Patents by Inventor Jun-Bin Shi

Jun-Bin Shi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9135411
    Abstract: A digital rights management (DRM) apparatus and a DRM method are disclosed. The DRM apparatus includes a DRM packer, a DRM object database, a distribution manager, a tracking recording unit, and an index controller. The DRM packager generates M content objects according to a digital content and outputs M DRM objects. The DRM object database stores the M DRM objects. The distribution manager selects N DRM objects according to request information from a client. M and N are positive integers, and N is less than M. The index controller controls the distribution manager to transmit N content objects to the client according to the tracking record, index information, a control rule, and a rights datum.
    Type: Grant
    Filed: January 18, 2012
    Date of Patent: September 15, 2015
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Shu-Fen Yang, Jun-Bin Shi, Ko-Li Kan
  • Patent number: 9053322
    Abstract: A computing environment security method is provided. The method includes: a) dissolving an application package to be tested to obtain at least one data set, wherein each data set corresponds to contents with respect to one of a plurality of aspects of the application package; and b) evaluating whether the application package is a repackaged application according to the at least one data set. Step (b) includes: c) for each data set, analyzing a characteristic relationship of the contents with respect to the aspect corresponding to the data set to accordingly generate characteristic data for the data set; and d) determining whether the application package to be tested is a repackaged application package according to the characteristic data of the at least one data set and a search result obtained from a database, wherein the search result corresponds to the characteristic data within a corresponding distance.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: June 9, 2015
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang, Jun-Yu Chen
  • Publication number: 20140020094
    Abstract: A computing environment security method is provided. The method includes: a) dissolving an application package to be tested to obtain at least one data set, wherein each data set corresponds to contents with respect to one of a plurality of aspects of the application package; and b) evaluating whether the application package is a repackaged application according to the at least one data set. Step (b) includes: c) for each data set, analyzing a characteristic relationship of the contents with respect to the aspect corresponding to the data set to accordingly generate characteristic data for the data set; and d) determining whether the application package to be tested is a repackaged application package according to the characteristic data of the at least one data set and a search result obtained from a database, wherein the search result corresponds to the characteristic data within a corresponding distance.
    Type: Application
    Filed: January 15, 2013
    Publication date: January 16, 2014
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang, Jun-Yu Chen
  • Publication number: 20130145175
    Abstract: A method and an apparatus for enciphering/deciphering digital rights management object are provided. The DRM enciphering method includes the following steps: A plurality of content objects which are divided from a digital content are received. A plurality of DRM vectors are generated according to tacit information between the DRM enciphering apparatus and the DRM deciphering apparatus. The content objects are respectively enciphered according to the DRM vectors to generate a plurality of DRM objects.
    Type: Application
    Filed: April 4, 2012
    Publication date: June 6, 2013
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang
  • Publication number: 20130041991
    Abstract: A digital rights management (DRM) apparatus and a DRM method are disclosed. The DRM apparatus includes a DRM packer, a DRM object database, a distribution manager, a tracking recording unit, and an index controller. The DRM packager generates M content objects according to a digital content and outputs M DRM objects. The DRM object database stores the M DRM objects. The distribution manager selects N DRM objects according to request information from a client. M and N are positive integers, and N is less than M. The index controller controls the distribution manager to transmit N content objects to the client according to the tracking record, index information, a control rule, and a rights datum.
    Type: Application
    Filed: January 18, 2012
    Publication date: February 14, 2013
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Shu-Fen Yang, Jun-Bin Shi, Ko-Li Kan
  • Patent number: 7966367
    Abstract: A web application execution method, for a client to execute a web application on a remote server is provided. A connection status between the client and the remote server is monitored. If the connection is established, an online learning process is performed to monitor the handshakes between the client and the server, thereby constructing a virtual server. If the connection is disconnected, an offline service is activated, allowing the client to execute the web application through the virtual server. If the connection is reestablished after being disconnected, a synchronization process is performed to synchronize state machines within the virtual server and the server.
    Type: Grant
    Filed: April 20, 2009
    Date of Patent: June 21, 2011
    Assignee: Industrial Technology Research Institute
    Inventors: Hsiang-Yuan Hsueh, Yi-Bin Lin, Jun-Bin Shi
  • Publication number: 20100169407
    Abstract: A web application execution method, for a client to execute a web application on a remote server is provided. A connection status between the client and the remote server is monitored. If the connection is established, an online learning process is performed to monitor the handshakes between the client and the server, thereby constructing a virtual server. If the connection is disconnected, an offline service is activated, allowing the client to execute the web application through the virtual server. If the connection is reestablished after being disconnected, a synchronization process is performed to synchronize state machines within the virtual server and the server.
    Type: Application
    Filed: April 20, 2009
    Publication date: July 1, 2010
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Hsiang-Yuan Hsueh, Yi-Bin Lin, Jun-Bin Shi
  • Publication number: 20100169183
    Abstract: A web transaction system and a controlling method thereof are provided. The controlling method of web transaction system includes the following steps. The translating information of a temporary unit is provided to a first service unit by a web transaction system. Whether the temporary unit has received a first transaction element of the first service unit is determined. The translating information of the first service unit is provided to a second service unit. Whether the first service unit has received a second transaction element is determined. If the first service unit has received the second transaction element and the temporary unit has received the first transaction element, then the first transaction element is sent to the second service unit from the temporary unit.
    Type: Application
    Filed: April 24, 2009
    Publication date: July 1, 2010
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Shin-Yan Chiou, Jun-Bin Shi
  • Patent number: 7596695
    Abstract: An application-based data encryption method implemented in an operating system. When receiving system calls for writing data opened by an application, the operating system encrypts the data utilizing an encryption key. When receiving system calls for reading data requested by the application, the operating system decrypts the data utilizing a decryption key. The encryption key and the decryption key may be the same key or two different keys.
    Type: Grant
    Filed: November 4, 2004
    Date of Patent: September 29, 2009
    Assignee: Industrial Technology Research Institute
    Inventors: Wen-Chiuan Liao, Jun-Bin Shi
  • Publication number: 20050278527
    Abstract: An application-based data encryption method implemented in an operating system. When receiving system calls for writing data opened by an application, the operating system encrypts the data utilizing an encryption key. When receiving system calls for reading data requested by the application, the operating system decrypts the data utilizing a decryption key. The encryption key and the decryption key may be the same key or two different keys.
    Type: Application
    Filed: November 4, 2004
    Publication date: December 15, 2005
    Inventors: Wen-Chiuan Liao, Jun-Bin Shi