Patents by Inventor Ching-Hai Tsai

Ching-Hai Tsai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9773109
    Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: September 26, 2017
    Assignee: Acalvio Technologies, Inc.
    Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20170206349
    Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.
    Type: Application
    Filed: January 6, 2017
    Publication date: July 20, 2017
    Applicant: Acalvio Technologies, Inc.
    Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
  • Patent number: 9576145
    Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: February 21, 2017
    Assignee: ACALVIO TECHNOLOGIES, INC.
    Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20150096048
    Abstract: Methods and systems are presented of presenting false and/or decoy content to an intruder operating on a computer system by obfuscating critical files on a computer storage device with data that directs subsequent infiltration and propagation to designated decoy hosts and decoy applications. Method and systems are provided for selectively presenting different contents to different viewers/users of application resource files for the purpose of preventing the valuable content from being read, tampered with, exfiltrated, or used as a means to perform subsequent attacks on network resources.
    Type: Application
    Filed: September 30, 2014
    Publication date: April 2, 2015
    Applicant: Shadow Networks, Inc.
    Inventors: Yadong Zhang, Ching-Hai Tsai, Johnson L. Wu, Craig A. Schultz
  • Publication number: 20130067101
    Abstract: The technology disclosed addresses initiation of peer-to-peer media exchange sessions, with traversal of NAT and firewall devices, in a manner adapted to roaming. In particular, involves preliminary determination of NAT/firewall topology, which reduces latency at initiation, and hole punching technologies to select a routing and traversal strategy that reduce reliance on external media relay devices.
    Type: Application
    Filed: March 5, 2012
    Publication date: March 14, 2013
    Inventors: Richard H. Xu, Chong-Jin Koh, Bryan Ford, Markus Hahn, Gabriel Berryn Levy, Ching-Hai Tsai, Yusuf Saib, Srinivasa Yarrakonda
  • Patent number: 8130760
    Abstract: The technology disclosed addresses initiation of peer-to-peer media exchange sessions, with traversal of NAT and firewall devices, in a manner adapted to roaming. In particular, involves preliminary determination of NAT/firewall topology, which reduces latency at initiation, and hole punching technologies to select a routing and traversal strategy that reduce reliance on external media relay devices.
    Type: Grant
    Filed: April 26, 2010
    Date of Patent: March 6, 2012
    Assignee: Nuvoiz, Inc.
    Inventors: Richard H. Xu, Chong-Jin Koh, Bryan Ford, Markus Hahn, Gabriel Berryn Levy, Ching-Hai Tsai, Yusuf Saib, Srinivasa Yarrakonda
  • Publication number: 20100299743
    Abstract: The technology disclosed addresses initiation of peer-to-peer media exchange sessions, with traversal of NAT and firewall devices, in a manner adapted to roaming. In particular, involves preliminary determination of NAT/firewall topology, which reduces latency at initiation, and hole punching technologies to select a routing and traversal strategy that reduce reliance on external media relay devices.
    Type: Application
    Filed: April 26, 2010
    Publication date: November 25, 2010
    Inventors: Richard H. Xu, Chong-Jin Koh, Bryan Ford, Markus Hahn, Gabriel Berryn Levy, Ching-Hai Tsai, Yusuf Saib, Srinivasa Yarrakonda
  • Patent number: 7706373
    Abstract: The technology disclosed addresses initiation of peer-to-peer media exchange sessions, with traversal of NAT and firewall devices, in a manner adapted to roaming. In particular, involves preliminary determination of NAT/firewall topology, which reduces latency at initiation, and hole punching technologies to select a routing and traversal strategy that reduce reliance on external media relay devices.
    Type: Grant
    Filed: November 1, 2006
    Date of Patent: April 27, 2010
    Assignee: Nuvoiz, Inc.
    Inventors: Richard H. Xu, Chong-Jin Koh, Bryan Ford, Markus Hahn, Gabriel Berryn Levy, Ching-Hai Tsai, Yusuf Saib, Srinivasa Yarrakonda
  • Publication number: 20080148379
    Abstract: The technology disclosed addresses initiation of peer-to-peer media exchange sessions, with traversal of NAT and firewall devices, in a manner adapted to roaming. In particular, involves preliminary determination of NAT/firewall topology, which reduces latency at initiation, and hole punching technologies to select a routing and traversal strategy that reduce reliance on external media relay devices.
    Type: Application
    Filed: November 1, 2006
    Publication date: June 19, 2008
    Inventors: Richard H. Xu, Chong-Jin Koh, Bryan Ford, Markus Hahn, Gabriel Berryn Levy, Ching-Hai Tsai, Yusuf Saib, Srinivasa Yarrakonda
  • Patent number: 6582107
    Abstract: A foldable lampshade has an upper ring and a lower ring. A plurality of ribs is pivotally mounted between the upper ring and the lower ring. Each rib has an upper arm and a lower arm pivotally mounted together by a pin. A notch is defined at an inner side of the lower arm and near an upper end of the lower arm. A pole is formed near a lower end of the upper arm and located in the notch. A resilient member has a first end secured on the upper arm and a second end secured on the lower arm. A shade covers the upper ring, the lower ring and the ribs.
    Type: Grant
    Filed: November 6, 2001
    Date of Patent: June 24, 2003
    Inventor: Ching-Hai Tsai
  • Publication number: 20030086274
    Abstract: A foldable lampshade has an upper ring and a lower ring. A plurality of ribs is pivotally mounted between the upper ring and the lower ring. Each rib has an upper arm and a lower arm pivotally mounted together by a pin. A notch is defined at an inner side of the lower arm and near an upper end of the lower arm. A pole is formed near a lower end of the upper arm and located in the notch. A resilient member has a first end secured on the upper arm and a second end secured on the lower arm. A shade covers the upper ring, the lower ring and the ribs.
    Type: Application
    Filed: November 6, 2001
    Publication date: May 8, 2003
    Inventor: Ching-Hai Tsai