Patents by Inventor Yueh-Hsun Lin

Yueh-Hsun Lin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11017094
    Abstract: A method for generating a deserialization vulnerability report of a Java project, includes: determining, by a computing device, if interior knowledge of the Java project is available, and when the interior knowledge of the Java project isn't available, performing a black box analysis to generate the deserialization vulnerability report; and when the interior knowledge of the Java project is available, determining by the computing device if source code of the Java project is accessible, when the source code of the Java project is accessible, performing a white box analysis to generate the deserialization vulnerability report, and when the source code of the Java project isn't accessible, performing a gray box analysis to generate the deserialization vulnerability report.
    Type: Grant
    Filed: January 3, 2018
    Date of Patent: May 25, 2021
    Assignees: Beijing Jingdong Shangke Information Technology Co., Ltd., JD.com American Technologies Corporation
    Inventors: Fengguo Wei, Yueh-Hsun Lin
  • Patent number: 10984052
    Abstract: A method and system for searching encrypted data using wildcard keywords. The method includes: obtaining, by a first computing device, a keyword for data to be encrypted, where the keyword has a fixed length; generating a sequence of primes; determining corresponding one prime from the sequence of primes for each character of the keyword; and defining a product of the corresponding primes of the characters of the keyword as index of the encrypted data, where the index can be searched using a wildcard search keyword.
    Type: Grant
    Filed: November 19, 2018
    Date of Patent: April 20, 2021
    Assignees: Beijing Jingdong Shangke Information Technology Co., Ltd., JD.com American Technologies Corporation
    Inventors: Qiuxiang Dong, Yueh-Hsun Lin, Wei Gao, Jimmy Su
  • Patent number: 10965453
    Abstract: A method and system for encryption and decryption. The system includes a user computing device, a root secret server, and a backend server. The root secret server has a root secret code, and when receiving a fingerprint of the user computing device, calculates a device secret code for that device using the fingerprint. When sensitive data needs to be encrypted, the user computing device calculates a data key for the data based on the device secret code and the data information, and encrypts the data. The backend server retrieves the root secret code from the root secret server, and in response to receiving the encrypted data, retrieves data information and calculates the data key to decrypt the data. Similarly, the backend server can encrypt data and the user computing device can decrypt data. The root secret code, the device code, and the data key form a three level encryption mechanism.
    Type: Grant
    Filed: September 14, 2018
    Date of Patent: March 30, 2021
    Assignees: Beijing Jingdong Shangke Information Technology Co., Ltd., JD.com American Technologies Corporation
    Inventors: Yueh-Hsun Lin, Wei Gao, Jimmy Su
  • Patent number: 10686776
    Abstract: A connected device includes an application processor, a secure element, and a control module. The application processor is configured to receive a control command from an electronic device. The secure element is connected between the application processor and a control module and is configured to authenticate the control command. The control module is configured to receive the control command when the control command is authenticated by the secure element, execute the control command to activate at least one function of the connected device, and transmit a response to the electronic device.
    Type: Grant
    Filed: May 2, 2017
    Date of Patent: June 16, 2020
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Peng Ning, Yueh-Hsun Lin, Stephen E. McLaughlin, Michael C. Grace, Ahmed M. Azab, Rohan Bhutkar, Yong Choi
  • Publication number: 20200159779
    Abstract: A method and system for searching encrypted data using wildcard keywords. The method includes: obtaining, by a first computing device, a keyword for data to be encrypted, where the keyword has a fixed length; generating a sequence of primes; determining corresponding one prime from the sequence of primes for each character of the keyword; and defining a product of the corresponding primes of the characters of the keyword as index of the encrypted data, where the index can be searched using a wildcard search keyword.
    Type: Application
    Filed: November 19, 2018
    Publication date: May 21, 2020
    Inventors: Qiuxiang Dong, Yueh-Hsun Lin, Wei Gao, Jimmy Su
  • Publication number: 20200092090
    Abstract: A method and system for encryption and decryption. The system includes a user computing device, a root secret server, and a backend server. The root secret server has a root secret code, and when receiving a fingerprint of the user computing device, calculates a device secret code for that device using the fingerprint. When sensitive data needs to be encrypted, the user computing device calculates a data key for the data based on the device secret code and the data information, and encrypts the data. The backend server retrieves the root secret code from the root secret server, and in response to receiving the encrypted data, retrieves data information and calculates the data key to decrypt the data. Similarly, the backend server can encrypt data and the user computing device can decrypt data. The root secret code, the device code, and the data key form a three level encryption mechanism.
    Type: Application
    Filed: September 14, 2018
    Publication date: March 19, 2020
    Inventors: Yueh-Hsun Lin, Wei Gao, Jimmy Su
  • Publication number: 20190205543
    Abstract: A method for generating a deserialization vulnerability report of a Java project, includes: determining, by a computing device, if interior knowledge of the Java project is available, and when the interior knowledge of the Java project isn't available, performing a black box analysis to generate the deserialization vulnerability report; and when the interior knowledge of the Java project is available, determining by the computing device if source code of the Java project is accessible, when the source code of the Java project is accessible, performing a white box analysis to generate the deserialization vulnerability report, and when the source code of the Java project isn't accessible, performing a gray box analysis to generate the deserialization vulnerability report.
    Type: Application
    Filed: January 3, 2018
    Publication date: July 4, 2019
    Inventors: Fengguo Wei, Yueh-Hsun Lin
  • Publication number: 20180026963
    Abstract: A connected device includes an application processor, a secure element, and a control module. The application processor is configured to receive a control command from an electronic device. The secure element is connected between the application processor and a control module and is configured to authenticate the control command. The control module is configured to receive the control command when the control command is authenticated by the secure element, execute the control command to activate at least one function of the connected device, and transmit a response to the electronic device.
    Type: Application
    Filed: May 2, 2017
    Publication date: January 25, 2018
    Inventors: Peng Ning, Yueh-Hsun Lin, Stephen E. McLaughlin, Michael C. Grace, Ahmed M. Azab, Rohan Bhutkar, Yong Choi