Taipei, Taiwan

Wen-Chih Lee


Average Co-Inventor Count = 3.0

ph-index = 2

Forward Citations = 7(Granted Patents)


Company Filing History:


Years Active: 2013-2015

Loading Chart...
2 patents (USPTO):Explore Patents

Title: Innovations of Inventor Wen-Chih Lee

Introduction

Wen-Chih Lee is a notable inventor based in Taipei, Taiwan. He has made significant contributions to the field of technology, particularly in the realm of computer security and graphical user interface analysis. With a total of 2 patents, his work reflects a commitment to enhancing software functionality and security.

Latest Patents

Wen-Chih Lee's latest patents include a "Layout Scanner for Application Classification" and a method for "Protection of Computers Against Argument Switch Attacks." The layout scanner patent describes a process for generating a database of known graphical user interface layouts using samples of executable files. This innovation allows for the identification of unknown executable files by analyzing their graphical user interfaces and matching them against a database. The second patent focuses on protecting computers from argument switch attacks by intercepting function calls that terminate processes. This method involves an antivirus system that evaluates function calls to ensure that critical processes are not terminated maliciously.

Career Highlights

Wen-Chih Lee is currently employed at Trend Micro Inc., a leading company in cybersecurity solutions. His work at Trend Micro has allowed him to apply his innovative ideas in practical applications, contributing to the company's mission of providing robust security solutions.

Collaborations

Wen-Chih Lee has collaborated with notable colleagues, including Ming-Chang Shih and Wei-Chung Chou. These collaborations have fostered a creative environment that encourages the development of groundbreaking technologies.

Conclusion

Wen-Chih Lee's contributions to technology through his patents and work at Trend Micro Inc. highlight his role as an influential inventor in the field of computer security and user interface design. His innovative approaches continue to shape the landscape of software development and cybersecurity.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…