Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Inventor:
Chang; David Yu
Address:
Austin, TX
No. of patents:
29
Patents:












Patent Number Title Of Patent Date Issued
8572694 Integrated security roles October 29, 2013
An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security ro
8290163 Automatic wireless network password update October 16, 2012
An approach is provided that allows an administrator to set a new password at a wireless access point, such as a traditional WAP or a wireless router. The wireless access point creates a message that includes the new password. The message is encrypted using the old password that was
7874008 Dynamically configuring extensible role based manageable resources January 18, 2011
Methods and systems are provided for dynamically altering the capabilities of a software application in response to a request from a user to perform an action in the application. Based on the user's security role, the software application is reconfigured by either granting access to the
7731089 Interactive physical mail content management June 8, 2010
A computer implemented method, apparatus, and computer usable program code for interactive mail management of physical mail. Physical mail is received in a mailbox. An identifier is read in response to receiving the physical mail in the mailbox. The physical mail contains the identifier.
7546640 Fine-grained authorization by authorization table associated with a resource June 9, 2009
Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource. Further, the embodiment includ
7483914 Method and system for implementing an application-based naming system January 27, 2009
A method is presented for processing names by a naming service. A naming service obtains an application name for an application along with at least one deployment attribute for a deployment of an instance of the application within a data processing system. The naming service generates
7454786 Method for integrated security roles November 18, 2008
A method for integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifi
7299288 System and method for concurrent security connections November 20, 2007
A system and method for concurrent security connections is presented. An association table is used that includes a list of active credentials. An active credential includes information such as user id and password information for a given domain. The active credential may also include
7210125 Method and system for application installation and management using an application-based naming April 24, 2007
A method is presented for managing applications using application-based names. A naming service registers an alias name; the alias name represents a first compound name that includes an application name that is associated with an application and a deployment name that is associated w
7203697 Fine-grained authorization using mbeans April 10, 2007
Methods, systems, and media are disclosed for managing a resource managed by a mbean server having an mbean. One embodiment includes receiving a request by the application, wherein the request constitutes an action a user seeks to perform on the resource, and adding a number of instance
7139918 Multiple secure socket layer keyfiles for client login support November 21, 2006
A method and system to allow multiple users of a client computer to establish a secure connection for each of the multiple users between the client computer and a server computer. Each user is allowed to unlock a keyfile unique to that user. The unique keyfile is able to authenticate
7076798 Securing non-EJB corba objects using an EJB security mechanism July 11, 2006
A method and system for providing security protection to Common Object Request Broker Architecture (CORBA) objects located on a server. An EJB shadow object is created for the CORBA object. The EJB shadow object invokes an EJB security mechanism on behalf of the CORBA object, thus pr
6996620 System and method for concurrent security connections February 7, 2006
A system and method for concurrent security connections is presented. An association table is used that includes a list of active credentials. An active credential includes information such as user id and password information for a given domain. The active credential may also include
6950825 Fine grained role-based access to system resources September 27, 2005
A security policy process which provides role-based permissions for hierarchically organized system resources such as domains, clusters, application servers, and resources, as well as topic structures for messaging services. Groups of permissions are assigned to roles, and each user
6912718 EVENT NOTIFICATION CHANNEL BETWEEN SUPPLIER AND CONSUMER OBJECTS IN OBJECT ORIENTED PROGRAMMING June 28, 2005
An event notification channel is provided in a computer controlled object oriented programming system having at least one event supplier object and a plurality of event consumer objects which may be run continuously without interruption and without loss of event notification to any c
6898717 Network domain with secured and unsecured servers May 24, 2005
A method and implementing computer system are provided in which a Quality Of Protection (QOP) indication is established in a tagged component for servers in a network domain. Each server may have one QOP setting associated with the server for inbound messages and another QOP setting
6704765 System for allocating resources among agent processes March 9, 2004
A certain number of agents and tokens are created. A first agent that is assigned a request must obtain a token to process the request. The number of agents which may concurrently process requests are limited by preventing an agent from processing a request unless the agent has an as
6687831 Method and apparatus for multiple security service enablement in a data processing system February 3, 2004
A method and apparatus in a computer system for establishing a connection between a client proxy object and a server target object. A request is received from the client proxy object to access the server target object, wherein the request includes an identification of a type of communica
6397383 Constraint language parser which rejects invalid filter constraint during run time May 28, 2002
The present invention provides a system and method for parsing a constraint language in a computer network. The method includes receiving a constraint string; parsing the constraint string, comprising replacement of valid operators, variables, and values with special characters; and dete
6292825 Service application with pull notification September 18, 2001
A method and implementing computer system is provided in which an event/notification channel of a service provider will send a brief "notification" of an arrival of a full or complete event/notification message which has been received in an event/notification channel, to all relevant
6286025 Method and system of process identification by user defined process variables September 4, 2001
A method and system is provided for attaching user defined information to a process object in a data processing system. The method comprises creating a process control block corresponding to an invoked process. The control block has system defined process variables that are assigned valu
6272554 Method and apparatus for a corba typecode data manipulator August 7, 2001
A method and apparatus for decomposing arbitrarily complex CORBA data types into a flat data buffer and recomposing the data type back from the buffer. CORBA TypeCode data is converted to/from stream form. A memory management function releases the memory used for the reconstructed form o
6240453 Managing unused resources in a service application May 29, 2001
A method and implementing computer system is provided in which a service provider application for a network enables clients to selectively create communication channels and resources within the network. The application is programmed to monitor and examine the created resources for client
5870753 Method and apparatus for enabling a persistent metastate for objects in an object oriented envir February 9, 1999
A method and apparatus for enabling the maintenance of multiple metastates for a persistent object without increasing the size of the object reference. An object reference data structure is provided in memory and persistent storage to carry a key which contains a universal unique ide
5870742 Method and apparatus for enabling persistent attributes in an object oriented environment February 9, 1999
A method and apparatus for saving and restoring persistent objects in a distributed object-oriented programming environment. This invention maintains persistent values for individual attributes and or instance variables. Attribute persistence is implemented using an interface that is
5802383 Method and apparatus for displaying clusters on a computer network September 1, 1998
A method and apparatus for monitoring the status of a computer network by displaying polygon-shaped objects (or "icons") to represent groups of devices connected to the network. In a preferred embodiment each device (or "node") on the network is assigned to one of a number of groups (or
5724065 Float to surface display March 3, 1998
A method, system and program for displaying data in a panel with output fields which are insufficiently long to display some data. A panel with data in a plurality of output fields is displayed, in one preferred embodiment, the data is displayed in matrix form. A first data displayed
5706516 System for communicating messages among agent processes January 6, 1998
Data processing application requests are processed in a computer system configured as a plurality of nodes with a plurality of interacting processes. Data is requested by an application request originating on a first node. The request data includes data located on a plurality of the
5675798 System and method for selectively and contemporaneously monitoring processes in a multiprocessin October 7, 1997
A system, method and program product for determining and displaying the status of client application programs executing on a multiprocessing server. Server process control blocks and synchronization object descriptors are created in the shared memory of the server. Application progra










 
 
  Recently Added Patents
Plasma panel based radiation detector
Electron beam manipulation system and method in X-ray sources
Housing for gas flow indicator
Transmission apparatus, receiving apparatus, method, and storage medium
Rim for a TV receiver
Portable, single member housing cord protector
Method of manufacturing pipe with branch
  Randomly Featured Patents
Apparatus for storing bottles
Method of containing a botanical item
Service ceiling, in particular for laboratories, and method of installing such a ceiling
Internal combustion engine with SCR and integrated ammonia production
"Scoopeeze" portable canine waste pick-up device
Method and apparatus for detecting failure in vibrating sensors
Topical anti-acne composition
Write head with modified side shields
Stable selvage intermediate for weft inserted warp knit draperies
Spray dried mustard flour