Patents by Inventor Ching-Yun Chao
Ching-Yun Chao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230096183Abstract: A system can generate a non-sensitive identifier for sensitive data at a spoke in a hub-and-spoke configuration, wherein the spoke is configured to receive management commands by a hub device of the hub-and-spoke configuration. The system can store an association between the non-sensitive identifier and the sensitive data, resulting in a stored association. The system can send, to the hub device, a first indication of the non-sensitive identifier, and a second indication of a type of data of the sensitive data. The system can receive, from the hub device, a management command identifying the non-sensitive identifier. The system can identify the sensitive data based on the stored association. The system can perform the management command based on the sensitive data.Type: ApplicationFiled: September 30, 2021Publication date: March 30, 2023Inventors: John Woodyard, Ching-Yun Chao
-
Patent number: 11601342Abstract: Described herein are methods and a system for managing devices in remote data centers using a cloud service user interface (UI). The cloud service UI receives device management requests to device management application program interface (API). At the cloud service side, the device management requests to device management application program interface (API) are intercepted and converted to device cloud management REST interfaces. The device cloud management REST interfaces to a remote data center of devices, and converted to device native API used to manage a specific device.Type: GrantFiled: January 25, 2022Date of Patent: March 7, 2023Assignee: Dell Products L.P.Inventors: Ching-Yun Chao, John Korchemniy, Rajesh Basa, Rajini Ramachandran Karthik, Rajeev Rangappa, Anil Varkhedi, Suresh Attuluri
-
Patent number: 11521156Abstract: Trustable delivery of a product uses a package with a printed label having a unique product ID, an RFID marker applied to the product that contains the ID, and a smart chip inside the product that contains the ID and a digital key. The ID from the RFID marker is compared to the label for initial validation of the package. The smart chip is further interrogated to generate an encoded value of the ID, such as a hash value, using the digital key. The hash value is then used to authenticate the ID, thereby verifying that the product as delivered is the original, untampered product. The product ID and the hash value are recorded in a blockchain ledger associated with the product. In this manner, the packaged product can be validated by any party in the delivery chain, e.g., manufacturer, seller, distributor, delivery service, and final recipient.Type: GrantFiled: January 9, 2020Date of Patent: December 6, 2022Assignee: International Business Machines CorporationInventors: Daniel Pacheco, Vijender Koorella, Ching-Yun Chao, Richard Daniel Gunjal
-
Patent number: 11487886Abstract: An example operation may include one or more of generating, by a first blockchain client, a transaction to a blockchain network to transfer a document, transferring over a private channel, by a second blockchain client, a first key to the first blockchain client, the private channel providing a point-to-point connection between the first and second blockchain clients, encrypting the document using a shared key, transferring, by the first blockchain client, the encrypted document over the private channel, generating, by the second blockchain client, a transaction to acknowledge receipt of the encrypted document, and transferring the shared key encrypted with the first key.Type: GrantFiled: May 3, 2019Date of Patent: November 1, 2022Assignee: International Business Machines CorporationInventors: Vijender Koorella, Pramod Verma, Richard Gunjal, Ching-Yun Chao, Jeronimo Irazabal
-
Patent number: 11303446Abstract: An example operation includes one or more of selecting, by a trust maintainer node, at least two blockchain nodes to be assigned as non-human intelligent nodes controlled by separate consortiums, identifying, by the trust maintainer node, a plurality of blockchain nodes that are not assigned as non-human intelligent nodes, assigning, by the trust maintainer node, a trust value to each of the plurality of the blockchain nodes based on voting histories of each of the plurality of the blockchain nodes to determine an overall trust value of a blockchain, and responsive to the overall trust value of the blockchain being below a minimum threshold, selecting at least one node from the plurality of the nodes to be assigned as the non-human intelligent node to increase the overall trust value of the blockchain.Type: GrantFiled: April 9, 2020Date of Patent: April 12, 2022Assignee: International Business Machines CorporationInventors: Vijender Koorella, Daniel Pacheco, Richard Daniel Gunjal, Ching-Yun Chao
-
Patent number: 11297066Abstract: Described are techniques for an access management protocol including a method comprising associating a granted permission set and a constrained permission set to a user profile in an access management system. Respective granted permissions in the granted permission set authorize the user profile to perform the respective granted permissions, and respective constrained permissions in the constrained permission set preclude the user profile from performing the respective constrained permissions. The method further comprises receiving a permission-based request at the access management system and from the user profile and determining that the permission-based request is associated with a permission that is included in both the granted permission set and the constrained permission set. The method further comprises rejecting the permission-based request.Type: GrantFiled: January 20, 2020Date of Patent: April 5, 2022Assignee: International Business Machines CorporationInventors: Yi-hsiu Wei, David Yu Chang, Ching-Yun Chao, Hui-Ming Lin
-
Patent number: 11196774Abstract: A method, system, and computer program product for detecting a network application security question is provided. The method includes receiving permission to access social media sources of a user. The social media sources and Internet based sources of the user are monitored in response to receiving the permission and associated data is generated and stored. A request for access to a secure account of the user is received and a list of security questions is presented to the user. The list of security questions is analyzed with respect to the data and each security question is ranked. An answer to a question of the list is received and analyzed and security attributes of the answer with respect to a potential malicious attempt to provide a predicted answer to for access to secure account are determined. A resulting security process with respect to enabling access to the secure account is executed.Type: GrantFiled: March 5, 2020Date of Patent: December 7, 2021Assignee: International Business Machines CorporationInventors: Yi-hsiu Wei, David Yu Chang, Ching-Yun Chao
-
Publication number: 20210320797Abstract: An example operation includes one or more of selecting, by a trust maintainer node, at least two blockchain nodes to be assigned as non-human intelligent nodes controlled by separate consortiums, identifying, by the trust maintainer node, a plurality of blockchain nodes that are not assigned as non-human intelligent nodes, assigning, by the trust maintainer node, a trust value to each of the plurality of the blockchain nodes based on voting histories of each of the plurality of the blockchain nodes to determine an overall trust value of a blockchain, and responsive to the overall trust value of the blockchain being below a minimum threshold, selecting at least one node from the plurality of the nodes to be assigned as the non-human intelligent node to increase the overall trust value of the blockchain.Type: ApplicationFiled: April 9, 2020Publication date: October 14, 2021Inventors: Vijender Koorella, Daniel Pacheco, Richard Daniel Gunjal, Ching-Yun Chao
-
Patent number: 11138188Abstract: An example operation may include one or more of connecting, by a feedback controller node, to a blockchain network configured to process transaction proposals through a plurality of endorser nodes connected to an orderer node, receiving, by the feedback controller node, reports from the orderer node that reflect performance of the plurality of the endorser nodes, assigning, by the feedback controller node, rankings to the plurality of the endorser nodes based on the reports, and ordering the transaction proposals to be executed by the plurality of the endorser nodes based on the assigned rankings.Type: GrantFiled: November 7, 2018Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Ching-Yun Chao, Yi-Hsiu Wei, David Y. Chang
-
Publication number: 20210281612Abstract: A method, system, and computer program product for detecting a network application security question is provided. The method includes receiving permission to access social media sources of a user. The social media sources and Internet based sources of the user are monitored in response to receiving the permission and associated data is generated and stored. A request for access to a secure account of the user is received and a list of security questions is presented to the user. The list of security questions is analyzed with respect to the data and each security question is ranked. An answer to a question of the list is received and analyzed and security attributes of the answer with respect to a potential malicious attempt to provide a predicted answer to for access to secure account are determined. A resulting security process with respect to enabling access to the secure account is executed.Type: ApplicationFiled: March 5, 2020Publication date: September 9, 2021Inventors: Yi-hsiu Wei, David Yu Chang, Ching-Yun Chao
-
Publication number: 20210226956Abstract: Described are techniques for an access management protocol including a method comprising associating a granted permission set and a constrained permission set to a user profile in an access management system. Respective granted permissions in the granted permission set authorize the user profile to perform the respective granted permissions, and respective constrained permissions in the constrained permission set preclude the user profile from performing the respective constrained permissions. The method further comprises receiving a permission-based request at the access management system and from the user profile and determining that the permission-based request is associated with a permission that is included in both the granted permission set and the constrained permission set. The method further comprises rejecting the permission-based request.Type: ApplicationFiled: January 20, 2020Publication date: July 22, 2021Inventors: Yi-hsiu Wei, David Yu Chang, Ching-Yun Chao, Hui-Ming Lin
-
Publication number: 20210216958Abstract: Trustable delivery of a product uses a package with a printed label having a unique product ID, an RFID marker applied to the product that contains the ID, and a smart chip inside the product that contains the ID and a digital key. The ID from the RFID marker is compared to the label for initial validation of the package. The smart chip is further interrogated to generate an encoded value of the ID, such as a hash value, using the digital key. The hash value is then used to authenticate the ID, thereby verifying that the product as delivered is the original, untampered product. The product ID and the hash value are recorded in a blockchain ledger associated with the product. In this manner, the packaged product can be validated by any party in the delivery chain, e.g., manufacturer, seller, distributor, delivery service, and final recipient.Type: ApplicationFiled: January 9, 2020Publication date: July 15, 2021Inventors: Daniel Pacheco, Vijender Koorella, Ching-Yun Chao, Richard Daniel Gunjal
-
Patent number: 11032083Abstract: An example operation may include one or more of connecting, by a committer node, to a main blockchain comprised of a plurality of initiator nodes, receiving, by the committer node, a transaction from an initiator node of the plurality of the initiator nodes and placing blocks of the transaction on the main blockchain, executing, by the committer node, a request from the initiator node of the plurality of the initiator nodes to branch off a sub-blockchain from the main blockchain, processing, by the committer node, the transaction in the sub-blockchain, detecting, by the committer node, a completion or an ending of the transaction in the sub-blockchain, in response to the detection of the completion of the transaction, committing the transaction to the main blockchain, in response to the detection of the ending of the transaction, terminating the transaction in the sub-blockchain, and discarding, by the committer node, the sub-blockchain.Type: GrantFiled: November 6, 2018Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: Ching-Yun Chao, David Y. Chang, Yi-Hsiu Wei
-
Patent number: 10834122Abstract: An example operation may include one or more of connecting, by a participating blockchain (BC) node, to a blockchain network configured to store a plurality of packages, selecting and downloading, by the participating BC node, a package containing a random code variant identified by a unique identifier (ID), executing, by the participating BC node, the package to calculate an outcome associated with the variant ID, receiving, by the participating BC node, votes on outcomes associated with the variant ID and votes on outcomes associated with different variant IDs from other nodes of the blockchain network, and analyzing, by the participating BC node, the votes to determine if the votes on the outcomes associated with the variant ID are different from the votes on the outcomes associated with the different variant IDs.Type: GrantFiled: September 5, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Ching-Yun Chao, Yi-Hsiu Wei, David Y. Chang
-
Publication number: 20200349261Abstract: An example operation may include one or more of generating, by a first blockchain client, a transaction to a blockchain network to transfer a document, transferring over a private channel, by a second blockchain client, a first key to the first blockchain client, the private channel providing a point-to-point connection between the first and second blockchain clients, encrypting the document using a shared key, transferring, by the first blockchain client, the encrypted document over the private channel, generating, by the second blockchain client, a transaction to acknowledge receipt of the encrypted document, and transferring the shared key encrypted with the first key.Type: ApplicationFiled: May 3, 2019Publication date: November 5, 2020Inventors: Vijender Koorella, Pramod Verma, Richard Gunjal, Ching-Yun Chao, Jeronimo Irazabal
-
Publication number: 20200273018Abstract: Mechanisms are provided to implement a recurring payment collection system for extending current quick response (QR) code payment methods to collect recurring payments from a customer. The recurring payment collection system sends a notification to the customer that a recurring payment is due in response to a recurring payment event occurring. The recurring payment collection system obtains a QR code for the recurring payment in response to the customer acknowledging the notification. The recurring payment collection system utilizes the QR code to request the recurring payment from a payment system. The recurring payment collection system acknowledges that the recurring payment has been made in responsive to the recurring payment being processed by the payment system.Type: ApplicationFiled: February 27, 2019Publication date: August 27, 2020Inventors: Ching-Yun Chao, John H. Teoh, Frankie Kong, Xin Ni, Randy A. Rendahl
-
Patent number: 10743973Abstract: Approaches presented herein enable performing an oral health diagnosis of a user using an oral monitoring device fixed in the oral cavity. Specifically, an oral monitoring device collects jaw movement data as a user goes about daily living. An oral healthcare analysis is performed comparing current measurement data against abnormality classifications to identify abnormal jaw movement. If an abnormality is identified, an oral healthcare professional can be notified.Type: GrantFiled: December 14, 2017Date of Patent: August 18, 2020Assignee: International Business Machines CorporationInventors: Ebony C. Adams, Ching-Yun Chao, Christian Compton, Jeremy R. Fox, Manjunath Ravi
-
Patent number: 10666441Abstract: Exposure of sensitive information to users and other servers is controlled by using a first security token which contains a user identity and one or more user credentials associated with a first user; a second security token which contains an identity of a token issuer and an identity of a first owning process; and at least a first trusted server which accesses a downstream computing service on behalf of the first user by substituting or combining the first security token and the second security token, while preventing the second security token from being exposed to the first user. This establishes a first security sensitivity level for the first user and a second security sensitivity level for the first trusted server, wherein the first security sensitivity level is a lower access level than the second security sensitivity level for the downstream service.Type: GrantFiled: April 1, 2019Date of Patent: May 26, 2020Assignee: International Business Machines CorporationInventors: John Y-C. Chang, Ching-Yun Chao, Bertrand Be-Chung Chiu, Ki H. Park
-
Publication number: 20200145221Abstract: An example operation may include one or more of connecting, by a committer node, to a main blockchain comprised of a plurality of initiator nodes, receiving, by the committer node, a transaction from an initiator node of the plurality of the initiator nodes and placing blocks of the transaction on the main blockchain, executing, by the committer node, a request from the initiator node of the plurality of the initiator nodes to branch off a sub-blockchain from the main blockchain, processing, by the committer node, the transaction in the sub-blockchain, detecting, by the committer node, a completion or an ending of the transaction in the sub-blockchain, in response to the detection of the completion of the transaction, committing the transaction to the main blockchain, in response to the detection of the ending of the transaction, terminating the transaction in the sub-blockchain, and discarding, by the committer node, the sub-blockchain.Type: ApplicationFiled: November 6, 2018Publication date: May 7, 2020Inventors: Ching-Yun Chao, David Y. Chang, Yi-Hsiu Wei
-
Publication number: 20200142988Abstract: An example operation may include one or more of connecting, by a feedback controller node, to a blockchain network configured to process transaction proposals through a plurality of endorser nodes connected to an orderer node, receiving, by the feedback controller node, reports from the orderer node that reflect performance of the plurality of the endorser nodes, assigning, by the feedback controller node, rankings to the plurality of the endorser nodes based on the reports, and ordering the transaction proposals to be executed by the plurality of the endorser nodes based on the assigned rankings.Type: ApplicationFiled: November 7, 2018Publication date: May 7, 2020Inventors: Ching-Yun Chao, Yi-Hsiu Wei, David Y. Chang