loadpatents
name:-0.092544794082642
name:-0.080214023590088
name:-0.021321058273315
Chao; Ching-Yun Patent Filings

Chao; Ching-Yun

Patent Applications and Registrations

Patent applications and USPTO patent grants for Chao; Ching-Yun.The latest application filed is for "prevention of majority attacks".

Company Profile
20.71.71
  • Chao; Ching-Yun - Austin TX
  • Chao; Ching-Yun - Raleigh TX US
  • Chao; Ching-Yun - Boca Raton FL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Prevention of majority attacks
Grant 11,303,446 - Koorella , et al. April 12, 2
2022-04-12
Constrained roles for access management
Grant 11,297,066 - Wei , et al. April 5, 2
2022-04-05
Network application security question detection and modification
Grant 11,196,774 - Wei , et al. December 7, 2
2021-12-07
Prevention Of Majority Attacks
App 20210320797 - Koorella; Vijender ;   et al.
2021-10-14
Performance optimization
Grant 11,138,188 - Chao , et al. October 5, 2
2021-10-05
Network Application Security Question Detection And Modification
App 20210281612 - Wei; Yi-hsiu ;   et al.
2021-09-09
Constrained Roles For Access Management
App 20210226956 - Wei; Yi-hsiu ;   et al.
2021-07-22
Trustable Product Delivery With Rfid And Smart Chip
App 20210216958 - Pacheco; Daniel ;   et al.
2021-07-15
Atomic transactional processing
Grant 11,032,083 - Chao , et al. June 8, 2
2021-06-08
Prevention of majority attacks
Grant 10,834,122 - Chao , et al. November 10, 2
2020-11-10
Database Private Document Sharing
App 20200349261 - Koorella; Vijender ;   et al.
2020-11-05
Using Quick Response (QR) Codes to Collect Recurring Payments
App 20200273018 - Chao; Ching-Yun ;   et al.
2020-08-27
Temporal mandible data capture analysis and recommendation
Grant 10,743,973 - Adams , et al. A
2020-08-18
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
Grant 10,666,441 - Chang , et al.
2020-05-26
Performance Optimization
App 20200142988 - Chao; Ching-Yun ;   et al.
2020-05-07
Atomic Transactional Processing
App 20200145221 - Chao; Ching-Yun ;   et al.
2020-05-07
Temporal mandible data capture analysis and recommendation
Grant 10,639,135 - Adams , et al.
2020-05-05
Prevention Of Majority Attacks
App 20200076830 - Chao; Ching-Yun ;   et al.
2020-03-05
Guarding against cross-site request forgery (CSRF) attacks
Grant 10,454,949 - Lo , et al. Oc
2019-10-22
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment
App 20190229917 - Chang; John Y-C. ;   et al.
2019-07-25
Sponsored trust relationship management between multiple racks
Grant 10,341,324 - Chang , et al.
2019-07-02
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
Grant 10,341,109 - Chang , et al.
2019-07-02
Wireless power distribution management in an open environment
Grant 10,291,072 - Chao , et al.
2019-05-14
Temporal Mandible Data Capture Analysis And Recommendation
App 20190133730 - Adams; Ebony C. ;   et al.
2019-05-09
Temporal Mandible Data Capture Analysis And Recommendation
App 20190133731 - Adams; Ebony C. ;   et al.
2019-05-09
Robotic Chef
App 20190111569 - Chang; David Y. ;   et al.
2019-04-18
Robotic Chef
App 20190111568 - Chang; David Y. ;   et al.
2019-04-18
Construct data management between loosely coupled racks
Grant 10,171,561 - Chang , et al. J
2019-01-01
Sponsored Trust Relationship Management Between Multiple Racks
App 20180241737 - Chang; John Yow-Chun ;   et al.
2018-08-23
Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management
Grant 9,985,787 - Quirk , et al. May 29, 2
2018-05-29
Sponsored trust relationship management between multiple racks
Grant 9,985,954 - Chang , et al. May 29, 2
2018-05-29
Trust relationship management amongst racks in a data center
Grant 9,906,370 - Apte , et al. February 27, 2
2018-02-27
Wireless Power Distribution Management In An Open Environment
App 20170324278 - Chao; Ching-Yun ;   et al.
2017-11-09
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment
App 20170279610 - Chang; John Y-C. ;   et al.
2017-09-28
Distributor business policy driven cloud services integration
Grant 9,767,497 - Chao , et al. September 19, 2
2017-09-19
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
Grant 9,712,322 - Chang , et al. July 18, 2
2017-07-18
Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management
Grant 9,705,676 - Quirk , et al. July 11, 2
2017-07-11
Guarding against cross-site request forgery (CSRF) attacks
App 20170149803 - Lo; Lewis ;   et al.
2017-05-25
Sponsored Trust Relationship Management Between Multiple Racks
App 20170149765 - Chang; John Yow-Chun ;   et al.
2017-05-25
Trust Relationship Management Amongst Racks In A Data Center
App 20170141927 - Apte; Ajay A. ;   et al.
2017-05-18
Method For Establshing, Configuring, And Managing A Transient Social Group
App 20170142188 - Chang; David Y. ;   et al.
2017-05-18
Construct Data Management Between Loosely Coupled Racks
App 20170134302 - Chang; John Yow-Chun ;   et al.
2017-05-11
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment
App 20170026179 - Chang; John Y-C. ;   et al.
2017-01-26
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
Grant 9,531,538 - Chang , et al. December 27, 2
2016-12-27
Extending infrastructure security to services in a cloud computing environment
Grant 9,426,155 - Chao , et al. August 23, 2
2016-08-23
Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management
App 20160226666 - Quirk; Aaron James ;   et al.
2016-08-04
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment
App 20160099808 - Chang; John Y-C. ;   et al.
2016-04-07
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
Grant 9,237,020 - Chang , et al. January 12, 2
2016-01-12
Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management
App 20150356286 - Quirk; Aaron James ;   et al.
2015-12-10
Establishing a trust relationship between two product systems
Grant 9,160,731 - Chang , et al. October 13, 2
2015-10-13
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
Grant 9,148,285 - Chang , et al. September 29, 2
2015-09-29
Establishing a Trust Relationship Between Two Product Systems
App 20150074395 - Chang; John Y. ;   et al.
2015-03-12
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment
App 20150006902 - Chang; John Y-C. ;   et al.
2015-01-01
Extending infrastructure security to services in a cloud computing environment
App 20140317716 - Chao; Ching-Yun ;   et al.
2014-10-23
Ensuring integrity of security event log upon download and delete
Grant 8,856,086 - Chao , et al. October 7, 2
2014-10-07
Controlling Exposure of Sensitive Data and Operation Using Process Bound Security Tokens in Cloud Computing Environment
App 20140208119 - Chang; John Y-C. ;   et al.
2014-07-24
Backup and restore in a secure appliance with integrity and confidentiality
Grant 8,769,274 - Chao July 1, 2
2014-07-01
Backup and restore in a secure appliance with integrity and confidentiality
App 20140068258 - Chao; Ching-Yun
2014-03-06
Ensuring integrity of security event log upon download and delete
App 20140059013 - Chao; Ching-Yun ;   et al.
2014-02-27
Integrated security roles
Grant 8,572,694 - Chang , et al. October 29, 2
2013-10-29
Workstation application server programming protection via classloader policy based visibility control
Grant 8,447,975 - Botzum , et al. May 21, 2
2013-05-21
Using a portable computing device as a smart key device
Grant 8,112,628 - Bade , et al. February 7, 2
2012-02-07
Method and apparatus for preventing rogue implementations of a security-sensitive class interface
Grant 7,925,881 - Birk , et al. April 12, 2
2011-04-12
Method for using a compact disk as a smart key device
Grant 7,908,492 - Bade , et al. March 15, 2
2011-03-15
Highly scalable and highly available cluster system management scheme
Grant 7,870,234 - Arendt , et al. January 11, 2
2011-01-11
Highly scalable and highly available cluster system management scheme
Grant 7,870,235 - Arendt , et al. January 11, 2
2011-01-11
Method and system for protecting master secrets using smart key devices
Grant 7,849,326 - Chao December 7, 2
2010-12-07
Systems and methods for management and auto-generation of encryption keys
Grant 7,822,206 - Birk , et al. October 26, 2
2010-10-26
Application server object-level security for distributed computing domains
Grant 7,810,132 - Birk , et al. October 5, 2
2010-10-05
Credential delegation using identity assertion
Grant 7,765,585 - Chao , et al. July 27, 2
2010-07-27
Error detection protocol
Grant 7,756,830 - Chao , et al. July 13, 2
2010-07-13
Dynamic cache lookup based on dynamic data
Grant 7,752,452 - Birk , et al. July 6, 2
2010-07-06
Preventing rogue implementations of a security-sensitive class interface
Grant 7,734,918 - Birk , et al. June 8, 2
2010-06-08
Method and system for establishing a trust framework based on smart key devices
Grant 7,711,951 - Chao May 4, 2
2010-05-04
Role-based access control management for multiple heterogeneous application components
Grant 7,676,831 - Britton , et al. March 9, 2
2010-03-09
Method for assuring event record integrity
Grant 7,661,111 - Chao February 9, 2
2010-02-09
Method for Using a Compact Disk as a Smart Key Device
App 20090327763 - Bade; Steven A. ;   et al.
2009-12-31
Using a Portable Computing Device as a Smart Key Device
App 20090313470 - Bade; Steven A. ;   et al.
2009-12-17
Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework
Grant 7,634,803 - Birk , et al. December 15, 2
2009-12-15
Dynamic Cache Lookup Based on Dynamic Data
App 20090138951 - Birk; Peter Daniel ;   et al.
2009-05-28
System and method for credential delegation using identity assertion
Grant 7,526,798 - Chao , et al. April 28, 2
2009-04-28
Method for tracking security attributes along invocation chain using secure propagation token
Grant 7,526,799 - Birk , et al. April 28, 2
2009-04-28
Dynamic cache lookup based on dynamic data
Grant 7,487,361 - Birk , et al. February 3, 2
2009-02-03
Using security levels to improve permission checking performance and manageability
Grant 7,475,431 - Chao January 6, 2
2009-01-06
Method for using a portable computing device as a smart key device
Grant 7,475,247 - Bade , et al. January 6, 2
2009-01-06
Highly Scalable and Highly Available Cluster System Management Scheme
App 20080320113 - Arendt; James W. ;   et al.
2008-12-25
Highly scalable and highly available cluster system management scheme
App 20080320112 - Arendt; James W. ;   et al.
2008-12-25
Integrated Security Roles
App 20080295147 - Chang; David Yu ;   et al.
2008-11-27
Method for integrated security roles
Grant 7,454,786 - Chang , et al. November 18, 2
2008-11-18
Application server object-level security for distributed computing domains
Grant 7,448,066 - Birk , et al. November 4, 2
2008-11-04
Application Server Object-level Security for Distributed Computing Domains
App 20080222697 - Birk; Peter Daniel ;   et al.
2008-09-11
Credential Delegation Using Identity Assertion
App 20080196097 - Chao; Ching-Yun ;   et al.
2008-08-14
Highly scalable and highly available cluster system management scheme
Grant 7,412,479 - Arendt , et al. August 12, 2
2008-08-12
Method and system for using a compact disk as a smart key device
Grant 7,386,736 - Bade , et al. June 10, 2
2008-06-10
Method And Apparatus For Preventing Rogue Implementations Of A Security-sensitive Class Interface
App 20080133910 - Birk; Peter Daniel ;   et al.
2008-06-05
Systems And Methods For Management And Auto-generation Of Encryption Keys
App 20080101610 - BIRK; PETER D. ;   et al.
2008-05-01
Method and apparatus for preventing rogue implementations of a security-sensitive class interface
Grant 7,337,318 - Birk , et al. February 26, 2
2008-02-26
Method And Apparatus For Preventing Rogue Implementations Of A Security-sensitive Class Interface
App 20080034202 - Birk; Peter Daniel ;   et al.
2008-02-07
Securing Access To A Service Data Object
App 20070271618 - CHAO; CHING-YUN ;   et al.
2007-11-22
Method for assuring event record integrity
App 20070089116 - Chao; Ching-Yun
2007-04-19
Role-based access control management for multiple heterogeneous application components
App 20070056026 - Britton; Kathryn H. ;   et al.
2007-03-08
Workstation application server programming protection via classloader policy based visibility control
App 20070011451 - Botzum; Keys S. ;   et al.
2007-01-11
Method for maintaining application compatibility within an application isolation policy
App 20070011723 - Chao; Ching-Yun
2007-01-11
Method and system for using a portable computing device as a smart key device
App 20060133615 - Bade; Steven A. ;   et al.
2006-06-22
Method and system for using a compact disk as a smart key device
App 20060136748 - Bade; Steven A. ;   et al.
2006-06-22
Method and system for providing highly available services based on a load balancing policy and a reusable connection context object
Grant 7,058,717 - Chao , et al. June 6, 2
2006-06-06
Dynamic cache lookup based on dynamic data
App 20060020813 - Birk; Peter Daniel ;   et al.
2006-01-26
Method and apparatus for tracking security attributes along invocation chain using secure propagation token
App 20060021016 - Birk; Peter Daniel ;   et al.
2006-01-26
Method and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework
App 20060015727 - Birk; Peter Daniel ;   et al.
2006-01-19
System and method for using security levels to improve permission checking performance and manageability
App 20060005019 - Chao; Ching-Yun
2006-01-05
Method and apparatus for handling custom token propagation without Java serialization
App 20060005234 - Birk; Peter Daniel ;   et al.
2006-01-05
System and method for using security levels to simplify security policy management
App 20050278790 - Birk, Peter Daniel ;   et al.
2005-12-15
Fine grained role-based access to system resources
Grant 6,950,825 - Chang , et al. September 27, 2
2005-09-27
Method and system for protecting master secrets using smart key devices
App 20050154898 - Chao, Ching-Yun
2005-07-14
Method and system for establishing a trust framework based on smart key devices
App 20050154875 - Chao, Ching-Yun
2005-07-14
Declarative trust model between reverse proxy server and websphere application server
App 20050154886 - Birk, Peter Daniel ;   et al.
2005-07-14
System and method for secure network state management and single sign-on
App 20050154887 - Birk, Peter Daniel ;   et al.
2005-07-14
System and method for integrated security roles
App 20040193909 - Chang, David Yu ;   et al.
2004-09-30
Method and apparatus for preventing rogue implementations of a security-sensitive class interface
App 20040172530 - Birk, Peter Daniel ;   et al.
2004-09-02
Apparatus and method for maintaining consistency of shared data resources in a cluster environment
Grant 6,748,381 - Chao , et al. June 8, 2
2004-06-08
JAAS security and COBRA security integration
App 20040098614 - Chang, David Yu ;   et al.
2004-05-20
System and method for credential delegation using identity assertion
App 20040088578 - Chao, Ching-Yun ;   et al.
2004-05-06
Application server object-level security for distributed computing domains
App 20040059940 - Birk, Peter Daniel ;   et al.
2004-03-25
Method and system to provide highly available services
App 20040019680 - Chao, Ching-Yun ;   et al.
2004-01-29
Fine grained role-based access to system resources
App 20030229623 - Chang, David Yu ;   et al.
2003-12-11
Apparatus and method for tracking access to data resources in a cluster environment
Grant 6,587,860 - Chandra , et al. July 1, 2
2003-07-01
Method and system for replicating data in a distributed computer environment
Grant 6,529,960 - Chao , et al. March 4, 2
2003-03-04
Method and apparatus for building and managing multi-clustered computer systems
Grant 6,438,705 - Chao , et al. August 20, 2
2002-08-20
Highly scalable and highly available cluster system management scheme
Grant 6,427,163 - Arendt , et al. July 30, 2
2002-07-30
Highly scalable and highly available cluster system management scheme
App 20020091814 - Arendt, James W. ;   et al.
2002-07-11
Method and apparatus for managing clustered computer systems
Grant 6,393,485 - Chao , et al. May 21, 2
2002-05-21
Method, system and computer program for replicating data in a distributed computed environment
Grant 6,338,092 - Chao , et al. January 8, 2
2002-01-08
Resource group quorum scheme for highly scalable and highly available cluster system management
Grant 6,314,526 - Arendt , et al. November 6, 2
2001-11-06
Method and system for replicating data in a distributed computer environment
App 20010037398 - Chao, Ching-Yun ;   et al.
2001-11-01
Enqueuing a configuration change in a network cluster and restore a prior configuration in a back up storage in reverse sequence ordered
Grant 6,003,075 - Arendt , et al. December 14, 1
1999-12-14
Virtual memory management for a microkernel system with multiple operating systems
Grant 5,842,226 - Barton , et al. November 24, 1
1998-11-24

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed