Patents by Inventor Chi Ching Chui

Chi Ching Chui has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10540508
    Abstract: One embodiment of the present invention provides a system that secures a database configuration from undesired modifications. This system allows a security officer to issue a configuration-locking command, which activates a lock for the configuration of a database object. When a configuration lock is activated for a database object, the system prevents a user (e.g., a database administrator) from modifying the configuration of the database object, without restricting the user from accessing the database object itself. The security officer is a trusted user that is responsible for maintaining the stability of the database configuration, such that a configuration lock activated by the security officer preserves the database configuration by overriding the privileges assigned to a database administrator.
    Type: Grant
    Filed: September 17, 2009
    Date of Patent: January 21, 2020
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Ji-Won Byun, Chi Ching Chui, Daniel ManHung Wong, Chon Hei Lei
  • Patent number: 10268705
    Abstract: Techniques for identifying unused privileges are provided. Database accesses are monitored to generate privilege usage data. Privilege usage data for each database access may indicate a user, a utilized privilege, an object that is the target of the privilege, and a role to which the privilege is granted. The privilege usage data is compared to database authorization data that indicates all (or a subset) of granted privileges. A result of the comparison is unused privilege data that indicates what granted privileges were not utilized. A role graph may be generated that indicates one or more privileges that were utilized and one or more privileges that were not utilized along with role paths providing the privileges.
    Type: Grant
    Filed: June 24, 2014
    Date of Patent: April 23, 2019
    Assignee: Oracle International Corporation
    Inventors: Chi Ching Chui, Vikram R. Pesati
  • Patent number: 9886590
    Abstract: An application platform examines, at runtime, various specified aspects of an application environment in which an application interacts with a user. Such examinations are made to determine a state for each of the various specified aspects. Further, the platform automatically activates particular application environment roles for the user depending on the result of the examinations. For example, an application environment role may be activated representing a particular detected mode of communication (e.g., encrypted network communications) or a particular detected manner of authentication (e.g., password authentication). Such activations are based on the detected states and specified states for the various specified aspects of the application environment. Such activations may occur in the context of an application attempting to perform an operation on an access controlled object on behalf of a user.
    Type: Grant
    Filed: July 23, 2009
    Date of Patent: February 6, 2018
    Assignee: Oracle International Corporation
    Inventors: Janaki Narasinghanallur, Min-Hank Ho, Thomas Keefe, Eric Sedlar, Chi Ching Chui, Vikram Pesati
  • Patent number: 9330116
    Abstract: Methods, machines, and stored instructions are provided for determining hierarchical paths to nodes based on stored information about the nodes. A node analyzer analyzes a hierarchy to create mappings that represent the hierarchy. The mappings may include a “parent mapping” that maps selected-level nodes to parent nodes of the selected-level nodes, and a “path mapping” that maps a plurality of nodes other than the selected-level nodes to a plurality of paths, within the hierarchy, to the plurality of nodes. A path module then determines path(s) to specified node(s) at least in part by mapping the specified node(s) to particular parent node(s) of the specified node(s) using the parent mapping. The path module also maps the particular parent node(s) to particular path(s) using the path mapping. The information from the path and parent mappings may be assembled to form path(s) within the hierarchy to the specified node(s).
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: May 3, 2016
    Assignee: Oracle International Corporation
    Inventors: Lijie Heng, Chi Ching Chui, Yi Ouyang
  • Publication number: 20150370824
    Abstract: Techniques for identifying unused privileges are provided. Database accesses are monitored to generate privilege usage data. Privilege usage data for each database access may indicate a user, a utilized privilege, an object that is the target of the privilege, and a role to which the privilege is granted. The privilege usage data is compared to database authorization data that indicates all (or a subset) of granted privileges. A result of the comparison is unused privilege data that indicates what granted privileges were not utilized. A role graph may be generated that indicates one or more privileges that were utilized and one or more privileges that were not utilized along with role paths providing the privileges.
    Type: Application
    Filed: June 24, 2014
    Publication date: December 24, 2015
    Inventors: Chi Ching Chui, Vikram R. Pesati
  • Publication number: 20140280363
    Abstract: Methods, machines, and stored instructions are provided for determining hierarchical paths to nodes based on stored information about the nodes. A node analyzer analyzes a hierarchy to create mappings that represent the hierarchy. The mappings may include a “parent mapping” that maps selected-level nodes to parent nodes of the selected-level nodes, and a “path mapping” that maps a plurality of nodes other than the selected-level nodes to a plurality of paths, within the hierarchy, to the plurality of nodes. A path module then determines path(s) to specified node(s) at least in part by mapping the specified node(s) to particular parent node(s) of the specified node(s) using the parent mapping. The path module also maps the particular parent node(s) to particular path(s) using the path mapping. The information from the path and parent mappings may be assembled to form path(s) within the hierarchy to the specified node(s).
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Oracle International Corporation
    Inventors: LIJIE HENG, Chi Ching Chui, Yi Ouyang
  • Patent number: 8239396
    Abstract: A machine-implemented method and machine-readable media for transforming sensitive data in a database is provided. Sensitive data in the database are transformed based on a query context of a query. The query may also be transformed. The transformed query may be applied against the transformed sensitive data to construct a query result. The query result with the transformed sensitive data represents a lenticular view. The lenticular view represents a modified form of the sensitive data that an end-user is allowed access to.
    Type: Grant
    Filed: March 20, 2009
    Date of Patent: August 7, 2012
    Assignee: Oracle International Corporation
    Inventors: Ji-Won Byun, Chi Ching Chui, Daniel M. Wong
  • Publication number: 20110067084
    Abstract: One embodiment of the present invention provides a system that secures a database configuration from undesired modifications. This system allows a security officer to issue a configuration-locking command, which activates a lock for the configuration of a database object. When a configuration lock is activated for a database object, the system prevents a user (e.g., a database administrator) from modifying the configuration of the database object, without restricting the user from accessing the database object itself. The security officer is a trusted user that is responsible for maintaining the stability of the database configuration, such that a configuration lock activated by the security officer preserves the database configuration by overriding the privileges assigned to a database administrator.
    Type: Application
    Filed: September 17, 2009
    Publication date: March 17, 2011
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Ji-Won Byun, Chi Ching Chui, Daniel ManHung Wong, Chon Hei Lei
  • Publication number: 20110023082
    Abstract: An application platform examines, at runtime, various specified aspects of an application environment in which an application interacts with a user. Such examinations are made to determine a state for each of the various specified aspects. Further, the platform automatically activates particular application environment roles for the user depending on the result of the examinations. For example, an application environment role may be activated representing a particular detected mode of communication (e.g., encrypted network communications) or a particular detected manner of authentication (e.g., password authentication). Such activations are based on the detected states and specified states for the various specified aspects of the application environment. Such activations may occur in the context of an application attempting to perform an operation on an access controlled object on behalf of a user.
    Type: Application
    Filed: July 23, 2009
    Publication date: January 27, 2011
    Inventors: Janaki Narasinghanallur, Min-Hank Ho, Thomas Keefe, Eric Sedlar, Chi Ching Chui, Vikram Pesati
  • Patent number: 7840551
    Abstract: One embodiment of the present invention provides a system for automatically classifying data in a database. During operation, the system receives and executes a database operation. Next, the system automatically determines if any data was modified as a result of executing the database operation. If so, for each data item that was modified, the system automatically determines if the data item is associated with a classification-rule. If so, the system automatically reclassifies the data item according to the classification-rule. If not, the system leaves a classification of the data item unchanged.
    Type: Grant
    Filed: November 1, 2007
    Date of Patent: November 23, 2010
    Assignee: Oracle International Corporation
    Inventors: Daniel ManHung Wong, Amit Ganesh, Bipul Sinha, Chi Ching Chui
  • Publication number: 20100241641
    Abstract: A machine-implemented method and machine-readable media for transforming sensitive data in a database is provided. Sensitive data in the database are transformed based on a query context of a query. The query may also be transformed. The transformed query may be applied against the transformed sensitive data to construct a query result. The query result with the transformed sensitive data represents a lenticular view. The lenticular view represents a modified form of the sensitive data that an end-user is allowed access to.
    Type: Application
    Filed: March 20, 2009
    Publication date: September 23, 2010
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Ji-Won Byun, Chi Ching Chui, Daniel M. Wong
  • Publication number: 20100030781
    Abstract: One embodiment of the present invention provides a system for automatically classifying data in a database. During operation, the system receives and executes a database operation. Next, the system automatically determines if any data was modified as a result of executing the database operation. If so, for each data item that was modified, the system automatically determines if the data item is associated with a classification-rule. If so, the system automatically reclassifies the data item according to the classification-rule. If not, the system leaves a classification of the data item unchanged.
    Type: Application
    Filed: November 1, 2007
    Publication date: February 4, 2010
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Daniel ManHung Wong, Amit Ganesh, Bipul Sinha, Chi Ching Chui