Patents by Inventor Hyen Chung

Hyen Chung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230183563
    Abstract: Proposed are a microcapsule having a core-shell structure that has high-temperature durability and solvent resistance and is environment-friendly. The microcapsule includes a core portion containing a hydrophobic active component and a shell portion surrounding the core portion and containing a silane crosslinkable polyurethane-based resin derived from a crosslinkable alkoxy silane group-terminated prepolymer.
    Type: Application
    Filed: October 29, 2020
    Publication date: June 15, 2023
    Applicant: INSILICO CO. LTD.
    Inventors: Jong Hwa KIM, Dong Hyen CHUNG, Seung Hoon CHOI, Jae Hoon YUN, Sohyun KWON
  • Publication number: 20080034202
    Abstract: A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object.
    Type: Application
    Filed: October 4, 2007
    Publication date: February 7, 2008
    Inventors: Peter Birk, Ching-Yun Chao, Hyen Chung
  • Publication number: 20060020813
    Abstract: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 26, 2006
    Applicant: International Business Machines Corporation
    Inventors: Peter Birk, Ching-Yun Chao, Hyen Chung
  • Publication number: 20060015727
    Abstract: An extensible token framework is provided for identifying purpose and behavior of run time security objects. The framework includes a set of marker token interfaces, which extends from a default token interface. A service provider may implement one or more marker token interfaces for a Subject or a thread of execution. A service provider may also implement its own custom marker tokens to perform custom operations. The security infrastructure runtime recognizes behavior and purpose of run time security objects based on the marker or custom marker token interfaces the token implements and handles the security objects accordingly.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 19, 2006
    Applicant: International Business Machines Corporation
    Inventors: Peter Birk, Ching-Yun Chao, Hyen Chung
  • Publication number: 20060005234
    Abstract: A method, apparatus and computer instructions for handling propagation of custom tokens without using Java™ serialization. A service provider may plug in a first login module to add a marker token to a subject for later use by an application at run time. The marker token is then serialized by the mechanism of the present invention by invoking a get bytes method on the token. The present invention then propagates the token downstream if the token is marked forwardable. At a target server, a second login module may be plugged in to deserialize a byte array from a list of tokens and perform custom operation on the byte array retrieved from a token holder.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Applicant: International Business Machines Corporation
    Inventors: Peter Birk, Ching-Yun Chao, Hyen Chung
  • Publication number: 20050154887
    Abstract: State management (cookie) data is encrypted so that access control data included in the cookie is unable to be modified by the user. A hashing algorithm is performed using various fields in the cookie data and the hash value is encrypted. The hash value is combined with other data such as the user identifier and a time stamp and encrypted to form a cookie value. When a request is received, the cookie data is checked. If the token value is not in the server's cache then the token is authenticated facilitating movement of the client between servers. If the cookie does not exist or is timed out, then the user is authenticated using traditional means.
    Type: Application
    Filed: January 12, 2004
    Publication date: July 14, 2005
    Applicant: International Business Machines Corporation
    Inventors: Peter Birk, Ching-Yun Chao, Hyen Chung, Carlton Mason, Karkala Reddy, Vishwanath Venkataramappa, Dennis Riddlemoser
  • Publication number: 20050154886
    Abstract: A method and system for providing a declarative trust association model that formalizes the way trust is established and requires corresponding authentication information to be presented in a standard format. Consequently, the application server may provide a guaranteed level of protection. The mechanism of the present invention provides a framework that allows an application server to enforce a trust evaluation and allows reverse proxy security server to assert a client's security identity, as well as other client security credential information. A known trust association interceptor model is extended to allow the reverse proxy security server to assert the authenticated user's security attributes. Such security attributes include, for example, group information, authentication strength, and location (i.e., where does the user enter the request, intranet vs. internet, IP address, etc.,). The security attributes can be used in making authorization decisions.
    Type: Application
    Filed: January 12, 2004
    Publication date: July 14, 2005
    Applicant: International Business Machines Corporation
    Inventors: Peter Birk, Ching-Yun Chao, Hyen Chung, Ajay Karkala, Carlton Mason, Nataraj Nagaratnam, Brian Smith, Vishwanath Venkataramappa