Growing community of inventors

Austin, TX, United States of America

Bertrand Be-Chung Chiu

Average Co-Inventor Count = 4.20

ph-index = 3

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 37

Bertrand Be-Chung ChiuChing-Yun Chao (7 patents)Bertrand Be-Chung ChiuKi Hong Park (6 patents)Bertrand Be-Chung ChiuJohn Y-c Chang (6 patents)Bertrand Be-Chung ChiuJohn Yow-Chun Chang (1 patent)Bertrand Be-Chung ChiuYuhsuke Kaneyasu (1 patent)Bertrand Be-Chung ChiuJay William Warfield (1 patent)Bertrand Be-Chung ChiuDouglas Yellow Shue (1 patent)Bertrand Be-Chung ChiuBertrand Be-Chung Chiu (7 patents)Ching-Yun ChaoChing-Yun Chao (95 patents)Ki Hong ParkKi Hong Park (13 patents)John Y-c ChangJohn Y-c Chang (6 patents)John Yow-Chun ChangJohn Yow-Chun Chang (16 patents)Yuhsuke KaneyasuYuhsuke Kaneyasu (9 patents)Jay William WarfieldJay William Warfield (3 patents)Douglas Yellow ShueDouglas Yellow Shue (2 patents)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. International Business Machines Corporation (7 from 164,108 patents)


7 patents:

1. 10666441 - Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

2. 10341109 - Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

3. 9712322 - Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

4. 9531538 - Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

5. 9237020 - Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

6. 9148285 - Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment

7. 8856086 - Ensuring integrity of security event log upon download and delete

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
12/3/2025
Loading…