Search

Ut Van Le

from Austin, TX
Age ~62

Ut Le Phones & Addresses

  • Austin, TX
  • 17809 Silent Harbor Loop, Pflugerville, TX 78660 (512) 761-4570
  • 10 Rinaldi Blvd, Poughkeepsie, NY 12601
  • Knoxville, TX
  • Carey, TX
  • Travis, TX

Professional Records

License Records

Ut T Le

License #:
1214000195
Category:
Wax Technician License

Resumes

Resumes

Ut Le Photo 1

Advisory Engineer

View page
Location:
Austin, TX
Industry:
Computer Software
Work:
Ibm
Software Engineer

Ibm
Advisory Engineer
Skills:
Java Enterprise Edition
Agile Methodologies
Websphere
Aix
Java
Eclipse
Cloud Computing
Software Development
Software Engineering
Unix
Linux
Solution Architecture
Ant
Websphere Application Server
Enterprise Architecture
Ibm Aix
Soa
Db2
Shell Scripting
Service Oriented Architecture
Ut Le Photo 2

Ut Le

View page
Ut Le Photo 3

Ut Le

View page
Ut Le Photo 4

Ut Le

View page
Ut Le Photo 5

Ut Le

View page

Publications

Us Patents

System And Method For Merging Security Constraints When Using Security Annotations

View page
US Patent:
8645679, Feb 4, 2014
Filed:
Jun 17, 2011
Appl. No.:
13/162744
Inventors:
Elisa Ferracane - Austin TX, US
Paul William Bennett - Austin TX, US
William J. O'Donnell - Fichburg WI, US
Ajay Reddy Karkala - Austin TX, US
Ut Van Le - Austin TX, US
Michael Craig Thompson - Austin TX, US
Maxim Avery Moldenhauer - Durham NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
713152, 726 1, 726 14, 726 26
Abstract:
A method is described for merging security constraints associated with an application when using security annotations. The application comprises one or more servlets, such as a Java servlet. During application deployment, a list of role names is generated by merging static security constraints, for example, identified in a deployment descriptor, and in a static security annotation that defines a list containing the names of authorized roles for a servlet. Later, during application runtime in an application server, security constraints are retrieved from a plurality of sources, including both dynamic and static security annotations. Using the list of role names and the security constraints retrieved, a set of merged security constraints having a defined and proper order of precedence is generated. In particular, preferably one or more dynamic security annotations are first merged with one or more static security annotations to generate a set of runtime constraints. The security constraints from the deployment descriptor are then merged with the set of runtime constraints and the list of roles to generate the set of merged security constraints.

Systems And Methods For Management And Auto-Generation Of Encryption Keys

View page
US Patent:
20080101610, May 1, 2008
Filed:
Oct 26, 2006
Appl. No.:
11/553276
Inventors:
PETER D. BIRK - Austin TX, US
Keys D. Botzum - Columbia MD, US
Ching-Yun Chao - Austin TX, US
Hyen V. Chung - Round Rock TX, US
Alaine DeMyers - Austin TX, US
Ut Van Le - Austin TX, US
James L. Lentz - Austin TX, US
Mickella A. Rosiles - Austin TX, US
International Classification:
H04L 9/00
US Classification:
380277, 380 44
Abstract:
Systems, methods and media for managing and generating encryption keys are disclosed. In one embodiment, a processor executes encryption key processing computer code to receive requests for keys from an application program. The processor determines whether the requesting application program executes on a node or server that is within the scope of machines authorized to receive the requested keys. If authorized, the processor produces a key map and sends the key map to the application program, enabling the application program to access one or more keys in the key map. The keys are updated automatically according to a specifiable schedule.

System And Method To Control Display Of A Realm Name

View page
US Patent:
20120317633, Dec 13, 2012
Filed:
Jun 10, 2011
Appl. No.:
13/157633
Inventors:
William J. O'Donnell - Fichburg WI, US
Paul William Bennett - , US
Elisa Ferracane - Austin TX, US
Ajay Reddy Karkala - Austin TX, US
Ut Van Le - Austin TX, US
Michael Craig Thompson - Austin TX, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 21/00
US Classification:
726 10, 726 3
Abstract:
A method for dynamically assigning a displayable realm name begins upon receipt of an authentication request to an application, such as a web application, being executed by an application server. In response, a determination is made whether an application realm name has been set in a configuration file associated with the application. If not, a custom display property is then evaluated. If the custom display property is set true, a realm name associated with an active authentication mechanism is retrieved and provided for display in an authentication panel. If the custom display property is set false, a default string is provided for display in the authentication panel. In this manner, an application server administrator can control what realm name is displayed to an end user in the event an application developer has not specified the realm name in the application configuration.
Ut Van Le from Austin, TX, age ~62 Get Report