Patents by Inventor Pang-Chieh Wang

Pang-Chieh Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240129325
    Abstract: A network intrusion detecting system includes a network card configured to receive network traffic and a processor. The processor is configured to analyze the network traffic and extract traffic characteristics of the network traffic and confirm whether the network traffic is network traffic to be detected based on the traffic characteristics; input the network traffic to be detected into an automatic coding module to obtain a reconstructed sample and calculate a reconstruction error between the network traffic to be detected and the reconstructed sample; input the network traffic to be detected and the reconstructed sample respectively into at least one classification module and calculate a distribution similarity when the reconstruction error is less than a reconstruction error threshold; and input the network traffic to be detected into an intrusion anomaly classification model for network intrusion classification when the distribution similarity is less than a confidence distribution similarity threshold.
    Type: Application
    Filed: November 15, 2022
    Publication date: April 18, 2024
    Applicant: Industrial Technology Research Institute
    Inventors: Pei-Hsuan Lu, Pang-Chieh Wang
  • Patent number: 11641346
    Abstract: A data anonymity method and a data anonymity system are provided. The data anonymity method includes the following steps. A data set comprising a plurality of direct-identifiers, a plurality of quasi-identifiers and a plurality of event logs each of which includes an activity and a timestamp is obtained. A content of each of the direct-identifiers is replaced by a pseudonym. The quasi-identifiers are classified, via a group-by algorithm with k-anonymity, as a plurality of equivalence classes. The activities corresponding to each of the direct-identifiers are linked according to the timestamps to obtain a plurality of event sequences. A similarity hierarchy tree is obtained according to a plurality of edit distances among the event sequences. The event sequences are grouped according to the similarity hierarchy tree with k-anonymity to obtain at least one group. The event sequences which are in the group are generalized.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: May 2, 2023
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Ming-Chih Kao, Yu-Hsuan Pan, Pin-Hui Lu, Pei-Hsuan Lu, Pang-Chieh Wang, Kai-Cheng Liu
  • Publication number: 20230116486
    Abstract: A detection device and a detection method for a malicious HTTP request are provided. The detection method includes: receiving a HTTP request and capturing a parameter from the HTTP request; filtering the HTTP request in response to the parameter not matching a whitelist; encoding each character of the HTTP request to generate an encoded string in response to the HTTP request not being filtered; generating an estimated HTTP request according to the encoded string by using an autoencoder; and determining that the HTTP request is a malicious HTTP request in response to a similarity between the HTTP request and the estimated HTTP request being less than a similarity threshold, and outputting a determined result.
    Type: Application
    Filed: November 11, 2021
    Publication date: April 13, 2023
    Applicant: Industrial Technology Research Institute
    Inventors: Pei-Hsuan Lu, Pang-Chieh Wang
  • Patent number: 11138327
    Abstract: A privacy data integration method and a server are provided. The privacy data integration method includes the following steps. A first processing device and a second processing device respectively obtain a first generative model and a second generative model according to a first privacy data and a second privacy data. A server generates a first generative data and a second generative data via the first generative model and the second generative model respectively. The server integrates the first generative data and the second generative data to obtain a synthetic data.
    Type: Grant
    Filed: December 27, 2018
    Date of Patent: October 5, 2021
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Ming-Chih Kao, Pang-Chieh Wang, Chia-Mu Yu, Pin-Hui Lu, Kai-Cheng Liu
  • Publication number: 20210203644
    Abstract: A data anonymity method and a data anonymity system are provided. The data anonymity method includes the following steps. A data set comprising a plurality of direct-identifiers, a plurality of quasi-identifiers and a plurality of event logs each of which includes an activity and a timestamp is obtained. A content of each of the direct-identifiers is replaced by a pseudonym. The quasi-identifiers are classified, via a group-by algorithm with k-anonymity, as a plurality of equivalence classes. The activities corresponding to each of the direct-identifiers are linked according to the timestamps to obtain a plurality of event sequences. A similarity hierarchy tree is obtained according to a plurality of edit distances among the event sequences. The event sequences are grouped according to the similarity hierarchy tree with k-anonymity to obtain at least one group. The event sequences which are in the group are generalized.
    Type: Application
    Filed: December 30, 2019
    Publication date: July 1, 2021
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Ming-Chih KAO, Yu-Hsuan PAN, Pin-Hui LU, Pei-Hsuan LU, Pang-Chieh WANG, Kai-Cheng LIU
  • Publication number: 20200210605
    Abstract: A privacy data integration method and a server are provided. The privacy data integration method includes the following steps. A first processing device and a second processing device respectively obtain a first generative model and a second generative model according to a first privacy data and a second privacy data. A server generates a first generative data and a second generative data via the first generative model and the second generative model respectively. The server integrates the first generative data and the second generative data to obtain a synthetic data.
    Type: Application
    Filed: December 27, 2018
    Publication date: July 2, 2020
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Ming-Chih KAO, Pang-Chieh WANG, Chia-Mu YU, Pin-Hui LU, Kai-Cheng LIU
  • Patent number: 10699029
    Abstract: A data de-identification method, a data de-identification apparatus and a non-transitory computer readable storage medium executing the same are provided. Original data including an identification field, a condition field, and a record field is obtained. An event condition is obtained according to the condition field. From the original data, a plurality of event fragment sequences corresponding to each of a plurality of identification data and corresponding to the event condition are obtained according to the plurality of identification data in the identification field and the event condition. Sequence data is obtained according to the plurality of identification data and the plurality of event fragment sequences corresponding to each of the identification data. De-identification data is obtained by adjusting the sequence data.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: June 30, 2020
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Chuan-Wei Kuo, Ming-Chih Kao, Yu-Hsuan Pan, Pang-Chieh Wang
  • Publication number: 20190114447
    Abstract: A data de-identification method, a data de-identification apparatus and a non-transitory computer readable storage medium executing the same are provided. Original data including an identification field, a condition field, and a record field is obtained. An event condition is obtained according to the condition field. From the original data, a plurality of event fragment sequences corresponding to each of a plurality of identification data and corresponding to the event condition are obtained according to the plurality of identification data in the identification field and the event condition. Sequence data is obtained according to the plurality of identification data and the plurality of event fragment sequences corresponding to each of the identification data. De-identification data is obtained by adjusting the sequence data.
    Type: Application
    Filed: December 27, 2017
    Publication date: April 18, 2019
    Inventors: Chuan-Wei KUO, Ming-Chih KAO, Yu-Hsuan PAN, Pang-Chieh WANG
  • Patent number: 9135411
    Abstract: A digital rights management (DRM) apparatus and a DRM method are disclosed. The DRM apparatus includes a DRM packer, a DRM object database, a distribution manager, a tracking recording unit, and an index controller. The DRM packager generates M content objects according to a digital content and outputs M DRM objects. The DRM object database stores the M DRM objects. The distribution manager selects N DRM objects according to request information from a client. M and N are positive integers, and N is less than M. The index controller controls the distribution manager to transmit N content objects to the client according to the tracking record, index information, a control rule, and a rights datum.
    Type: Grant
    Filed: January 18, 2012
    Date of Patent: September 15, 2015
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Shu-Fen Yang, Jun-Bin Shi, Ko-Li Kan
  • Patent number: 9053322
    Abstract: A computing environment security method is provided. The method includes: a) dissolving an application package to be tested to obtain at least one data set, wherein each data set corresponds to contents with respect to one of a plurality of aspects of the application package; and b) evaluating whether the application package is a repackaged application according to the at least one data set. Step (b) includes: c) for each data set, analyzing a characteristic relationship of the contents with respect to the aspect corresponding to the data set to accordingly generate characteristic data for the data set; and d) determining whether the application package to be tested is a repackaged application package according to the characteristic data of the at least one data set and a search result obtained from a database, wherein the search result corresponds to the characteristic data within a corresponding distance.
    Type: Grant
    Filed: January 15, 2013
    Date of Patent: June 9, 2015
    Assignee: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang, Jun-Yu Chen
  • Publication number: 20140020094
    Abstract: A computing environment security method is provided. The method includes: a) dissolving an application package to be tested to obtain at least one data set, wherein each data set corresponds to contents with respect to one of a plurality of aspects of the application package; and b) evaluating whether the application package is a repackaged application according to the at least one data set. Step (b) includes: c) for each data set, analyzing a characteristic relationship of the contents with respect to the aspect corresponding to the data set to accordingly generate characteristic data for the data set; and d) determining whether the application package to be tested is a repackaged application package according to the characteristic data of the at least one data set and a search result obtained from a database, wherein the search result corresponds to the characteristic data within a corresponding distance.
    Type: Application
    Filed: January 15, 2013
    Publication date: January 16, 2014
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang, Jun-Yu Chen
  • Publication number: 20130145175
    Abstract: A method and an apparatus for enciphering/deciphering digital rights management object are provided. The DRM enciphering method includes the following steps: A plurality of content objects which are divided from a digital content are received. A plurality of DRM vectors are generated according to tacit information between the DRM enciphering apparatus and the DRM deciphering apparatus. The content objects are respectively enciphered according to the DRM vectors to generate a plurality of DRM objects.
    Type: Application
    Filed: April 4, 2012
    Publication date: June 6, 2013
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Jun-Bin Shi, Shu-Fen Yang
  • Publication number: 20130041991
    Abstract: A digital rights management (DRM) apparatus and a DRM method are disclosed. The DRM apparatus includes a DRM packer, a DRM object database, a distribution manager, a tracking recording unit, and an index controller. The DRM packager generates M content objects according to a digital content and outputs M DRM objects. The DRM object database stores the M DRM objects. The distribution manager selects N DRM objects according to request information from a client. M and N are positive integers, and N is less than M. The index controller controls the distribution manager to transmit N content objects to the client according to the tracking record, index information, a control rule, and a rights datum.
    Type: Application
    Filed: January 18, 2012
    Publication date: February 14, 2013
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Pang-Chieh Wang, Shu-Fen Yang, Jun-Bin Shi, Ko-Li Kan
  • Patent number: 8286187
    Abstract: Resource management system is provided, implemented between a service bundle developer and provider and a service bundle user. A resource requirement determining device determines a system resource requirement for a service bundle provided by the service bundle developer and provider, and generates resource requirement information corresponding to the service bundle. A processor receives information of system resource utilization status from the service bundle user, determines whether available resource of the service bundle user is sufficient for the resource requirement of the service bundle, when the available resource of the service bundle user is insufficient, the processor generates a waiting queue, and adds the service bundle into the waiting queue. When available resource of the service bundle user is sufficient, the processor installs the service bundle specified in the waiting queue in the service user. A storage device stores the waiting queue and corresponding resource requirement information.
    Type: Grant
    Filed: May 27, 2008
    Date of Patent: October 9, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Ting-Wei Hou, Pang-Chieh Wang, Yi-Shuan Hung, Sheng-An Jang, Cheng-Liang Lin, Wen-Wei Lin
  • Publication number: 20080320483
    Abstract: Resource management system is provided, implemented between a service bundle developer and provider and a service bundle user. A resource requirement determining device determines a system resource requirement for a service bundle provided by the service bundle developer and provider, and generates resource requirement information corresponding to the service bundle. A processor receives information of system resource utilization status from the service bundle user, determines whether available resource of the service bundle user is sufficient for the resource requirement of the service bundle, when the available resource of the service bundle user is insufficient, the processor generates a waiting queue, and adds the service bundle into the waiting queue. When available resource of the service bundle user is sufficient, the processor installs the service bundle specified in the waiting queue in the service user. A storage device stores the waiting queue and corresponding resource requirement information.
    Type: Application
    Filed: May 27, 2008
    Publication date: December 25, 2008
    Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTE
    Inventors: Ting-Wei Hou, Pang-Chieh Wang, Yi-Shuan Hung, Sheng-An Jang, Cheng-Liang Lin, Wen-Wei Lin