Patents by Inventor Shee-Yen Tan
Shee-Yen Tan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240152638Abstract: A method is provided that includes receiving a data request from a requesting device requesting data from a data source, looking up, in a blockchain ledger, a transaction corresponding to the data request to validate the data request, forwarding the validated data request to a data server, receiving a data response from the data server in response to the data request, wherein the data response comprises the requested data from the data source, and forwarding the data response to the requesting device.Type: ApplicationFiled: November 3, 2022Publication date: May 9, 2024Inventors: Gordon Yong LI, Xuemin CHEN, Philippe KLEIN, Abbas SAADAT, Shee-Yen TAN, Rui Pedro DE MOURA ALVES PIMENTA
-
Patent number: 9904809Abstract: Aspects of a method and system for multi-level security initialization and configuration are provided. A security system may comprise a security processor, a host processor, and at least one security component, such as a descrambler. The security processor may enable a security component based on information stored within a non-volatile memory integrated within the security processor. The host processor may enable generation of at least one configuration command communicated to the security processor for configuring the enabled security component. The configuration command may correspond to a security control operational mode for the security component that may indicate, for example, activation or deactivation of the security component. The security processor may authenticate a digital signature in the configuration command. Initialization and configuration may be performed during a system boot sequence of the security system.Type: GrantFiled: March 6, 2007Date of Patent: February 27, 2018Assignee: Avago Technologies General IP (Singapore) Pte. Ltd.Inventors: Shee-Yen Tan, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
-
Patent number: 9025768Abstract: A system for securing a variable length keyladder key includes a keyladder decryptor configured to alter a first layer key and to execute a keyladder algorithm to generate a content key, the keyladder algorithm to generate the content key by decrypting an encrypted second layer key with the altered first layer key. The alteration mirrors the alteration applied to encrypt the second layer key by a content server providing content data to be decrypted. The system may further include a cryptographic direct memory access controller (DMAC) coupled with the keyladder decryptor and to decrypt encrypted content data using the generated content key. The keyladder decryptor may be further configured to send the content key to be stored in the DMAC without information regarding how the first layer key was altered. The alteration may include a permutation function or other change or modification.Type: GrantFiled: April 4, 2013Date of Patent: May 5, 2015Assignee: Broadcom CorporationInventors: Shashank Shekhar, Shee-Yen Tan, Andrew Dellow
-
Publication number: 20140258708Abstract: A system for securing a variable length keyladder key includes a keyladder decryptor configured to alter a first layer key and to execute a keyladder algorithm to generate a content key, the keyladder algorithm to generate the content key by decrypting an encrypted second layer key with the altered first layer key. The alteration mirrors the alteration applied to encrypt the second layer key by a content server providing content data to be decrypted. The system may further include a cryptographic direct memory access controller (DMAC) coupled with the keyladder decryptor and to decrypt encrypted content data using the generated content key. The keyladder decryptor may be further configured to send the content key to be stored in the DMAC without information regarding how the first layer key was altered. The alteration may include a permutation function or other change or modification.Type: ApplicationFiled: April 4, 2013Publication date: September 11, 2014Applicant: BROADCOM CORPORATIONInventors: Shashank Shekhar, Shee-Yen Tan, Andrew Dellow
-
Patent number: 8347357Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode. Results of operations associated with security components may be transferred to other processors communicatively coupled to the security processor.Type: GrantFiled: November 30, 2010Date of Patent: January 1, 2013Assignee: Broadcom CorporationInventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
-
Publication number: 20110072490Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode. Results of operations associated with security components may be transferred to other processors communicatively coupled to the security processor.Type: ApplicationFiled: November 30, 2010Publication date: March 24, 2011Applicant: BROADCOM CORPORATIONInventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
-
Patent number: 7844996Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode.Type: GrantFiled: May 23, 2005Date of Patent: November 30, 2010Assignee: Broadcom CorporationInventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
-
Publication number: 20070294745Abstract: Aspects of a method and system for multi-level security initialization and configuration are provided. A security system may comprise a security processor, a host processor, and at least one security component, such as a descrambler. The security processor may enable a security component based on information stored within a non-volatile memory integrated within the security processor. The host processor may enable generation of at least one configuration command communicated to the security processor for configuring the enabled security component. The configuration command may correspond to a security control operational mode for the security component that may indicate, for example, activation or deactivation of the security component. The security processor may authenticate a digital signature in the configuration command. Initialization and configuration may be performed during a system boot sequence of the security system.Type: ApplicationFiled: March 6, 2007Publication date: December 20, 2007Inventors: Shee-Yen Tan, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
-
Publication number: 20060265734Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode.Type: ApplicationFiled: May 23, 2005Publication date: November 23, 2006Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
-
Patent number: 6310692Abstract: A dynamic, preventive, centralized printer resource management system provides dynamic, preventive monitoring of printer resources and centralization of the supervision of printer resources in a print management system. The system dynamically monitors the printer resources and delivers warning messages to system administrators, end users, and/or vendors when a printer resource falls below a predetermined threshold. Further, the printer resources can be monitored from a single, centralized location, such as a control panel proximate the system administrator. Notification of printer resource warnings can also be electronically delivered to end users, system operators, and/or vendors. Thus, the printer resource deficiency can be investigated by the administrator, user, or vendor, and resolved prior to the printer resource becoming entirely exhausted.Type: GrantFiled: May 15, 1998Date of Patent: October 30, 2001Assignees: Kuji Xerox Co. Ltd., Xerox CorporationInventors: ShengKuo Fan, Yasuo Nakajima, Joseph Fung, Shee-Yen Tan
-
Patent number: 6301011Abstract: A plug and play interface for output device used in a distributed computer network includes a front end module which submits print jobs to a document processor module. The document processor module processes the print jobs and forwards the print jobs to a back end module, which directs the print jobs to the appropriate output devices. The plug and play interface allows for the addition of various output devices connected by various protocols by simply bringing into to the back end a shared library corresponding to the new output device. Thus, various output devices may be used without requiring any revision of or stopping the system.Type: GrantFiled: November 7, 1997Date of Patent: October 9, 2001Assignee: Xerox CorporationInventors: Joseph Z. Fung, Vikram R. Mahuvakar, Shee-Yen Tan, Ton Huu Truong
-
Patent number: 5978560Abstract: A distributed printing system that more optimally distributes job requests within a distributed printing system based on more detailed information about the particular attributes of each output device. In particular, additional printer attributes are used that allow greater utilization of a plurality of attached printers having differing capabilities. These attributes include "max-concurrent-jobs-processing" (MCJP), "number-of-jobs-on-device" (NJOD) and "number-of-cascaded-jobs" (NCJ), and a attribute value "saturated" for the attribute "printer-state". The attribute MCJP is an integer value that is based on the capabilities of the printer. NJOB and NCJ attributes allow monitoring of jobs sent to each printer for supported and unsupported printers. If NJOB or NCJ are greater than MCJP, then the attribute "printer-state" is set to "saturated", prohibiting further spooling of print jobs to that particular printer.Type: GrantFiled: November 7, 1997Date of Patent: November 2, 1999Assignee: Xerox CorporationInventors: Shee-Yen Tan, Joseph Z. Fung, Shengkuo Fan, David Paul Nesbitt