Patents by Inventor Chon Hei Lei
Chon Hei Lei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10540508Abstract: One embodiment of the present invention provides a system that secures a database configuration from undesired modifications. This system allows a security officer to issue a configuration-locking command, which activates a lock for the configuration of a database object. When a configuration lock is activated for a database object, the system prevents a user (e.g., a database administrator) from modifying the configuration of the database object, without restricting the user from accessing the database object itself. The security officer is a trusted user that is responsible for maintaining the stability of the database configuration, such that a configuration lock activated by the security officer preserves the database configuration by overriding the privileges assigned to a database administrator.Type: GrantFiled: September 17, 2009Date of Patent: January 21, 2020Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Ji-Won Byun, Chi Ching Chui, Daniel ManHung Wong, Chon Hei Lei
-
Patent number: 10339336Abstract: One embodiment of the present invention provides a system that facilitates encryption of data within a column of a database. The system operates by first receiving a command to perform a database operation. Next, the system parses the command to create a parse tree. The system then examines the parse tree to determine if a column referenced in the parse tree is an encrypted column. If a column referenced in the parse tree is an encrypted column, the system automatically transforms the command to include one or more cryptographic commands to facilitate accessing the encrypted column while performing the database operation.Type: GrantFiled: June 11, 2003Date of Patent: July 2, 2019Assignee: Oracle International CorporationInventors: Chon Hei Lei, Thomas Keefe, Daniel M. Wong
-
Patent number: 9886481Abstract: A method and apparatus for preserving optimization hints in a transformed query is provided. In one embodiment, the methodology is implemented by query optimization logic. Upon receiving a first query to access values in a column of a table protected by an access control policy, the query optimization logic creates a second query that is equivalent to the first query as subject to the access control policy. Furthermore, the second query contains a new predicate that conjunctively joins a clone of a first expression in a predicate of the first query with a second expression that is derived, based on the access control policy, from the first expression. In one embodiment, the query optimization logic submits the second query for execution.Type: GrantFiled: October 20, 2011Date of Patent: February 6, 2018Assignee: Oracle International CorporationInventor: Chon Hei Lei
-
Patent number: 9495394Abstract: A method and apparatus are described for sharing a session to access a database. A database server receives, in a session, a session context identifier and a command. The session context identifier identifies a session context to use for the session. The session context is a set of information or commands that plug into a session state and specify how commands in the session are to be performed for a particular user or privilege level. In response to receiving the identifier, the database server associates the session context with the database session for the connection. The database server uses the session context to process the command. The session context may then be detached from the session, allowing another user to attach to the session via another session context.Type: GrantFiled: August 29, 2013Date of Patent: November 15, 2016Assignee: Oracle International CorporationInventors: Janaki Narasinghanallur, Min-Hank Ho, Eric Sedlar, Thomas Keefe, Chon Hei Lei, Vikram Pesati
-
Patent number: 8667018Abstract: One embodiment of the present invention provides a system that implements a security policy in a database. During operation, the system receives a request associated with a set of objects in the database. Next, the system obtains a set of access control lists (ACLs) associated with the database, wherein a respective ACL specifies one or more access privileges associated with a user or user group, and wherein a respective ACLs is not specific to a particular object in the database. The system then evaluates the ACLs to obtain a set of ACL results associated with the request and processes the request by applying the set of ACL results to the objects without evaluating the ACLs repeatedly for each of the objects.Type: GrantFiled: August 8, 2008Date of Patent: March 4, 2014Assignee: Oracle International CorporationInventors: Mohammed Irfan Rafiq, Chon Hei Lei, Vikram Kapoor, Thomas F. Keefe, Nipun Agarwal, Thomas Baby, Sam Idicula, Vikram Reddy Pesati
-
Publication number: 20140006344Abstract: A method and apparatus are described for sharing a session to access a database. A database server receives, in a session, a session context identifier and a command. The session context identifier identifies a session context to use for the session. The session context is a set of information or commands that plug into a session state and specify how commands in the session are to be performed for a particular user or privilege level. In response to receiving the identifier, the database server associates the session context with the database session for the connection. The database server uses the session context to process the command. The session context may then be detached from the session, allowing another user to attach to the session via another session context.Type: ApplicationFiled: August 29, 2013Publication date: January 2, 2014Applicant: Oracle International CorporationInventors: JANAKI NARASINGHANALLUR, MIN-HANK HO, ERIC SEDLAR, THOMAS KEEFE, CHON HEI LEI, VIKRAM PESATI
-
Patent number: 8549038Abstract: A method and apparatus are described for sharing a session to access a database. A database server receives, in a session, a session context identifier and a command. The session context identifier identifies a session context to use for the session. The session context is a set of information or commands that plug into a session state and specify how commands in the session are to be performed for a particular user or privilege level. In response to receiving the identifier, the database server associates the session context with the database session for the connection. The database server uses the session context to process the command. The session context may then be detached from the session, allowing another user to attach to the session via another session context.Type: GrantFiled: June 15, 2009Date of Patent: October 1, 2013Assignee: Oracle International CorporationInventors: Janaki Narasinghanallur, Min-Hank Ho, Eric Sedlar, Thomas Keefe, Chon Hei Lei, Vikram Pesati
-
Publication number: 20120095988Abstract: A method and apparatus for preserving optimization hints in a transformed query is provided. In one embodiment, the methodology is implemented by query optimization logic. Upon receiving a first query to access values in a column of a table protected by an access control policy, the query optimization logic creates a second query that is equivalent to the first query as subject to the access control policy. Furthermore, the second query contains a new predicate that conjunctively joins a clone of a first expression in a predicate of the first query with a second expression that is derived, based on the access control policy, from the first expression. In one embodiment, the query optimization logic submits the second query for execution.Type: ApplicationFiled: October 20, 2011Publication date: April 19, 2012Inventor: Chon Hei Lei
-
Patent number: 8065329Abstract: A method and apparatus for preserving optimization hints in a transformed query is provided. In one embodiment, the methodology is implemented by query optimization logic. Upon receiving a first query to access values in a column of a table protected by an access control policy, the query optimization logic creates a second query that is equivalent to the first query as subject to the access control policy. Furthermore, the second query contains a new predicate that conjunctively joins a clone of a first expression in a predicate of the first query with a second expression that is derived, based on the access control policy, from the first expression. In one embodiment, the query optimization logic submits the second query for execution.Type: GrantFiled: June 18, 2007Date of Patent: November 22, 2011Assignee: Oracle International CorporationInventor: Chon Hei Lei
-
Patent number: 7925023Abstract: One embodiment of the present invention provides a system for managing keys. During operation, the system authenticates a client at a key manager. Next, the system receives a token from the client at the key manager, wherein the token is associated with a customer key, and includes a token authenticator. This token authenticator comprises one-half of an authenticator pair which is used to determine if the client is the owner of the customer key. Next, the system decrypts the token using a master key. The system then verifies a client authenticator, which comprises the other half of the authenticator pair which is used to determine if the client is the owner of the customer key. If the client is the owner of the customer key, the system sends the customer key to the client, which enables the client to encrypt/decrypt data. Finally, the client deletes the customer key.Type: GrantFiled: March 3, 2006Date of Patent: April 12, 2011Assignee: Oracle International CorporationInventors: Paul Youn, Daniel ManHung Wong, Min-Hank Ho, Chon Hei Lei
-
Publication number: 20110067084Abstract: One embodiment of the present invention provides a system that secures a database configuration from undesired modifications. This system allows a security officer to issue a configuration-locking command, which activates a lock for the configuration of a database object. When a configuration lock is activated for a database object, the system prevents a user (e.g., a database administrator) from modifying the configuration of the database object, without restricting the user from accessing the database object itself. The security officer is a trusted user that is responsible for maintaining the stability of the database configuration, such that a configuration lock activated by the security officer preserves the database configuration by overriding the privileges assigned to a database administrator.Type: ApplicationFiled: September 17, 2009Publication date: March 17, 2011Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Ji-Won Byun, Chi Ching Chui, Daniel ManHung Wong, Chon Hei Lei
-
Patent number: 7873660Abstract: Described herein is an approach that may be used to control access to information requested by a query, where access is granted or denied to all the information requested based on factors that relate to information requested as a whole rather than on individual-by-individual row basis. Also described is a mechanism in which a database server dynamically creates and computes another query in response to receiving a query, and then uses the computed results to determine whether access to the data requested by the received query may be granted.Type: GrantFiled: February 27, 2003Date of Patent: January 18, 2011Assignee: Oracle International CorporationInventors: Daniel Manhung Wong, Chon Hei Lei, Rama Vissapragada
-
Publication number: 20100318570Abstract: A method and apparatus are described for sharing a session to access a database. A database server receives, in a session, a session context identifier and a command. The session context identifier identifies a session context to use for the session. The session context is a set of information or commands that plug into a session state and specify how commands in the session are to be performed for a particular user or privilege level. In response to receiving the identifier, the database server associates the session context with the database session for the connection. The database server uses the session context to process the command. The session context may then be detached from the session, allowing another user to attach to the session via another session context.Type: ApplicationFiled: June 15, 2009Publication date: December 16, 2010Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Janaki Narasinghanallur, Min-Hank Ho, Eric Sedlar, Thomas Keefe, Chon Hei Lei, Vlkram Pesati
-
Patent number: 7827403Abstract: One embodiment of the present invention provides a system that decrypts an encrypted column in a row. During operation, the system receives the encrypted column in the row. The system then determines a security domain associated with the encrypted column in the row, wherein the security domain represents a set of columns in rows encrypted using the same key. Next, the system determines a key associated with the security domain. The system then decrypts the encrypted column in the row using the key. Note that using a security domain to represent a set of columns in rows enables the database to grant access to data within the database at arbitrary levels of granularity.Type: GrantFiled: April 13, 2005Date of Patent: November 2, 2010Assignee: Oracle International CorporationInventors: Daniel ManHung Wong, Chon Hei Lei
-
Patent number: 7770006Abstract: One embodiment of the present invention provides a system that authorizes a sensitive database operation. During operation, the system receives a request to perform a sensitive database operation. Note that, a sensitive database operation is an operation which, in the hands of a malicious user, poses a serious security threat. Next, the system determines a multiparty authorization requirement for the sensitive database operation, wherein the multiparty authorization requirement specifies a set of approvals required for authorizing the sensitive database operation. The system then sends approval requests to one or more approving parties based on the multiparty authorization requirement. Next, the system receives approvals for authorizing the sensitive database operation. The system then determines whether the approvals satisfy the multiparty authorization requirement.Type: GrantFiled: May 26, 2005Date of Patent: August 3, 2010Assignee: Oracle International CorporationInventors: Daniel ManHung Wong, MingKang Xu, Paul Youn, MinHank Ho, Chon Hei Lei
-
Patent number: 7761704Abstract: One embodiment of the present invention provides a system that can expire encrypted-data. During operation, the system receives an expiry-request that includes object-identifying information, which can be used to identify a set of database objects that contain the encrypted-data, wherein a database object can be a table, a partition, a row, or a column in a row. Furthermore, a database object can have an expiration time, and it can be stored in an archive, which is typically used to store large amounts of data for long periods using a slower, but cheaper storage medium than the storage medium used by the database. The system then identifies a set of keys for the encrypted-data using the object-identifying information. Next, the system deletes the set of keys, thereby expiring the encrypted-data. Note that, deleting the set of keys ensures that the secure key repository does not contain any stale keys associated with expired encrypted-data.Type: GrantFiled: March 17, 2005Date of Patent: July 20, 2010Assignee: Oracle International CorporationInventors: Min-Hank Ho, Daniel ManHung Wong, Chon Hei Lei, Thomas Keefe
-
Publication number: 20100036846Abstract: One embodiment of the present invention provides a system that implements a security policy in a database. During operation, the system receives a request associated with a set of objects in the database. Next, the system obtains a set of access control lists (ACLs) associated with the database, wherein a respective ACL specifies one or more access privileges associated with a user or user group, and wherein a respective ACLs is not specific to a particular object in the database. The system then evaluates the ACLs to obtain a set of ACL results associated with the request and processes the request by applying the set of ACL results to the objects without evaluating the ACLs repeatedly for each of the objects.Type: ApplicationFiled: August 8, 2008Publication date: February 11, 2010Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Mohammed Irfan Rafiq, Chon Hei Lei, Vikram Kapoor, Thomas F. Keefe, Nipun Agarwal, Thomas Baby, Sam Idicula, Vikram Reddy Pesati
-
Publication number: 20080313134Abstract: A method and apparatus for preserving optimization hints in a transformed query is provided. In one embodiment, the methodology is implemented by query optimization logic. Upon receiving a first query to access values in a column of a table protected by an access control policy, the query optimization logic creates a second query that is equivalent to the first query as subject to the access control policy. Furthermore, the second query contains a new predicate that conjunctively joins a clone of a first expression in a predicate of the first query with a second expression that is derived, based on the access control policy, from the first expression. In one embodiment, the query optimization logic submits the second query for execution.Type: ApplicationFiled: June 18, 2007Publication date: December 18, 2008Inventor: Chon Hei Lei
-
Patent number: 7440962Abstract: An improved method and system for centrally managing and accessing attribute information in a distributed computing system is disclosed. Applications set up application specific user attributes in a directory. When an application user connects to a server, the server automatically accesses the directory to identify the relevant user attributes for that application. These user attributes are retrieved and stored in the session context. Standard LDAP attributes can also be retrieved from the directory and stored in the session context.Type: GrantFiled: October 9, 2001Date of Patent: October 21, 2008Assignee: Oracle International CorporationInventors: Daniel ManHung Wong, Nina Lewis, Chon Hei Lei
-
Patent number: 7310647Abstract: Returning rows having column values masked is disclosed. In response to receiving a database command, a modified database command is created that specifies whether to mask a value by returning a mask of the value instead of the value. In an embodiment, the condition expression is included in a policy function that is referenced by a policy. In an embodiment, the policy determines how the condition expressions are used. The condition expression may be used to determine which column values to mask. The condition expression may also be used to filter which rows are returned.Type: GrantFiled: January 23, 2004Date of Patent: December 18, 2007Assignee: Oracle International CorporationInventors: Chon Hei Lei, Daniel Manhung Wong, Thomas Keefe, Kristy Browder Edwards