Patents by Inventor David Yu Chang

David Yu Chang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240090564
    Abstract: Features relating to a vaporizer body are provided. The vaporizer body may include an outer shell that includes an inner region defined by an outer shell sidewall. A support structure is configured to fit within the inner region of the outer shell. The support structure includes a storage region defined by a top support structure, a bottom support structure, a bottom cap, and a gasket. An integrated board assembly is configured to fit within the storage region of the support structure. The integrated board assembly may include a printed circuit board assembly formed of multiple layers that form a rigid structure and that include an inner, flexible layer. A first antenna is integrated at a proximal end of the flexible layer, and a second antenna is integrated at a distal end of the flexible layer.
    Type: Application
    Filed: April 24, 2023
    Publication date: March 21, 2024
    Inventors: Joshua Fu, Christopher Loental, Marko Markovic, Alexander Weiss, Alexander Ringrose, David Carlberg, Robyn Nariyoshi, Devin Spratt, Nicholas J. Hatton, Yen Jen Chang, Chen Yu Li, Barry Tseng, Prince Wang, Thomas Germann, Andreas Schaefer
  • Patent number: 11297066
    Abstract: Described are techniques for an access management protocol including a method comprising associating a granted permission set and a constrained permission set to a user profile in an access management system. Respective granted permissions in the granted permission set authorize the user profile to perform the respective granted permissions, and respective constrained permissions in the constrained permission set preclude the user profile from performing the respective constrained permissions. The method further comprises receiving a permission-based request at the access management system and from the user profile and determining that the permission-based request is associated with a permission that is included in both the granted permission set and the constrained permission set. The method further comprises rejecting the permission-based request.
    Type: Grant
    Filed: January 20, 2020
    Date of Patent: April 5, 2022
    Assignee: International Business Machines Corporation
    Inventors: Yi-hsiu Wei, David Yu Chang, Ching-Yun Chao, Hui-Ming Lin
  • Patent number: 11196774
    Abstract: A method, system, and computer program product for detecting a network application security question is provided. The method includes receiving permission to access social media sources of a user. The social media sources and Internet based sources of the user are monitored in response to receiving the permission and associated data is generated and stored. A request for access to a secure account of the user is received and a list of security questions is presented to the user. The list of security questions is analyzed with respect to the data and each security question is ranked. An answer to a question of the list is received and analyzed and security attributes of the answer with respect to a potential malicious attempt to provide a predicted answer to for access to secure account are determined. A resulting security process with respect to enabling access to the secure account is executed.
    Type: Grant
    Filed: March 5, 2020
    Date of Patent: December 7, 2021
    Assignee: International Business Machines Corporation
    Inventors: Yi-hsiu Wei, David Yu Chang, Ching-Yun Chao
  • Patent number: 11176274
    Abstract: A method, computer system, and computer program product for protecting user data while performing third-party account registration. The method may include receiving, from a third party, a request for personal data of a user. The method may request the user to authenticate the request for personal data. In response to receiving from the user the authentication, the method may include providing the third party the personal data of the user. A portion of the personal data of the user that is provided to the third party may be altered and may be mapped to the user. The method may store identifying information about the third party. The method may also include receiving, from the user, a parameter respecting use of the portion of the personal data that is altered. The parameter may limit the third party from obtaining information from the portion of the personal data that is altered.
    Type: Grant
    Filed: May 28, 2019
    Date of Patent: November 16, 2021
    Assignee: International Business Machines Corporation
    Inventors: Adam Yoho, David Yu Chang, Wilalberto Rodriguez, Paul William Bennett, Zechariah Hein
  • Publication number: 20210281612
    Abstract: A method, system, and computer program product for detecting a network application security question is provided. The method includes receiving permission to access social media sources of a user. The social media sources and Internet based sources of the user are monitored in response to receiving the permission and associated data is generated and stored. A request for access to a secure account of the user is received and a list of security questions is presented to the user. The list of security questions is analyzed with respect to the data and each security question is ranked. An answer to a question of the list is received and analyzed and security attributes of the answer with respect to a potential malicious attempt to provide a predicted answer to for access to secure account are determined. A resulting security process with respect to enabling access to the secure account is executed.
    Type: Application
    Filed: March 5, 2020
    Publication date: September 9, 2021
    Inventors: Yi-hsiu Wei, David Yu Chang, Ching-Yun Chao
  • Publication number: 20210271766
    Abstract: Transaction information management is provided. A request for a transaction identifier is received from a first entity to perform a transaction with a user. Transaction information for the transaction determined with the transaction information including authorized entities and sets of personal information of the user available to each of the authorized entities. The transaction information is stored. The transaction identifier linked to the transaction is generated. The transaction identifier is provided to the first entity.
    Type: Application
    Filed: March 2, 2020
    Publication date: September 2, 2021
    Inventors: Adam Yoho, David Yu Chang, Zechariah Hein, Paul William Bennett, Wilalberto Rodriguez
  • Publication number: 20210226956
    Abstract: Described are techniques for an access management protocol including a method comprising associating a granted permission set and a constrained permission set to a user profile in an access management system. Respective granted permissions in the granted permission set authorize the user profile to perform the respective granted permissions, and respective constrained permissions in the constrained permission set preclude the user profile from performing the respective constrained permissions. The method further comprises receiving a permission-based request at the access management system and from the user profile and determining that the permission-based request is associated with a permission that is included in both the granted permission set and the constrained permission set. The method further comprises rejecting the permission-based request.
    Type: Application
    Filed: January 20, 2020
    Publication date: July 22, 2021
    Inventors: Yi-hsiu Wei, David Yu Chang, Ching-Yun Chao, Hui-Ming Lin
  • Patent number: 10897463
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: January 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Publication number: 20200380164
    Abstract: A method, computer system, and computer program product for protecting user data while performing third-party account registration. The method may include receiving, from a third party, a request for personal data of a user. The method may request the user to authenticate the request for personal data. In response to receiving from the user the authentication, the method may include providing the third party the personal data of the user. A portion of the personal data of the user that is provided to the third party may be altered and may be mapped to the user. The method may store identifying information about the third party. The method may also include receiving, from the user, a parameter respecting use of the portion of the personal data that is altered. The parameter may limit the third party from obtaining information from the portion of the personal data that is altered.
    Type: Application
    Filed: May 28, 2019
    Publication date: December 3, 2020
    Inventors: Adam Yoho, David Yu Chang, Wilalberto Rodriguez, Paul William Bennett, Zechariah Hein
  • Publication number: 20190297070
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Application
    Filed: June 10, 2019
    Publication date: September 26, 2019
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 10367806
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Grant
    Filed: June 20, 2017
    Date of Patent: July 30, 2019
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Publication number: 20170302651
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Application
    Filed: June 20, 2017
    Publication date: October 19, 2017
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 9722995
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Grant
    Filed: January 9, 2015
    Date of Patent: August 1, 2017
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 9288214
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: March 15, 2016
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Publication number: 20150222626
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Application
    Filed: January 9, 2015
    Publication date: August 6, 2015
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 9021093
    Abstract: Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein
    Type: Grant
    Filed: August 17, 2010
    Date of Patent: April 28, 2015
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Publication number: 20150007274
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
    Type: Application
    Filed: June 30, 2014
    Publication date: January 1, 2015
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 8769622
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa
  • Patent number: 8572694
    Abstract: An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.
    Type: Grant
    Filed: March 14, 2008
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: David Yu Chang, Ching-Yun Chao
  • Publication number: 20130007845
    Abstract: An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David Yu Chang, Messaoud Benantar, John Yow-Chun Chang, Vishwanath Venkataramappa