Patent application number | Description | Published |
20100319031 | HOT VIDEO PREDICTION SYSTEM BASED ON USER INTERESTS SOCIAL NETWORK - A hot video prediction system is provided. A video comments database stores video comments submitted by a plurality of users. A user social network constructor establishes a user social network according to the video comments. When new comments of a new video are received, a hot video predictor uses the user social network to determine a similar theme between the new video and hot videos that have been hot for a period of time, and predicts whether the new video will become popular accordingly. A social network adaptor checks the prediction, and modifies the user social network accordingly. | 12-16-2010 |
20110004936 | BOTNET EARLY DETECTION USING HYBRID HIDDEN MARKOV MODEL ALGORITHM - A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state. | 01-06-2011 |
20110185420 | DETECTION METHODS AND DEVICES OF WEB MIMICRY ATTACKS - A web mimicry attack detection device is provided, including: a first token sequence collector receiving a hypertext transfer protocol request and extracting string content of the hypertext transfer protocol request according to a token collection method to generate a token sequence corresponding to the hypertext transfer protocol request, wherein the token sequence comprises a plurality of the tokens; and a mimicry attack detector generating a label and a confidence score corresponding individually to the tokens according to the tokens and a conditional random field probability model, summing the confidence score individually corresponding to the tokens in the token sequence by a summary rule to generate a summary confidence score, and determining whether the hypertext transfer protocol request is an attack according to the summary confidence score and the label individually corresponding to the tokens. | 07-28-2011 |
20110185425 | NETWORK ATTACK DETECTION DEVICES AND METHODS - A network attack detection device is provided, including a spatial coordinate database for storing spatial coordinate data; a standard time zone database for storing standard time zone data; a domain name system packet collector for collecting a domain name system packet; a spatial snapshot feature extractor for extracting internet protocol address corresponding to the domain name system packet according to the domain name system packet, and generating spatial feature data corresponding to the internet protocol address according to the internet protocol address, the spatial coordinate data and the standard time zone data; and an attack detector for determining whether the domain name system packet is an attack according to the spatial feature data and a spatial snapshot detection model, and when determining that the domain name system packet is an attack, sending a warning to indicate the attack. | 07-28-2011 |
20120159629 | METHOD AND SYSTEM FOR DETECTING MALICIOUS SCRIPT - A method for detecting a malicious script is provided. A plurality of distribution eigenvalues are generated according to a plurality of function names of a web script. After the distribution eigenvalues are inputted to a hidden markov model (HMM), probabilities respectively corresponding to a normal state and an abnormal state are calculated. Accordingly, whether the web script is malicious or not can be determined according to the probabilities. Even an attacker attempts to change the event order, insert a new event or replace an event with a new one to avoid detection, the method can still recognize the intent hidden in the web script by using the HMM for event modeling. As such, the method may be applied in detection of obfuscated malicious scripts. | 06-21-2012 |
20130055400 | METHOD FOR GENERATING CROSS-SITE SCRIPTING ATTACK - A method for generating a cross-site scripting attack is provided. An attack string sample is analyzed for obtaining a token sequence. A string word corresponding to each token is used to replace the token for generating a cross-site scripting attack string. Accordingly, a large number of cross-site scripting attacks are generated automatically, so as to execute a penetration test for a website. | 02-28-2013 |
20130268675 | Method and System for Tracing Domain Names and Computer Readable Storage Medium Storing the Method - A method for tracing at least one domain name is disclosed. In the method, several DNS resource records of candidate domain names are queried from at least one DNS name server. The candidate domain names are domain names that need to be traced. Internet Protocol (IP) addresses associated with the candidate domain names are retrieved from the DNS resource records of the candidate domain names. At least one external resource server is connected to retrieve corresponding registration information of the respective IP addresses of the candidate domain names. A tracing weight of each of the candidate domain names is calculated according to the DNS resource records, the IP addresses and the corresponding registration information of the candidate domain names. The candidate domain names are traced according to their respective tracing weights. A system for tracing at least one domain name is also disclosed. | 10-10-2013 |
20140181973 | METHOD AND SYSTEM FOR DETECTING MALICIOUS APPLICATION - A malicious applications detection method is provided. The method includes: extracting a plurality of static features from a manifest file and a de-compiled code respectively obtained from a plurality of training malicious applications (APK files) and a plurality of training benign applications (APK files); generating at least one malicious application group using a clustering algorithm and generating at least one benign application group; generating application detecting models respectively representing the malicious and benign application groups based on static features of the training malicious and benign applications in each malicious application group and each benign application group; extracting target static features from a target manifest file and a target de-compiled code of a target application; using a classification algorithm, the target static features, and the application detecting models to determine whether the target application belongs to the malicious application group; and generating a warning message when a determination result is positive. | 06-26-2014 |
20150319187 | METHOD, ELECTRONIC DEVICE, AND USER INTERFACE FOR ON-DEMAND DETECTING MALWARE - A method, an electronic device, and a user interface for on-demand detecting a malware are provided and adapted for estimating whether an application has vulnerabilities or malicious behaviors. The method includes the following steps. Firstly, evaluating a risk level and a test time of the application which has vulnerabilities or malicious behaviors. Next, detecting the application by selection of user to estimate the risk level of the application which has vulnerabilities or malicious behaviors and then correspondingly generating a detection result. Therefore, the method, the electronic device, and the user interface for on-demand detecting the malware can detect the risk level of the application which has vulnerabilities or malicious behaviors before getting virus pattern of the variant or new malware. | 11-05-2015 |
Patent application number | Description | Published |
20110202894 | Method and Apparatus for Versatile Controllability and Observability in Prototype System - Methods and systems for testing a prototype, the method including receiving, at a first interface component, a configuration parameter associated with a configured image representative of at least a portion of a user design and an associated verification module. The method further includes, sending, using the first interface component, the configured image to a device. A second interface component may be configured to send timing and control information to the verification module based on at least one of the configuration image and runtime control information received from the first interface component. In response to receiving the timing and control information from the second interface component, the verification module may control the device and/or monitor the device state of at least a portion of the user design. | 08-18-2011 |
20110251836 | CIRCUIT EMULATION SYSTEMS AND METHODS - An apparatus for circuit emulation may include a first circuit board, one or more circuit emulation resource on the first circuit board, a first interconnection interface on the first circuit board, and a second interconnection interface on the first circuit board. The first circuit board may include conductive wiring paths. The circuit emulation resource is on the first circuit board and coupled with a portion of the conductive wiring paths, with each circuit emulation resource being configured to emulate a portion of an electronic circuit by receiving input signals and producing output signals in response to the input signals. The first interconnection interface is on the first circuit board and coupled with at least a first portion of the circuit emulation resource, The first interconnection interface may be configured to couple with an interconnection interface of a second circuit board having a second group of conductive wiring paths and having a second group of circuit emulation resources. The second interconnection interface is on the first circuit board and coupled with at least a second portion of the at least one circuit emulation resource. The second interconnection interface may be configured to couple with an interconnection interface of a third circuit board having a third group of conductive wiring paths and having a third group of circuit emulation resources. | 10-13-2011 |
20130035925 | METHOD AND APPARATUS FOR VERSATILE CONTROLLABILITY AND OBSERVABILITY IN PROTOTYPE SYSTEM - A method for emulating a circuit design includes receiving, at an emulation interface, signal values associated with probed signals from a verification module of a custom prototype board which can be described by at least one board description file and can comprise at least one field programmable gate array for emulating the circuit design. The method can also include processing, the probed signal values associated with a portion of the circuit design being emulated, the emulation interface being capable of being configured to provide timing and control information to at least the verification module, and can comprise a controller and a memory device, with the controller being capable of being configured to receive the probed signal values. The method can further include storing the processed information and transmitting it to the host workstation. | 02-07-2013 |
Patent application number | Description | Published |
20090002239 | MICRO-STRIP ANTENNA WITH L-SHAPED BAND-STOP FILTER - A micro-strip antenna includes an L-shaped coupler, a set of micro-strip antennas, and an L-shaped band-stop filter. The set of micro-strip antennas includes at least one rectangular micro-strip antenna unit and a micro-strip line. The rectangular micro-strip antenna unit is coupled to the micro-strip line. The micro-strip line is coupled to the first end of the coupler. The band-stop filter is disposed along a corner of the rectangular micro-strip antenna unit, and is disposed between the antenna unit and the coupler without being physically connected to the antenna unit and the coupler. The width, length, and position of the L-shaped band-stop filter can be determined for the specific band-stop frequency and to optimize its coupling extent with the L-shaped coupler. | 01-01-2009 |
20090303693 | Wireless Power Transmitting Apparatus - A wireless power transmitting apparatus for remotely transmitting energy is implemented with a closed metal housing and a plurality of conductive plates disposed within the closed metal housing. With the aid of a high impedance between the closed metal housing and the conductive plates, a surface having the high impedance is formed on both the closed metal housing and the conductive plates for constraining electromagnetic power within the closed metal housing from dissipating and being consumed. The wireless power transmitting apparatus is not merely able to effectively and uniformly restrict electromagnetic field energy to the closed metal housing with the aid of the high impedance, but is also be able to raise a power transmitting efficiency between a power emitting device and a power receiving device. | 12-10-2009 |
20100238084 | Dual-band Planar Micro-Strip Antenna - To meet the requirements including dual-band, a high gain, and a broadside radiation formation, a dual band planar micro-strip antenna utilizing antenna array is provided. One array element includes a rectangle-shaped micro-strip antenna and an arrow-shaped micro-strip antenna. A first resonant frequency is determined by a length of the rectangle-shaped micro-strip antenna. Slots are dug for satisfying a second resonance frequency. Curved surfaces of the arrow-shaped micro-strip antenna designed according to an ellipse equation so that a frequency resonance is reached under both the first resonant frequency and a second resonant frequency, and a broadside radiation formation is thus generated. A T-shaped jointer distributes power between antenna elements according to the output impedances of the antenna elements. An L-shaped band-stop filter located on the T-shaped jointer is utilized to suppress frequency resonance resulted from multiples of the first resonant frequency. | 09-23-2010 |
20110025576 | MULTI-BAND MICROSTRIP MEANDER-LINE ANTENNA - A multi-band microstrip meander-line antenna includes a substrate, two meander-shaped conductors, and two feed lines. The first meander-shaped conductor is disposed on the substrate in a first reciprocating bend manner for providing a resonant frequency band corresponding to a first operating frequency. The second meander-shaped conductor is disposed on the substrate in a second reciprocating bend manner for providing a resonant frequency band corresponding to a second operating frequency. The first feed line includes the first end electrically connected to a first feed point of the antenna and the second end electrically connected to the end of the first meander-shaped conductor. The second feed line includes the first end electrically connected to the second feed point of the antenna and the second end electrically connected to the end of the second meander-shaped conductor. | 02-03-2011 |
20110095958 | Antenna Array Method for Enhancing Signal Transmission - In an antenna array, a metal layer is used for covering a block mapped by micro-strips, which are disposed on an obverse side of a base plate, on a reverse side of the base plate, so as to concentrating energy of radio signals emitted from radiator sets on a predetermined direction. The base plate and elements loaded by the base plate are fabricated according to designed specifications, so as to enhance the concentration of energy of the radio signals on the predetermined direction. | 04-28-2011 |
20120086522 | BULK ACOUSTIC WAVE RESONATOR AND BULK ACOUSTIC WAVE FILTER AND METHOD OF FABRICATING BULK ACOUSTIC WAVE RESONATOR - A bulk acoustic wave (BAW) resonator includes a substrate, and two electrodes stacked on the substrate, and at least one piezoelectric layer interposed between the two electrodes. The two electrodes and the piezoelectric layer are at least partially overlapped with each other in a vertical projection direction, and one of the two electrodes has a plurality of openings. | 04-12-2012 |
20140286062 | RECTIFYING MODULE, ELECTRICAL APPARATUS THEREOF, AND RECTIFYING METHOD THEREOF - An exemplary embodiment of the present disclosure illustrates a rectifying module, which is operable for rectifying an alternating current (AC) signal into a direct current (DC) signal. The rectifying module includes a transmission line, at least one rectifying unit, and at least one pattern. The transmission line is configured for receiving and transmitting the alternating current signal. The rectifying unit is arranged neighboring to the transmission line for operatively coupling with the transmission line to receive a part of the alternating current signal and rectifies the alternating current signal into the DC signal. The pattern is configured to be a hollow grounding structure and the pattern is disposed under the dual-line coupling areas of the rectifying unit neighboring to the transmission line. | 09-25-2014 |
20140302780 | TRANSMISSION INTERFACE DEVICE AND SYSTEM THEREOF - An exemplary embodiment of the present disclosure illustrates a transmission interface device, and the transmission interface device comprises an antenna body. The antenna body comprises at least one electric coupling body and at least one magnetic coupling body at least covering or surrounding portion of the electric coupling body. When the antenna of the electronic device is close to the antenna body, the antenna body and the antenna of the electronic device selectively generate an electric coupling effect, a magnetic coupling effect, or a strong electromagnetic coupling effect, such that the transmission interface device can wirelessly charge the electronic device, or alternatively the transmission interface device and the electronic device can perform a power or data transmission. | 10-09-2014 |