Patents by Inventor Thomas James Andrews

Thomas James Andrews has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250233744
    Abstract: A system grants access for a computing entity to execute a requested operation upon a target resource based on a set of one or more access policies associated with a different computing entity. The access control service receives a surrogate access request from a first computing entity. The surrogate access request represents a request for the first computing entity to execute a requested operation upon a target resource based on a set of one or more access policies corresponding to a principal associated with a second computing entity. The system obtains a set of one or more access policies respectively, including a set of one or more authorized operations associated with the principal, and determines whether the requested operation corresponds to at least one authorized operation. Responsive to determining that the requested operation corresponds to at least one authorized operation, the system authorizes execution of the requested operation.
    Type: Application
    Filed: January 11, 2024
    Publication date: July 17, 2025
    Applicant: Oracle International Corporation
    Inventors: Thomas James Andrews, Girish Nagaraja
  • Publication number: 20250202902
    Abstract: A system executes an authorization process for initiating a session with a computing entity. Executing the authorization process includes determining an identity associated with the computing entity, identifying a current set of access policies associated with the identity, and determining, based on the current set of access policies, a first set of actions that the computing entity is authorized to perform. While executing the session, the system executes a first action in accordance with the current set of access policies. Subsequent to executing the first action, the set of access policies is modified. The system detects an occurrence of a trigger condition, and in response, re-executes the authorization process for the session, including determining, based on the modified set of access policies, a second set of actions the computing entity is authorized to perform that differs from the first set of actions.
    Type: Application
    Filed: December 14, 2023
    Publication date: June 19, 2025
    Applicant: Oracle International Corporation
    Inventors: Tony Long, Krishna Sai Veera Reddy, Karthik Venkatesh, Philip Ramsey, Arsalan Ahmad, Thomas James Andrews
  • Publication number: 20250097302
    Abstract: A system is disclosed that includes capabilities by which a nested sub-resource residing in a service tenancy can access a customer-owned resource residing in a customer tenancy without the use of a cross-tenant policy. The disclosed system provides the ability for a nested sub-resource residing in a service tenancy to obtain the resource principal identity of a higher-level resource residing in the customer tenancy and use the identity of the higher-level resource to access a customer-owned resource residing in the customer tenancy. Using the resource principal identity of its higher-level resource, the sub-resource can access a customer-owned resource that resides in a customer tenancy in a seamless way without having to write a cross-tenancy policy statement that provides permission to the sub-resource to access the customer-owned resource.
    Type: Application
    Filed: September 27, 2024
    Publication date: March 20, 2025
    Applicant: Oracle International Corporation
    Inventors: A M Helali Mortuza Bhuiyan, Pritesh Kiritkumar Patel, Ayman Mohammed Aly Hassan Elmenshawy, Thomas James Andrews, Sreedhar Katti, Jason Anthony Slepicka, Jakub Karol Wojciak, Kenneth Choi Kil
  • Publication number: 20250007832
    Abstract: Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer tenancy, where the traffic is generated by a multi-tenancy service. The traffic can be destined to the target service. The traffic can be tagged by the multi-tenancy service with information indicating that the traffic is egressing therefrom on behalf of the customer tenancy. The customer tenancy can be associated with the egress policy. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy on the traffic that the target service is receiving.
    Type: Application
    Filed: June 12, 2024
    Publication date: January 2, 2025
    Applicant: Oracle International Corporation
    Inventors: Girish Nagaraja, Martin John Sleeman, Thomas Ray Bakita, Richard Benjamin Stockton, Troy Ari Levin, Jinsu Choi, Thomas James Andrews
  • Publication number: 20250007843
    Abstract: Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network, or by a multi-tenancy service on behalf of the customer. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network) or by the multi-tenancy service. The customer network can be associated with the egress policy. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy on the traffic that the target service is receiving.
    Type: Application
    Filed: September 29, 2023
    Publication date: January 2, 2025
    Applicant: Oracle International Corporation
    Inventors: Girish Nagaraja, Martin John Sleeman, Thomas Ray Bakita, Richard Benjamin Stockton, Troy Ari Levin, Jinsu Choi, Thomas James Andrews
  • Publication number: 20250007845
    Abstract: Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network). The customer network can be associated with the egress policy. The customer can define the egress policy at different granularity levels by using different attributes. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy, based on the customer-defined attributes, on the traffic that the target service is receiving.
    Type: Application
    Filed: September 29, 2023
    Publication date: January 2, 2025
    Applicant: Oracle International Corporation
    Inventors: Girish Nagaraja, Martin John Sleeman, Thomas Ray Bakita, Richard Benjamin Stockton, Troy Ari Levin, Jinsu Choi, Thomas James Andrews
  • Publication number: 20250007956
    Abstract: Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer, where the traffic is generated by a customer network of the customer, such as a customer tenancy or an on-premise network. The traffic can be destined to the target service. The traffic can be tagged by the customer network (e.g., by a gateway of the customer network). The customer network can be associated with the egress policy. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy on the traffic that the target service is receiving.
    Type: Application
    Filed: September 29, 2023
    Publication date: January 2, 2025
    Applicant: Oracle International Corporation
    Inventors: Girish Nagaraja, Martin John Sleeman, Thomas Ray Bakita, Richard Benjamin Stockton, Troy Ari Levin, Jinsu Choi, Thomas James Andrews
  • Patent number: 12137145
    Abstract: A system is disclosed that includes capabilities by which a nested sub-resource residing in a service tenancy can access a customer-owned resource residing in a customer tenancy without the use of a cross-tenant policy. The disclosed system provides the ability for a nested sub-resource residing in a service tenancy to obtain the resource principal identity of a higher-level resource residing in the customer tenancy and use the identity of the higher-level resource to access a customer-owned resource residing in the customer tenancy. Using the resource principal identity of its higher-level resource, the sub-resource can access a customer-owned resource that resides in a customer tenancy in a seamless way without having to write a cross-tenancy policy statement that provides permission to the sub-resource to access the customer-owned resource.
    Type: Grant
    Filed: September 27, 2023
    Date of Patent: November 5, 2024
    Assignee: Oracle International Corporation
    Inventors: A M Helali Mortuza Bhuiyan, Pritesh Kiritkumar Patel, Ayman Mohammed Aly Hassan Elmenshawy, Thomas James Andrews, Sreedhar Katti, Jason Anthony Slepicka, Jakub Karol Wojciak, Kenneth Choi Kil
  • Patent number: 12052172
    Abstract: Techniques for enforcing an egress policy at a target service are described. In an example, traffic is generated for a customer tenancy, where the traffic is generated by a multi-tenancy service. The traffic can be destined to the target service. The traffic can be tagged by the multi-tenancy service with information indicating that the traffic is egressing therefrom on behalf of the customer tenancy. The customer tenancy can be associated with the egress policy. The target service can determine the egress policy based on the information tagged to the traffic and can enforce the egress policy on the traffic that the target service is receiving.
    Type: Grant
    Filed: September 29, 2023
    Date of Patent: July 30, 2024
    Assignee: Oracle International Corporation
    Inventors: Girish Nagaraja, Martin John Sleeman, Thomas Ray Bakita, Richard Benjamin Stockton, Troy Ari Levin, Jinsu Choi, Thomas James Andrews
  • Publication number: 20240119133
    Abstract: Techniques described herein relate to authorization between integrated cloud products. An example includes receiving, by a computing device and from a first resource, a first request for permission to access a certificate to verify a requestor's identity. The computing device can transmit a second request to a second resource to authorize permitting access to the certificate. The computing device can receive a response from the second resource comprising an authorization to permit access to the certificate. The computing device can grant permission to the first resource to access the certificate, wherein the first resource is configured to verify the requestor's identity based on accessing the certificate. The computing device can receive a third request from the first resource to generate an association object between the first resource and the certificate. The computing device can generate the association object, wherein the association object associates the first resource and the certificate.
    Type: Application
    Filed: October 10, 2022
    Publication date: April 11, 2024
    Applicant: Oracle International Corporation
    Inventors: Mauruthi Geetha Mohan, Anthony Long, Mina Michel Gorgy Anes, Sanjeeb Kumar Sahoo, Yingyu Yang, Bakhtiyar Uddin, Thomas James Andrews
  • Publication number: 20230097515
    Abstract: Systems and methods for combined authorization for entities within a domain are described. One aspect relates to a method. The method can include receiving a request for a user to take an action in a first system and determining a first authorization status of the action by the user with the first system. The method can include determining a second authorization status of the action by the user with a second system, determining a union of the first authorization status and the second authorization status, and comparing the union of the first authorization status and the second authorization status to authorization criteria.
    Type: Application
    Filed: September 30, 2022
    Publication date: March 30, 2023
    Applicant: Oracle International Corporation
    Inventors: Gregg Alan Wilson, Thomas James Andrews, Gary Philip Cole, Girishi Nagaraja, Bhavitha Chava
  • Patent number: 11249952
    Abstract: This disclosure describes techniques implemented partly by a service provider network for distributed storage of event data in data storage according to a data-storage schema in order to reduce the amount of computing resources required to store and access the event data. The techniques may include generating event identifiers (IDs) for actions performed by users to manage cloud-based services. Rather than indexing event IDs by writing the event IDs to a database, the techniques described herein include storing event IDs in different file folders in storage according to a storage schema where the different file folders are assigned to store event IDs having different prefix portions. In this way, event IDs may be stored, or grouped, in different file folders according to prefix portions of the event IDs to reduce the amount of reads and writes required for the event IDs.
    Type: Grant
    Filed: September 21, 2018
    Date of Patent: February 15, 2022
    Assignee: Amazon Technologies, Inc.
    Inventor: Thomas James Andrews