Patents by Inventor Jui-Pang Wang

Jui-Pang Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9712597
    Abstract: A media data processing method is provided herein. The media data processing method is adapted for a portable mobile device. The media data processing method includes: selecting at least one first media file in a first client; uploading the at least one first media file to a server; mixing and editing the at least one first media file and at least one second media file in the server to generate a video.
    Type: Grant
    Filed: January 5, 2015
    Date of Patent: July 18, 2017
    Assignee: HTC Corporation
    Inventors: Chien-Wen Chen, Pai-Chang Yeh, Mao-Chiang Tsai, Jui-Pang Wang, Chun-Tang Huang
  • Publication number: 20150200999
    Abstract: A media data processing method is provided herein. The media data processing method is adapted for a portable mobile device. The media data processing method includes: selecting at least one first media file in a first client; uploading the at least one first media file to a server; mixing and editing the at least one first media file and at least one second media file in the server to generate a video.
    Type: Application
    Filed: January 5, 2015
    Publication date: July 16, 2015
    Inventors: Chien-Wen CHEN, Pai-Chang YEH, Mao-Chiang TSAI, Jui-Pang WANG, Chun-Tang HUANG
  • Patent number: 8949990
    Abstract: Detection of dynamic URLs that are vulnerable to XSS attacks is described. First, a dynamic URL is crafted by incorporating a piece of test code designed to expose an instance of XSS vulnerabilities. Next, the crafted URL is loaded into a browser, which causes a web page to be generated that may include the piece of test code. If, upon loading the web page into the browser, the piece of test code is executed by the browser and the browser sends a request to a web server as a result, then the URL is reported as XSS vulnerable. Others, the URL is not vulnerable to this instance of XSS attack. The test may be repeated multiple times for different pieces of test code, each piece designed to expose a different instance of XSS vulnerabilities.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: February 3, 2015
    Assignee: Trend Micro Inc.
    Inventors: Sheng-Chi Hsieh, Jui-Pang Wang
  • Patent number: 8850567
    Abstract: Unauthorized URL requests are detected based on individual user's access map(s). An access map describes legitimate paths that a user may be led from one URL to another URL. Additional information on individual URLs forming the paths, such as whether a particular URL is a start URL or a critical URL, is also included in the access map. The access map may be updated based on the most currently available information. When a URL request is made from a client device associated with a user, and it if is determined that the requested URL may potentially suffer from CSRF attacks, then the requested URL and its referral URL are compared against the URL paths in the user's access map to determine whether the URL request is unauthorized. If so, then an alert may be raised.
    Type: Grant
    Filed: February 4, 2008
    Date of Patent: September 30, 2014
    Assignee: Trend Micro, Inc.
    Inventors: Sheng-Chi Hsieh, Jui-Pang Wang, Chao-Yu Chen
  • Patent number: 8561188
    Abstract: Detection and prevention of botnet behavior is accomplished by monitoring access request in a network. Each request includes a domain of content to access and a path of content to access, and each path includes a file name and query string. Once obtained, the query strings for each of these requests are normalized. A signature is then created for each of the normalized query strings. The obtained requests can then be grouped by signature. Once the requests have been grouped by signature, each grouping is examined to identify suspicious signatures based on common botnet behavior. Suspicious requests are used in back-end and front-end defenses against botnets.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: October 15, 2013
    Assignee: Trend Micro, Inc.
    Inventors: Jui Pang Wang, Ming-Tai Chang, Jui-Chieh Wu
  • Patent number: 8175387
    Abstract: Two images are compared to determine how similar they are. First, a process normalizes each image, then horizontal and vertical byte sequences are derived from each image. A similarity formula is used to obtain a similarity value that represents the similarity between the two images. An approximate pattern matching algorithm is used to determine the error distance between the horizontal byte sequences for the images and to determine the error distance between the vertical byte sequences for the images. The error distances and the length of the byte sequences are used to determine the similarity value. Padding is used to make the aspect ratios the same.
    Type: Grant
    Filed: September 19, 2007
    Date of Patent: May 8, 2012
    Assignee: Trend Micro, Inc.
    Inventors: Sheng-chi Hsieh, Jui-pang Wang
  • Patent number: 7996681
    Abstract: A method for performing electronic signature verification for an entity is provided. The method includes creating a signature card for the entity by analyzing color change frequency of an initial electronic signature image. The method also includes comparing a second electronic signature image for the entity and the signature card to perform electronic signature verification.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: August 9, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Jui-Pang Wang, Sheng-Chi Hsieh