advertisement

Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document

50 %
50 %
advertisement
Information about Taiwan’s Information Security Policy Enhancement: An Analysis of Patent...

Published on February 4, 2008

Author: sosorry

Source: slideshare.net

advertisement

Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document ICCMSE 2007@Corfu, Greece Nai-Wen Hsu ; Jr-Shiuan Liang; Yi-Chang Chen [email_address] ; [email_address] ; [email_address]

[email_address] Provide the strategies for Taiwan’s government in drawing up science and technology policies.

Outline Introduction Why patents? Methods Patent indicator analysis Patent documents analysis Results Potential strategies Conclusions

Introduction

Why patents?

Methods

Patent indicator analysis

Patent documents analysis

Results

Potential strategies

Conclusions

The Method of Policy Formulation in Taiwan Delphi Focus groups Discussion forums

Delphi

Focus groups

Discussion forums

What Is the Problem? One of information security policy goal in Taiwan : Consolidation of national information & communication security Gap : What? When? Who? Action plan...

One of information security policy goal in Taiwan :

Consolidation of national information & communication security

Action plan...

Our Approach Patent indicators analysis Provide comprehensive point of view Patent document analysis Discover the specific trend

Patent indicators analysis

Provide comprehensive point of view

Patent document analysis

Discover the specific trend

Why Patents? Patent statistics is used to be economic indicators Griliches Z., 1990. Patent Statistics as Economic Indicators: A Survey To identify advanced technological areas and leading country (who) Karki M. M. S., and Road K. S. K., 1997. Patent Citation Analysis: A Policy Analysis Tool H. Ernst, 2003, Patent Information for Strategic Technology Management Discover the trend by analyzing patent document (what) Lent B., Agrawal R., and Srikant R.,1997. Discovering Trends in Text Databases Sheremetyeva S., 2003, Natural Language Analysis of Patent Claims

Patent statistics is used to be economic indicators

Griliches Z., 1990. Patent Statistics as Economic Indicators: A Survey

To identify advanced technological areas and leading country (who)

Karki M. M. S., and Road K. S. K., 1997. Patent Citation Analysis: A Policy Analysis Tool

H. Ernst, 2003, Patent Information for Strategic Technology Management

Discover the trend by analyzing patent document (what)

Lent B., Agrawal R., and Srikant R.,1997. Discovering Trends in Text Databases

Sheremetyeva S., 2003, Natural Language Analysis of Patent Claims

USPTO United States Patent and Trademark Office 6 million entries, 70 countries, open access database, well-structured classification, fixed format

United States Patent and Trademark Office

6 million entries,

70 countries,

open access database,

well-structured classification,

fixed format

Work Flow

USPTO UPC/726 to Taiwan’s IS Categorizations Ref: RDEC, 2005. Information Security Regulation Development Blueprint (Draft) 117 11, 12, 13 Firewall FW 232 14, 15 Virtual Private Network VPN 365 22, 23 Intrusion Prevention Systems IPS 299 22, 25 Vulnerability Management VM 354 22, 24 Malware Prevention MP 752 21, 26, 27, 28, 29, 30 Electronic Authentication Security Access Control Method AC 1461 02, 03, 04, 05, 06, 07, 08, 09, 10, 21 Electronic Authentication Security Network Access Control NA 783 02, 16, 17, 18, 19, 20, 21 Electronic Authentication Security System Access Control SA Quant. UPC/726 IS categorizations in Taiwan Abbrev.

Electronic Authentication Security

Access Control Method

Electronic Authentication Security

Network Access Control

Electronic Authentication Security

System Access Control

Step 1: Patent Indicators Analysis

Selected Countries US CA GB FR IL DE FI TW JP IE

Patent Indicators Number of Patent Current Impact Index, CII Number of citation -> Imply the capability of technology Technology Cycle Time, TCT Average year cited -> Measure the speed of innovation Science Linkage Index, SLI Comparison of scientific research to patent -> Evaluate the utilization of scientific research Ref: Narin F. and Hamilton K. S., 1996. Bibliometric performance measures

Number of Patent

Current Impact Index, CII

Number of citation -> Imply the capability of technology

Technology Cycle Time, TCT

Average year cited -> Measure the speed of innovation

Science Linkage Index, SLI

Comparison of scientific research to patent -> Evaluate the utilization of scientific research

Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country

Fig. 1 Patent issued by year

Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country

Step 2: Patent Document Analysis

Linguistic Preprocessing Separate every patent into tokens Noun, Verb, Adjective, or Adverb is already pre-defined in the WordNet dictionary file Ref: WordNet 3.0 Reference Manual, 2006 Feldman R. et al, 1998. Text Mining at the Term Level

Separate every patent into tokens

Noun, Verb, Adjective, or Adverb is already pre-defined in the WordNet dictionary file

Candidate Phrase Generation “ Noun Noun” or “Adjective Noun” are chosen as candidate phrase Ref: NooJ manual, 2006

“ Noun Noun” or “Adjective Noun” are chosen as candidate phrase

Association Rules Analysis Find the association rules in sentences phrase X -> phrase Y , support=10%, confidence=1% Discover the trend by time period upward, fair, downward Ref: Lent B., Agrawal R., and Srikant R.,1997. Discovering Trends in Text Databases

Find the association rules in sentences

phrase X -> phrase Y , support=10%, confidence=1%

Discover the trend by time period

upward, fair, downward

Example The system of claim 1, wherein each of the plurality of interrogation engines comprises intrusion detection, virus detection, spam detection or policy violation detection.

The system of claim 1, wherein each of the plurality of interrogation engines comprises intrusion detection, virus detection, spam detection or policy violation detection.

Linguistic Preprocessing Noun system, claim, plurality, interrogation, engines, intrusion, detection, virus, detection, spam, detection, policy, violation, detection Verb comprises Adjective each

Noun

system, claim, plurality, interrogation, engines, intrusion, detection, virus, detection, spam, detection, policy, violation, detection

Verb

comprises

Adjective

each

Candidate Phrase Generation 1 interrogation engines 1 intrusion detection 1 virus detection 1 spam detection 1 policy violation 1 violation detection Frequency Phrases

Association Rules Analysis Association Rules virus detection -> spam detection Trend: upward 2 2004 1 2003 0 1999 0 2000 1 2001 1 2002 2 2005 3 2006 Frequency Year

Association Rules

virus detection -> spam detection

Trend: upward

Results of Step 2

Potential Strategies Taiwan promotes in e-readiness but lacks in systems/programs security: Requires secure programming technique, correct and unified programming trait Requires assessment scan on application systems codes Long-Term: To solve the fundamental problem MP and IPS / MP and VM are similar: Taiwan should integrate with others from Malware Prevention Cover the insufficiency of Taiwan: Israel and United States are the top priority cooperation partners Israel performs well in Instruction Prevention System and Vulnerability Management Middle-Term: To implement the defense-in-depth strategy Information security trend: From network access layer security to application layer security In Malware Prevention: Prevent executable instructions attack from web browser Prevent virus detection prevent the virus from spam or handheld computer Short-Term: To fit the trend

Taiwan promotes in e-readiness but lacks in systems/programs security:

Requires secure programming technique, correct and unified programming trait

Requires assessment scan on application systems codes

MP and IPS / MP and VM are similar:

Taiwan should integrate with others from Malware Prevention

Cover the insufficiency of Taiwan:

Israel and United States are the top priority cooperation partners

Israel performs well in Instruction Prevention System and Vulnerability Management

Information security trend:

From network access layer security to application layer security

In Malware Prevention:

Prevent executable instructions attack from web browser

Prevent virus detection prevent the virus from spam or handheld computer

Conclusion Potential strategies could be proposed via our approach Some better mining algorithms may be adopted in the future

Potential strategies could be proposed via our approach

Some better mining algorithms may be adopted in the future

Thank you for your attention.

Add a comment

Related pages

Taiwan's Information Security Policy Enhancement: an ...

Taiwan's Information Security Policy Enhancement: an Analysis of Patent Indicators and Patent ... Abstract Information security policy in Taiwan stems ...
Read more

Nowcasting Patent Indicators - ResearchGate

Nowcasting Patent Indicators / H. Dernis. ... Taiwan's Information Security Policy Enhancement: an Analysis of Patent Indicators and Patent Documents.
Read more

scitation.aip.org

... Yi‐Chang", title = "Taiwan's Information Security Policy Enhancement: an Analysis of Patent Indicators and Patent Documents" ...
Read more

scitation.aip.org

... Yi‐Chang YR 2007 T1 Taiwan's Information Security Policy Enhancement: an Analysis of Patent Indicators and Patent Documents JF AIP Conference ...
Read more

FOREIGN PATENT DOCUMENTS - ResearchGate - Share and ...

Publication » FOREIGN PATENT DOCUMENTS. ... Taiwan's Information Security Policy Enhancement: an Analysis of Patent Indicators and Patent Documents.
Read more

Patents - Patent US5446895 - Measurement analysis software ...

A measurement analysis software method ... the enhancement project's performance indicators, ... to update enhancement project information to ...
Read more

Patent Quality Assurance | USPTO - United States Patent ...

... and Information Security; ... and meaningful indicators of patent examination quality are ... quality policy, quality objectives, audits, analysis ...
Read more

Technology life cycle analysis method based on patent ...

... we have compiled candidate patent indicators from ... But the patent information in the early ... A comparative analysis of Taiwan's CRT and ...
Read more

25045 Security Cover PDF - The Official Web Site for The ...

The need for and type of security enhancements will be ... Information Security policies, ... The Energy Information Sharing and Analysis Center is ...
Read more