Patents by Inventor Chon Lei

Chon Lei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7639819
    Abstract: One embodiment of the present invention provides a system that facilitates using an external security device to secure data in a database without having to modify database applications. The system operates by receiving a request at the database to perform an encryption/decryption operation, wherein the encryption/decryption operation is performed with the assistance of the external security module in a manner that is transparent to database applications. In response to the request, the system passes a wrapped (encrypted) column key (a key used to encrypt data within the database) to an external security module, wherein the wrapped column key is a column key encrypted with a master key that exists only within the external security module. The system then unwraps (decrypts) the wrapped column key in the external security module to retrieve the column key. Next, the system returns the column key to the database.
    Type: Grant
    Filed: June 16, 2005
    Date of Patent: December 29, 2009
    Assignee: Oracle International Corporation
    Inventors: Min-Hank Ho, Paul Youn, Daniel ManHung Wong, Chon Lei
  • Publication number: 20080019527
    Abstract: One embodiment of the present invention provides a system for managing keys. During operation, the system authenticates a client at a key manager. Next, the system receives a token from the client at the key manager, wherein the token is associated with a customer key, and includes a token authenticator. This token authenticator comprises one-half of an authenticator pair which is used to determine if the client is the owner of the customer key. Next, the system decrypts the token using a master key. The system then verifies a client authenticator, which comprises the other half of the authenticator pair which is used to determine if the client is the owner of the customer key. If the client is the owner of the customer key, the system sends the customer key to the client, which enables the client to encrypt/decrypt data. Finally, the client deletes the customer key.
    Type: Application
    Filed: March 3, 2006
    Publication date: January 24, 2008
    Inventors: Paul Youn, Daniel Wong, Min-Hank Ho, Chon Lei
  • Publication number: 20060288232
    Abstract: One embodiment of the present invention provides a system that facilitates using an external security device to secure data in a database without having to modify database applications. The system operates by receiving a request at the database to perform an encryption/decryption operation, wherein the encryption/decryption operation is performed with the assistance of the external security module in a manner that is transparent to database applications. In response to the request, the system passes a wrapped (encrypted) column key (a key used to encrypt data within the database) to an external security module, wherein the wrapped column key is a column key encrypted with a master key that exists only within the external security module. The system then unwraps (decrypts) the wrapped column key in the external security module to retrieve the column key. Next, the system returns the column key to the database.
    Type: Application
    Filed: June 16, 2005
    Publication date: December 21, 2006
    Inventors: Min-Hank Ho, Paul Youn, Daniel Wong, Chon Lei
  • Publication number: 20060236104
    Abstract: One embodiment of the present invention provides a system that decrypts an encrypted column in a row. During operation, the system receives the encrypted column in the row. The system then determines a security domain associated with the encrypted column in the row, wherein the security domain represents a set of columns in rows encrypted using the same key. Next, the system determines a key associated with the security domain. The system then decrypts the encrypted column in the row using the key. Note that using a security domain to represent a set of columns in rows enables the database to grant access to data within the database at arbitrary levels of granularity.
    Type: Application
    Filed: April 13, 2005
    Publication date: October 19, 2006
    Inventors: Daniel Wong, Chon Lei
  • Publication number: 20060210085
    Abstract: One embodiment of the present invention provides a system that can expire encrypted-data. During operation, the system receives an expiry-request that includes object-identifying information, which can be used to identify a set of database objects that contain the encrypted-data, wherein a database object can be a table, a partition, a row, or a column in a row. Furthermore, a database object can have an expiration time, and it can be stored in an archive, which is typically used to store large amounts of data for long periods using a slower, but cheaper storage medium than the storage medium used by the database. The system then identifies a set of keys for the encrypted-data using the object-identifying information. Next, the system deletes the set of keys, thereby expiring the encrypted-data. Note that, deleting the set of keys ensures that the secure key repository does not contain any stale keys associated with expired encrypted-data.
    Type: Application
    Filed: March 17, 2005
    Publication date: September 21, 2006
    Inventors: Min-Hank Ho, Daniel Wong, Chon Lei, Thomas Keefe
  • Publication number: 20050269716
    Abstract: An integrated circuit (IC) chip module includes at least one integrated circuit chip mounted upon a substrate, and a plurality of passive components mounted upon the substrate. A polymer based bib has at least one opening formed therein, the at least one opening configured to accommodate the at least one integrated circuit chip therein, and the bib further configured for attachment to one or more of the plurality of passive components. A protective cap is mounted over the at least one integrated circuit chip and attached to the substrate, wherein the bib is configured to retain thereon a thermally conductive paste initially applied to at least one of the integrated circuit chip and the protective cap.
    Type: Application
    Filed: June 7, 2004
    Publication date: December 8, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tim Lee, Chon Lei, Donald Papae, Francis Szenher
  • Publication number: 20050144176
    Abstract: Returning rows having column values masked is disclosed. In response to receiving a database command, a modified database command is created that specifies whether to mask a value by returning a mask of the value instead of the value. In an embodiment, the condition expression is included in a policy function that is referenced by a policy. In an embodiment, the policy determines how the condition expressions are used. The condition expression may be used to determine which column values to mask. The condition expression may also be used to filter which rows are returned.
    Type: Application
    Filed: January 23, 2004
    Publication date: June 30, 2005
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Chon Lei, Daniel Wong, Thomas Keefe, Kristy Edwards
  • Publication number: 20050038783
    Abstract: A method and mechanism are provided for accessing data. Values are stored for a set of context attributes associated with a session between a database user and a database server. The database system includes an attribute setting mechanism that selectively restricts access to the set of context attributes based on a policy. During the session, the database server executes a query that contains a reference to one or more of the context attributes. For example, the query may contain a predicate that requires a comparison between a context attribute value and a constant. The database server processes the query based on current values of the one or more of the context attributes referenced in the query. A mechanism is also provided for dynamically attaching predicates to queries, where the predicates are attached based on a policy. For example, the database system detects that a query is issued against a database object.
    Type: Application
    Filed: September 15, 2004
    Publication date: February 17, 2005
    Inventors: Chon Lei, Douglas McMahon