1
Winson CW Chao, Ta Wei Lin, Wei Shiau Suen, Ming Hsun Wu, Ying Hung Yu: Dynamically providing algorithm-based password/challenge authentication. International Business Machines Corporation, David W Victor, Konrad Raynes Davda and Victor, May 27, 2014: US08739261 (1 worldwide citation)

Provided are a computer program product, method and system for dynamically providing algorithm-based password/challenge authentication. A page is provided to authenticate a presenter of a username including a string and a field for entry of a password. An entered password entered into the page is re ...


2
Winson C W Chao, Ta Wei Lin, Wei Shiau Suen, Ming Hsun Wu, Ying Hung Yu: Dynamically providing algorithm-based password/challenge authentication. International Business Machines Corporation, David W Victor, Konrad Raynes Davda and Victor, June 3, 2014: US08745712 (1 worldwide citation)

Provided are a computer program product, method and system for dynamically providing algorithm-based password/challenge authentication. A page is generated including selectable conversion operators to enable generation of an algorithm that applies at least one selected conversion operator of the sel ...


3
An Bang Wang, Ming Hsun Wu, Yi Hua Wang, I Chun Lin, Chia Chih Chen, Shiming Lin: High-precision vortex flow meter. National Taiwan University, Rosenberg Klein & Lee, February 10, 2009: US07487686 (1 worldwide citation)

A high-precision vortex flow meter includes a blunt body having a predetermined dimension and being arranged inside a fluid channel to serve as a vortex shedder. The vortex flow meter also includes a temperature detecting device for detecting the vortex shedder temperature and a temperature control ...


4
King Jen Chang, Wen Hwa Chen, Argon Chen, Chiung Nein Chen, Ming Chih Ho, Hao Chih Tai, Ming Hsun Wu, Po Wei Tsai: Method for retrieving a tumor contour of an image processing system. AmCad BioMed Corporation, Muncy Geissler Olds & Lowe PLLC, February 12, 2013: US08374892 (1 worldwide citation)

The present invention related to a method for retrieving a tumor contour of an image processing system that includes a memory storing a grayscale image and a processor, comprising: receiving an input tumor contour of the grayscale image; defining a tumor contour annular region and a plurality of ref ...


5
Chih Wen Chao, Cheng Ta Lee, Wei Shiau Suen, Ming Hsun Wu, Lun Pin Yuan: Facilitation of live virtual machine migration. International Business Machines Corporation, Lieberman & Brandsdorfer, December 4, 2018: US10146594

Embodiment pertain to facilitation of live migration of a virtual machine in a network system. The network system includes a first host, a second host, a first appliance for providing service to the first host, a second appliance for providing service to the second host, and a third appliance. At le ...


6
Li Ju Chen, Wei Hsiang Hsiung, Rick M F Wu, Ming Hsun Wu: Method, mobile device and computer program product for triggering an event of interest based on communications established with nearby wireless devices. INTERNATIONAL BUSINESS MACHINES CORPORATION, Cuenot Forsythe & Kim, August 1, 2017: US09723471

Triggering an event of interest in a mobile device based on communications established with nearby wireless devices can include receiving a challenge of the event of interest; obtaining a corresponding expression of a combination key with reference to the event in response to the challenge; receivin ...


7
Ming Da Ho, Ming Pin Hsueh, Ting Jui Hu, Ping Hung Lee, Ming Hsun Wu: Deploying a security appliance system in a high availability environment without extra network burden. International Business Machines Corporation, Michael O Keefe, April 18, 2017: US09628504

A security appliance system routing strings of data packets in a high availability environment. The security appliance system contains a plurality of intrusion prevention systems connected to a load balancer and a computing device. Each intrusion prevention system contains stored session state infor ...


8
Ming Da Ho, Ming Pin Hsueh, Ting Jui Hu, Ping Hung Lee, Ming Hsun Wu: Deploying a security appliance system in a high availability environment without extra network burden. International Business Machines Corporation, Michael O Keefe, April 18, 2017: US09628505

A security appliance system routing strings of data packets in a high availability environment. The security appliance system contains a plurality of intrusion prevention systems connected to a load balancer and a computing device. Each intrusion prevention system contains stored session state infor ...


9
Sheng Tung Hsu, Cheng Ta Lee, Wei Shiau Suen, Ming Hsun Wu: Translating network attributes of packets in a multi-tenant environment. International Business Machines Corporation, Jeffrey S LaBaw, February 6, 2018: US09887962

A method of translating network attributes of packets in a multi-tenant environment, and an appliance and a program product implementing the method. The method comprises the following steps: receiving a packet from a multi-tenant environment; referring to the information of tenants, translating a se ...


10
Wei Hsiang Hsiung, Sheng Tung Hsu, Cheng Ta Lee, Ming Hsun Wu: Dynamically generating a packet inspection policy for a policy enforcement point in a centralized management environment. International Business Machines Corporation, Francis Lammes, Stephen J Walder Jr, Jeffrey S LaBaw, February 27, 2018: US09906557

A mechanism is provided for generating a packet inspection policy for a policy enforcement point in a centralized management environment. Data of a network topology for the policy enforcement point corresponding to a network infrastructure is updated according to metadata of the policy enforcement p ...