Patents by Inventor En-Yi Liao
En-Yi Liao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230104966Abstract: A method for atomically manipulating an artificial two-dimensional material includes providing a first artificial two-dimensional (2D) material having a layered atomic structure; placing the first artificial 2D material in a vacuumed reactive chamber; using plasma to remove an atomic layer on one surface of the first artificial 2D material to expose unsaturated compounds; introducing heterogeneous atoms into the vacuumed reactive chamber, the heterogeneous atoms being different from atoms on the other surface of the first artificial 2D material; and binding the heterogeneous atoms with the unsaturated compounds to form a second artificial 2D material having two heterogeneous junctions.Type: ApplicationFiled: April 26, 2022Publication date: April 6, 2023Inventors: Ching-Yuan Su, En Yi Liao
-
Publication number: 20230105515Abstract: A two-dimensional electronic component includes a substrate; an artificial two-dimensional (2D) material disposed on the substrate; and a first metallic electrode disposed on the artificial 2D material. The artificial 2D material includes a layered atomic structure including a middle atomic layer, a lower atomic layer disposed on a lower surface of the middle atomic layer, and an upper atomic layer disposed on an upper surface of the middle atomic layer respectively. The upper atomic layer and the first metallic electrode are attracted together at a junction therebetween by metallic bonding.Type: ApplicationFiled: April 26, 2022Publication date: April 6, 2023Inventors: Ching-Yuan Su, En Yi Liao
-
Publication number: 20230108628Abstract: An artificial two-dimensional (2D) material includes a layered atomic structure including a middle atomic layer, a lower atomic layer, and an upper atomic layer. The lower and upper atomic layers are disposed on lower and upper surfaces of the middle atomic layer respectively. The middle atomic layer is a 2D planar atomic structure formed of a transition metal. The lower and upper atomic layers are a 2D planar atomic structure formed of heterogeneous atoms. Atoms of the layered atomic structure are bound by chemical bonding.Type: ApplicationFiled: April 26, 2022Publication date: April 6, 2023Inventors: Ching-Yuan Su, En Yi Liao
-
Patent number: 11590858Abstract: The present disclosure relates to methods and associated systems for operating a battery exchange station. The present method includes (1) receiving a ratio associated with a plurality of vehicles served by the battery exchange station; and (2) based on the ratio, storing different sets of information in memories associated with the batteries respectively, in accordance with received ratio.Type: GrantFiled: April 25, 2019Date of Patent: February 28, 2023Assignee: Gogoro Inc.Inventors: En-Yi Liao, Bo-Yu Chu, Chien-Chung Chen
-
Publication number: 20230015794Abstract: A battery exchange method has: receiving, from a first battery exchange station, a first alert indicating an issue regarding a battery inventory of the first battery exchange station; receiving, from a mobile device, a second alert indicating that the second battery exchange station does not release a second battery in response to an insertion of a first battery in one of a plurality of battery slots of the second battery exchange station; and providing an authorization to acquire the second battery from the second battery exchange station to the mobile device if the first and second alerts are associated with the same battery exchange station.Type: ApplicationFiled: July 5, 2022Publication date: January 19, 2023Inventors: En-Yi Liao, Chien-Chung Chen, Jing-Han Shiu, Hsu-Ho Hsiao
-
Publication number: 20220245234Abstract: Method and associated system for managing and/or authenticating an energy storage device. The method includes receiving a first portion of identification information stored in a data storage attached to the energy storage device (401); analyzing the first portion of the identification information at least partially based on a device identification of the device (403); updating a second portion of the identification information stored in the data storage attached to the energy storage device based on a result of analyzing the first portion of the identification information (405).Type: ApplicationFiled: July 15, 2020Publication date: August 4, 2022Inventors: Ching Chen, Jia-Yang Wu, En-Yi Liao, Chien-Chung Chen, Hok-Sum Horace Luke
-
Publication number: 20200339005Abstract: The present disclosure relates to methods and associated systems for operating a battery exchange station. The present method includes (1) receiving a ratio associated with a plurality of vehicles served by the battery exchange station; and (2) based on the ratio, storing different sets of information in memories associated with the batteries respectively, in accordance with received ratio.Type: ApplicationFiled: April 25, 2019Publication date: October 29, 2020Inventors: En-Yi Liao, Bo-Yu Chu, Chien-Chung Chen
-
Patent number: 10331535Abstract: A computer system identifies event discrepancies in an event tracking network. For a given event track-able content, the computer system identifies the event tracking system from its tracking URL. The computer system retrieves an event report from the event tracking system. The computer system also retrieves event postback messages from the content publisher and generates the event discrepancy report by comparing the data in the event report with the event postback messages.Type: GrantFiled: June 5, 2017Date of Patent: June 25, 2019Assignee: AppiSocial Co., Ltd.Inventor: En-Yi Liao
-
Patent number: 9477822Abstract: A password for accessing an online service is secured by receiving keystroke information of the password at a kernel level. The password is encrypted prior to inputting the encrypted password to an application program at an application level. The encrypted password is transmitted from the kernel level to the application level over an out-of-band-channel. The encrypted password is forwarded to a server computer associated with the online service. The server computer decrypts the encrypted password back to the password to determine if the client computer is authorized to access the online service.Type: GrantFiled: November 3, 2010Date of Patent: October 25, 2016Assignee: Trend Micro IncorporatedInventors: En-Yi Liao, Juichang Hsu
-
Patent number: 8607342Abstract: In one embodiment, incremental backups containing information on modified addressable portions of a data storage device are evaluated for presence of malicious codes (“malwares”). Each modified addressable portion may be individually accessed and scanned for malicious codes. Each modified addressable portion may also be mapped to its associated file, allowing the associated file to be scanned for malicious codes. These allow an incremental backup to be evaluated even when it only contains portions, rather than the entirety, of several different files. A clean incremental backup may be selected for restoring the data storage device in the event of malicious code infection.Type: GrantFiled: May 3, 2011Date of Patent: December 10, 2013Assignee: Trend Micro IncorporatedInventors: En-Yi Liao, Chinghsien Liao
-
Patent number: 8601064Abstract: In one embodiment, a server computer determines whether an email entering a private computer network is malicious (e.g., part of a directory harvest attack or bounce-source attack) by determining the recipient email address of the email and the Internet Protocol (IP) address of the source of the email. When the server computer determines that the email is malicious, the server computer may reject the email by sending a non-deterministic response to the source of the email. The non-deterministic response may include an error message that is different from the actual reason why the email is being rejected. The rejection may be sent as an immediate reply or postponed, for example.Type: GrantFiled: April 28, 2006Date of Patent: December 3, 2013Assignee: Trend Micro IncorporatedInventors: En-Yi Liao, Cheng-Lin Hou, Chinghsien Liao
-
Patent number: 8458261Abstract: In one embodiment, a method of generating a listing of valid email addresses in a private computer network includes monitoring of inbound emails and outbound delivery failure notification emails. Recipient email addresses of inbound emails may be indicated in the listing as valid email addresses. The delivery failure notification emails may be indicative of receipt in the private computer network of an undeliverable email. The recipient email address of the undeliverable email may be identified in the listing as an invalid email address. Comparing the recipient email addresses of undeliverable emails and inbound emails advantageously allows generation of the listing of valid email addresses in the private computer network without having to ask an email server for such a listing.Type: GrantFiled: April 7, 2006Date of Patent: June 4, 2013Assignee: Trend Micro IncorporatedInventors: En-Yi Liao, Cheng-Lin Hou, Chinghsien Liao
-
Patent number: 7971258Abstract: A method for detecting malware in a computer that employs a production operating system during normal use is provided. The method includes activating on the computer a first operating system while the production operating system is dormant and ascertaining at least a portion of the production operating system that would be involved in booting up the computer if the production operating system had been activated instead. The method further includes scanning, while the first operating system is activated and while the production operating system is dormant, the portion of the production operating system. The method further includes neutralizing, while the first operating system is activated and while the production operating system is dormant, the malware responsive to the scanning.Type: GrantFiled: September 28, 2007Date of Patent: June 28, 2011Assignee: Trend Micro IncorporatedInventors: En-Yi Liao, Richard Hsu, Franson Fang, Zhihe Zhang, Flanker Lu, Serend Lin
-
Patent number: 7962956Abstract: In one embodiment, incremental backups containing information on modified addressable portions of a data storage device are evaluated for presence of malicious codes (“malwares”). Each modified addressable portion may be individually accessed and scanned for malicious codes. Each modified addressable portion may also be mapped to its associated file, allowing the associated file to be scanned for malicious codes. These allow an incremental backup to be evaluated even when it only contains portions, rather than the entirety, of several different files. A clean incremental backup may be selected for restoring the data storage device in the event of malicious code infection.Type: GrantFiled: November 8, 2006Date of Patent: June 14, 2011Assignee: Trend Micro IncorporatedInventors: En-Yi Liao, Chinghsien Liao
-
Patent number: 7814540Abstract: Methods and arrangements for implementing new email handling policies in gateway logic that is inserted upstream of the existing email system (which may or may not have an existing email gateway). By inserting the gateway logic upstream of the existing email system, it is unnecessary to reconfigure existing email handling logic since the remainder of the email system downstream of the newly inserted gateway logic is substantially undisturbed. Techniques and arrangements are proposed to ensure the remainder of the email system continues to function correctly after the insertion of the new gateway logic.Type: GrantFiled: December 23, 2005Date of Patent: October 12, 2010Assignee: Trend Micro Inc.Inventors: En-Yi Liao, Cheng-Lin Hou, Jerry Chinghsien Liao
-
Patent number: 7533415Abstract: In one embodiment, a technique for controlling traffic in a computer network includes modifying a packet generated by a first computer. The packet may be intended for a second computer, but is modified to be redirected to a third computer. The packet may be processed in the third computer prior to being forwarded from the third computer to the second computer. The packet may be scanned for viruses at the third computer, for example. Among other advantages, the technique allows for scanning of early generated packets, redirection of selected packets, and routing of packets from a computer in general.Type: GrantFiled: April 21, 2004Date of Patent: May 12, 2009Assignee: Trend Micro IncorporatedInventors: Yi-Fen Chen, Yung-Chang Liang, En-Yi Liao
-
Patent number: 7461339Abstract: A software module at an e-mail gateway server scans incoming e-mail messages suspected of being phishing messages and inserts a script program into the head or body of the message in HTML form. The message is converted into an HTML document if necessary. The script program is written in a language such as VBScript, JScript, ECMAScript or JavaScript and can be run in a browser. The modified message is delivered to the recipient. When the e-mail client software on the user's desktop encounters the HTML content a browser starts up and the script program is executed by the browser. The script program can then take any action necessary to counter any hostile content of the message such as providing a warning message, comparing hyperlinks, intercepting a redirect request, warning about suspect attachments, etc.Type: GrantFiled: October 21, 2004Date of Patent: December 2, 2008Assignee: Trend Micro, Inc.Inventors: Jerry Chinghsien Liao, En-Yi Liao
-
Patent number: 7426574Abstract: In one embodiment, in a peer-to-peer network, data intended to be transferred directly from a first peer node to a second peer node are first redirected to an interception node. In the interception node, the data may be processed prior to being forwarded to the second peer node. The data may be scanned for virus detection and removal, for example.Type: GrantFiled: December 16, 2003Date of Patent: September 16, 2008Assignee: Trend Micro IncorporatedInventor: En-Yi Liao
-
Publication number: 20060101334Abstract: A software module at an e-mail gateway server scans incoming e-mail messages suspected of being phishing messages and inserts a script program into the head or body of the message in HTML form. The message is converted into an HTML document if necessary. The script program is written in a language such as VBScript, JScript, ECMAScript or JavaScript and can be run in a browser. The modified message is delivered to the recipient. When the e-mail client software on the user's desktop encounters the HTML content a browser starts up and the script program is executed by the browser. The script program can then take any action necessary to counter any hostile content of the message such as providing a warning message, comparing hyperlinks, intercepting a redirect request, warning about suspect attachments, etc.Type: ApplicationFiled: October 21, 2004Publication date: May 11, 2006Applicant: Trend Micro, Inc.Inventors: Jerry Liao, En-Yi Liao
-
Publication number: 20050238005Abstract: In one embodiment, a technique for controlling traffic in a computer network includes modifying a packet generated by a first computer. The packet may be intended for a second computer, but is modified to be redirected to a third computer. The packet may be processed in the third computer prior to being forwarded from the third computer to the second computer. The packet may be scanned for viruses at the third computer, for example. Among other advantages, the technique allows for scanning of early generated packets, redirection of selected packets, and routing of packets from a computer in general.Type: ApplicationFiled: April 21, 2004Publication date: October 27, 2005Inventors: Yi-Fen Chen, Yung-Chang Liang, En-Yi Liao