Patents by Inventor Shee-Yen Tan

Shee-Yen Tan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240152638
    Abstract: A method is provided that includes receiving a data request from a requesting device requesting data from a data source, looking up, in a blockchain ledger, a transaction corresponding to the data request to validate the data request, forwarding the validated data request to a data server, receiving a data response from the data server in response to the data request, wherein the data response comprises the requested data from the data source, and forwarding the data response to the requesting device.
    Type: Application
    Filed: November 3, 2022
    Publication date: May 9, 2024
    Inventors: Gordon Yong LI, Xuemin CHEN, Philippe KLEIN, Abbas SAADAT, Shee-Yen TAN, Rui Pedro DE MOURA ALVES PIMENTA
  • Patent number: 9904809
    Abstract: Aspects of a method and system for multi-level security initialization and configuration are provided. A security system may comprise a security processor, a host processor, and at least one security component, such as a descrambler. The security processor may enable a security component based on information stored within a non-volatile memory integrated within the security processor. The host processor may enable generation of at least one configuration command communicated to the security processor for configuring the enabled security component. The configuration command may correspond to a security control operational mode for the security component that may indicate, for example, activation or deactivation of the security component. The security processor may authenticate a digital signature in the configuration command. Initialization and configuration may be performed during a system boot sequence of the security system.
    Type: Grant
    Filed: March 6, 2007
    Date of Patent: February 27, 2018
    Assignee: Avago Technologies General IP (Singapore) Pte. Ltd.
    Inventors: Shee-Yen Tan, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
  • Patent number: 9025768
    Abstract: A system for securing a variable length keyladder key includes a keyladder decryptor configured to alter a first layer key and to execute a keyladder algorithm to generate a content key, the keyladder algorithm to generate the content key by decrypting an encrypted second layer key with the altered first layer key. The alteration mirrors the alteration applied to encrypt the second layer key by a content server providing content data to be decrypted. The system may further include a cryptographic direct memory access controller (DMAC) coupled with the keyladder decryptor and to decrypt encrypted content data using the generated content key. The keyladder decryptor may be further configured to send the content key to be stored in the DMAC without information regarding how the first layer key was altered. The alteration may include a permutation function or other change or modification.
    Type: Grant
    Filed: April 4, 2013
    Date of Patent: May 5, 2015
    Assignee: Broadcom Corporation
    Inventors: Shashank Shekhar, Shee-Yen Tan, Andrew Dellow
  • Publication number: 20140258708
    Abstract: A system for securing a variable length keyladder key includes a keyladder decryptor configured to alter a first layer key and to execute a keyladder algorithm to generate a content key, the keyladder algorithm to generate the content key by decrypting an encrypted second layer key with the altered first layer key. The alteration mirrors the alteration applied to encrypt the second layer key by a content server providing content data to be decrypted. The system may further include a cryptographic direct memory access controller (DMAC) coupled with the keyladder decryptor and to decrypt encrypted content data using the generated content key. The keyladder decryptor may be further configured to send the content key to be stored in the DMAC without information regarding how the first layer key was altered. The alteration may include a permutation function or other change or modification.
    Type: Application
    Filed: April 4, 2013
    Publication date: September 11, 2014
    Applicant: BROADCOM CORPORATION
    Inventors: Shashank Shekhar, Shee-Yen Tan, Andrew Dellow
  • Patent number: 8347357
    Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode. Results of operations associated with security components may be transferred to other processors communicatively coupled to the security processor.
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: January 1, 2013
    Assignee: Broadcom Corporation
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
  • Publication number: 20110072490
    Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode. Results of operations associated with security components may be transferred to other processors communicatively coupled to the security processor.
    Type: Application
    Filed: November 30, 2010
    Publication date: March 24, 2011
    Applicant: BROADCOM CORPORATION
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
  • Patent number: 7844996
    Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode.
    Type: Grant
    Filed: May 23, 2005
    Date of Patent: November 30, 2010
    Assignee: Broadcom Corporation
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
  • Publication number: 20070294745
    Abstract: Aspects of a method and system for multi-level security initialization and configuration are provided. A security system may comprise a security processor, a host processor, and at least one security component, such as a descrambler. The security processor may enable a security component based on information stored within a non-volatile memory integrated within the security processor. The host processor may enable generation of at least one configuration command communicated to the security processor for configuring the enabled security component. The configuration command may correspond to a security control operational mode for the security component that may indicate, for example, activation or deactivation of the security component. The security processor may authenticate a digital signature in the configuration command. Initialization and configuration may be performed during a system boot sequence of the security system.
    Type: Application
    Filed: March 6, 2007
    Publication date: December 20, 2007
    Inventors: Shee-Yen Tan, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
  • Publication number: 20060265734
    Abstract: In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode.
    Type: Application
    Filed: May 23, 2005
    Publication date: November 23, 2006
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Shee-Yen Tan, Hongbo Zhu, Qiang Ye
  • Patent number: 6310692
    Abstract: A dynamic, preventive, centralized printer resource management system provides dynamic, preventive monitoring of printer resources and centralization of the supervision of printer resources in a print management system. The system dynamically monitors the printer resources and delivers warning messages to system administrators, end users, and/or vendors when a printer resource falls below a predetermined threshold. Further, the printer resources can be monitored from a single, centralized location, such as a control panel proximate the system administrator. Notification of printer resource warnings can also be electronically delivered to end users, system operators, and/or vendors. Thus, the printer resource deficiency can be investigated by the administrator, user, or vendor, and resolved prior to the printer resource becoming entirely exhausted.
    Type: Grant
    Filed: May 15, 1998
    Date of Patent: October 30, 2001
    Assignees: Kuji Xerox Co. Ltd., Xerox Corporation
    Inventors: ShengKuo Fan, Yasuo Nakajima, Joseph Fung, Shee-Yen Tan
  • Patent number: 6301011
    Abstract: A plug and play interface for output device used in a distributed computer network includes a front end module which submits print jobs to a document processor module. The document processor module processes the print jobs and forwards the print jobs to a back end module, which directs the print jobs to the appropriate output devices. The plug and play interface allows for the addition of various output devices connected by various protocols by simply bringing into to the back end a shared library corresponding to the new output device. Thus, various output devices may be used without requiring any revision of or stopping the system.
    Type: Grant
    Filed: November 7, 1997
    Date of Patent: October 9, 2001
    Assignee: Xerox Corporation
    Inventors: Joseph Z. Fung, Vikram R. Mahuvakar, Shee-Yen Tan, Ton Huu Truong
  • Patent number: 5978560
    Abstract: A distributed printing system that more optimally distributes job requests within a distributed printing system based on more detailed information about the particular attributes of each output device. In particular, additional printer attributes are used that allow greater utilization of a plurality of attached printers having differing capabilities. These attributes include "max-concurrent-jobs-processing" (MCJP), "number-of-jobs-on-device" (NJOD) and "number-of-cascaded-jobs" (NCJ), and a attribute value "saturated" for the attribute "printer-state". The attribute MCJP is an integer value that is based on the capabilities of the printer. NJOB and NCJ attributes allow monitoring of jobs sent to each printer for supported and unsupported printers. If NJOB or NCJ are greater than MCJP, then the attribute "printer-state" is set to "saturated", prohibiting further spooling of print jobs to that particular printer.
    Type: Grant
    Filed: November 7, 1997
    Date of Patent: November 2, 1999
    Assignee: Xerox Corporation
    Inventors: Shee-Yen Tan, Joseph Z. Fung, Shengkuo Fan, David Paul Nesbitt