Patents by Inventor Wuchieh J. Jong

Wuchieh J. Jong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10142162
    Abstract: Modifying a behavior of a mobile application running on a mobile data processing system is provided. Information regarding a system function of the mobile data processing system is retrieved. It is determined whether the information regarding the system function meets a criterion of a policy trigger corresponding to the system function. In response to determining that the information regarding the system function does meet a criterion of the policy trigger corresponding to the system function, an action is performed to modify the behavior of the mobile application running on the mobile data processing system that corresponds to the system function meeting the criterion of the policy trigger.
    Type: Grant
    Filed: August 19, 2016
    Date of Patent: November 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Christopher A. Hambridge, Kevan D. Holdaway, Wuchieh J. Jong, Dillon D. Lees
  • Publication number: 20180330304
    Abstract: A pool of candidates to respond to an issue can be determined. For each of a plurality of candidates who are included in the pool of candidates, information corresponding to a respective candidate can be accessed. The information corresponding to the respective candidate can at least indicate the respective candidate's current location and metadata pertaining to the current location. For each of the plurality of candidates who are included in the pool of candidates, the information corresponding to the respective candidate can be analyzed. Based on the analyzing the information, at least one best available candidate to respond to the issue can be determined, the best available candidate selected from the pool of candidates.
    Type: Application
    Filed: May 9, 2017
    Publication date: November 15, 2018
    Inventors: Christopher A. Hambridge, Kevan D. Holdaway, Wuchieh J. Jong, Jorge L. Padilla, Helen L. Gawor
  • Publication number: 20180330305
    Abstract: A pool of candidates to respond to an issue can be determined. For each of a plurality of candidates who are included in the pool of candidates, information corresponding to a respective candidate can be accessed. The information corresponding to the respective candidate can at least indicate the respective candidate's current location and metadata pertaining to the current location. For each of the plurality of candidates who are included in the pool of candidates, the information corresponding to the respective candidate can be analyzed. Based on the analyzing the information, at least one best available candidate to respond to the issue can be determined, the best available candidate selected from the pool of candidates.
    Type: Application
    Filed: December 18, 2017
    Publication date: November 15, 2018
    Inventors: Christopher A. Hambridge, Kevan D. Holdaway, Wuchieh J. Jong, Jorge L. Padilla, Helen L. Gawor
  • Publication number: 20180054346
    Abstract: Modifying a behavior of a mobile application running on a mobile data processing system is provided. Information regarding a system function of the mobile data processing system is retrieved. It is determined whether the information regarding the system function meets a criterion of a policy trigger corresponding to the system function. In response to determining that the information regarding the system function does meet a criterion of the policy trigger corresponding to the system function, an action is performed to modify the behavior of the mobile application running on the mobile data processing system that corresponds to the system function meeting the criterion of the policy trigger.
    Type: Application
    Filed: August 19, 2016
    Publication date: February 22, 2018
    Inventors: Christopher A. Hambridge, Kevan D. Holdaway, Wuchieh J. Jong, Dillon D. Lees
  • Patent number: 8199916
    Abstract: A method, network element, and computer storage program product, are provided for selectively loading a communication network security enforcement point (“SEP”) with security association (“SA”) information for inspection of encrypted data in a secure, end-to-end communications path. At least one encrypted data packet is received. It is determined that SA information for decrypting the at least one encrypted data packet fails to exist locally at the SEP. A request is sent to a communication network key server for SA information associated with the at least one encrypted data packet. The SA information associated with the at least one encrypted data packet is received from the communication network key server.
    Type: Grant
    Filed: December 26, 2007
    Date of Patent: June 12, 2012
    Assignee: International Business Machines Corporation
    Inventors: Christopher Meyer, Wuchieh J. Jong, Linwood H. Overby, Jr.
  • Patent number: 7895646
    Abstract: A self-adjusting Internet Key Exchange (IKE) daemon negotiation throttle minimizes retransmission processing during Security Association (SA) negotiation requests. The self-adjusting IKE daemon receives a request for a new negotiation to be performed by a negotiation system; determines if the negotiation system is in congestion; and if the negotiation system is determined to be in congestion: determines if a token is available in a token bucket; and if a token is available in the token bucket, removes the token from the token bucket; and performs the new negotiation.
    Type: Grant
    Filed: May 25, 2006
    Date of Patent: February 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey B. Cates, Wuchieh J. Jong, Scott C. Moonen, Keith J. Welter
  • Publication number: 20090169005
    Abstract: A method, network element, and computer storage program product, are provided for selectively loading a communication network security enforcement point (“SEP”) with security association (“SA”) information for inspection of encrypted data in a secure, end-to-end communications path. At least one encrypted data packet is received. It is determined that SA information for decrypting the at least one encrypted data packet fails to exist locally at the SEP. A request is sent to a communication network key server for SA information associated with the at least one encrypted data packet. The SA information associated with the at least one encrypted data packet is received from the communication network key server.
    Type: Application
    Filed: December 26, 2007
    Publication date: July 2, 2009
    Inventors: Christopher Meyer, Wuchieh J. Jong, Linwood H. Overby, JR.
  • Publication number: 20070277232
    Abstract: The present invention provides an Internet Key Exchange (IKE) daemon self-adjusting negotiation throttle for minimizing retransmission processing during Security Association (SA) negotiation requests. A method in accordance with an embodiment of the present invention includes: receiving a request for a new negotiation to be performed by a negotiation system; determining if the negotiation system is in congestion; and if the negotiation system is determined to be in congestion: determining if a token is available in a token bucket; and if a token is available in the token bucket, removing the token from the token bucket; and performing the new negotiation.
    Type: Application
    Filed: May 25, 2006
    Publication date: November 29, 2007
    Inventors: Jeffrey B. Cates, Wuchieh J. Jong, Scott C. Moonen, Keith J. Welter