Patents by Inventor Der-Tsai Lee

Der-Tsai Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8555269
    Abstract: Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.
    Type: Grant
    Filed: August 5, 2010
    Date of Patent: October 8, 2013
    Assignee: Armorize Technologies, Inc.
    Inventors: Yao-Wen Huang, Fang Yu, Chung-Hung Tsai, Christian Hang, Der-Tsai Lee, Sy-Yen Kuo
  • Publication number: 20110197180
    Abstract: Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.
    Type: Application
    Filed: August 5, 2010
    Publication date: August 11, 2011
    Applicant: ARMORIZE TECHNOLOGIES, INC.
    Inventors: Yao-Wen Huang, Fang Yu, Chung-Hung Tsai, Christian Hang, Der-Tsai Lee, Sy-Yen Kuo
  • Publication number: 20110055547
    Abstract: Some general aspects relate to secured means for managing and delivering personal information, for example, in the context of electronic commerce. A request from a first entity to encrypt personal information includes a first specification of the personal information to be encrypted. An encrypted specification of the personal information is then generated according to an encoding strategy. The encrypted specification of the personal information is provided to the first entity for subsequent use by a personal information user. A second entity sends a request to decrypt the encrypting specification of the personal information. Upon determining that the second entity is an authorized personal information receiver, a decrypted specification of the personal information is formed according to a decoding strategy determined based on an analysis of the encrypted specification. This decrypted specification of the personal information is then provided to the second entity.
    Type: Application
    Filed: August 27, 2010
    Publication date: March 3, 2011
    Applicant: Academia Sinica
    Inventors: Gen-Cher Lee, Der-Tsai Lee, Laurent Lin
  • Patent number: 7779399
    Abstract: Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.
    Type: Grant
    Filed: May 16, 2006
    Date of Patent: August 17, 2010
    Assignee: Armorize Technologies, Inc.
    Inventors: Yao-Wen Huang, Fang Yu, Chung-Hung Tsai, Christian Hang, Der-Tsai Lee, Sy-Yen Kuo
  • Publication number: 20070074188
    Abstract: Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities.
    Type: Application
    Filed: May 16, 2006
    Publication date: March 29, 2007
    Inventors: Yao-Wen Huang, Fang Yu, Chung-Hung Tsai, Christian Hang, Der-Tsai Lee, Sy-Yen Kuo
  • Publication number: 20020035427
    Abstract: A system for regulating the speed of a motorcycle, of the type powered by an electric motor and a battery, includes a command module that determines a desired speed of the motor, a speed sensor which determines an actual speed of the motor, and a controller which controls the electric motor based on the desired speed and the actual speed.
    Type: Application
    Filed: November 6, 2001
    Publication date: March 21, 2002
    Applicant: Academia Sinica, a Taiwanese Corporation
    Inventors: Der-Tsai Lee, Chi-Haur Wu
  • Patent number: 6324464
    Abstract: A system for regulating the speed of a motorcycle, of the type powered by an electric motor and a battery, includes a command module that determines a desired speed of the motor, a speed sensor which determines an actual speed of the motor, and a controller which controls the electric motor based on the desired speed and the actual speed.
    Type: Grant
    Filed: December 30, 1999
    Date of Patent: November 27, 2001
    Assignee: Academia Sinica
    Inventors: Der-Tsai Lee, Chi-Haur Wu
  • Patent number: 6243624
    Abstract: A compliant controller implements a biological model of a primate muscle so as to provide simultaneous position and force control with nonlinear damping for an actuator. The compliant controller uses one or more position sensors but does not require the use of a force sensor to provide force control. The compliant controller implements a force determining algorithm that is a function of an initial actuator position, a subsequently sensed actuator position, a desired actuator position and a position calculated from a nonlinear damping function. The algorithm updates or resets the initial actuator position or the calculated position depending upon the amount of actuator movement sensed. The compliant controller in accordance with the force determining algorithm and resetting of the various position values allows a desired position to be quickly attained while allowing the controller to compliantly respond to the presence or removal of an unknown or unexpected disturbing force.
    Type: Grant
    Filed: March 19, 1999
    Date of Patent: June 5, 2001
    Assignee: Northwestern University
    Inventors: Chi-haur Wu, Der-Tsai Lee
  • Patent number: 6178539
    Abstract: A method for computing critical area for shorts of a layout, in accordance with the present invention, includes the steps of computing a Voronoi diagram for the layout, computing a second order Voronoi diagram to arrive at a partitioning of the layout into regions, computing critical area within each region and summing the critical areas to arrive at a total critical area for shorts in the layout. A system is also provided for calculating the critical area.
    Type: Grant
    Filed: September 17, 1998
    Date of Patent: January 23, 2001
    Assignee: International Business Machines Corporation
    Inventors: Evanthia Papadopoulou, Der-Tsai Lee