Patents by Inventor Chooi Peng Low
Chooi Peng Low has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250126125Abstract: Up front authorization of a workflow and a security context for workflow execution are disclosed. All possible authorizations that may be required by a workflow definition are identified up front. A requestor is allowed to execute the workflow only when the authorizations of the user include the authorizations that may be required by the workflow. An immutable security context is generated and associated with the workflow or an instance thereof. The immutable security context can prevent or reduce failures associated with changes to a requestor's authorizations and may also scope or limit the workflow to at least the type or capacity of work requested and/or work uniquely identified in the security context. The immutable security context is managed in a security context that is separate and independent of the workflow execution context.Type: ApplicationFiled: October 13, 2023Publication date: April 17, 2025Inventors: Yi Fang, Georgi Abelovich Yaralov, Chooi Peng Low, Ching-Yun Chao
-
Publication number: 20250124145Abstract: Up front authorization of a workflow and a security context for workflow execution are disclosed. All possible authorizations that may be required by a workflow are identified up front. A requestor is allowed to execute the workflow only when the authorizations of the user include the authorizations that may be required by the workflow. A security context is generated and associated with the workflow or an instance thereof. The security context scopes or limits the workflow to at least the type or capacity of work requested, work uniquely identified in the security context, and/or service/workflow/call paths that the request is allowed to be processed through.Type: ApplicationFiled: October 13, 2023Publication date: April 17, 2025Inventors: Daniel K. O'Reilly, JR., Chooi Peng Low, Yi Fang, Ranjit Kollu, Jonathon Cwik, Ching-Yun Chao
-
Publication number: 20240422147Abstract: Systems and methods are provided that may be implemented to orchestrate trusted enrollment of an endpoint client information handling system by deploying a signed payload of an enrollment package to the endpoint client system, and by using a client software agent executing on the endpoint client system to first verify the distribution chain and/or signature of the deployed enrollment package before proceeding to use other information contained in the enrollment package to contact a registration server to enroll the endpoint client system.Type: ApplicationFiled: August 27, 2024Publication date: December 19, 2024Inventors: Chooi Peng Low, Michael Phillips
-
Patent number: 12101306Abstract: Systems and methods are provided that may be implemented to orchestrate trusted enrollment of an endpoint client information handling system by deploying a signed payload of an enrollment package to the endpoint client system, and by using a client software agent executing on the endpoint client system to first verify the distribution chain and/or signature of the deployed enrollment package before proceeding to use other information contained in the enrollment package to contact a registration server to enroll the endpoint client system.Type: GrantFiled: August 26, 2021Date of Patent: September 24, 2024Assignee: Dell Products L.P.Inventors: Chooi Peng Low, Michael Phillips
-
Patent number: 12086865Abstract: A system includes a purchase portal configured to receive a purchase order from a customer, wherein the purchase order includes a service from each of a plurality of service providers. When receipt of the purchase order is detected, a processor determines first and second ones of the service providers associated with the purchase order; and establishes a trust relationship between the first service provider and the second service provider in a context of the customer. The processor also sends a first request for a first trust artifact to the first service provider and a second request for a second trust artifact to the second service provider; receives the first trust artifact from the first service provider, receives the second trust artifact from the second service provider, sends the first trust artifact to the second service provider, and sends the second trust artifact to the first service provider.Type: GrantFiled: October 28, 2022Date of Patent: September 10, 2024Assignee: Dell Products L.P.Inventor: Chooi Peng Low
-
Patent number: 11748502Abstract: In one or more embodiments, a first information handling system (IHS) may: encrypt a document utilizing a symmetric encryption key to produce an encrypted document; and encrypt a metadata file, which includes the symmetric encryption key, utilizing a session encryption key to produce a first encrypted metadata file. In one or more embodiments, a second IHS may: decrypt the first encrypted metadata file utilizing the session encryption key to produce the metadata file; and encrypt the metadata file utilizing a public encryption key associated with a second TPM associated with a third IHS to produce a second encrypted metadata file. In one or more embodiments, the third information handling system may: decrypt the second encrypted metadata file utilizing a private encryption key associated with the second TPM to produce the metadata file; and decrypt the encrypted document utilizing the symmetric encryption key, from the metadata file, to produce the document.Type: GrantFiled: June 10, 2021Date of Patent: September 5, 2023Assignee: Dell Products L.P.Inventors: Amy Christine Nelson, Chooi Peng Low
-
Publication number: 20230061123Abstract: Systems and methods are provided that may be implemented to orchestrate trusted enrollment of an endpoint client information handling system by deploying a signed payload of an enrollment package to the endpoint client system, and by using a client software agent executing on the endpoint client system to first verify the distribution chain and/or signature of the deployed enrollment package before proceeding to use other information contained in the enrollment package to contact a registration server to enroll the endpoint client system.Type: ApplicationFiled: August 26, 2021Publication date: March 2, 2023Inventors: Chooi Peng Low, Michael Phillips
-
Publication number: 20230047485Abstract: A system includes a purchase portal configured to receive a purchase order from a customer, wherein the purchase order includes a service from each of a plurality of service providers. When receipt of the purchase order is detected, a processor determines first and second ones of the service providers associated with the purchase order; and establishes a trust relationship between the first service provider and the second service provider in a context of the customer. The processor also sends a first request for a first trust artifact to the first service provider and a second request for a second trust artifact to the second service provider; receives the first trust artifact from the first service provider, receives the second trust artifact from the second service provider, sends the first trust artifact to the second service provider, and sends the second trust artifact to the first service provider.Type: ApplicationFiled: October 28, 2022Publication date: February 16, 2023Inventor: Chooi Peng Low
-
Publication number: 20220398332Abstract: In one or more embodiments, a first information handling system (IHS) may: encrypt a document utilizing a symmetric encryption key to produce an encrypted document; and encrypt a metadata file, which includes the symmetric encryption key, utilizing a session encryption key to produce a first encrypted metadata file. In one or more embodiments, a second IHS may: decrypt the first encrypted metadata file utilizing the session encryption key to produce the metadata file; and encrypt the metadata file utilizing a public encryption key associated with a second TPM associated with a third IHS to produce a second encrypted metadata file. In one or more embodiments, the third information handling system may: decrypt the second encrypted metadata file utilizing a private encryption key associated with the second TPM to produce the metadata file; and decrypt the encrypted document utilizing the symmetric encryption key, from the metadata file, to produce the document.Type: ApplicationFiled: June 10, 2021Publication date: December 15, 2022Inventors: Amy Christine Nelson, Chooi Peng Low
-
Patent number: 11526928Abstract: A system includes a purchase portal configured to receive a purchase order from a customer, wherein the purchase order includes a service from each of a plurality of service providers. When receipt of the purchase order is detected, a processor determines first and second ones of the service providers associated with the purchase order; and establishes a trust relationship between the first service provider and the second service provider in a context of the customer. The processor also sends a first request for a first trust artifact to the first service provider and a second request for a second trust artifact to the second service provider; receives the first trust artifact from the first service provider, receives the second trust artifact from the second service provider, sends the first trust artifact to the second service provider, and sends the second trust artifact to the first service provider.Type: GrantFiled: February 3, 2020Date of Patent: December 13, 2022Assignee: Dell Products L.P.Inventor: Chooi Peng Low
-
Publication number: 20210241355Abstract: A system includes a purchase portal configured to receive a purchase order from a customer, wherein the purchase order includes a service from each of a plurality of service providers. When receipt of the purchase order is detected, a processor determines first and second ones of the service providers associated with the purchase order; and establishes a trust relationship between the first service provider and the second service provider in a context of the customer. The processor also sends a first request for a first trust artifact to the first service provider and a second request for a second trust artifact to the second service provider; receives the first trust artifact from the first service provider, receives the second trust artifact from the second service provider, sends the first trust artifact to the second service provider, and sends the second trust artifact to the first service provider.Type: ApplicationFiled: February 3, 2020Publication date: August 5, 2021Inventor: Chooi Peng Low
-
Patent number: 10855777Abstract: Systems and methods for a client-server system including a client and a runtime server to provide extended management services utilizing declarative service management plugins. The client may transmit client service data associated with a set of extension declarations of a service plugin package using a client service plugin. The runtime server may add the set of extension declarations to the first set of the management services. The runtime server may receive the client service data from the client. The runtime server may provide a management service of a set of management services for the client that may be based on the client service data and a subset of the set of extension declarations corresponding to the first management service. The first subset of the set of extension declarations may specify how the first management service is provided to the client.Type: GrantFiled: April 23, 2018Date of Patent: December 1, 2020Inventors: Brandon Grooters, Chooi Peng Low, Brijesh Mishra
-
Publication number: 20190327315Abstract: Systems and methods for a client-server system including a client and a runtime server to provide extended management services utilizing declarative service management plugins. The client may transmit client service data associated with a set of extension declarations of a service plugin package using a client service plugin. The runtime server may add the set of extension declarations to the first set of the management services. The runtime server may receive the client service data from the client. The runtime server may provide a management service of a set of management services for the client that may be based on the client service data and a subset of the set of extension declarations corresponding to the first management service. The first subset of the set of extension declarations may specify how the first management service is provided to the client.Type: ApplicationFiled: April 23, 2018Publication date: October 24, 2019Inventors: Brandon Grooters, Chooi Peng Low, Brijesh Mishra