Patents by Inventor Ming-Wei Wu

Ming-Wei Wu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200067971
    Abstract: A cyber breach diagnostics system includes: an activity records collection device arranged to operably collect multiple suspicious activities records related to multiple computing devices in a target network and corresponding multiple time stamps and multiple attribute tags, and to operably process the multiple suspicious activities records, the multiple time stamps, and the multiple attribute tags to generate a return data; and a suspicious event analysis device arranged to operably conduct a suspicious event sequence diagram generating operation to identify multiple suspicious events related to the target network as well as multiple time records corresponding to the multiple suspicious events, and to operably generate and display a suspicious event sequence diagram corresponding to the multiple suspicious events according to the multiple suspicious events and the multiple time records.
    Type: Application
    Filed: August 22, 2019
    Publication date: February 27, 2020
    Applicant: CyCarrier Technology Co., Ltd.
    Inventors: Ming-Chang CHIU, Hui-Ching HUANG, Pei Kan TSUNG, Ming Wei WU
  • Publication number: 20200065481
    Abstract: A suspicious event analysis device includes: a display device; a communication circuit, arranged to operably receive multiple suspicious activities records related to multiple computing devices in a target network and corresponding multiple time stamps and multiple attribute tags through internet; a storage circuit, arranged to operably store a suspicious event sequence diagram generating program; and a control circuit, arranged to operably execute the suspicious event sequence diagram generating program to conduct a suspicious event sequence diagram generating operation, so as to identify multiple suspicious events related to the target network as well as multiple time records corresponding to the multiple suspicious events, and to generate and display a suspicious event sequence diagram corresponding to the multiple suspicious events according to the multiple suspicious events and the multiple time records.
    Type: Application
    Filed: August 22, 2019
    Publication date: February 27, 2020
    Applicant: CyCarrier Technology Co., Ltd.
    Inventors: Ming-Chang CHIU, Hui-Ching HUANG, Pei Kan TSUNG, Ming Wei WU
  • Publication number: 20200067957
    Abstract: A suspicious event analysis device includes: a display device; a communication circuit, arranged to operably receive multiple suspicious activities records related to multiple computing devices in a target network and corresponding multiple time stamps and multiple attribute tags through internet; a storage circuit, arranged to operably store a suspicious event sequence diagram generating program; and a control circuit, arranged to operably execute the suspicious event sequence diagram generating program to conduct a suspicious event sequence diagram generating operation, so as to identify multiple suspicious events related to the target network as well as multiple time records corresponding to the multiple suspicious events, and to generate and display a suspicious event sequence diagram corresponding to the multiple suspicious events according to the multiple suspicious events and the multiple time records.
    Type: Application
    Filed: August 22, 2019
    Publication date: February 27, 2020
    Applicant: CyCarrier Technology Co., Ltd.
    Inventors: Ming-Chang CHIU, Hui-Ching HUANG, Pei Kan TSUNG, Ming Wei WU
  • Patent number: 10065244
    Abstract: The present invention discloses a method for fabricating a porous spherical iron-based alloy powder, a powder thereof and a sintered body thereof. The method comprises steps: mixing an iron oxide powder and an alloying powder to form a mixed powder; spray-granulating the mixed powder to form a spherical spray-granulated powder; and placing the spherical spray-granulated powder in a reducing environment and heating it to a temperature of lower than 700° C. to obtain a porous spherical iron-based alloy powder having high flowability, high compressibility, superior sinterability and low cost.
    Type: Grant
    Filed: April 18, 2016
    Date of Patent: September 4, 2018
    Assignee: Taiwan Powder Technologies Co., Ltd.
    Inventors: Kuen-Shyang Hwang, Ming-Wei Wu, Yang-Liang Fan
  • Publication number: 20170297114
    Abstract: The present invention discloses a method for fabricating a porous spherical iron-based alloy powder, a powder thereof and a sintered body thereof. The method comprises steps: mixing an iron oxide powder and an alloying powder to form a mixed powder; spray-granulating the mixed powder to form a spherical spray-granulated powder; and placing the spherical spray-granulated powder in a reducing environment and heating it to a temperature of lower than 700° C. to obtain a porous spherical iron-based alloy powder having high flowability, high compressibility, superior sinterability and low cost.
    Type: Application
    Filed: April 18, 2016
    Publication date: October 19, 2017
    Inventors: Kuen-Shyang HWANG, Ming-Wei WU, Yang-Liang FAN
  • Publication number: 20160134652
    Abstract: A method for recognizing disguised malicious document, carried out by a computer system including a central processing unit (CPU), a memory, and a database storing rules for defining executable file and non-executable file, comprising steps of: receiving a static file through a network and an input/out interface; scanning the static file for a file header to determine if it is a non-executable file; analyzing file body of the non-executable file to locate components of an executable file and mark these positions; extracting components of the executable file from the non-executable file; concatenating the extracted components in accordance with a default rule or a heuristic rule to form a new file; and obtaining a new file that is executable, such that the received static file is a non-executable file having an embedded executable file, thus labeling the static file as a disguised malicious document.
    Type: Application
    Filed: January 18, 2016
    Publication date: May 12, 2016
    Inventors: Ming-Chang Chiu, Ming-Wei Wu, Ching-Chung Wang, Che-Kuo Hsu, Pei-Kan Tsung
  • Publication number: 20140150101
    Abstract: A method for recognizing malicious file has steps: receiving a static file through a network or an input/out interface to be stored in the memory; defining suspicious positions where components of a malware are possibly encrypted in the static file; decrypting the suspicious positions to identify a PE header and a shellcode; extracting the PE header and the shellcode terms in segments; and determining whether the PE header and the shellcode terms can be assembled into an executable binary which indicates a recognition of the malicious file.
    Type: Application
    Filed: January 29, 2014
    Publication date: May 29, 2014
    Applicant: Xecure Lab Co., Ltd.
    Inventors: Ming-Chang Chiu, Ming-Wei Wu, Ching-Chung Wang, Che-Kuo Hsu, Pei-Kan Tsung
  • Publication number: 20130179975
    Abstract: A method for extracting the genetic fingerprinting of a malicious document file includes the steps of establishing a database to store a plurality of genetic fingerprinting data of the first malicious document, then retrieving a document file sent via the Internet, and then proceeding with multi-point detection and extraction to the document file, so as to obtain a multi-point section, then comparing and analyzing the multi-point section with the plurality of genetic fingerprinting data of the first malicious document to confirm whether the multi-point section program code of the document file matches a malicious feature, thereby achieves the goal of extracting the content information of the document file and converts it into the genetic fingerprinting data of a new malicious document.
    Type: Application
    Filed: September 12, 2012
    Publication date: July 11, 2013
    Inventors: Ming-Chang Chiu, Ming-Wei Wu, Ching-Chung Wang, Che-Kuo Hsu, Pei-Kan Tsung
  • Publication number: 20110003177
    Abstract: A method for producing a sputtering target containing boron has steps of providing cobalt-chromium (Co·Cr) prealloy powder, mixing Co·Cr prealloy powder and raw material powder containing boron and oxide to form a mixture, preforming the mixture to form a green compact, and sintering the green compact to obtain the sputtering target containing boron. Because Co·Cr prealloy powder is provided, then is mixed with boron, oxide or the like, size and distribution of boride particles can be efficiently controlled. Therefore, Co, Cr, B or the like are uniformly distributed in the sputtering target.
    Type: Application
    Filed: July 6, 2009
    Publication date: January 6, 2011
    Applicant: SOLAR APPLIED MATERIALS TECHNOLOGY CORP.
    Inventors: Ming-Wei Wu, Hao-Chia Liao