Patents by Inventor Chi-Jui Ho

Chi-Jui Ho has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8239929
    Abstract: A multiple key, multiple tiered network security system, method and apparatus provides at least three levels of security. The first level of security includes physical (MAC) address authentication of a user device being attached to the network, such as a user device being attached to a port of a network access device. The second level includes authentication of the user of the user device, such as user authentication in accordance with the IEEE 802.1x standard. The third level includes dynamic assignment of a user policy to the port based on the identity of the user, wherein the user policy is used to selectively control access to the port. The user policy may identify or include an access control list (ACL) or MAC address filter. Also, the user policy is not dynamically assigned if insufficient system resources are available to do so. Failure to pass a lower security level results in a denial of access to subsequent levels of authentication.
    Type: Grant
    Filed: April 28, 2010
    Date of Patent: August 7, 2012
    Assignee: Foundry Networks, LLC
    Inventors: Philip Kwan, Chi-Jui Ho
  • Publication number: 20100223654
    Abstract: A multiple key, multiple tiered network security system, method and apparatus provides at least three levels of security. The first level of security includes physical (MAC) address authentication of a user device being attached to the network, such as a user device being attached to a port of a network access device. The second level includes authentication of the user of the user device, such as user authentication in accordance with the IEEE 802.1x standard. The third level includes dynamic assignment of a user policy to the port based on the identity of the user, wherein the user policy is used to selectively control access to the port. The user policy may identify or include an access control list (ACL) or MAC address filter. Also, the user policy is not dynamically assigned if insufficient system resources are available to do so. Failure to pass a lower security level results in a denial of access to subsequent levels of authentication.
    Type: Application
    Filed: April 28, 2010
    Publication date: September 2, 2010
    Applicant: Brocade Communications Systems, Inc.
    Inventors: Philip Kwan, Chi-Jui Ho
  • Patent number: 7735114
    Abstract: A multiple key, multiple tiered network security system, method and apparatus provides at least three levels of security. The first level of security includes physical (MAC) address authentication of a user device being attached to the network, such as a user device being attached to a port of a network access device. The second level includes authentication of the user of the user device, such as user authentication in accordance with the IEEE 802.1x standard. The third level includes dynamic assignment of a user policy to the port based on the identity of the user, wherein the user policy is used to selectively control access to the port. The user policy may identify or include an access control list (ACL) or MAC address filter. Also, the user policy is not dynamically assigned if insufficient system resources are available to do so. Failure to pass a lower security level results in a denial of access to subsequent levels of authentication.
    Type: Grant
    Filed: September 4, 2003
    Date of Patent: June 8, 2010
    Assignee: Foundry Networks, Inc.
    Inventors: Philip Kwan, Chi-Jui Ho
  • Publication number: 20050055570
    Abstract: A multiple key, multiple tiered network security system, method and apparatus provides at least three levels of security. The first level of security includes physical (MAC) address authentication of a user device being attached to the network, such as a user device being attached to a port of a network access device. The second level includes authentication of the user of the user device, such as user authentication in accordance with the IEEE 802.1x standard. The third level includes dynamic assignment of a user policy to the port based on the identity of the user, wherein the user policy is used to selectively control access to the port. The user policy may identify or include an access control list (ACL) or MAC address filter. Also, the user policy is not dynamically assigned if insufficient system resources are available to do so. Failure to pass a lower security level results in a denial of access to subsequent levels of authentication.
    Type: Application
    Filed: September 4, 2003
    Publication date: March 10, 2005
    Inventors: Philip Kwan, Chi-Jui Ho
  • Publication number: 20040255154
    Abstract: A multiple key, multiple tiered network security system, method and apparatus provides at least three levels of security. The first level of security includes physical MAC address authentication of a device being attached to the network, such as a device being attached to a port of a network switch. The second level includes authentication of the user of the device, such as user authentication in accordance with the 802.1x standard. The third level includes dynamic assignment of the port to a particular VLAN based on the identity of the user. Failure to pass a lower security level results in a denial of access to subsequent levels of authentication.
    Type: Application
    Filed: June 11, 2003
    Publication date: December 16, 2004
    Applicant: Foundry Networks, Inc.
    Inventors: Philip Kwan, Chi-Jui Ho
  • Publication number: 20010048992
    Abstract: A phase transition type recording medium. On a substrate, a lower dielectric layer is formed. An adding dielectric layer having a high reflectivity is formed on the lower dielectric layer. A recording layer is formed on the adding high reflective dielectric layer. An upper dielectric layer is formed on the recording layer. A reflective layer is formed on the upper dielectric layer, and a protecting layer is further formed on the reflective layer.
    Type: Application
    Filed: January 8, 1999
    Publication date: December 6, 2001
    Inventors: TZUAN-REN JENG, PO-FU YEN, CHI-JUI HO, DON-YAU CHIANG, LONG-YUH HONG, DER-RAY HUANG, TSAI-CHU HSIAO, LII-CHYUAN TSAI