Patents by Inventor David Yu Chang

David Yu Chang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190297070
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Application
    Filed: June 10, 2019
    Publication date: September 26, 2019
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 10367806
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Grant
    Filed: June 20, 2017
    Date of Patent: July 30, 2019
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Publication number: 20170302651
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Application
    Filed: June 20, 2017
    Publication date: October 19, 2017
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 9722995
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Grant
    Filed: January 9, 2015
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 9288214
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: March 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Publication number: 20150222626
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Application
    Filed: January 9, 2015
    Publication date: August 6, 2015
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 9021093
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Grant
    Filed: August 17, 2010
    Date of Patent: April 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Publication number: 20150007274
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
    Type: Application
    Filed: June 30, 2014
    Publication date: January 1, 2015
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 8769622
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 8572694
    Abstract: An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.
    Type: Grant
    Filed: March 14, 2008
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Ching-Yun Chao
  • Publication number: 20130007845
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 8290163
    Abstract: An approach is provided that allows an administrator to set a new password at a wireless access point, such as a traditional WAP or a wireless router. The wireless access point creates a message that includes the new password. The message is encrypted using the old password that was previously set for the wireless network. The encrypted message is wirelessly transmitted from the wireless access point to the active client devices (those clients currently accessing the wireless network). The clients decrypt the message using the old password that was previously provided to the clients. The clients retrieve the new password from the message. The clients construct a new message that is encrypted using the new password. The new message is wirelessly transmitted from the clients to the wireless access device and serves as an acknowledgement.
    Type: Grant
    Filed: March 15, 2008
    Date of Patent: October 16, 2012
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Publication number: 20120047258
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Application
    Filed: August 17, 2010
    Publication date: February 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 7874008
    Abstract: Methods and systems are provided for dynamically altering the capabilities of a software application in response to a request from a user to perform an action in the application. Based on the user's security role, the software application is reconfigured by either granting access to the user to an existing component of the application, or if no suitable component is available, adding an external vendor component to the software application which is suitable for performing the requested action.
    Type: Grant
    Filed: August 29, 2006
    Date of Patent: January 18, 2011
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chung Chang, Vishwanath Venkataramappa
  • Patent number: 7731089
    Abstract: A computer implemented method, apparatus, and computer usable program code for interactive mail management of physical mail. Physical mail is received in a mailbox. An identifier is read in response to receiving the physical mail in the mailbox. The physical mail contains the identifier. Information contained in the identifier is sent to the mail recipient. The mail recipient is able to identify instructions for communicating with a sender associated with the physical mail based on the information from the identifier.
    Type: Grant
    Filed: August 8, 2006
    Date of Patent: June 8, 2010
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 7546640
    Abstract: Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource. Further, the embodiment includes locating, based on the request, the resource in a structure having groupings of resources, wherein the groupings include a grouping having the resource. Typically the groupings comprise files having mappings of resources to assigned groups, and each group has an associated authorization table mapping roles or policies to users. Further still, the embodiment includes reading an authorization table associated with the grouping having the resource, and determining whether to grant the access rights for performing the action on the resource.
    Type: Grant
    Filed: December 10, 2003
    Date of Patent: June 9, 2009
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Vishwanath Venkataramappa, Leigh Allen Williamson
  • Publication number: 20090037196
    Abstract: A method, computer program product, and apparatus for receiving a postal mail item. The postal mail item is received. The postal mail item contains a radio frequency identifier identifying the sender of the postal mail item. Responsive to receiving the postal mail item in the mailbox, the radio frequency identifier of the postal mail item is scanned with a scanner to identify the sender of the postal mail item. A determination is made whether the sender of the postal mail item is in a junk mail list. The junk mail list includes a list of senders accessible to a processor in the scanner.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 5, 2009
    Inventors: David Yu Chang, John Yow-Chun Chang, Syed-Muasir Khalll, Vishwanath Venkataramappa
  • Patent number: 7483914
    Abstract: A method is presented for processing names by a naming service. A naming service obtains an application name for an application along with at least one deployment attribute for a deployment of an instance of the application within a data processing system. The naming service generates an application-based name for the instance of the application; the application-based name represents a context within a naming system that is supported by the naming service, and the application-based name is a compound name that includes the application name and at least one deployment name for a deployment attribute. A deployment attribute is a metadata value, such as a deployment identifier or version identifier, that characterizes a manner in which the instance of the application is deployed within the data processing system.
    Type: Grant
    Filed: July 17, 2003
    Date of Patent: January 27, 2009
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, William Mitchell Edwards, Russell Ley Newcombe
  • Publication number: 20080295147
    Abstract: An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.
    Type: Application
    Filed: March 14, 2008
    Publication date: November 27, 2008
    Inventors: David Yu Chang, Ching-Yun Chao
  • Patent number: 7454786
    Abstract: A method for integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.
    Type: Grant
    Filed: March 27, 2003
    Date of Patent: November 18, 2008
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Ching-Yun Chao