao DAI, Yao-Tung TSOU, Ting-Yu LEE, Castle YEN, Sy-Yen KUO, Jain-Shing WU
  • Publication number: 20120131428
    Abstract: A web page crawling method, a web page crawling device and a computer storage medium thereof are provided. The web page crawling method analyzes a web page to create an object list which comprises a dynamic triggering object according to a DOM. And it creates a triggering mission list which comprises at least one triggering event corresponding to the dynamic triggering object according to the object list. Then it triggers the web page to generate a triggered web page according to the at least one triggering event. Finally, it creates a web page link list of the dynamic triggering object according to a new link object of the triggered web page. In addition, the web page crawling device is configured to carry out the web page crawling method, and the computer storage medium executes the web page crawling method after it is loaded into the web page crawling device.
    Type: Application
    Filed: December 2, 2010
    Publication date: May 24, 2012
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Yi-An TSAI, Chien-Tsung Liu, Jain-Shing Wu
  • Publication number: 20120131675
    Abstract: A server, a user device, and a malware detection method thereof are provided. The server connects with the user device via a network, and records execution records of the user device. Based on the history of the execution records of the user device, the server can detect whether the user device has malwares or not accordingly.
    Type: Application
    Filed: December 15, 2010
    Publication date: May 24, 2012
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Yao DAI, Yu-Chen Chang, Jain-Shing Wu, Jui-Fa Chen, Sy-Yen Kuo
  • Publication number: 20120117647
    Abstract: A computer worm curing system includes a string receiving module, a string generating module and a string replying module. The string receiving module receives an infected string, which is generated by a computer worm, from an infected host, which is infected by the computer worm, through a network. The infected string includes a shellcode, and the shellcode is executed utilizing a vulnerable process. The string generating module generates a curing code for curing the computer worm, and replaces the shellcode in the infected string with the curing code to generate a curing string, such that the curing string can be executed utilizing the vulnerable process. The string replying module replies the curing string to the infected host, such that the curing code of the curing string can be executed utilizing the vulnerable process of the infected host to cure the infected host of the computer worm.
    Type: Application
    Filed: December 7, 2010
    Publication date: May 10, 2012
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Jen Chen, Jain-Shing Wu, Fu-Hau Hsu, Chia-Jun Lin
  • Publication number: 20110138485
    Abstract: A monitor method and a monitor apparatus for monitoring a data of hardware are provided. The data has private information, identification information and at least one first network transmission address. The monitor apparatus comprises a storage unit and a processing unit. The data is stored in the storage unit according to the identification information. The processing unit is configured to record the identification information and the at least one first network transmission address of the data in a mark information table. In response to a sending system call, when a transmission is arranged to transmit the private information of the data to a second network transmission address which is different from the at least one first network transmission address, the processing unit will output a signal to cease the transmission.
    Type: Application
    Filed: December 4, 2009
    Publication date: June 9, 2011
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Chin-Wei TIEN, Yao-Ting CHUNG, Chih-Hung LIN, Jain-Shing WU
  • Publication number: 20110023120
    Abstract: A method and a system for cleaning malicious software (malware), a computer program product, and a storage medium are provided. A relation graph is established to associate processes in an operating system and related elements. A node marking action is performed on the relation graph when a predetermined condition is satisfied. The node corresponding to a malicious process and its related nodes are marked with a first label. The nodes of other normal processes and their related nodes are marked with a second label. Then, those nodes marked with both the first label and the second label are screened, so that each of the nodes is marked with only the first label or the second label. Finally, the processes and elements corresponding to the nodes marked with the first label are removed.
    Type: Application
    Filed: October 1, 2009
    Publication date: January 27, 2011
    Applicant: INSTITUTE FOR INFORMATION INDUSTRY
    Inventors: Shih-Yao Dai, Yu-Chen Chang, Jain-Shing Wu, Chih-Hung Lin, Yen-Nun Huang, Sy-Yen Kuo
  • Publication number: 20090147689
    Abstract: Method, network apparatus and computer readable medium thereof for detecting the defect of the network are provided. The network apparatus comprises a controlling module and a relaying module. The controlling module comprises a generating module for generating a plurality of sub-detecting packets; and a first combining module for combining the plurality of sub-detecting module into a detecting packet; the relaying module is for receiving the detecting packet from the controlling module, the relaying module comprises a decomposing module for decomposing the detecting packet into the plurality of sub-detecting packets and transfer the sub-detecting packets to a target host; and a second combining module for receiving a plurality sub-result packets from the target host which are corresponding to the sub-detecting packets, combining the sub-result packets into a result packet and transferring the result packet to the controlling module to complete the detection.
    Type: Application
    Filed: January 30, 2008
    Publication date: June 11, 2009
    Inventors: Hsin-Chien Kao, Jain Shing Wu, Chih-Hung Lin
  • Patent number: 7185291
    Abstract: The present invention relates to a computer with a touch screen, and the user can execute one of “undo”, “cut”, “copy” and “paste” editing commands by a continuous stroke movement to increase the input operational efficiency. For example, after marking an area on the screen, if the subsequent stroke is moved downwards, the “cut” operation is performed, and if the subsequent stroke is moved upwards, the “copy” operation is performed. Furthermore, when the user stops the stroke at a predetermined position, if the subsequent stroke is moved towards the right, the “paste” operation is performed, and if the subsequent stroke is moved towards the left, the “undo” operation is performed.
    Type: Grant
    Filed: March 4, 2003
    Date of Patent: February 27, 2007
    Assignee: Institute for Information Industry
    Inventors: Chin-Wang Wu, Jain-Shing Wu
  • Publication number: 20040174399
    Abstract: The present invention relates to a computer with a touch screen, and the user can execute one of “undo”, “cut”, “copy” and “paste” editing commands by a continuous stroke movement to increase the input operational efficiency. For example, after marking an area on the screen, if the subsequent stroke is moved downwards, the “cut” operation is performed, and if the subsequent stroke is moved upwards, the “copy” operation is performed. Furthermore, when the user stops the stroke at a predetermined position, if the subsequent stroke is moved towards the right, the “paste” operation is performed, and if the subsequent stroke is moved towards the left, the “undo” operation is performed.
    Type: Application
    Filed: March 4, 2003
    Publication date: September 9, 2004
    Applicant: Institute for Information Industry
    Inventors: Chin-Wang Wu, Jain-Shing Wu