Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document     ICCMSE 2007@Cor...
[email_address] Provide the strategies for Taiwan’s government in drawing up science and technology policies.
Outline <ul><li>Introduction </li></ul><ul><li>Why patents? </li></ul><ul><li>Methods </li></ul><ul><ul><li>Patent indicat...
The Method of Policy Formulation in Taiwan <ul><li>Delphi </li></ul><ul><li>Focus groups </li></ul><ul><li>Discussion foru...
What Is the Problem? <ul><li>One of information security policy goal in Taiwan : </li></ul><ul><ul><li>Consolidation of na...
Our Approach <ul><li>Patent indicators analysis </li></ul><ul><ul><li>Provide comprehensive point of view </li></ul></ul><...
Why Patents? <ul><li>Patent statistics is used to be economic indicators </li></ul><ul><ul><li>Griliches Z., 1990. Patent ...
USPTO <ul><li>United States Patent and Trademark Office </li></ul><ul><ul><li>6 million entries, </li></ul></ul><ul><ul><l...
Work Flow
USPTO UPC/726 to Taiwan’s IS Categorizations  Ref: RDEC, 2005. Information Security Regulation Development Blueprint (Draf...
Step 1:  Patent Indicators Analysis
Selected Countries US CA GB FR IL DE FI TW JP IE
Patent Indicators <ul><li>Number of Patent </li></ul><ul><li>Current Impact Index, CII  </li></ul><ul><ul><li>Number of ci...
Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of categor...
Fig. 1 Patent issued by year
Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of categor...
Step 2:   Patent Document Analysis
Linguistic Preprocessing <ul><li>Separate every patent into tokens </li></ul><ul><li>Noun, Verb, Adjective, or Adverb is a...
Candidate Phrase Generation <ul><li>“ Noun Noun” or “Adjective Noun” are chosen as candidate phrase  </li></ul>Ref: NooJ m...
Association Rules Analysis <ul><li>Find the association rules in sentences </li></ul><ul><ul><li>phrase  X   -> phrase  Y ...
Example <ul><li>The system of claim 1, wherein each of the plurality of interrogation engines comprises intrusion detectio...
Linguistic Preprocessing <ul><li>Noun </li></ul><ul><ul><li>system, claim, plurality, interrogation, engines, intrusion, d...
Candidate Phrase Generation 1 interrogation engines 1 intrusion detection 1 virus detection 1 spam detection 1 policy viol...
Association Rules Analysis <ul><li>Association Rules  </li></ul><ul><ul><li>virus detection -> spam detection </li></ul></...
Results of Step 2
Potential Strategies <ul><li>Taiwan promotes in e-readiness but lacks in systems/programs security: </li></ul><ul><ul><li>...
Conclusion  <ul><li>Potential strategies could be proposed via our approach </li></ul><ul><li>Some better mining algorithm...
Thank you for your attention.
Upcoming SlideShare
Loading in …5
×

Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document

1,163 views
1,060 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,163
On SlideShare
0
From Embeds
0
Number of Embeds
14
Actions
Shares
0
Downloads
40
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document

  1. 1. Taiwan’s Information Security Policy Enhancement: An Analysis of Patent Indicators and Patent Document ICCMSE 2007@Corfu, Greece Nai-Wen Hsu ; Jr-Shiuan Liang; Yi-Chang Chen [email_address] ; [email_address] ; [email_address]
  2. 2. [email_address] Provide the strategies for Taiwan’s government in drawing up science and technology policies.
  3. 3. Outline <ul><li>Introduction </li></ul><ul><li>Why patents? </li></ul><ul><li>Methods </li></ul><ul><ul><li>Patent indicator analysis </li></ul></ul><ul><ul><li>Patent documents analysis </li></ul></ul><ul><li>Results </li></ul><ul><li>Potential strategies </li></ul><ul><li>Conclusions </li></ul>
  4. 4. The Method of Policy Formulation in Taiwan <ul><li>Delphi </li></ul><ul><li>Focus groups </li></ul><ul><li>Discussion forums </li></ul>
  5. 5. What Is the Problem? <ul><li>One of information security policy goal in Taiwan : </li></ul><ul><ul><li>Consolidation of national information & communication security </li></ul></ul>Gap : What? When? Who? <ul><ul><li>Action plan... </li></ul></ul>
  6. 6. Our Approach <ul><li>Patent indicators analysis </li></ul><ul><ul><li>Provide comprehensive point of view </li></ul></ul><ul><li>Patent document analysis </li></ul><ul><ul><li>Discover the specific trend </li></ul></ul>
  7. 7. Why Patents? <ul><li>Patent statistics is used to be economic indicators </li></ul><ul><ul><li>Griliches Z., 1990. Patent Statistics as Economic Indicators: A Survey </li></ul></ul><ul><li>To identify advanced technological areas and leading country (who) </li></ul><ul><ul><li>Karki M. M. S., and Road K. S. K., 1997. Patent Citation Analysis: A Policy Analysis Tool </li></ul></ul><ul><ul><li>H. Ernst, 2003, Patent Information for Strategic Technology Management </li></ul></ul><ul><li>Discover the trend by analyzing patent document (what) </li></ul><ul><ul><li>Lent B., Agrawal R., and Srikant R.,1997. Discovering Trends in Text Databases </li></ul></ul><ul><ul><li>Sheremetyeva S., 2003, Natural Language Analysis of Patent Claims </li></ul></ul>
  8. 8. USPTO <ul><li>United States Patent and Trademark Office </li></ul><ul><ul><li>6 million entries, </li></ul></ul><ul><ul><li>70 countries, </li></ul></ul><ul><ul><li>open access database, </li></ul></ul><ul><ul><li>well-structured classification, </li></ul></ul><ul><ul><li>fixed format </li></ul></ul>
  9. 9. Work Flow
  10. 10. USPTO UPC/726 to Taiwan’s IS Categorizations Ref: RDEC, 2005. Information Security Regulation Development Blueprint (Draft) 117 11, 12, 13 Firewall FW 232 14, 15 Virtual Private Network VPN 365 22, 23 Intrusion Prevention Systems IPS 299 22, 25 Vulnerability Management VM 354 22, 24 Malware Prevention MP 752 21, 26, 27, 28, 29, 30 <ul><li>Electronic Authentication Security </li></ul><ul><li>Access Control Method </li></ul>AC 1461 02, 03, 04, 05, 06, 07, 08, 09, 10, 21 <ul><li>Electronic Authentication Security </li></ul><ul><li>Network Access Control </li></ul>NA 783 02, 16, 17, 18, 19, 20, 21 <ul><li>Electronic Authentication Security </li></ul><ul><li>System Access Control </li></ul>SA Quant. UPC/726 IS categorizations in Taiwan Abbrev.
  11. 11. Step 1: Patent Indicators Analysis
  12. 12. Selected Countries US CA GB FR IL DE FI TW JP IE
  13. 13. Patent Indicators <ul><li>Number of Patent </li></ul><ul><li>Current Impact Index, CII </li></ul><ul><ul><li>Number of citation -> Imply the capability of technology </li></ul></ul><ul><li>Technology Cycle Time, TCT </li></ul><ul><ul><li>Average year cited -> Measure the speed of innovation </li></ul></ul><ul><li>Science Linkage Index, SLI </li></ul><ul><ul><li>Comparison of scientific research to patent -> Evaluate the utilization of scientific research </li></ul></ul>Ref: Narin F. and Hamilton K. S., 1996. Bibliometric performance measures
  14. 14. Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country
  15. 15. Fig. 1 Patent issued by year
  16. 16. Results of Step 1 Fig. 1 Patent issued by year Fig. 2 CII of category by country in 2004, 2005, 2006 Fig. 4 SLI of category by country Fig. 3 TCT of category by country
  17. 17. Step 2: Patent Document Analysis
  18. 18. Linguistic Preprocessing <ul><li>Separate every patent into tokens </li></ul><ul><li>Noun, Verb, Adjective, or Adverb is already pre-defined in the WordNet dictionary file </li></ul>Ref: WordNet 3.0 Reference Manual, 2006 Feldman R. et al, 1998. Text Mining at the Term Level
  19. 19. Candidate Phrase Generation <ul><li>“ Noun Noun” or “Adjective Noun” are chosen as candidate phrase </li></ul>Ref: NooJ manual, 2006
  20. 20. Association Rules Analysis <ul><li>Find the association rules in sentences </li></ul><ul><ul><li>phrase X -> phrase Y , support=10%, confidence=1% </li></ul></ul><ul><li>Discover the trend by time period </li></ul><ul><ul><li>upward, fair, downward </li></ul></ul>Ref: Lent B., Agrawal R., and Srikant R.,1997. Discovering Trends in Text Databases
  21. 21. Example <ul><li>The system of claim 1, wherein each of the plurality of interrogation engines comprises intrusion detection, virus detection, spam detection or policy violation detection. </li></ul>
  22. 22. Linguistic Preprocessing <ul><li>Noun </li></ul><ul><ul><li>system, claim, plurality, interrogation, engines, intrusion, detection, virus, detection, spam, detection, policy, violation, detection </li></ul></ul><ul><li>Verb </li></ul><ul><ul><li>comprises </li></ul></ul><ul><li>Adjective </li></ul><ul><ul><li>each </li></ul></ul>
  23. 23. Candidate Phrase Generation 1 interrogation engines 1 intrusion detection 1 virus detection 1 spam detection 1 policy violation 1 violation detection Frequency Phrases
  24. 24. Association Rules Analysis <ul><li>Association Rules </li></ul><ul><ul><li>virus detection -> spam detection </li></ul></ul><ul><li>Trend: upward </li></ul>2 2004 1 2003 0 1999 0 2000 1 2001 1 2002 2 2005 3 2006 Frequency Year
  25. 25. Results of Step 2
  26. 26. Potential Strategies <ul><li>Taiwan promotes in e-readiness but lacks in systems/programs security: </li></ul><ul><ul><li>Requires secure programming technique, correct and unified programming trait </li></ul></ul><ul><ul><li>Requires assessment scan on application systems codes </li></ul></ul>Long-Term: To solve the fundamental problem <ul><li>MP and IPS / MP and VM are similar: </li></ul><ul><ul><li>Taiwan should integrate with others from Malware Prevention </li></ul></ul><ul><li>Cover the insufficiency of Taiwan: </li></ul><ul><ul><li>Israel and United States are the top priority cooperation partners </li></ul></ul><ul><ul><li>Israel performs well in Instruction Prevention System and Vulnerability Management </li></ul></ul>Middle-Term: To implement the defense-in-depth strategy <ul><li>Information security trend: </li></ul><ul><ul><li>From network access layer security to application layer security </li></ul></ul><ul><li>In Malware Prevention: </li></ul><ul><ul><li>Prevent executable instructions attack from web browser </li></ul></ul><ul><ul><li>Prevent virus detection prevent the virus from spam or handheld computer </li></ul></ul>Short-Term: To fit the trend
  27. 27. Conclusion <ul><li>Potential strategies could be proposed via our approach </li></ul><ul><li>Some better mining algorithms may be adopted in the future </li></ul>
  28. 28. Thank you for your attention.

×