Patents by Inventor Kwan-I Lee

Kwan-I Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9674168
    Abstract: Techniques for managing privileged accounts via a privileged access management service are provided. In some examples, the service may be configured with a plug-in framework for accessing secure resources. In some aspects, plug-in code for implementing a workflow that includes step-up validation associated with a user attempting to access at least one secure resource may be received. Access to the at least one secure resource may be provided when the user is authenticated with respect to the service. In some examples, a request to access a second secure resource may be received. Additionally, in some examples, the workflow to perform the step-up validation may be implemented at least in response to the request to access the second secure resource. The workflow implemented based at least in part on an attribute associated with the request.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: June 6, 2017
    Assignee: Oracle International Corporation
    Inventors: Buddhika Kottahachchi, Himanshu Sharma, Ramaprakash Hosalli Sathyanarayan, Fannie Ho, Arun Theebaprakasam, Kwan-I Lee, Zhe Wang
  • Patent number: 9667610
    Abstract: Techniques for managing network-connected objects are provided. In some examples, code for accessing a network-connected object may be received. The code may be configured to enable generation of an application programming interface method. In some aspects, account information associated with a user may be stored. A particular method call corresponding to the application programming interface method may be received from a computer device of the user. The particular method call may include a request to access the network-connected object. In some examples, the request to access the network-connected object may be authenticated based at least in part on the account information. Additionally, in some examples, an instruction to the network-connected object may be provided over a network if the request is authenticated.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: May 30, 2017
    Assignee: Oracle International Corporation
    Inventors: Arun Theebaprakasam, Kuang-Yu Shih, Kwan-I Lee, Zhe Wang, Buddhika Kottahachchi
  • Publication number: 20150082396
    Abstract: Techniques for managing network-connected objects are provided. In some examples, code for accessing a network-connected object may be received. The code may be configured to enable generation of an application programming interface method. In some aspects, account information associated with a user may be stored. A particular method call corresponding to the application programming interface method may be received from a computer device of the user. The particular method call may include a request to access the network-connected object. In some examples, the request to access the network-connected object may be authenticated based at least in part on the account information. Additionally, in some examples, an instruction to the network-connected object may be provided over a network if the request is authenticated.
    Type: Application
    Filed: March 20, 2014
    Publication date: March 19, 2015
    Applicant: ORACLE INTERNATIONAL CORPORATION
    Inventors: Arun Theebaprakasam, Kuang-Yu Shih, Kwan-I Lee, Zhe Wang, Buddhika Kottahachchi
  • Publication number: 20150082372
    Abstract: Techniques for managing privileged accounts via a privileged access management service are provided. In some examples, the service may be configured with a plug-in framework for accessing secure resources. In some aspects, plug-in code for implementing a workflow that includes step-up validation associated with a user attempting to access at least one secure resource may be received. Access to the at least one secure resource may be provided when the user is authenticated with respect to the service. In some examples, a request to access a second secure resource may be received. Additionally, in some examples, the workflow to perform the step-up validation may be implemented at least in response to the request to access the second secure resource. The workflow implemented based at least in part on an attribute associated with the request.
    Type: Application
    Filed: March 20, 2014
    Publication date: March 19, 2015
    Applicant: Oracle International Corporation
    Inventors: Buddhika Kottahachchi, Himanshu Sharma, Ramaprakash Hosalli Sathyanarayan, Fannie Ho, Arun Theebaprakasam, Kwan-I Lee, Zhe Wang