JH

Jinho Hwang

IBM: 90 patents #680 of 70,183Top 1%
KY Kyndryl: 1 patents #287 of 874Top 35%
📍 Ossining, NY: #17 of 613 inventorsTop 3%
🗺 New York: #680 of 115,490 inventorsTop 1%
Overall (All Time): #17,431 of 4,157,543Top 1%
91
Patents All Time

Issued Patents All Time

Showing 51–75 of 91 patents

Patent #TitleCo-InventorsDate
10803177 Compliance-aware runtime generation based on application patterns and risk assessment Constantin Mircea Adam, Nikolaos Anerousis, Shripad Nadgowda, Maja Vukovic 2020-10-13
10788829 Self-driving vehicle passenger management Michael S. Gordon, Roxana Monge Nunez, Maja Vukovic 2020-09-29
10789368 Compliance-aware runtime generation based on application patterns and risk assessment Constantin Mircea Adam, Nikolaos Anerousis, Shripad Nadgowda, Maja Vukovic 2020-09-29
10782949 Risk aware application placement modeling and optimization in high turnover DevOps environments Tonghoon Suk, Zemei Zeng 2020-09-22
10778713 Method and system to manage risk of vulnerabilities and corresponding change actions to address malware threats Sai Zeng, Vugranam C. Sreedhar, Karin Murthy, Milton H. Hernandez, Lisa M. Chavez +4 more 2020-09-15
10649758 Group patching recommendation and/or remediation with risk assessment Muhammed Fatih Bulut, Lisa M. Chavez, Virginia Mayo, Vugranam C. Sreedhar, Sai Zeng 2020-05-12
10630803 Predictive data prefetching for connected vehicles Shriram Rajagopalan 2020-04-21
10604257 Unmanned aerial vehicle for air sampling Clifford A. Pickover, Maja Vukovic 2020-03-31
10601857 Automatically assessing a severity of a vulnerability via social media Muhammed Fatih Bulut, Lisa M. Chavez, Virginia Mayo, Maja Vukovic, Sai Zeng 2020-03-24
10599615 System, method, and recording medium for recycle bin management based on cognitive factors Ruchi Mahindru, Clifford A. Pickover, Valentina Salapura, Maja Vukovic 2020-03-24
10594789 Managing migration of an application from a source to a target Kun Bai, Brian Peterson, Maja Vukovic 2020-03-17
10591885 Device control based on a user's physical setting Olympia Gluck, Itzhack Goldberg, Maja Vukovic, Yelena Zilberstein 2020-03-17
10587643 Detecting a root cause for a vulnerability using subjective logic in social media Muhammed Fatih Bulut, Lisa M. Chavez, Anup Kalia, Virginia Mayo Policarpio, Sai Zeng 2020-03-10
10544007 Risk-aware management of elevator operations Byungchul Tak, Maja Vukovic 2020-01-28
10540496 Dynamic re-composition of patch groups using stream clustering Muhammed Fatih Bulut, Vugranam C. Sreedhar, Sai Zeng 2020-01-21
10412195 Risk-aware service management stack transformation during workload migration Clifford A. Pickover, Maja Vukovic 2019-09-10
10397209 Risk-aware multiple factor authentication based on pattern recognition and calendar Clifford A. Pickover, Maja Vukovic, Frederick Y. Wu 2019-08-27
10346338 Use of physical blocks to develop microservices Rick A. Hamilton, II, Agueda Martinez Hernandez Magro, Maja Vukovic 2019-07-09
10331937 Method and system for context-driven fingerprint scanning to track unauthorized usage of mobile devices Itzhack Goldberg, Neil Sondhi, Maja Vukovic 2019-06-25
10244049 Managing migration of an application from a source to a target Kun Bai, Brian Peterson, Maja Vukovic 2019-03-26
10110707 Chaining virtual network function services via remote memory sharing Shriram Rajagopalan 2018-10-23
10073974 Generating containers for applications utilizing reduced sets of libraries based on risk analysis Clifford A. Pickover, Maja Vukovic 2018-09-11
10070328 Predictive network traffic management Nikolaos Anerousis, Jin Xiao 2018-09-04
10015197 Determining network security policies during data center migration and detecting security violation Kun Bai, Jill L. Jermyn, HariGovind V. Ramasamy, Maja Vukovic 2018-07-03
9992280 Managing migration of an application from a source to a target Kun Bai, Brian Peterson, Maja Vukovic 2018-06-05