Patents by Inventor Chan Yiu Ng

Chan Yiu Ng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10423802
    Abstract: Embodiments of the present disclosure provide a technique for establishing data security over an Internet of Things (IoT) network. According to an embodiment, a method includes performing by at least one host entity implemented in a network, tracking distribution of data in the network by maintaining a data location file that includes plurality of parameters of each of plurality of data subsets. The data subsets are distributed in plurality of devices of the network such as key servers, host entities and client entities. The data subsets include any or a combination of an encryption key, a key identifier, a header, an authorization information, a decryption key, a control message, a computer program, a config file, data generated by any client entity of the one or more client entities, and data processed by any host entity of the one or more host entities.
    Type: Grant
    Filed: November 23, 2018
    Date of Patent: September 24, 2019
    Assignee: SKY1 Technology Limited
    Inventors: Kenneth Keung Yum Yu, Chan Yiu Ng
  • Publication number: 20190095640
    Abstract: Embodiments of the present disclosure provide a technique for establishing data security over an Internet of Things (IoT) network. According to an embodiment, a method includes performing by at least one host entity implemented in a network, tracking distribution of data in the network by maintaining a data location file that includes plurality of parameters of each of plurality of data subsets. The data subsets are distributed in plurality of devices of the network such as key servers, host entities and client entities. The data subsets include any or a combination of an encryption key, a key identifier, a header, an authorization information, a decryption key, a control message, a computer program, a config file, data generated by any client entity of the one or more client entities, and data processed by any host entity of the one or more host entities.
    Type: Application
    Filed: November 23, 2018
    Publication date: March 28, 2019
    Inventors: Kenneth Keung Yum Yu, Chan Yiu Ng
  • Patent number: 10164951
    Abstract: A method includes performing by at least one host entity implemented in a network, receiving an encryption key generated by a key server and a key identifier associated with said encryption key, generating a header comprising an information identifier associated with an information to be protected, the device identifier corresponding to the key server and the key identifier associated with the encryption key, encrypting said information using said encryption key and associating the header with the encrypted information, transmitting said encrypted information and the associated header to a receiving entity and transmitting an authorization information, said key identifier, and said header to the key server. Further, in response to determination that the receiving entity is authorized to access the encrypted information, the receiving entity decrypts the encrypted information using decryption key received from the key server.
    Type: Grant
    Filed: April 24, 2018
    Date of Patent: December 25, 2018
    Assignee: SKYI Technology Limited
    Inventors: Kenneth Keung Yum Yu, Chan Yiu Ng
  • Publication number: 20180309734
    Abstract: A method includes performing by at least one host entity implemented in a network, receiving an encryption key generated by a key server and a key identifier associated with said encryption key, generating a header comprising an information identifier associated with an information to be protected, the device identifier corresponding to the key server and the key identifier associated with the encryption key, encrypting said information using said encryption key and associating the header with the encrypted information, transmitting said encrypted information and the associated header to a receiving entity and transmitting an authorization information, said key identifier, and said header to the key server. Further, in response to determination that the receiving entity is authorized to access the encrypted information, the receiving entity decrypts the encrypted information using decryption key received from the key server.
    Type: Application
    Filed: April 24, 2018
    Publication date: October 25, 2018
    Inventors: Kenneth Keung Yum Yu, Chan Yiu Ng
  • Publication number: 20150244684
    Abstract: The present patent application is directed to a data security management system. The system includes a security server configured to store an encryption key to encrypt a file or any data and a decryption key to decrypt the file or the data; a first computing device configured to send an access authorization list with authorization limit to the security server, request an encryption key from the security server, and encrypt the file or data with the encryption key received from the security server; a second computing device configured to request a decryption key from the security server and decrypt the encrypted file with the decryption key received from the security server; and a cloud storage configured to share the file between a first user using the first computing device and a second user using the second computing device.
    Type: Application
    Filed: September 10, 2013
    Publication date: August 27, 2015
    Inventors: Chan Yiu Ng, Zhengshan Yan, Shing Yee Chu, Kam Tim Cheng, Ting Him Lee, Dennis Chung Young
  • Patent number: 5951691
    Abstract: The present invention provides a method and system for detecting corrupted data of a plurality of hard disk drives (HDDs) in a data storage subsystem. In this system a predetermined number of fixed blocks within each of the HDDs emulate a track of a first track format. The predetermined number of fixed blocks provide a logical track. The logical track of one of the plurality of HDDs is generated by the others of the plurality of HDDs. The plurality of logical tracks forming a plurality of track groups. In a first aspect the method and system comprises assigning each of the plurality of logical tracks an address translation (ADT) number, comparing each of the ADT numbers of the plurality of logical tracks to an expected value until a mismatch occurs in a logical track, and determining if other logical tracks in a same track group have accurate ADT numbers. The first aspect further includes reconstructing the logical track if the other tracks within the same track group have accurate ADT numbers.
    Type: Grant
    Filed: May 16, 1997
    Date of Patent: September 14, 1999
    Assignee: International Business Machines Corporation
    Inventors: Chan Yiu Ng, James C. Chen, Charles Richard Lanzi
  • Patent number: 5701429
    Abstract: A system and method for changing the number of logical volumes in a drawer in a rack in a direct access storage device subsystem is disclosed. The method and system are able to change the number of logical volumes without disrupting access to the other logical volumes in the rack. Channel connection addresses, which are logical volume addresses as known by the CPUs, are freed by removing the old drawer and then are mused. If the new drawer has more logical volumes than the old drawer, the next unused channel connection addresses are used with the new drawer. In a subsystem having a storage controller for providing control for a plurality of direct access storage devices, the logical volumes are spread across multiple physical devices. The storage controller maintains configuration data for the entire subsystem in redundant, non-volatile storage locations reserved specifically for its use.
    Type: Grant
    Filed: August 16, 1996
    Date of Patent: December 23, 1997
    Assignee: International Business Machines Corporation
    Inventors: Vernon J. Legvold, Julia Liu, Carol S. Michod, Chan Yiu Ng, William G. Sherman, II, Jeffrey R. Steffan, Steven R. Van Gundy
  • Patent number: 5666114
    Abstract: A constant size storage can be managed to preserve locality of referencing where it is partitioned into linear addressable storage space for compressed symbol strings and a linked list addressable space for overflowing portions of each compressed string, a token to the overflow being embedded in the linear address. The linear space is readjusted periodically in a direction so as to maintain the amount of available overflow within to lie within a certain range of current usage. Changes in compression statistics result in changing overflow usage requiring readjustment to minimize internal fragmentation etc.
    Type: Grant
    Filed: November 22, 1994
    Date of Patent: September 9, 1997
    Assignee: International Business Machines Corporation
    Inventors: Robert Bruce Brodie, Joe-Ming Cheng, Lawrence John Garibay, Jaishankar Moothedath Menon, Chan Yiu Ng, Tram Thi Mai Nguyen