Issued Patents All Time
Showing 25 most recent of 28 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12333614 | Quality, availability and AI model predictions | Apoorva Banubakode, Na Xu, Mohsen Samadani, Deepankar Mohapatra, Conrad De Peuter | 2025-06-17 |
| 11297066 | Constrained roles for access management | David Yu Chang, Ching-Yun Chao, Hui-Ming Lin | 2022-04-05 |
| 11196774 | Network application security question detection and modification | David Yu Chang, Ching-Yun Chao | 2021-12-07 |
| 11178022 | Evidence mining for compliance management | Rohit Ranchal, Uttam Thakore, HariGovind V. Ramasamy | 2021-11-16 |
| 11138188 | Performance optimization | Ching-Yun Chao, David Yu Chang | 2021-10-05 |
| 11132502 | Atom-based sensible synchronization for information indexing | Ye Chen, Zhen Hong Ding, Chang Lei, Wen Juan Nie, Ting Wu +2 more | 2021-09-28 |
| 11032083 | Atomic transactional processing | Ching-Yun Chao, David Yu Chang | 2021-06-08 |
| 10984190 | Atom-based sensible synchronization for information indexing | Ye Chen, Zhen Hong Ding, Chang Lei, Wen Juan Nie, Ting Wu +2 more | 2021-04-20 |
| 10834122 | Prevention of majority attacks | Ching-Yun Chao, David Yu Chang | 2020-11-10 |
| 10534856 | Atom-based sensible synchronization for information indexing | Ye Chen, Zhen Hong Ding, Chang Lei, Wen Juan Nie, Ting Wu +2 more | 2020-01-14 |
| 10031838 | Predictive approach to environment provisioning | Jason A. Collier, David L. Leigh, Scott A. Will | 2018-07-24 |
| 9952964 | Predictive approach to environment provisioning | Jason A. Collier, David L. Leigh, Scott A. Will | 2018-04-24 |
| 9524228 | Predictive approach to environment provisioning | Jason A. Collier, David L. Leigh, Scott A. Will | 2016-12-20 |
| 9430750 | Predictive approach to environment provisioning | Jason A. Collier, David L. Leigh, Scott A. Will | 2016-08-30 |
| 9100399 | Portable virtual systems for composite solutions | Ronald P. Doyle, Indrajit Poddar | 2015-08-04 |
| 8887241 | Virtual roles | Kathryn H. Britton, Dieter Buehler, William P. Higgins, Chunhui Yang | 2014-11-11 |
| 8572567 | Specifying and processing composed patterns | Geoffrey M. Hambrick | 2013-10-29 |
| 8311862 | Organizational design approach to transition cost assessment for business transformation | Jinchao Hunag, John W. Sweitzer, Kamorudeen Larry Yusuf | 2012-11-13 |
| 7949688 | Method of recording and backtracking business information model changes | Shaw-Ben Shi, John W. Sweitzer | 2011-05-24 |
| 7835233 | Disc autoloader and duplicator having one-dimensional robotic arm movement | Shuo Wei Chang | 2010-11-16 |
| 7676831 | Role-based access control management for multiple heterogeneous application components | Kathryn H. Britton, Dieter Buehler, Ching-Yun Chao, Timothy J. Hahn, Anthony Joseph Nadalin +2 more | 2010-03-09 |
| 6728788 | Method and system for converting a remote procedure call to a local procedure call when the service is on the same device as the calling client | Spencer James Ainsworth, David Werner Bachmann, Jayakumar Nagarajarao, James Wade | 2004-04-27 |
| 6462757 | Method, system and computer program product for locating a window of a windows operating system in a computer system | I-Lung Kao, Shaw-Ben Shi | 2002-10-08 |
| 5778228 | Method and system for transferring remote procedure calls and responses over a network | — | 1998-07-07 |
| 5713017 | Dual counter consistency control for fault tolerant network file servers | Dah-Haur Lin, Shaw-Ben Shi | 1998-01-27 |