Timothy T Tsai, Age 85704 Harcourt Dr, Cincinnati, OH 45246

Timothy Tsai Phones & Addresses

704 Harcourt Dr, Cincinnati, OH 45246 (513) 825-6957

Springdale, OH

Belle Mead, NJ

Bridgewater, NJ

Herndon, VA

Flushing, NY

Ashburn, VA

West Chester, OH

Show more

Mentions for Timothy T Tsai

Timothy Tsai resumes & CV records

Resumes

Timothy Tsai Photo 33

Timothy Tsai

Timothy Tsai Photo 34

Timothy Tsai

Publications & IP owners

Us Patents

Method And Apparatus For Providing Extensible Object-Oriented Fault Injection

US Patent:
6484276, Nov 19, 2002
Filed:
Oct 25, 1999
Appl. No.:
09/426331
Inventors:
Navjot Singh - Morristown NJ
Timothy Tsai - North Plainfield NJ
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
G06F 1130
US Classification:
714 41, 714 38, 717125, 717127
Abstract:
A method and apparatus for a fault injection tool having greater flexibility, ease and portability in realizing the basic functionality of the fault injection. The basic functionality of the fault injection process is abstracted into three base classes, namely, a fault injector (FI), a workload generator (WG) and a data collector (DC). A control class performs configuration and management of the objects that are instantiated from the base classes. The control class also implements a graphical user interface. For each base class there is a corresponding core class that performs control and management of a so-called associated âpluginâ. Each of the core classes can be implemented as a single class or as a pair of distributed classes. If a core class is implemented as a pair, the FI, WG, or DC object controls operation of the FIRemote, WGRemote or DCRemote object, respectively. For each core class, the associated plugin performs the actual functionality.

Fault Tolerance Software System With Periodic External Self-Test Failure Detection

US Patent:
7096388, Aug 22, 2006
Filed:
Aug 8, 2001
Appl. No.:
09/924983
Inventors:
Navjot Singh - Denville NJ, US
Timothy Tsai - Bridgewater NJ, US
Assignee:
Avaya Technology Corp. - Basking Ridge NJ
International Classification:
G06F 11/00
US Classification:
714 38
Abstract:
Fault tolerance is improved in a computing system which includes one or more computing machines by (i) executing a control thread or other control program in conjunction with a fault tolerance software system running on at least one of the machines, and (ii) initiating via the control program a test script program which sends one or more requests to a monitored program. The test script program also processes corresponding responses to the one or more requests, and generates a return value utilizable by the control program to indicate a failure condition in the monitored program. The computing system may be configured in accordance with a client-server architecture, with the fault tolerance software system and the monitored program both running on a server of the system. The test script program is preferably implemented in an object-oriented programming language such as Java, such that one or more components of the test script program comprise a base class from which one or more other components of the test script program are generatable for use with the monitored program.

Method For Real-Time Transport Protocol (Rtp) Packet Authentication

US Patent:
7372856, May 13, 2008
Filed:
May 27, 2004
Appl. No.:
10/854702
Inventors:
Sachin Garg - Green Brook NJ, US
Navjot Singh - Denville NJ, US
Timothy Kohchih Tsai - Alviso CA, US
Assignee:
Avaya Technology Corp. - Basking Ridge NJ
International Classification:
H04L 12/28
H04L 12/56
US Classification:
3703952
Abstract:
A method for Real-time Transport Protocol (RTP) packet authentication on a packet data network. In particular, the invention relates to a method for preventing toll fraud, privacy compromise, voice quality degradation, or denial of service (DoS) on Voice over IP networks. The Real-time Transport Protocol (RTP) is susceptible to several security attacks, including thirdparty snooping of private conversations, injection of forged content, and introduction or modification of packets to degrade voice quality. The Secure Real-time Transport Protocol (SRTP) provides confidentiality, message authentication, and replay protection for RTP traffic. However, SRTP incurs an additional overhead to verify the HMAC-SHA1 message authentication code for each packet. SRTP+ significantly decrease the verification overhead compared to SRTP and thereby increases the number of faked packets required to mount a successful denial of service attack. SRTP+ provides packet authentication but not integrity.

Stateful And Cross-Protocol Intrusion Detection For Voice Over Ip

US Patent:
7451486, Nov 11, 2008
Filed:
Sep 30, 2004
Appl. No.:
10/955594
Inventors:
Sachin Garg - Green Brook NJ, US
Navjot Singh - Denville NJ, US
Timothy Kohchih Tsai - Alviso CA, US
Yu-Sung Wu - West Lafayette IN, US
Saurabh Bagchi - Lafayette IN, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04L 9/00
H04L 12/22
US Classification:
726 23, 726 14, 379 8802, 37039552
Abstract:
A method for detecting intrusions that employ messages of two or more protocols is disclosed. Such intrusions might occur in Voice over Internet Protocol (VoIP) systems, as well as in systems in which two or more protocols support some service other than VoIP. In the illustrative embodiment of the present invention, a stateful intrusion-detection system is capable of employing rules that have cross-protocol pre-conditions. The illustrative embodiment can use such rules to recognize a variety of VoIP-based intrusion attempts, such as call hijacking, BYE attacks, etc. In addition, the illustrative embodiment is capable of using such rules to recognize other kinds of intrusion attempts in which two or more protocols support a service other than VoIP. The illustrative embodiment also comprises a stateful firewall that is capable of employing rules with cross-protocol pre-conditions.

Method For Understanding And Testing Third Party Software Components

US Patent:
7539978, May 26, 2009
Filed:
Nov 1, 2002
Appl. No.:
10/285576
Inventors:
Jennifer M. Haddox - Sterling VA, US
Gregory M. Kapfhammer - Cochranton PA, US
Ryan Colyer - Meadville PA, US
Timothy Tsai - Bridgewater NJ, US
Assignee:
Cigital, Inc. - Dulles VA
International Classification:
G06F 9/44
US Classification:
717130, 717126, 717131
Abstract:
Systems and methods to understand how commercial-off-the-shelf (COTS) software components interact with a system when the COTS components are integrated into a system. A software wrapping technology is utilized to encase the COTS software components such that a wrapper isolates the COTS components during testing.

Stateful And Cross-Protocol Intrusion Detection For Voice Over Ip

US Patent:
7814547, Oct 12, 2010
Filed:
Aug 28, 2008
Appl. No.:
12/200069
Inventors:
Sachin Garg - Bangalore, IN
Navjot Singh - Denville NJ, US
Timothy Kohchih Tsai - Alviso CA, US
Yu-Sung Wu - West Lafayette IN, US
Saurabh Bagchi - West Lafayette IN, US
Assignee:
Avaya Inc. - Basking Ridge NJ
International Classification:
H04L 9/00
US Classification:
726 23
Abstract:
A method for detecting intrusions that employ messages of two or more protocols is disclosed. Such intrusions might occur in Voice over Internet Protocol (VoIP) systems, as well as in systems in which two or more protocols support some service other than VoIP. In the illustrative embodiment of the present invention, a stateful intrusion-detection system is capable of employing rules that have cross-protocol pre-conditions. The illustrative embodiment can use such rules to recognize a variety of VoIP-based intrusion attempts, such as call hijacking, BYE attacks, etc. In addition, the illustrative embodiment is capable of using such rules to recognize other kinds of intrusion attempts in which two or more protocols support a service other than VoIP. The illustrative embodiment also comprises a stateful firewall that is capable of employing rules with cross-protocol pre-conditions.

Security Vulnerability Monitor

US Patent:
2005000, Jan 6, 2005
Filed:
Jul 1, 2003
Appl. No.:
10/611264
Inventors:
Navjot Singh - Denville NJ, US
Timothy Tsai - Bridgewater NJ, US
International Classification:
H04L009/00
US Classification:
713200000
Abstract:
A method and apparatus for automatically determining whether a security vulnerability alert is relevant to a device (e.g., personal computer, server, personal digital assistant [PDA], etc.), and automatically retrieving the associated software patches for relevant alerts, are disclosed. The illustrative embodiment intelligently determines whether the software application specified by a security vulnerability alert is resident on the device, whether the version of the software application on the device matches that of the security vulnerability alert, and whether the device's hardware platform and operating system match those of the security vulnerability alert.

Security Vulnerability Monitor

US Patent:
2009002, Jan 22, 2009
Filed:
Sep 30, 2008
Appl. No.:
12/241567
Inventors:
Navjot Singh - Denville NJ, US
Timothy Kohchih Tsai - Alviso CA, US
Assignee:
AVAYA INC. - Basking Ridge NJ
International Classification:
G06F 9/44
G06F 9/445
US Classification:
717168, 717174
Abstract:
A method and apparatus for automatically determining whether a security vulnerability alert is relevant to a device (e.g., personal computer, server, personal digital assistant [PDA], etc.), and automatically retrieving the associated software patches for relevant alerts, are disclosed. The illustrative embodiment intelligently determines whether the software application specified by a security vulnerability alert is resident on the device, whether the version of the software application on the device matches that of the security vulnerability alert, and whether the device's hardware platform and operating system match those of the security vulnerability alert.

NOTICE: You may not use PeopleBackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. PeopleBackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.