Patents by Inventor Jun-Bin Shi
Jun-Bin Shi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9135411Abstract: A digital rights management (DRM) apparatus and a DRM method are disclosed. The DRM apparatus includes a DRM packer, a DRM object database, a distribution manager, a tracking recording unit, and an index controller. The DRM packager generates M content objects according to a digital content and outputs M DRM objects. The DRM object database stores the M DRM objects. The distribution manager selects N DRM objects according to request information from a client. M and N are positive integers, and N is less than M. The index controller controls the distribution manager to transmit N content objects to the client according to the tracking record, index information, a control rule, and a rights datum.Type: GrantFiled: January 18, 2012Date of Patent: September 15, 2015Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Pang-Chieh Wang, Shu-Fen Yang, Jun-Bin Shi, Ko-Li Kan
-
Patent number: 9053322Abstract: A computing environment security method is provided. The method includes: a) dissolving an application package to be tested to obtain at least one data set, wherein each data set corresponds to contents with respect to one of a plurality of aspects of the application package; and b) evaluating whether the application package is a repackaged application according to the at least one data set. Step (b) includes: c) for each data set, analyzing a characteristic relationship of the contents with respect to the aspect corresponding to the data set to accordingly generate characteristic data for the data set; and d) determining whether the application package to be tested is a repackaged application package according to the characteristic data of the at least one data set and a search result obtained from a database, wherein the search result corresponds to the characteristic data within a corresponding distance.Type: GrantFiled: January 15, 2013Date of Patent: June 9, 2015Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang, Jun-Yu Chen
-
Publication number: 20140020094Abstract: A computing environment security method is provided. The method includes: a) dissolving an application package to be tested to obtain at least one data set, wherein each data set corresponds to contents with respect to one of a plurality of aspects of the application package; and b) evaluating whether the application package is a repackaged application according to the at least one data set. Step (b) includes: c) for each data set, analyzing a characteristic relationship of the contents with respect to the aspect corresponding to the data set to accordingly generate characteristic data for the data set; and d) determining whether the application package to be tested is a repackaged application package according to the characteristic data of the at least one data set and a search result obtained from a database, wherein the search result corresponds to the characteristic data within a corresponding distance.Type: ApplicationFiled: January 15, 2013Publication date: January 16, 2014Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang, Jun-Yu Chen
-
Publication number: 20130145175Abstract: A method and an apparatus for enciphering/deciphering digital rights management object are provided. The DRM enciphering method includes the following steps: A plurality of content objects which are divided from a digital content are received. A plurality of DRM vectors are generated according to tacit information between the DRM enciphering apparatus and the DRM deciphering apparatus. The content objects are respectively enciphered according to the DRM vectors to generate a plurality of DRM objects.Type: ApplicationFiled: April 4, 2012Publication date: June 6, 2013Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang
-
Publication number: 20130041991Abstract: A digital rights management (DRM) apparatus and a DRM method are disclosed. The DRM apparatus includes a DRM packer, a DRM object database, a distribution manager, a tracking recording unit, and an index controller. The DRM packager generates M content objects according to a digital content and outputs M DRM objects. The DRM object database stores the M DRM objects. The distribution manager selects N DRM objects according to request information from a client. M and N are positive integers, and N is less than M. The index controller controls the distribution manager to transmit N content objects to the client according to the tracking record, index information, a control rule, and a rights datum.Type: ApplicationFiled: January 18, 2012Publication date: February 14, 2013Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Pang-Chieh Wang, Shu-Fen Yang, Jun-Bin Shi, Ko-Li Kan
-
Patent number: 7966367Abstract: A web application execution method, for a client to execute a web application on a remote server is provided. A connection status between the client and the remote server is monitored. If the connection is established, an online learning process is performed to monitor the handshakes between the client and the server, thereby constructing a virtual server. If the connection is disconnected, an offline service is activated, allowing the client to execute the web application through the virtual server. If the connection is reestablished after being disconnected, a synchronization process is performed to synchronize state machines within the virtual server and the server.Type: GrantFiled: April 20, 2009Date of Patent: June 21, 2011Assignee: Industrial Technology Research InstituteInventors: Hsiang-Yuan Hsueh, Yi-Bin Lin, Jun-Bin Shi
-
Publication number: 20100169407Abstract: A web application execution method, for a client to execute a web application on a remote server is provided. A connection status between the client and the remote server is monitored. If the connection is established, an online learning process is performed to monitor the handshakes between the client and the server, thereby constructing a virtual server. If the connection is disconnected, an offline service is activated, allowing the client to execute the web application through the virtual server. If the connection is reestablished after being disconnected, a synchronization process is performed to synchronize state machines within the virtual server and the server.Type: ApplicationFiled: April 20, 2009Publication date: July 1, 2010Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Hsiang-Yuan Hsueh, Yi-Bin Lin, Jun-Bin Shi
-
Publication number: 20100169183Abstract: A web transaction system and a controlling method thereof are provided. The controlling method of web transaction system includes the following steps. The translating information of a temporary unit is provided to a first service unit by a web transaction system. Whether the temporary unit has received a first transaction element of the first service unit is determined. The translating information of the first service unit is provided to a second service unit. Whether the first service unit has received a second transaction element is determined. If the first service unit has received the second transaction element and the temporary unit has received the first transaction element, then the first transaction element is sent to the second service unit from the temporary unit.Type: ApplicationFiled: April 24, 2009Publication date: July 1, 2010Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Shin-Yan Chiou, Jun-Bin Shi
-
Patent number: 7596695Abstract: An application-based data encryption method implemented in an operating system. When receiving system calls for writing data opened by an application, the operating system encrypts the data utilizing an encryption key. When receiving system calls for reading data requested by the application, the operating system decrypts the data utilizing a decryption key. The encryption key and the decryption key may be the same key or two different keys.Type: GrantFiled: November 4, 2004Date of Patent: September 29, 2009Assignee: Industrial Technology Research InstituteInventors: Wen-Chiuan Liao, Jun-Bin Shi
-
Publication number: 20050278527Abstract: An application-based data encryption method implemented in an operating system. When receiving system calls for writing data opened by an application, the operating system encrypts the data utilizing an encryption key. When receiving system calls for reading data requested by the application, the operating system decrypts the data utilizing a decryption key. The encryption key and the decryption key may be the same key or two different keys.Type: ApplicationFiled: November 4, 2004Publication date: December 15, 2005Inventors: Wen-Chiuan Liao, Jun-Bin Shi