Patents by Inventor Zhe Hua Peng

Zhe Hua Peng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230396628
    Abstract: Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.
    Type: Application
    Filed: August 22, 2023
    Publication date: December 7, 2023
    Inventors: Feng Zhang, Peng Hui Jiang, TING YIN, Jun Su, Zhe Hua Peng
  • Patent number: 11777944
    Abstract: Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: October 3, 2023
    Assignee: International Business Machines Corporation
    Inventors: Feng Zhang, Peng Hui Jiang, Ting Yin, Jun Su, Zhe Hua Peng
  • Publication number: 20230222228
    Abstract: Techniques for hierarchical encryption for data storage are disclosed, in one or more embodiments. These techniques include parsing an electronic database storage request, based on the syntax of the request, to identify a plurality of request elements and determining, using one or more trained machine learning (ML) models, one or more sensitivities associated with the plurality of request elements. The techniques further include identifying one or more encryption techniques for the plurality of request elements based on the one or more sensitivities, encrypting data associated with the database storage request using the identified one or more encryption techniques, and storing the encrypted data and one or more associated encryption keys in an electronic database, using the electronic database storage request.
    Type: Application
    Filed: January 11, 2022
    Publication date: July 13, 2023
    Inventors: Zhe Hua PENG, Peng Hui JIANG, Ting YIN, Jun SU, Feng ZHANG
  • Publication number: 20220417250
    Abstract: Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.
    Type: Application
    Filed: June 29, 2021
    Publication date: December 29, 2022
    Inventors: Feng Zhang, Peng Hui Jiang, TING YIN, Jun Su, Zhe Hua Peng