Patents by Inventor Pao-Chuan LIAO

Pao-Chuan LIAO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12147537
    Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.
    Type: Grant
    Filed: December 12, 2023
    Date of Patent: November 19, 2024
    Assignee: Business Machines Corporation
    Inventors: Yu-Siang Chen, Ci-Hao Wu, Ying-Chen Yu, Pao-Chuan Liao, June-Ray Lin
  • Publication number: 20240176880
    Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.
    Type: Application
    Filed: December 12, 2023
    Publication date: May 30, 2024
    Inventors: Yu-Siang Chen, Ci-Hao Wu, Ying-Chen Yu, Pao-Chuan Liao, June-Ray Lin
  • Patent number: 11899791
    Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: February 13, 2024
    Assignee: International Business Machines Corporation
    Inventors: Yu-Siang Chen, Ci-Hao Wu, Ying-Chen Yu, Pao-Chuan Liao, June-Ray Lin
  • Patent number: 11790082
    Abstract: An approach to workflow management in response to a detected security incident in a computer system. The approach may include an inference driven response based on prior artifacts. The inference driven response may predict the condition of the system and the outcomes of actions in response to the security incident. The predictions made by the inference drive response may be based on a machine learning model. The inference driven response may pause or prevent scheduled actions of the system based on the predictions. The inference driven response may continue to monitor the system and dynamically update its predictions for the condition of the system. In response to the updated predictions, the inference driven response may cancel or execute the previously scheduled actions of the system.
    Type: Grant
    Filed: May 25, 2021
    Date of Patent: October 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Ying-Chen Yu, June-Ray Lin, Ci-Hao Wu, Pao-Chuan Liao
  • Publication number: 20230100947
    Abstract: A malware family identification engine constructs a graph data structure of direct relationships between malware instances and malware families, direct relationships between malware instances and detected tags, and indirect relationships between detected tags and malware families. The engine builds a dictionary data structure comprising detected tag entries linking each detected tag to one or more malware family nodes based on the graph data structure. The engine identifies significant indirect entities (SIEs) within the detected tag entries of the dictionary data structure and selects a SIE with a highest number of out-going links (OGLs) as a root node in a family tree data structure, recursively connects SIEs with a number of OGLs less than the highest number of OGLs to the root node in the family tree data structure, and converts each SIE name in the family tree data structure to a chained family entity name in the family tree data structure.
    Type: Application
    Filed: September 29, 2021
    Publication date: March 30, 2023
    Inventors: Yu-Siang Chen, Ci-Hao Wu, Ying-Chen Yu, Pao-Chuan Liao, June-Ray Lin
  • Publication number: 20220382859
    Abstract: An approach to workflow management in response to a detected security incident in a computer system. The approach may include an inference driven response based on prior artifacts. The inference driven response may predict the condition of the system and the outcomes of actions in response to the security incident. The predictions made by the inference drive response may be based on a machine learning model. The inference driven response may pause or prevent scheduled actions of the system based on the predictions. The inference driven response may continue to monitor the system and dynamically update its predictions for the condition of the system. In response to the updated predictions, the inference driven response may cancel or execute the previously scheduled actions of the system.
    Type: Application
    Filed: May 25, 2021
    Publication date: December 1, 2022
    Inventors: Ying-Chen Yu, June-Ray Lin, Ci-Hao Wu, Pao-Chuan Liao
  • Patent number: 11222020
    Abstract: Embodiments of the present invention relate to a method, system and computer program product for compacting data in a distributed storage system. According to the method, a query request is received from a client, wherein the query request comprises information of a previous query request of the client. A first query result of the query request and a second query result of the previous query request are retrieved. A delta data and a first indicator are sent to the client in response to the first query result being different from the second query result, wherein the delta data is the data of the first query result excluding the data comprised in both first and second query results, and the first indicator indicates the data comprised in both the first and the second query results.
    Type: Grant
    Filed: August 21, 2019
    Date of Patent: January 11, 2022
    Assignee: International Business Machines Corporation
    Inventors: Jia-Sian Jhang, Hsiao-Yung Chen, Shr-an Su, Pao-Chuan Liao, Yung Wen YW Deng
  • Publication number: 20210056109
    Abstract: Embodiments of the present invention relate to a method, system and computer program product for compacting data in a distributed storage system. According to the method, a query request is received from a client, wherein the query request comprises information of a previous query request of the client. A first query result of the query request and a second query result of the previous query request are retrieved. A delta data and a first indicator are sent to the client in response to the first query result being different from the second query result, wherein the delta data is the data of the first query result excluding the data comprised in both first and second query results, and the first indicator indicates the data comprised in both the first and the second query results.
    Type: Application
    Filed: August 21, 2019
    Publication date: February 25, 2021
    Inventors: Jia-Sian Jhang, Hsiao-Yung Chen, Shr-an Su, Pao-Chuan Liao, Yung Wen YW Deng
  • Patent number: 10504133
    Abstract: Administering reward schemes. A first reward scheme is predefined by a computer system, the first reward scheme defining a first reward event. A second reward scheme is obtained externally by the computer system, the second reward scheme defining a second reward event. In response to an action by a user, the computer system determines whether the first reward event or the second reward event has been triggered. If the first reward event has been triggered, the computer system calculates a first reward for the user according the first reward scheme and if the second reward event has been triggered, the computer system calculates a second reward for the user according the second reward scheme. The second reward scheme may be obtained by, and shared to, the computer system as an inheritance of rules within an organization.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: December 10, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chia-Ru Chang, Vincent Y. Deng, Pao-Chuan Liao, June-Ray Lin
  • Publication number: 20160125447
    Abstract: Administering reward schemes. A first reward scheme is predefined by a computer system, the first reward scheme defining a first reward event. A second reward scheme is obtained externally by the computer system, the second reward scheme defining a second reward event. In response to an action by a user, the computer system determines whether the first reward event or the second reward event has been triggered. If the first reward event has been triggered, the computer system calculates a first reward for the user according the first reward scheme and if the second reward event has been triggered, the computer system calculates a second reward for the user according the second reward scheme. The second reward scheme may be obtained by, and shared to, the computer system as an inheritance of rules within an organization.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 5, 2016
    Inventors: Chia-Ru CHANG, Vincent Y. DENG, Pao-Chuan LIAO, June-Ray LIN
  • Publication number: 20160089608
    Abstract: Aspects are related to automatically determining game mechanics in business process gamification. Execution data of prior users of a first task in a business process is accessed in a history database. The execution data of the prior users of the first task is analyzed. The game mechanics for the first task is determined according to a result of the analyzing.
    Type: Application
    Filed: September 29, 2015
    Publication date: March 31, 2016
    Inventors: Vincent Yw Deng, Pao-Chuan Liao, Raymund June-Ray Lin, Binh Q. Nguyen
  • Publication number: 20140038146
    Abstract: A method and system of teaming via a social network service for activity coaching include creating a stage model that comprises a first and second stages, wherein a value of a performing parameter for use in the first stage is less than a value of the performing parameter for use in the second stage; receiving initial activity data of users at social network service; determining users involved in the first stage according to initial activity data; teaming the users involved in the first stage; communicating to users via social network service the value of the performing parameter for use in the second stage; setting a team goal to achieve the value; waiting for feedback from the users; determining whether the team goal is achieved; moving the users in the same team to the second stage; and providing rewards to the users, if the determination is affirmative.
    Type: Application
    Filed: July 31, 2013
    Publication date: February 6, 2014
    Applicant: Inrternational Business Machines Corporation
    Inventors: Pao-Chuan LIAO, June-Ray LIN, Sreeram RAMAKRISHNAN, Kai-Quan ZHENG