Patents by Inventor Pei-Chun Yao

Pei-Chun Yao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10091167
    Abstract: A method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus, and an apparatus implementing the method. The method comprises the following steps: designating a suspicious timeslot; if any packet does not present in the designated timeslot, capturing current incoming packets or capturing other incoming packets in the designated timeslot next time; automatically associating the packets in the designated timeslot to form at least one traffic flow corresponding to a connection or call; analyzing the at least one traffic flow to select at least one suspicious target traffic flow; and outputting the at least one selected suspicious target flow.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: October 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sheng-Tung Hsu, Chien Pang Lee, Pei-Chun Yao
  • Publication number: 20170339108
    Abstract: A method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus, and an apparatus implementing the method. The method comprises the following steps: designating a suspicious timeslot; if any packet does not present in the designated timeslot, capturing current incoming packets or capturing other incoming packets in the designated timeslot next time; automatically associating the packets in the designated timeslot to form at least one traffic flow corresponding to a connection or call; analyzing the at least one traffic flow to select at least one suspicious target traffic flow; and outputting the at least one selected suspicious target flow.
    Type: Application
    Filed: May 18, 2017
    Publication date: November 23, 2017
    Inventors: Sheng-Tung Hsu, Chien Pang Lee, Pei-Chun Yao
  • Patent number: 9660959
    Abstract: A method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus, and an apparatus implementing the method. The method includes the following steps: designating a suspicious timeslot; if any packet does not present in the designated timeslot, capturing current incoming packets or capturing other incoming packets in the designated timeslot next time; automatically associating the packets in the designated timeslot to form at least one traffic flow corresponding to a connection or call; analyzing the at least one traffic flow to select at least one suspicious target traffic flow; and outputting the at least one selected suspicious target flow.
    Type: Grant
    Filed: July 31, 2014
    Date of Patent: May 23, 2017
    Assignee: International Business Machines Corporation
    Inventors: Sheng-Tung Hsu, Chien Pang Lee, Pei-Chun Yao
  • Publication number: 20150350161
    Abstract: A method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus, and an apparatus implementing the method. The method comprises the following steps: designating a suspicious timeslot; if any packet does not present in the designated timeslot, capturing current incoming packets or capturing other incoming packets in the designated timeslot next time; automatically associating the packets in the designated timeslot to form at least one traffic flow corresponding to a connection or call; analyzing the at least one traffic flow to select at least one suspicious target traffic flow; and outputting the at least one selected suspicious target flow.
    Type: Application
    Filed: July 31, 2014
    Publication date: December 3, 2015
    Inventors: Sheng-Tung Hsu, Chien Pang Lee, Pei-Chun Yao
  • Patent number: 8769130
    Abstract: Client computers may be configured to communicate with a security server computer to receive access point information for computer network wireless access points in a particular geographic location. A client computer may provide its current geographic location to the security server computer to request access point information. The server computer may retrieve from an access point database access point information for computer network wireless access points in the geographic location. The server computer may provide the access point information to the client computer, which may display the access point information over a geographic map. The access point information may indicate whether any computer network wireless access point in the geographic location poses a computer security threat.
    Type: Grant
    Filed: May 12, 2008
    Date of Patent: July 1, 2014
    Assignee: Trend Micro Incorporated
    Inventors: Chia-Chi Chang, Kun-Shan Lin, Pei-Chun Yao
  • Patent number: 8191143
    Abstract: Anti-pharming techniques in wireless computer networks at pre-IP state are disclosed. A user computer connecting to a wireless computer network may include an anti-pharming module configured to monitor data communications to and from a wireless access point of the wireless computer network. The anti-pharming module may be configured to determine if data communication going in a direction from the wireless access point to the user computer originated from a wireless station rather than a server configured to dynamically provide network addresses to computers connecting to the wireless computer network. The wireless station may be deemed a malicious computer perpetrating a pharming attack when it originated the data communication and is responding to a request to obtain network address previously sent by the user computer.
    Type: Grant
    Filed: November 13, 2007
    Date of Patent: May 29, 2012
    Assignee: Trend Micro Incorporated
    Inventors: Kun-Shan Lin, Pei-Chun Yao, Chia-Chi Chang
  • Patent number: 8056133
    Abstract: In one embodiment, a peer-to-peer (P2P) protect server may include a crawler to obtain files available for P2P data transfer. The P2P protect server may employ a scan engine to scan the files for computer viruses, and store the results of the scanning in a database. A P2P protect application running in a P2P client may request the P2P protect server for information on whether or not a particular file available for P2P data transfer is infected with a computer virus. This allows the user of the P2P client to make an informed decision before downloading the file from another P2P client.
    Type: Grant
    Filed: July 26, 2006
    Date of Patent: November 8, 2011
    Assignee: Trend Micro Incorporated
    Inventors: Pei-Chun Yao, Chia-Chi Chang
  • Patent number: 7849166
    Abstract: To protect a user computer from eavesdroppers, a secure communication connection is created through a computer network. The secure communication connection may be created even when the user computer communicates with a web server computer that does not support secure communication connections. The secure communication connection may be to a protection server computer. Another communication connection may be formed between the protection server computer and the web server computer to allow the user computer to transfer data to the web server computer by way of the protection server computer. The creation of the secure communication connection may be by user request or automatic upon detection of protected address or data.
    Type: Grant
    Filed: January 11, 2008
    Date of Patent: December 7, 2010
    Assignee: Trend Micro Incorporated
    Inventors: Chia-Chi Chang, Kun-Shan Lin, Pei-Chun Yao