Patents by Inventor Ya Hsuan Tsai

Ya Hsuan Tsai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11288376
    Abstract: A source code analysis tool is augmented to support rule-based analysis of code to attempt to identify certain lexical information indicative of hard-coded secret (e.g., password) support in the code. The tool takes the source code as input, parses the content with a lexical analyzer based on language grammar, and processes the resulting data through preferably a pair of rule-based engines. Preferably, one engine is configured to identify variables explicitly intended to be used as a hard-coded secret, and the other engine is configured to identify data strings that could potentially support such a secret. The outputs of these rules engines are consolidated and evaluated to identify a likelihood that the code under examination includes support for a hard-coded secret. The result is then provided to the developer for further action to address any potential security vulnerability identified by the analysis.
    Type: Grant
    Filed: May 2, 2019
    Date of Patent: March 29, 2022
    Assignee: International Business Machines Corporation
    Inventors: Ya-Hsuan Tsai, Chun-Shuo Lin, Chuang Hsin-Yu
  • Patent number: 11121871
    Abstract: A technique to secure a wireless communication link that is being shared among a wireless access point (AP), and each of a set of wireless clients (each a mobile station (STA)) that are coupled to the AP over the communication link. A typical implementation is a WPA2-PSK communication link. In this approach, and in lieu of a single secret key being shared by all AP-STA pairs, each AP-STA pair derives its own unique WLAN shared secret, preferably via a Diffie-Hellman (DH) key exchange. The WLAN shared secret is then used to generate WPA2-PSK keys, namely, pairwise master key (PMK) and pairwise transient key (PTK), that establish an 802.11 standards-compliant secure link.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: September 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chih-Wei Hsiao, Chih-Wen Chao, Wei-Hsiang Hsiung, Ya-Hsuan Tsai
  • Patent number: 10891646
    Abstract: A method of locating one or more endpoint connectors of a network cable wherein the network cable includes a first endpoint connector and a second endpoint connector comprises: one or more processors capturing an incoming packet carrying therein a specific identifier, wherein the specific identifier is a specific bit string that has been predefined to trigger an activation of one or more indicating devices located on one or more endpoint connectors on the network cable; determining that the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet carries therein the specific identifier, triggering an activation of a first indicating device indicative of a location of the first endpoint connector.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: January 12, 2021
    Assignee: International Business Machines Corporation
    Inventors: Chun-Fei Chang, Ming Da Ho, Ming-Pin Hsueh, Ya Hsuan Tsai
  • Publication number: 20200349259
    Abstract: A source code analysis tool is augmented to support rule-based analysis of code to attempt to identify certain lexical information indicative of hard-coded secret (e.g., password) support in the code. The tool takes the source code as input, parses the content with a lexical analyzer based on language grammar, and processes the resulting data through preferably a pair of rule-based engines. Preferably, one engine is configured to identify variables explicitly intended to be used as a hard-coded secret, and the other engine is configured to identify data strings that could potentially support such a secret. The outputs of these rules engines are consolidated and evaluated to identify a likelihood that the code under examination includes support for a hard-coded secret. The result is then provided to the developer for further action to address any potential security vulnerability identified by the analysis.
    Type: Application
    Filed: May 2, 2019
    Publication date: November 5, 2020
    Applicant: International Business Machines Corporation
    Inventors: Ya-Hsuan Tsai, Chun-Shuo Lin, Chuang Hsin-Yu
  • Publication number: 20200127829
    Abstract: A technique to secure a wireless communication link that is being shared among a wireless access point (AP), and each of a set of wireless clients (each a mobile station (STA)) that are coupled to the AP over the communication link. A typical implementation is a WPA2-PSK communication link. In this approach, and in lieu of a single secret key being shared by all AP-STA pairs, each AP-STA pair derives its own unique WLAN shared secret, preferably via a Diffie-Hellman (DH) key exchange. The WLAN shared secret is then used to generate WPA2-PSK keys, namely, pairwise master key (PMK) and pairwise transient key (PTK), that establish an 802.11 standards-compliant secure link.
    Type: Application
    Filed: October 22, 2018
    Publication date: April 23, 2020
    Applicant: International Business Machines Corporation
    Inventors: Chih-Wei Hsiao, Chih-Wen Chao, Wei-Hsiang Hsiung, Ya-Hsuan Tsai
  • Patent number: 10607016
    Abstract: Techniques are provided for decrypting an encrypted file within an enterprise network. The techniques include identifying by a password collecting module a password entered during a file encryption procedure performed at a terminal and storing the password; receiving an encrypted file by a data leakage protection (DLP) module; and attempting to decrypt the encrypted file with the password by the DLP module.
    Type: Grant
    Filed: July 24, 2017
    Date of Patent: March 31, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ya Hsuan Tsai, Ying-Hung Yu, Hariharan Mahadevan
  • Publication number: 20190188746
    Abstract: A method of locating one or more endpoint connectors of a network cable wherein the network cable includes a first endpoint connector and a second endpoint connector comprises: one or more processors capturing an incoming packet carrying therein a specific identifier, wherein the specific identifier is a specific bit string that has been predefined to trigger an activation of one or more indicating devices located on one or more endpoint connectors on the network cable; determining that the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet carries therein the specific identifier, triggering an activation of a first indicating device indicative of a location of the first endpoint connector.
    Type: Application
    Filed: January 31, 2019
    Publication date: June 20, 2019
    Inventors: Chun-FeI Chang, Ming Da Ho, Ming-Pin Hsueh, Ya Hsuan Tsai
  • Patent number: 10277467
    Abstract: A method of locating endpoint connectors of a network cable comprises: capturing an incoming packet carrying therein a specific identifier from an echo request instruction; determining whether the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet received carries therein the specific identifier, triggering an indicating device indicative of locations of endpoint connectors of a network cable.
    Type: Grant
    Filed: November 25, 2014
    Date of Patent: April 30, 2019
    Assignee: International Business Machines Corporation
    Inventors: Chun-Fei Chang, Ming Da Ho, Ming-Pin Hsueh, Ya Hsuan Tsai
  • Publication number: 20180018467
    Abstract: Techniques are provided for decrypting an encrypted file within an enterprise network. The techniques include identifying by a password collecting module a password entered during a file encryption procedure performed at a terminal and storing the password; receiving an encrypted file by a data leakage protection (DLP) module; and attempting to decrypt the encrypted file with the password by the DLP module.
    Type: Application
    Filed: July 24, 2017
    Publication date: January 18, 2018
    Applicant: International Business Machines Corporation
    Inventors: Ya Hsuan Tsai, Ying-Hung Yu, Hariharan Mahadevan
  • Patent number: 9727739
    Abstract: Techniques are provided for decrypting an encrypted file within an enterprise network. The techniques include identifying by a password collecting module a password entered during a file encryption procedure performed at a terminal and storing the password; receiving an encrypted file by a data leakage protection (DLP) module; and attempting to decrypt the encrypted file with the password by the DLP module.
    Type: Grant
    Filed: July 21, 2014
    Date of Patent: August 8, 2017
    Assignee: International Business Machines Corporation
    Inventors: Ya Hsuan Tsai, Ying-Hung Yu, Mahadevan Hariharan
  • Patent number: 9565210
    Abstract: A session of network communications is processed between a client terminal and a server by intercepting a request generated from a network transport unit of the client terminal, generating an intermediate session ID for the client terminal, asking the server to establish a session, receiving a response sent from the server using a server session ID after the session is established, associating the server session ID with the intermediate session ID and sending the response to the network transport unit using the intermediate session ID.
    Type: Grant
    Filed: August 22, 2012
    Date of Patent: February 7, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Wei-Hsiang Hsiung, Wei-Shiau Suen, Ya Hsuan Tsai, Rick M F Wu
  • Patent number: 9117078
    Abstract: Creating a policy to be used by a malware prevention system uses multiple events triggered by malware. A sample of malicious computer code or malware is executed in a computer system having a kernel space and a user space. Event data relating to multiple events caused by the malicious code executing on the computer system are captured and stored. The event data is configured using a specific property that facilitates malware behavior analysis. A behavior list is then created utilizing the multiple events and associated event data. The behavior list, together with data in a malware behavior database, is used to derive a policy for use in a malware prevention system. The computer system is free of any malicious code, including viruses, Trojan horses, or any other unwanted software code. The malicious computer code executes without any constraints so that the execution behavior of the malicious code may be observed and captured.
    Type: Grant
    Filed: September 17, 2008
    Date of Patent: August 25, 2015
    Assignee: Trend Micro Inc.
    Inventors: Hao-Liang Chien, Ming-Chang Shih, Ya-Hsuan Tsai
  • Publication number: 20150156103
    Abstract: A method of locating endpoint connectors of a network cable comprises: capturing an incoming packet carrying therein a specific identifier from an echo request instruction; determining whether the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet received carries therein the specific identifier, triggering an indicating device indicative of locations of endpoint connectors of a network cable.
    Type: Application
    Filed: November 25, 2014
    Publication date: June 4, 2015
    Inventors: Chun-Fei Chang, Ming Da Ho, Ming-Pin Hsueh, Ya Hsuan Tsai
  • Publication number: 20140344573
    Abstract: Techniques are provided for decrypting an encrypted file within an enterprise network. The techniques include identifying by a password collecting module a password entered during a the encryption procedure performed at a terminal and storing the password: receiving an encrypted file by a data leakage protection (DLP) module; and attempting to decrypt the encrypted file with the password by the DLP module.
    Type: Application
    Filed: July 21, 2014
    Publication date: November 20, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ya Hsuan Tsai, Ying-Hung Yu, Mahadevan Hariharan
  • Publication number: 20140189349
    Abstract: A method of decrypting an encrypted file within an enterprise network is provided. The method includes identifying by a password collecting module a password entered during a file encryption procedure performed at a terminal and storing the password; receiving an encrypted file by a data leakage protection (DLP) module; and attempting to decrypt the encrypted file with the password by the DLP module.
    Type: Application
    Filed: December 27, 2013
    Publication date: July 3, 2014
    Applicant: International Business Machines Corporation
    Inventors: Ya Hsuan Tsai, Ying-Hung Yu
  • Publication number: 20130054823
    Abstract: A session of network communications is processed between a client terminal and a server by intercepting a request generated from a network transport unit of the client terminal, generating an intermediate session ID for the client terminal, asking the server to establish a session, receiving a response sent from the server using a server session ID after the session is established, associating the server session ID with the intermediate session ID and sending the response to the network transport unit using the intermediate session ID.
    Type: Application
    Filed: August 22, 2012
    Publication date: February 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Wei-Hsiang Hsiung, Wei-Shiau Suen, Ya Hsuan Tsai, Rick M. F. Wu