Patents by Inventor Jun Jie Yu

Jun Jie Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11645375
    Abstract: Embodiments of the present disclosure relate to methods, systems and computer program products for authorization of resource access. According to the method, a first token is assigned by one or more processing units to authorize a client to access at least one protected resource of a resource owner. The first token depends on an access session with the client. A second token associated with at least one long-term protected resource of the resource owner is assigned by one or more processing units to the client based on the assigning of the first token. The second token is independent from the access session. In response to receiving a request including the second token from the client, the at least one long-term protected resource is provided by one or more processing units to the client. In other embodiments, a further method and corresponding systems and computer program products are disclosed.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: May 9, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jun Jie Yu, Chang Lei, Kun Yang, Zhi Yong Xue, Jing Cai, Hu Wang
  • Publication number: 20200104473
    Abstract: Embodiments of the present disclosure relate to methods, systems and computer program products for authorization of resource access. According to the method, a first token is assigned by one or more processing units to authorize a client to access at least one protected resource of a resource owner. The first token depends on an access session with the client. A second token associated with at least one long-term protected resource of the resource owner is assigned by one or more processing units to the client based on the assigning of the first token. The second token is independent from the access session. In response to receiving a request including the second token from the client, the at least one long-term protected resource is provided by one or more processing units to the client. In other embodiments, a further method and corresponding systems and computer program products are disclosed.
    Type: Application
    Filed: September 27, 2018
    Publication date: April 2, 2020
    Inventors: Jun Jie Yu, Chang Lei, Kun Yang, Zhi Yong Xue, Jing Cai, Hu Wang
  • Publication number: 20200104418
    Abstract: Method, computer program products, system are provided. A search request for a target object from a user is received. The request comprises at least one keyword and at least one Key Circle, wherein the at least one Key Circle includes at least one person selected by the user from a social network associated with the user. Based on the request, a search is conducted. Further, a result of the search is returned to the user, wherein the result includes at least one item that includes the target object related to both the at least one key word and the at least one Key Circle.
    Type: Application
    Filed: September 27, 2018
    Publication date: April 2, 2020
    Inventors: Chang Lei, Jing Cai, Kun Yang, Jun Jie Yu, Zhi Yong Xue, Li Juan Chen, Yahui Song