Patents by Inventor En-Yi Liao

En-Yi Liao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230104966
    Abstract: A method for atomically manipulating an artificial two-dimensional material includes providing a first artificial two-dimensional (2D) material having a layered atomic structure; placing the first artificial 2D material in a vacuumed reactive chamber; using plasma to remove an atomic layer on one surface of the first artificial 2D material to expose unsaturated compounds; introducing heterogeneous atoms into the vacuumed reactive chamber, the heterogeneous atoms being different from atoms on the other surface of the first artificial 2D material; and binding the heterogeneous atoms with the unsaturated compounds to form a second artificial 2D material having two heterogeneous junctions.
    Type: Application
    Filed: April 26, 2022
    Publication date: April 6, 2023
    Inventors: Ching-Yuan Su, En Yi Liao
  • Publication number: 20230105515
    Abstract: A two-dimensional electronic component includes a substrate; an artificial two-dimensional (2D) material disposed on the substrate; and a first metallic electrode disposed on the artificial 2D material. The artificial 2D material includes a layered atomic structure including a middle atomic layer, a lower atomic layer disposed on a lower surface of the middle atomic layer, and an upper atomic layer disposed on an upper surface of the middle atomic layer respectively. The upper atomic layer and the first metallic electrode are attracted together at a junction therebetween by metallic bonding.
    Type: Application
    Filed: April 26, 2022
    Publication date: April 6, 2023
    Inventors: Ching-Yuan Su, En Yi Liao
  • Publication number: 20230108628
    Abstract: An artificial two-dimensional (2D) material includes a layered atomic structure including a middle atomic layer, a lower atomic layer, and an upper atomic layer. The lower and upper atomic layers are disposed on lower and upper surfaces of the middle atomic layer respectively. The middle atomic layer is a 2D planar atomic structure formed of a transition metal. The lower and upper atomic layers are a 2D planar atomic structure formed of heterogeneous atoms. Atoms of the layered atomic structure are bound by chemical bonding.
    Type: Application
    Filed: April 26, 2022
    Publication date: April 6, 2023
    Inventors: Ching-Yuan Su, En Yi Liao
  • Patent number: 11590858
    Abstract: The present disclosure relates to methods and associated systems for operating a battery exchange station. The present method includes (1) receiving a ratio associated with a plurality of vehicles served by the battery exchange station; and (2) based on the ratio, storing different sets of information in memories associated with the batteries respectively, in accordance with received ratio.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: February 28, 2023
    Assignee: Gogoro Inc.
    Inventors: En-Yi Liao, Bo-Yu Chu, Chien-Chung Chen
  • Publication number: 20230015794
    Abstract: A battery exchange method has: receiving, from a first battery exchange station, a first alert indicating an issue regarding a battery inventory of the first battery exchange station; receiving, from a mobile device, a second alert indicating that the second battery exchange station does not release a second battery in response to an insertion of a first battery in one of a plurality of battery slots of the second battery exchange station; and providing an authorization to acquire the second battery from the second battery exchange station to the mobile device if the first and second alerts are associated with the same battery exchange station.
    Type: Application
    Filed: July 5, 2022
    Publication date: January 19, 2023
    Inventors: En-Yi Liao, Chien-Chung Chen, Jing-Han Shiu, Hsu-Ho Hsiao
  • Publication number: 20220245234
    Abstract: Method and associated system for managing and/or authenticating an energy storage device. The method includes receiving a first portion of identification information stored in a data storage attached to the energy storage device (401); analyzing the first portion of the identification information at least partially based on a device identification of the device (403); updating a second portion of the identification information stored in the data storage attached to the energy storage device based on a result of analyzing the first portion of the identification information (405).
    Type: Application
    Filed: July 15, 2020
    Publication date: August 4, 2022
    Inventors: Ching Chen, Jia-Yang Wu, En-Yi Liao, Chien-Chung Chen, Hok-Sum Horace Luke
  • Publication number: 20200339005
    Abstract: The present disclosure relates to methods and associated systems for operating a battery exchange station. The present method includes (1) receiving a ratio associated with a plurality of vehicles served by the battery exchange station; and (2) based on the ratio, storing different sets of information in memories associated with the batteries respectively, in accordance with received ratio.
    Type: Application
    Filed: April 25, 2019
    Publication date: October 29, 2020
    Inventors: En-Yi Liao, Bo-Yu Chu, Chien-Chung Chen
  • Patent number: 10331535
    Abstract: A computer system identifies event discrepancies in an event tracking network. For a given event track-able content, the computer system identifies the event tracking system from its tracking URL. The computer system retrieves an event report from the event tracking system. The computer system also retrieves event postback messages from the content publisher and generates the event discrepancy report by comparing the data in the event report with the event postback messages.
    Type: Grant
    Filed: June 5, 2017
    Date of Patent: June 25, 2019
    Assignee: AppiSocial Co., Ltd.
    Inventor: En-Yi Liao
  • Patent number: 9477822
    Abstract: A password for accessing an online service is secured by receiving keystroke information of the password at a kernel level. The password is encrypted prior to inputting the encrypted password to an application program at an application level. The encrypted password is transmitted from the kernel level to the application level over an out-of-band-channel. The encrypted password is forwarded to a server computer associated with the online service. The server computer decrypts the encrypted password back to the password to determine if the client computer is authorized to access the online service.
    Type: Grant
    Filed: November 3, 2010
    Date of Patent: October 25, 2016
    Assignee: Trend Micro Incorporated
    Inventors: En-Yi Liao, Juichang Hsu
  • Patent number: 8607342
    Abstract: In one embodiment, incremental backups containing information on modified addressable portions of a data storage device are evaluated for presence of malicious codes (“malwares”). Each modified addressable portion may be individually accessed and scanned for malicious codes. Each modified addressable portion may also be mapped to its associated file, allowing the associated file to be scanned for malicious codes. These allow an incremental backup to be evaluated even when it only contains portions, rather than the entirety, of several different files. A clean incremental backup may be selected for restoring the data storage device in the event of malicious code infection.
    Type: Grant
    Filed: May 3, 2011
    Date of Patent: December 10, 2013
    Assignee: Trend Micro Incorporated
    Inventors: En-Yi Liao, Chinghsien Liao
  • Patent number: 8601064
    Abstract: In one embodiment, a server computer determines whether an email entering a private computer network is malicious (e.g., part of a directory harvest attack or bounce-source attack) by determining the recipient email address of the email and the Internet Protocol (IP) address of the source of the email. When the server computer determines that the email is malicious, the server computer may reject the email by sending a non-deterministic response to the source of the email. The non-deterministic response may include an error message that is different from the actual reason why the email is being rejected. The rejection may be sent as an immediate reply or postponed, for example.
    Type: Grant
    Filed: April 28, 2006
    Date of Patent: December 3, 2013
    Assignee: Trend Micro Incorporated
    Inventors: En-Yi Liao, Cheng-Lin Hou, Chinghsien Liao
  • Patent number: 8458261
    Abstract: In one embodiment, a method of generating a listing of valid email addresses in a private computer network includes monitoring of inbound emails and outbound delivery failure notification emails. Recipient email addresses of inbound emails may be indicated in the listing as valid email addresses. The delivery failure notification emails may be indicative of receipt in the private computer network of an undeliverable email. The recipient email address of the undeliverable email may be identified in the listing as an invalid email address. Comparing the recipient email addresses of undeliverable emails and inbound emails advantageously allows generation of the listing of valid email addresses in the private computer network without having to ask an email server for such a listing.
    Type: Grant
    Filed: April 7, 2006
    Date of Patent: June 4, 2013
    Assignee: Trend Micro Incorporated
    Inventors: En-Yi Liao, Cheng-Lin Hou, Chinghsien Liao
  • Patent number: 7971258
    Abstract: A method for detecting malware in a computer that employs a production operating system during normal use is provided. The method includes activating on the computer a first operating system while the production operating system is dormant and ascertaining at least a portion of the production operating system that would be involved in booting up the computer if the production operating system had been activated instead. The method further includes scanning, while the first operating system is activated and while the production operating system is dormant, the portion of the production operating system. The method further includes neutralizing, while the first operating system is activated and while the production operating system is dormant, the malware responsive to the scanning.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: June 28, 2011
    Assignee: Trend Micro Incorporated
    Inventors: En-Yi Liao, Richard Hsu, Franson Fang, Zhihe Zhang, Flanker Lu, Serend Lin
  • Patent number: 7962956
    Abstract: In one embodiment, incremental backups containing information on modified addressable portions of a data storage device are evaluated for presence of malicious codes (“malwares”). Each modified addressable portion may be individually accessed and scanned for malicious codes. Each modified addressable portion may also be mapped to its associated file, allowing the associated file to be scanned for malicious codes. These allow an incremental backup to be evaluated even when it only contains portions, rather than the entirety, of several different files. A clean incremental backup may be selected for restoring the data storage device in the event of malicious code infection.
    Type: Grant
    Filed: November 8, 2006
    Date of Patent: June 14, 2011
    Assignee: Trend Micro Incorporated
    Inventors: En-Yi Liao, Chinghsien Liao
  • Patent number: 7814540
    Abstract: Methods and arrangements for implementing new email handling policies in gateway logic that is inserted upstream of the existing email system (which may or may not have an existing email gateway). By inserting the gateway logic upstream of the existing email system, it is unnecessary to reconfigure existing email handling logic since the remainder of the email system downstream of the newly inserted gateway logic is substantially undisturbed. Techniques and arrangements are proposed to ensure the remainder of the email system continues to function correctly after the insertion of the new gateway logic.
    Type: Grant
    Filed: December 23, 2005
    Date of Patent: October 12, 2010
    Assignee: Trend Micro Inc.
    Inventors: En-Yi Liao, Cheng-Lin Hou, Jerry Chinghsien Liao
  • Patent number: 7533415
    Abstract: In one embodiment, a technique for controlling traffic in a computer network includes modifying a packet generated by a first computer. The packet may be intended for a second computer, but is modified to be redirected to a third computer. The packet may be processed in the third computer prior to being forwarded from the third computer to the second computer. The packet may be scanned for viruses at the third computer, for example. Among other advantages, the technique allows for scanning of early generated packets, redirection of selected packets, and routing of packets from a computer in general.
    Type: Grant
    Filed: April 21, 2004
    Date of Patent: May 12, 2009
    Assignee: Trend Micro Incorporated
    Inventors: Yi-Fen Chen, Yung-Chang Liang, En-Yi Liao
  • Patent number: 7461339
    Abstract: A software module at an e-mail gateway server scans incoming e-mail messages suspected of being phishing messages and inserts a script program into the head or body of the message in HTML form. The message is converted into an HTML document if necessary. The script program is written in a language such as VBScript, JScript, ECMAScript or JavaScript and can be run in a browser. The modified message is delivered to the recipient. When the e-mail client software on the user's desktop encounters the HTML content a browser starts up and the script program is executed by the browser. The script program can then take any action necessary to counter any hostile content of the message such as providing a warning message, comparing hyperlinks, intercepting a redirect request, warning about suspect attachments, etc.
    Type: Grant
    Filed: October 21, 2004
    Date of Patent: December 2, 2008
    Assignee: Trend Micro, Inc.
    Inventors: Jerry Chinghsien Liao, En-Yi Liao
  • Patent number: 7426574
    Abstract: In one embodiment, in a peer-to-peer network, data intended to be transferred directly from a first peer node to a second peer node are first redirected to an interception node. In the interception node, the data may be processed prior to being forwarded to the second peer node. The data may be scanned for virus detection and removal, for example.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: September 16, 2008
    Assignee: Trend Micro Incorporated
    Inventor: En-Yi Liao
  • Publication number: 20060101334
    Abstract: A software module at an e-mail gateway server scans incoming e-mail messages suspected of being phishing messages and inserts a script program into the head or body of the message in HTML form. The message is converted into an HTML document if necessary. The script program is written in a language such as VBScript, JScript, ECMAScript or JavaScript and can be run in a browser. The modified message is delivered to the recipient. When the e-mail client software on the user's desktop encounters the HTML content a browser starts up and the script program is executed by the browser. The script program can then take any action necessary to counter any hostile content of the message such as providing a warning message, comparing hyperlinks, intercepting a redirect request, warning about suspect attachments, etc.
    Type: Application
    Filed: October 21, 2004
    Publication date: May 11, 2006
    Applicant: Trend Micro, Inc.
    Inventors: Jerry Liao, En-Yi Liao
  • Publication number: 20050238005
    Abstract: In one embodiment, a technique for controlling traffic in a computer network includes modifying a packet generated by a first computer. The packet may be intended for a second computer, but is modified to be redirected to a third computer. The packet may be processed in the third computer prior to being forwarded from the third computer to the second computer. The packet may be scanned for viruses at the third computer, for example. Among other advantages, the technique allows for scanning of early generated packets, redirection of selected packets, and routing of packets from a computer in general.
    Type: Application
    Filed: April 21, 2004
    Publication date: October 27, 2005
    Inventors: Yi-Fen Chen, Yung-Chang Liang, En-Yi Liao