Patent | Date |
---|
Prevention of majority attacks Grant 11,303,446 - Koorella , et al. April 12, 2 | 2022-04-12 |
Constrained roles for access management Grant 11,297,066 - Wei , et al. April 5, 2 | 2022-04-05 |
Network application security question detection and modification Grant 11,196,774 - Wei , et al. December 7, 2 | 2021-12-07 |
Prevention Of Majority Attacks App 20210320797 - Koorella; Vijender ;   et al. | 2021-10-14 |
Performance optimization Grant 11,138,188 - Chao , et al. October 5, 2 | 2021-10-05 |
Network Application Security Question Detection And Modification App 20210281612 - Wei; Yi-hsiu ;   et al. | 2021-09-09 |
Constrained Roles For Access Management App 20210226956 - Wei; Yi-hsiu ;   et al. | 2021-07-22 |
Trustable Product Delivery With Rfid And Smart Chip App 20210216958 - Pacheco; Daniel ;   et al. | 2021-07-15 |
Atomic transactional processing Grant 11,032,083 - Chao , et al. June 8, 2 | 2021-06-08 |
Prevention of majority attacks Grant 10,834,122 - Chao , et al. November 10, 2 | 2020-11-10 |
Database Private Document Sharing App 20200349261 - Koorella; Vijender ;   et al. | 2020-11-05 |
Using Quick Response (QR) Codes to Collect Recurring Payments App 20200273018 - Chao; Ching-Yun ;   et al. | 2020-08-27 |
Temporal mandible data capture analysis and recommendation Grant 10,743,973 - Adams , et al. A | 2020-08-18 |
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment Grant 10,666,441 - Chang , et al. | 2020-05-26 |
Performance Optimization App 20200142988 - Chao; Ching-Yun ;   et al. | 2020-05-07 |
Atomic Transactional Processing App 20200145221 - Chao; Ching-Yun ;   et al. | 2020-05-07 |
Temporal mandible data capture analysis and recommendation Grant 10,639,135 - Adams , et al. | 2020-05-05 |
Prevention Of Majority Attacks App 20200076830 - Chao; Ching-Yun ;   et al. | 2020-03-05 |
Guarding against cross-site request forgery (CSRF) attacks Grant 10,454,949 - Lo , et al. Oc | 2019-10-22 |
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment App 20190229917 - Chang; John Y-C. ;   et al. | 2019-07-25 |
Sponsored trust relationship management between multiple racks Grant 10,341,324 - Chang , et al. | 2019-07-02 |
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment Grant 10,341,109 - Chang , et al. | 2019-07-02 |
Wireless power distribution management in an open environment Grant 10,291,072 - Chao , et al. | 2019-05-14 |
Temporal Mandible Data Capture Analysis And Recommendation App 20190133730 - Adams; Ebony C. ;   et al. | 2019-05-09 |
Temporal Mandible Data Capture Analysis And Recommendation App 20190133731 - Adams; Ebony C. ;   et al. | 2019-05-09 |
Robotic Chef App 20190111569 - Chang; David Y. ;   et al. | 2019-04-18 |
Robotic Chef App 20190111568 - Chang; David Y. ;   et al. | 2019-04-18 |
Construct data management between loosely coupled racks Grant 10,171,561 - Chang , et al. J | 2019-01-01 |
Sponsored Trust Relationship Management Between Multiple Racks App 20180241737 - Chang; John Yow-Chun ;   et al. | 2018-08-23 |
Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management Grant 9,985,787 - Quirk , et al. May 29, 2 | 2018-05-29 |
Sponsored trust relationship management between multiple racks Grant 9,985,954 - Chang , et al. May 29, 2 | 2018-05-29 |
Trust relationship management amongst racks in a data center Grant 9,906,370 - Apte , et al. February 27, 2 | 2018-02-27 |
Wireless Power Distribution Management In An Open Environment App 20170324278 - Chao; Ching-Yun ;   et al. | 2017-11-09 |
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment App 20170279610 - Chang; John Y-C. ;   et al. | 2017-09-28 |
Distributor business policy driven cloud services integration Grant 9,767,497 - Chao , et al. September 19, 2 | 2017-09-19 |
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment Grant 9,712,322 - Chang , et al. July 18, 2 | 2017-07-18 |
Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management Grant 9,705,676 - Quirk , et al. July 11, 2 | 2017-07-11 |
Guarding against cross-site request forgery (CSRF) attacks App 20170149803 - Lo; Lewis ;   et al. | 2017-05-25 |
Sponsored Trust Relationship Management Between Multiple Racks App 20170149765 - Chang; John Yow-Chun ;   et al. | 2017-05-25 |
Trust Relationship Management Amongst Racks In A Data Center App 20170141927 - Apte; Ajay A. ;   et al. | 2017-05-18 |
Method For Establshing, Configuring, And Managing A Transient Social Group App 20170142188 - Chang; David Y. ;   et al. | 2017-05-18 |
Construct Data Management Between Loosely Coupled Racks App 20170134302 - Chang; John Yow-Chun ;   et al. | 2017-05-11 |
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment App 20170026179 - Chang; John Y-C. ;   et al. | 2017-01-26 |
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment Grant 9,531,538 - Chang , et al. December 27, 2 | 2016-12-27 |
Extending infrastructure security to services in a cloud computing environment Grant 9,426,155 - Chao , et al. August 23, 2 | 2016-08-23 |
Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management App 20160226666 - Quirk; Aaron James ;   et al. | 2016-08-04 |
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment App 20160099808 - Chang; John Y-C. ;   et al. | 2016-04-07 |
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment Grant 9,237,020 - Chang , et al. January 12, 2 | 2016-01-12 |
Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management App 20150356286 - Quirk; Aaron James ;   et al. | 2015-12-10 |
Establishing a trust relationship between two product systems Grant 9,160,731 - Chang , et al. October 13, 2 | 2015-10-13 |
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment Grant 9,148,285 - Chang , et al. September 29, 2 | 2015-09-29 |
Establishing a Trust Relationship Between Two Product Systems App 20150074395 - Chang; John Y. ;   et al. | 2015-03-12 |
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment App 20150006902 - Chang; John Y-C. ;   et al. | 2015-01-01 |
Extending infrastructure security to services in a cloud computing environment App 20140317716 - Chao; Ching-Yun ;   et al. | 2014-10-23 |
Ensuring integrity of security event log upon download and delete Grant 8,856,086 - Chao , et al. October 7, 2 | 2014-10-07 |
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment App 20140208119 - Chang; John Y-C. ;   et al. | 2014-07-24 |
Backup and restore in a secure appliance with integrity and confidentiality Grant 8,769,274 - Chao July 1, 2 | 2014-07-01 |
Backup and restore in a secure appliance with integrity and confidentiality App 20140068258 - Chao; Ching-Yun | 2014-03-06 |
Ensuring integrity of security event log upon download and delete App 20140059013 - Chao; Ching-Yun ;   et al. | 2014-02-27 |
Integrated security roles Grant 8,572,694 - Chang , et al. October 29, 2 | 2013-10-29 |
Workstation application server programming protection via classloader policy based visibility control Grant 8,447,975 - Botzum , et al. May 21, 2 | 2013-05-21 |
Using a portable computing device as a smart key device Grant 8,112,628 - Bade , et al. February 7, 2 | 2012-02-07 |
Method and apparatus for preventing rogue implementations of a security-sensitive class interface Grant 7,925,881 - Birk , et al. April 12, 2 | 2011-04-12 |
Method for using a compact disk as a smart key device Grant 7,908,492 - Bade , et al. March 15, 2 | 2011-03-15 |
Highly scalable and highly available cluster system management scheme Grant 7,870,234 - Arendt , et al. January 11, 2 | 2011-01-11 |
Highly scalable and highly available cluster system management scheme Grant 7,870,235 - Arendt , et al. January 11, 2 | 2011-01-11 |
Method and system for protecting master secrets using smart key devices Grant 7,849,326 - Chao December 7, 2 | 2010-12-07 |
Systems and methods for management and auto-generation of encryption keys Grant 7,822,206 - Birk , et al. October 26, 2 | 2010-10-26 |
Application server object-level security for distributed computing domains Grant 7,810,132 - Birk , et al. October 5, 2 | 2010-10-05 |
Credential delegation using identity assertion Grant 7,765,585 - Chao , et al. July 27, 2 | 2010-07-27 |
Error detection protocol Grant 7,756,830 - Chao , et al. July 13, 2 | 2010-07-13 |
Dynamic cache lookup based on dynamic data Grant 7,752,452 - Birk , et al. July 6, 2 | 2010-07-06 |
Preventing rogue implementations of a security-sensitive class interface Grant 7,734,918 - Birk , et al. June 8, 2 | 2010-06-08 |
Method and system for establishing a trust framework based on smart key devices Grant 7,711,951 - Chao May 4, 2 | 2010-05-04 |
Role-based access control management for multiple heterogeneous application components Grant 7,676,831 - Britton , et al. March 9, 2 | 2010-03-09 |
Method for assuring event record integrity Grant 7,661,111 - Chao February 9, 2 | 2010-02-09 |
Method for Using a Compact Disk as a Smart Key Device App 20090327763 - Bade; Steven A. ;   et al. | 2009-12-31 |
Using a Portable Computing Device as a Smart Key Device App 20090313470 - Bade; Steven A. ;   et al. | 2009-12-17 |
Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework Grant 7,634,803 - Birk , et al. December 15, 2 | 2009-12-15 |
Dynamic Cache Lookup Based on Dynamic Data App 20090138951 - Birk; Peter Daniel ;   et al. | 2009-05-28 |
System and method for credential delegation using identity assertion Grant 7,526,798 - Chao , et al. April 28, 2 | 2009-04-28 |
Method for tracking security attributes along invocation chain using secure propagation token Grant 7,526,799 - Birk , et al. April 28, 2 | 2009-04-28 |
Dynamic cache lookup based on dynamic data Grant 7,487,361 - Birk , et al. February 3, 2 | 2009-02-03 |
Using security levels to improve permission checking performance and manageability Grant 7,475,431 - Chao January 6, 2 | 2009-01-06 |
Method for using a portable computing device as a smart key device Grant 7,475,247 - Bade , et al. January 6, 2 | 2009-01-06 |
Highly Scalable and Highly Available Cluster System Management Scheme App 20080320113 - Arendt; James W. ;   et al. | 2008-12-25 |
Highly scalable and highly available cluster system management scheme App 20080320112 - Arendt; James W. ;   et al. | 2008-12-25 |
Integrated Security Roles App 20080295147 - Chang; David Yu ;   et al. | 2008-11-27 |
Method for integrated security roles Grant 7,454,786 - Chang , et al. November 18, 2 | 2008-11-18 |
Application server object-level security for distributed computing domains Grant 7,448,066 - Birk , et al. November 4, 2 | 2008-11-04 |
Application Server Object-level Security for Distributed Computing Domains App 20080222697 - Birk; Peter Daniel ;   et al. | 2008-09-11 |
Credential Delegation Using Identity Assertion App 20080196097 - Chao; Ching-Yun ;   et al. | 2008-08-14 |
Highly scalable and highly available cluster system management scheme Grant 7,412,479 - Arendt , et al. August 12, 2 | 2008-08-12 |
Method and system for using a compact disk as a smart key device Grant 7,386,736 - Bade , et al. June 10, 2 | 2008-06-10 |
Method And Apparatus For Preventing Rogue Implementations Of A Security-sensitive Class Interface App 20080133910 - Birk; Peter Daniel ;   et al. | 2008-06-05 |
Systems And Methods For Management And Auto-generation Of Encryption Keys App 20080101610 - BIRK; PETER D. ;   et al. | 2008-05-01 |
Method and apparatus for preventing rogue implementations of a security-sensitive class interface Grant 7,337,318 - Birk , et al. February 26, 2 | 2008-02-26 |
Method And Apparatus For Preventing Rogue Implementations Of A Security-sensitive Class Interface App 20080034202 - Birk; Peter Daniel ;   et al. | 2008-02-07 |
Securing Access To A Service Data Object App 20070271618 - CHAO; CHING-YUN ;   et al. | 2007-11-22 |
Method for assuring event record integrity App 20070089116 - Chao; Ching-Yun | 2007-04-19 |
Role-based access control management for multiple heterogeneous application components App 20070056026 - Britton; Kathryn H. ;   et al. | 2007-03-08 |
Workstation application server programming protection via classloader policy based visibility control App 20070011451 - Botzum; Keys S. ;   et al. | 2007-01-11 |
Method for maintaining application compatibility within an application isolation policy App 20070011723 - Chao; Ching-Yun | 2007-01-11 |
Method and system for using a portable computing device as a smart key device App 20060133615 - Bade; Steven A. ;   et al. | 2006-06-22 |
Method and system for using a compact disk as a smart key device App 20060136748 - Bade; Steven A. ;   et al. | 2006-06-22 |
Method and system for providing highly available services based on a load balancing policy and a reusable connection context object Grant 7,058,717 - Chao , et al. June 6, 2 | 2006-06-06 |
Dynamic cache lookup based on dynamic data App 20060020813 - Birk; Peter Daniel ;   et al. | 2006-01-26 |
Method and apparatus for tracking security attributes along invocation chain using secure propagation token App 20060021016 - Birk; Peter Daniel ;   et al. | 2006-01-26 |
Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework App 20060015727 - Birk; Peter Daniel ;   et al. | 2006-01-19 |
System and method for using security levels to improve permission checking performance and manageability App 20060005019 - Chao; Ching-Yun | 2006-01-05 |
Method and apparatus for handling custom token propagation without Java serialization App 20060005234 - Birk; Peter Daniel ;   et al. | 2006-01-05 |
System and method for using security levels to simplify security policy management App 20050278790 - Birk, Peter Daniel ;   et al. | 2005-12-15 |
Fine grained role-based access to system resources Grant 6,950,825 - Chang , et al. September 27, 2 | 2005-09-27 |
Method and system for protecting master secrets using smart key devices App 20050154898 - Chao, Ching-Yun | 2005-07-14 |
Method and system for establishing a trust framework based on smart key devices App 20050154875 - Chao, Ching-Yun | 2005-07-14 |
Declarative trust model between reverse proxy server and websphere application server App 20050154886 - Birk, Peter Daniel ;   et al. | 2005-07-14 |
System and method for secure network state management and single sign-on App 20050154887 - Birk, Peter Daniel ;   et al. | 2005-07-14 |
System and method for integrated security roles App 20040193909 - Chang, David Yu ;   et al. | 2004-09-30 |
Method and apparatus for preventing rogue implementations of a security-sensitive class interface App 20040172530 - Birk, Peter Daniel ;   et al. | 2004-09-02 |
Apparatus and method for maintaining consistency of shared data resources in a cluster environment Grant 6,748,381 - Chao , et al. June 8, 2 | 2004-06-08 |
JAAS security and COBRA security integration App 20040098614 - Chang, David Yu ;   et al. | 2004-05-20 |
System and method for credential delegation using identity assertion App 20040088578 - Chao, Ching-Yun ;   et al. | 2004-05-06 |
Application server object-level security for distributed computing domains App 20040059940 - Birk, Peter Daniel ;   et al. | 2004-03-25 |
Method and system to provide highly available services App 20040019680 - Chao, Ching-Yun ;   et al. | 2004-01-29 |
Fine grained role-based access to system resources App 20030229623 - Chang, David Yu ;   et al. | 2003-12-11 |
Apparatus and method for tracking access to data resources in a cluster environment Grant 6,587,860 - Chandra , et al. July 1, 2 | 2003-07-01 |
Method and system for replicating data in a distributed computer environment Grant 6,529,960 - Chao , et al. March 4, 2 | 2003-03-04 |
Method and apparatus for building and managing multi-clustered computer systems Grant 6,438,705 - Chao , et al. August 20, 2 | 2002-08-20 |
Highly scalable and highly available cluster system management scheme Grant 6,427,163 - Arendt , et al. July 30, 2 | 2002-07-30 |
Highly scalable and highly available cluster system management scheme App 20020091814 - Arendt, James W. ;   et al. | 2002-07-11 |
Method and apparatus for managing clustered computer systems Grant 6,393,485 - Chao , et al. May 21, 2 | 2002-05-21 |
Method, system and computer program for replicating data in a distributed computed environment Grant 6,338,092 - Chao , et al. January 8, 2 | 2002-01-08 |
Resource group quorum scheme for highly scalable and highly available cluster system management Grant 6,314,526 - Arendt , et al. November 6, 2 | 2001-11-06 |
Method and system for replicating data in a distributed computer environment App 20010037398 - Chao, Ching-Yun ;   et al. | 2001-11-01 |
Enqueuing a configuration change in a network cluster and restore a prior configuration in a back up storage in reverse sequence ordered Grant 6,003,075 - Arendt , et al. December 14, 1 | 1999-12-14 |
Virtual memory management for a microkernel system with multiple operating systems Grant 5,842,226 - Barton , et al. November 24, 1 | 1998-11-24 |