Patents by Inventor Il-Sung Lee
Il-Sung Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11942480Abstract: A semiconductor device includes: a substrate; a first buried insulation layer disposed on the substrate; a first well which is disposed on the first buried insulation layer in a first region defined by a first element separation film, and includes a first portion extending along an upper surface of the first buried insulation layer, and a second portion extending from the first portion in a direction from the substrate toward the first buried insulation layer; a second buried insulation layer disposed on the first portion of the first well; a first semiconductor film disposed on the second buried insulation layer; a first transistor on the first semiconductor film; and a second element separation film which separates the second buried insulation layer and the first semiconductor film from the second portion of the first well, on the first portion of the first well, wherein an upper surface of the second portion of the first well is placed on the same plane as an upper surface of the first element separation fType: GrantFiled: February 10, 2022Date of Patent: March 26, 2024Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Il Min Lee, Hoon-Sung Choi
-
Publication number: 20230385428Abstract: A method for processing a cryptographic operation request includes receiving, at a hardware security module (HSM), the cryptographic operation request including a cryptographic key and at least one authorization token, determining, by the HSM, whether an access control list (ACL) associated with the cryptographic key of the cryptographic operation request is authorized to govern access to the cryptographic key, and validating, by the HSM, the at least one authorization token. When the at least one authorization token is valid and the ACL is authorized to govern access to the cryptographic key of the cryptographic operation request, the method includes processing, by the HSM, the cryptographic operation request.Type: ApplicationFiled: July 25, 2023Publication date: November 30, 2023Applicant: Google LLCInventors: Patrick Stahlberg, August Huber, Il-Sung Lee, Tao Tao, Xiaolan Zhang, John Randolph, David Elrom
-
Patent number: 11741240Abstract: A method for processing a cryptographic operation request includes receiving, at a hardware security module (HSM), the cryptographic operation request including a cryptographic key and at least one authorization token, determining, by the HSM, whether an access control list (ACL) associated with the cryptographic key of the cryptographic operation request is authorized to govern access to the cryptographic key, and validating, by the HSM, the at least one authorization token. When the at least one authorization token is valid and the ACL is authorized to govern access to the cryptographic key of the cryptographic operation request, the method includes processing, by the HSM, the cryptographic operation request.Type: GrantFiled: June 4, 2021Date of Patent: August 29, 2023Assignee: Google LLCInventors: Patrick Stahlberg, August Huber, Il-Sung Lee, Tao Tao, Xiaolan Zhang, John Randolph, David Elrom
-
Patent number: 11611558Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.Type: GrantFiled: November 13, 2019Date of Patent: March 21, 2023Assignee: Google LLCInventors: Il-Sung Lee, Sidharth Durgesh Telang, Jimmy C. Chau, Timothy Matthew Dierks, Ariel Joseph Feldman, Hunter James Freyer, Netanel Keidar, Gregory David Laun, Tianyuan Liu, Pedro Henrique Ribeiro Morais e Silva, Aditya Sinha, Xioalan Zhang
-
Patent number: 11032080Abstract: A method for processing a cryptographic operation request includes receiving, at a hardware security module (HSM), the cryptographic operation request including a cryptographic key and at least one authorization token, determining, by the HSM, whether an access control list (ACL) associated with the cryptographic key of the cryptographic operation request is authorized to govern access to the cryptographic key, and validating, by the HSM, the at least one authorization token. When the at least one authorization token is valid and the ACL is authorized to govern access to the cryptographic key of the cryptographic operation request, the method includes processing, by the HSM, the cryptographic operation request.Type: GrantFiled: January 25, 2018Date of Patent: June 8, 2021Assignee: Google LLCInventors: Patrick Stahlberg, Il-Sung Lee, Tao Tao, Xiaolan Zhang, John Randolph, August Huber, David Elrom
-
Publication number: 20210144141Abstract: A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.Type: ApplicationFiled: November 13, 2019Publication date: May 13, 2021Applicant: Google LLCInventors: Il-Sung Lee, Sidharth Durgesh Telang, Jimmy C. Chau, Timothy Matthew Dierks, Ariel Joseph Feldman, Hunter James Freyer, Netanel Keidar, Gregory David Laun, Tianyuan Liu, Pedro Henrique Ribeiro Morais e Silva, Aditya Sinha, Xioalan Zhang
-
Publication number: 20180367311Abstract: A method for processing a cryptographic operation request includes receiving, at a hardware security module (HSM), the cryptographic operation request including a cryptographic key and at least one authorization token, determining, by the HSM, whether an access control list (ACL) associated with the cryptographic key of the cryptographic operation request is authorized to govern access to the cryptographic key, and validating, by the HSM, the at least one authorization token. When the at least one authorization token is valid and the ACL is authorized to govern access to the cryptographic key of the cryptographic operation request, the method includes processing, by the HSM, the cryptographic operation request.Type: ApplicationFiled: January 25, 2018Publication date: December 20, 2018Applicant: Google LLCInventors: Patrick Stahlberg, Il-Sung Lee, Tao Tao, Xiaolan Zhang, John Randolph, August Huber, David Elrom
-
Patent number: 9003054Abstract: Systems and methodologies that enhance a Tabular Data Stream (TDS) protocol by enabling efficient transmission of a row(s) with null columns(s). An identification component employs a bit map that can be positioned at beginning of a row, to indicate to the receiving side (e.g., a client) columns that are to be sent. Accordingly, by distinguishing columns that are null from columns that are not null—followed by sending columns that are not null—transmission resources can be effectively employed.Type: GrantFiled: October 25, 2007Date of Patent: April 7, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Il-Sung Lee, Matthew A. Neerincx, Peter Gvozdjak, Chadwin James Mumford
-
Publication number: 20090182899Abstract: Systems and methods are provided, wherein the method includes retrieving and/or storing one or more data types representative of a selected date and/or time value from a server to a client in a server/client SQL environment using a selected wire format. Another aspect provides apparatus including a SQL server, a SQL client operationally coupled to the server, and means to transmit the selected time/date data types between the server and the client according to a selected wire format. In an illustrative implementation, the wire format translates the date/time data into a binary format.Type: ApplicationFiled: January 15, 2008Publication date: July 16, 2009Applicant: MICROSOFT CORPORATIONInventors: Il-Sung Lee, Xinwei Hong, Peter Gvozdjak, Chadwin James Mumford
-
Publication number: 20090112889Abstract: Systems and methodologies that enhance a Tabular Data Stream (TDS) protocol by enabling efficient transmission of a row(s) with null columns(s). An identification component employs a bit map that can be positioned at beginning of a row, to indicate to the receiving side (e.g., a client) columns that are to be sent. Accordingly, by distinguishing columns that are null from columns that are not null—followed by sending columns that are not null—transmission resources can be effectively employed.Type: ApplicationFiled: October 25, 2007Publication date: April 30, 2009Applicant: MICROSOFT CORPORATIONInventors: Il-Sung Lee, Matthew A. Neerincx, Peter Gvozdjak, Chadwin James Mumford
-
Publication number: 20080301148Abstract: Systems and methodologies that enhance a Tabular Data Stream (TDS) protocol by enabling clients to send tabular formed data as a single parameter to servers. A Table Valued Parameter (TVP) transporting component enables the client servers to transmit entire database tables as a single parameter; when invoking a server side procedure, for example. As such, values can be passed for functions associated with a stored procedure, and a parameter styled Application Program Interface (API) can be implemented.Type: ApplicationFiled: June 25, 2007Publication date: December 4, 2008Applicant: MICROSOFT CORPORATIONInventors: Il-Sung Lee, Matthew A. Neerincx, Vaughn L. Washington, Alazel Acheson