Patents by Inventor Yi Fen Chen
Yi Fen Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250101428Abstract: Small interfering RNAs (siRNA) having specific modification patterns to improve interference efficiencies thereof. The modification patterns each comprises a combination of 2?-O methyl modification, 2?-O-fluoro-modification, and phosphorothioate (PS) bonds at defined positions in the sense strand and anti-sense strand of each siRNA, and optionally 5? phosphate modifications.Type: ApplicationFiled: December 2, 2022Publication date: March 27, 2025Inventors: Yi-Chung CHANG, Chi-Fan YANG, Hui-Yu CHEN, Yi-Fen CHEN
-
Publication number: 20240026362Abstract: Provided are interfering RNAs (e.g., siRNAs) targeting SARS-CoV (e.g., the POL, Spike, Helicase, or Envelop gene thereof) and therapeutic uses thereof for inhibiting SARS-CoV infection and/or treating diseases associated with the infection (e.g., COVID-19).Type: ApplicationFiled: December 3, 2021Publication date: January 25, 2024Applicants: MICROBIO (SHANGHAI) CO. LTD., ONENESS BIOTECH CO. LTD.Inventors: Yi-Chung CHANG, Chi-Fan YANG, Yi-Fen CHEN, Chia-Chun YANG, Yuan-Lin CHOU
-
Patent number: 11604887Abstract: A data protection method is provided. The data protection method includes the following. A first image is obtained; at least one first object image in the first image is identified; the at least one first object image is analyzed to capture multiple first characteristic values of multiple characteristic points of the at least one first object image; and an encryption key is generated according to the first characteristic values.Type: GrantFiled: March 2, 2021Date of Patent: March 14, 2023Assignee: Wistron CorporationInventor: Yi Fen Chen
-
Publication number: 20230045508Abstract: Disclosed herein are a heat-shrinkable polyester label film and a preparation method thereof. The label film has a shrinkage force not lower than 5.5 N in at least one shrinkage direction after immersing the heat-shrinkable polyester label film in water at 55° C. for 30 seconds, and a heat shrinkage rate of not lower than 50% in the shrinkage direction after immersing the heat-shrinkable polyester label film in water at 55° C. for 240 seconds.Type: ApplicationFiled: July 21, 2022Publication date: February 9, 2023Inventors: Yi-Fen CHEN, Yow-An LEU, Li-Ling CHANG
-
Publication number: 20220198039Abstract: A data protection method is provided. The data protection method includes the following. A first image is obtained; at least one first object image in the first image is identified; the at least one first object image is analyzed to capture multiple first characteristic values of multiple characteristic points of the at least one first object image; and an encryption key is generated according to the first characteristic values.Type: ApplicationFiled: March 2, 2021Publication date: June 23, 2022Applicant: Wistron CorporationInventor: Yi Fen Chen
-
Patent number: 9043587Abstract: An endpoint computer in an enterprise network is configured to detect computer security threat events, such as presence of a computer virus. Upon detection of a threat event, the endpoint computer generates computer security threat data for the threat event. The threat data may include user identifiable data that can be used to identify a user in the enterprise network. The endpoint computer encrypts the user identifiable data prior to sending the threat data to a smart protection network or to an enterprise server where threat data from various enterprise networks are collected for analysis. The endpoint computer may also encrypt an identifier for the threat data and provide the encrypted identifier to the smart protection network and to an enterprise server in the enterprise network. The enterprise server may use the encrypted identifier to retrieve the threat data from the smart protection network to generate user-specific reports.Type: GrantFiled: July 5, 2012Date of Patent: May 26, 2015Assignee: Trend Micro IncorporatedInventors: Yi-Fen Chen, Shuosen Robert Liu
-
Patent number: 8661434Abstract: A machine in the form of a computer is configured to run virtual machines. A virtual machine migrated from another computer is run in the computer. A security profile of the migrated virtual machine in the computer indicates a configuration setting of another network component in another computer network. A network profile in the computer indicates a configuration setting of a network component in the current computer network. The security profile of the migrated virtual machine is automatically updated to reflect the configuration setting of the network component in the current computer network to provide computer security function in the current computer network.Type: GrantFiled: August 5, 2009Date of Patent: February 25, 2014Assignee: Trend Micro IncorporatedInventors: Yung-Chang Liang, Yi-Fen Chen
-
Patent number: 8656488Abstract: In one embodiment, a network security appliance includes a logic circuit, a network processing unit, and a general purpose processor to protect a computer network from malicious codes, unauthorized data packets, and other network security threats. The logic circuit may include one or more programmable logic devices configured to scan incoming data packets at different layers of a multi-layer protocol, such as the OSI-seven layer model. The network processing unit may work in conjunction with the logic circuit to perform protocol parsing, to form higher layer data units from the data packets, and other network communications-related tasks. The general purpose processor may execute software for performing functions not available from the logic circuit or the network processing unit. For example, the general purpose processor may remove malicious code from infected data or perform malicious code scanning on data when the logic circuit is not configured to do so.Type: GrantFiled: March 1, 2006Date of Patent: February 18, 2014Assignee: Trend Micro IncorporatedInventors: Yung-Chang Liang, Said Kaki, Yi-Fen Chen
-
Patent number: 8458797Abstract: In one embodiment, an antivirus mechanism (e.g., antivirus program) in a computer initiates shielding procedures in response to a triggering event indicative of a presence of a virus in the computer, the virus being of a type not recognized by the antivirus program. The shielding procedures advantageously protect important components of the computer while the antivirus program does not have the requisite antidote to directly deal with the virus.Type: GrantFiled: March 25, 2004Date of Patent: June 4, 2013Assignee: Trend Micro IncorporatedInventors: Kai Yu, Chih-Ming Chen, Yi-Fen Chen
-
Patent number: 8359651Abstract: A web threat protection system may receive candidate uniform resource locators (URLs) from several URL sources. The candidate URLs may be received in a submission database. At least a portion of the candidate URLs is selected for further investigation by sending crawlers to retrieve objects from the selected URLs. The retrieved objects may be analyzed to determine whether they are malicious or good (i.e., not malicious). The result of the analysis may be used to build a security states database that includes security information of the selected URLs. Good URLs may be included in a safe URL sphere, which may be used to navigate to good websites on the Internet.Type: GrantFiled: May 15, 2008Date of Patent: January 22, 2013Assignee: Trend Micro IncorporatedInventors: Handong Wu, Alendry Ivan Macalintal, Andrew Kyle Purtell, Andrew Lee, Chenghuai Lu, Feike Hayo Hacquebord, Yi-Fen Chen, Raimund Alexander Genes
-
Patent number: 8291498Abstract: A network level virus monitoring system capable of monitoring a flow of network traffic in any of a number of inspection modes depending upon the particular needs of a system administrator. The system includes a network virus sensor self registration module coupled to a network virus/worm sensor arranged to automatically self register the associated network virus/worm sensor. The monitoring provides an early warning of a virus attack thereby facilitating quarantine procedures directed at containing a virus outbreak. By providing such an early warning, the network virus monitor reduces the number of computers ultimately affected by the virus attack resulting in a concomitant reduction in both the cost of repair to the system and the amount of downtime. In this way, the inventive network virus monitor provides a great improvement in system uptime and reduction in system losses.Type: GrantFiled: June 16, 2009Date of Patent: October 16, 2012Assignee: Trend Micro IncorporatedInventors: Yung Chang Liang, Yi Fen Chen
-
Patent number: 8239668Abstract: An endpoint computer in an enterprise network is configured to detect computer security threat events, such as presence of a computer virus. Upon detection of a threat event, the endpoint computer generates computer security threat data for the threat event. The threat data may include user identifiable data that can be used to identify a user in the enterprise network. The endpoint computer encrypts the user identifiable data prior to sending the threat data to a smart protection network or to an enterprise server where threat data from various enterprise networks are collected for analysis. The endpoint computer may also encrypt an identifier for the threat data and provide the encrypted identifier to the smart protection network and to an enterprise server in the enterprise network. The enterprise server may use the encrypted identifier to retrieve the threat data from the smart protection network to generate user-specific reports.Type: GrantFiled: April 15, 2009Date of Patent: August 7, 2012Assignee: Trend Micro IncorporatedInventors: Yi-Fen Chen, Shuosen Robert Liu
-
Publication number: 20100048120Abstract: An adjustable air vent device for a computer housing includes a frame and a plurality of slats. The frame extends through an opening formed in the computer housing, and defines an air passage communicating an interior and an exterior of the computer housing. Each of the slats has two opposite lateral edges that are connected pivotally to an inner side of the frame. Due to the pivotal connection of the slats to the frame, direction of flow of air out of the air passage can be changed by adjusting angles of the slats relative to the frame.Type: ApplicationFiled: June 24, 2009Publication date: February 25, 2010Applicant: Wistron CorporationInventors: Cheng-Hsiang Chuang, Liang Yu, Chia-Ching Lee, Yi-Fen Chen
-
Patent number: 7565550Abstract: A network level virus monitoring system capable of monitoring a flow of network traffic in any of a number of inspection modes depending upon the particular needs of a system administrator. The system includes a network virus sensor self registration module coupled to a network virus/worm sensor arranged to automatically self register the associated network virus/worm sensor. The monitoring provides an early warning of a virus attack thereby facilitating quarantine procedures directed at containing a virus outbreak. By providing such an early warning, the network virus monitor reduces the number of computers ultimately affected by the virus attack resulting in a concomitant reduction in both the cost of repair to the system and the amount of downtime. In this way, the inventive network virus monitor provides a great improvement in system uptime and reduction in system losses.Type: GrantFiled: October 9, 2003Date of Patent: July 21, 2009Assignee: Trend Micro, Inc.Inventors: Yung Chang Liang, Yi Fen Chen
-
Patent number: 7533415Abstract: In one embodiment, a technique for controlling traffic in a computer network includes modifying a packet generated by a first computer. The packet may be intended for a second computer, but is modified to be redirected to a third computer. The packet may be processed in the third computer prior to being forwarded from the third computer to the second computer. The packet may be scanned for viruses at the third computer, for example. Among other advantages, the technique allows for scanning of early generated packets, redirection of selected packets, and routing of packets from a computer in general.Type: GrantFiled: April 21, 2004Date of Patent: May 12, 2009Assignee: Trend Micro IncorporatedInventors: Yi-Fen Chen, Yung-Chang Liang, En-Yi Liao
-
Patent number: 7523493Abstract: A network level virus monitoring system capable of monitoring a flow of network traffic in any of a number of inspection modes depending upon the particular needs of a system administrator. The monitoring provides an early warning of a virus attack thereby facilitating quarantine procedures directed at containing a virus outbreak. By providing such an early warning, the network virus monitor reduces the number of computers ultimately affected by the virus attack resulting in a concomitant reduction in both the cost of repair to the system and the amount of downtime. In this way, the inventive network virus monitor provides a great improvement in system uptime and reduction in system losses.Type: GrantFiled: October 9, 2003Date of Patent: April 21, 2009Assignee: Trend Micro IncorporatedInventors: Yung Chang Liang, Yi Fen Chen
-
Patent number: 7386888Abstract: In a distributed network having a number of server computers and associated client devices, method of isolating infected client devices from uninfected client devices is described. The method is carried out by correlating network related virus infection information, determining if a virus outbreak has occurred based on the correlated information, isolating infected client devices from uninfected client devices when the virus outbreak is confirmed, monitoring all data packets in the network for the virus, identifying a packet type associated with the virus, and blocking only the identified packet type.Type: GrantFiled: October 9, 2003Date of Patent: June 10, 2008Assignee: Trend Micro, Inc.Inventors: Yung Chang Liang, Yi Fen Chen
-
Publication number: 20060206936Abstract: In one embodiment, a network security appliance includes a logic circuit, a network processing unit, and a general purpose processor to protect a computer network from malicious codes, unauthorized data packets, and other network security threats. The logic circuit may include one or more programmable logic devices configured to scan incoming data packets at different layers of a multi-layer protocol, such as the OSI-seven layer model. The network processing unit may work in conjunction with the logic circuit to perform protocol parsing, to form higher layer data units from the data packets, and other network communications-related tasks. The general purpose processor may execute software for performing functions not available from the logic circuit or the network processing unit. For example, the general purpose processor may remove malicious code from infected data or perform malicious code scanning on data when the logic circuit is not configured to do so.Type: ApplicationFiled: March 1, 2006Publication date: September 14, 2006Inventors: Yung-Chang Liang, Said Kaki, Yi-Fen Chen
-
Publication number: 20050238005Abstract: In one embodiment, a technique for controlling traffic in a computer network includes modifying a packet generated by a first computer. The packet may be intended for a second computer, but is modified to be redirected to a third computer. The packet may be processed in the third computer prior to being forwarded from the third computer to the second computer. The packet may be scanned for viruses at the third computer, for example. Among other advantages, the technique allows for scanning of early generated packets, redirection of selected packets, and routing of packets from a computer in general.Type: ApplicationFiled: April 21, 2004Publication date: October 27, 2005Inventors: Yi-Fen Chen, Yung-Chang Liang, En-Yi Liao