Patents by Inventor Te-En Wei

Te-En Wei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230138458
    Abstract: A machine learning system and method are provided. The machine learning system includes a plurality of client apparatuses, and the client apparatuses include a first client apparatus and one or more second client apparatuses. The first client apparatus transmits a model update request to the one or more second client apparatuses, and the model update request corresponds to a malware type. The first client apparatus receives a second local model corresponding to each of the one or more second client apparatuses from each of the one or more second client apparatuses. The first client apparatus generates a plurality of node sequences based on a first local model and each of the second local models. The first client apparatus merges the first local model and each of the second local models based on the node sequences to generate a local model set.
    Type: Application
    Filed: November 24, 2021
    Publication date: May 4, 2023
    Inventors: Te-En Wei, Kun Wei Lee, Shin-Ying Huang, Hsiao-Hsien Chang, Jain-Shing Wu
  • Publication number: 20220179908
    Abstract: An information security device and method thereof are provided. The information security device includes a transceiver, a register and a processor. The transceiver configured to receive scenario information of a company; The register configured to store multiple instructions and multiple databases; and the processor coupled to the transceiver and the register, and configured to execute the multiple instructions to: read first vulnerability related information and first event information from the multiple databases; generate at least one first intelligent graph according to the first vulnerability related information and the first event information, and generate a second intelligent graph according to the scenario information; and compare the at least one first intelligent graph with the second intelligent graph to identify at least one similarity between the at least one first intelligent graph and the second intelligent graph for determining whether the company has information security threat.
    Type: Application
    Filed: December 3, 2020
    Publication date: June 9, 2022
    Inventors: Te-En WEI, Shin-Ying HUANG, Hsiao-Hsien CHANG, Jain-Shing WU
  • Patent number: 11057403
    Abstract: A suspicious packet detection device and a suspicious packet detection method thereof are provided. The suspicious packet detection device captures an HTTP packet transmitted from an internal network to an external network, and based on an HTTP header of the HTTP packet, determines that the HTTP packet belongs to one of a browser category and an application category and identifies the HTTP packet as one of a normal packet and a suspicious packet. When the HTTP packet is identified as the normal packet, the suspicious packet detection device further verifies whether the HTTP packet is the suspicious packet or not by comparing the HTTP header with relevance information or by using a URL classification model.
    Type: Grant
    Filed: November 27, 2018
    Date of Patent: July 6, 2021
    Assignee: Institute For Information Industry
    Inventors: Chi-Kuan Chiu, Hsiao-Hsien Chang, Te-En Wei
  • Patent number: 10841228
    Abstract: An abnormal flow detection device and an abnormal flow detection method thereof are provided. The abnormal flow detection device analyses a plurality of packets captured during a time interval to obtain a plurality of flow features of each packet and selects at least one key flow feature from the flow features based on a dimensionality reduction algorithm. The abnormal flow detection device trains a bidirectional generative adversarial network (BiGAN) by taking the at least one key flow feature of each packet as an input of the BiGAN to build a flow recognition model for detecting abnormal flows.
    Type: Grant
    Filed: December 5, 2018
    Date of Patent: November 17, 2020
    Assignee: Institute For Information Industry
    Inventors: Kun-Wei Lee, Chin-Wei Chen, Te-En Wei, Hsiao-Hsien Chang
  • Patent number: 10742668
    Abstract: A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access records. Each access record includes a network address, time stamp, and access content. Each attack pattern corresponds to at least one attack access relation. Each attack access relation is defined by a network address and access content. The apparatus retrieves several attack records according to at least one attack address. The network address of each attack record is one of the attack address(s). The apparatus divides the attack records into several groups according to the time stamps and performs the following operations for each group: (a) creating at least one access relation for each attack address included in the group and (b) determining that the group corresponds to one of the attack patterns according to the at least one access relation of the group.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: August 11, 2020
    Assignee: Institute For Information Industry
    Inventors: Chia-Min Lai, Ching-Hao Mao, Chih-Hung Hsieh, Te-En Wei, Chi-Ping Lai
  • Publication number: 20200153742
    Abstract: An abnormal flow detection device and an abnormal flow detection method thereof are provided. The abnormal flow detection device analyses a plurality of packets captured during a time interval to obtain a plurality of flow features of each packet and selects at least one key flow feature from the flow features based on a dimensionality reduction algorithm. The abnormal flow detection device trains a bidirectional generative adversarial network (BiGAN) by taking the at least one key flow feature of each packet as an input of the BiGAN to build a flow recognition model for detecting abnormal flows.
    Type: Application
    Filed: December 5, 2018
    Publication date: May 14, 2020
    Inventors: Kun-Wei LEE, Chin-Wei CHEN, Te-En WEI, Hsiao-Hsien CHANG
  • Publication number: 20200145435
    Abstract: A suspicious packet detection device and a suspicious packet detection method thereof are provided. The suspicious packet detection device captures an HTTP packet transmitted from an internal network to an external network, and based on an HTTP header of the HTTP packet, determines that the HTTP packet belongs to one of a browser category and an application category and identifies the HTTP packet as one of a normal packet and a suspicious packet. When the HTTP packet is identified as the normal packet, the suspicious packet detection device further verifies whether the HTTP packet is the suspicious packet or not by comparing the HTTP header with relevance information or by using a URL classification model.
    Type: Application
    Filed: November 27, 2018
    Publication date: May 7, 2020
    Inventors: Chi-Kuan CHIU, Hsiao-Hsien CHANG, Te-En WEI
  • Patent number: 10586044
    Abstract: An abnormal behavior detection model building apparatus and an abnormal behavior detection model building method thereof are provided. The abnormal behavior detection model building apparatus analyzes the parts of speech of a plurality of program operation sequences in a plurality of program operation sequence data associated with abnormal behaviors to generate a plurality of word vectors and cluster the word vectors. Based on the result of the clustering, the abnormal behavior detection model building apparatus obtains a feature vector of each of the program operation sequence data, and perform a supervised learning for a classification algorithm by using the feature vectors so as to build an abnormal behavior detection model.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: March 10, 2020
    Assignee: Institute For Information Industry
    Inventors: Te-EN Wei, Chih-Hung Hsieh, Hsiang-Tsung Kung
  • Publication number: 20190180030
    Abstract: An abnormal behavior detection model building apparatus and an abnormal behavior detection model building method thereof are provided. The abnormal behavior detection model building apparatus analyzes the parts of speech of a plurality of program operation sequences in a plurality of program operation sequence data associated with abnormal behaviors to generate a plurality of word vectors and cluster the word vectors. Based on the result of the clustering, the abnormal behavior detection model building apparatus obtains a feature vector of each of the program operation sequence data, and perform a supervised learning for a classification algorithm by using the feature vectors so as to build an abnormal behavior detection model.
    Type: Application
    Filed: December 12, 2017
    Publication date: June 13, 2019
    Inventors: Te-EN WEI, Chih-Hung HSIEH, Hsiang-Tsung KUNG
  • Patent number: 10250626
    Abstract: An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus stores a plurality of access records of an application, wherein each access record includes a network address of a host and an access content. The attacking node detection apparatus filters the access records into a plurality of filtered access records according to a predetermined rule so that the access content of each filtered access record conforms to the predetermined rule. The attacking node detection apparatus creates at least one access relation of each of the network addresses according to the filtered access records, wherein each access relation is defined by one of the network addresses and one of the access contents. The attacking node detection apparatus identifies a specific network address as an attacking node according to the access relations.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: April 2, 2019
    Assignee: Institute For Information Industry
    Inventors: Chia-Min Lai, Ching-Hao Mao, Chih-Hung Hsieh, Te-En Wei, Chi-Ping Lai
  • Publication number: 20180159878
    Abstract: An attacking node detection apparatus, method, and computer program product thereof are provided. The attacking node detection apparatus is stored with a plurality of access records of an application, wherein each access record includes a network address of a host and an access content. The attacking node detection apparatus filters the access records into a plurality of filtered access records according to a predetermined rule so that the access content of each filtered access record conforms to the predetermined rule. The attacking node detection apparatus creates at least one access relation of each of the network addresses according to the filtered access records, wherein each access relation is defined by one of the network addresses and one of the access contents. The attacking node detection apparatus identifies a specific network address as an attacking node according to the access relations.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Chia-Min LAI, Ching-Hao MAO, Chih-Hung HSIEH, Te-EN WEI, Chi-Ping LAI
  • Publication number: 20180159868
    Abstract: A network attack pattern determination apparatus, method, and non-transitory computer readable storage medium thereof are provided. The apparatus is stored with several attack patterns and access records. Each access record includes a network address, time stamp, and access content. Each attack pattern corresponds to at least one attack access relation. Each attack access relation is defined by a network address and access content. The apparatus retrieves several attack records according to at least one attack address. The network address of each attack record is one of the attack address(s). The apparatus divides the attack records into several groups according to the time stamps and performs the following operations for each group: (a) creating at least one access relation for each attack address included in the group and (b) determining that the group corresponds to one of the attack patterns according to the at least one access relation of the group.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Chia-Min LAI, Ching-Hao MAO, Chih-Hung HSIEH, Te-EN WEI, Chi-Ping LAI
  • Publication number: 20150012988
    Abstract: An authentication method and an authentication system are provided. The authentication method includes the following steps. Providing a test image in a first state. Obtaining the test image in a second state in response to a rotating operation. Calculating a difference value between each of image hash values of the test image in the second state and the test image in a third state. Determining that an authentication is successful if the difference value is less than a threshold value, wherein the third state is a state in which the test image is up-right.
    Type: Application
    Filed: July 5, 2013
    Publication date: January 8, 2015
    Inventors: Albert Bor-Ren Jeng, Hahn-Ming Lee, Te-En Wei, Yuh-Jye Lee