Dr. Park graduated from the University of Florida College of Medicine at Gainesville in 2006. She works in Gainesville, FL and specializes in Cardiovascular Disease.
Neil Garcia-Sinclair - Alameda CA 94501-7117 Ki Bong Park - Arleta CA 91331
International Classification:
H02K 2910
US Classification:
318254, 318138
Abstract:
A multi-phase bipolar brushless D. C. motor having an embedded permanent magnet as a rotor, an armature as a stator and a plurality of windings are sub-wound on the stator in parallel and independently phase-connected. A commutation encoder defining light shielding and light detecting portions is fixedly mounted on a shaft of the rotor to be rotated, and a photo-sensor is coupled operatively thereto and connected with a driving circuit to improve the performance of the motor.
Controlling Exposure Of Sensitive Data And Operation Using Process Bound Security Tokens In Cloud Computing Environment
- Armonk NY, US Ching-Yun Chao - Austin TX, US Bertrand Be-Chung Chiu - Austin TX, US Ki H. Park - Research Triangle Park NC, US
International Classification:
H04L 9/32 H04L 29/06
Abstract:
Exposure of sensitive information to users and other servers is controlled by using a first security token which contains a user identity and one or more user credentials associated with a first user; a second security token which contains an identity of a token issuer and an identity of a first owning process; and at least a first trusted server which accesses a downstream computing service on behalf of the first user by substituting or combining the first security token and the second security token, while preventing the second security token from being exposed to the first user. This establishes a first security sensitivity level for the first user and a second security sensitivity level for the first trusted server, wherein the first security sensitivity level is a lower access level than the second security sensitivity level for the downstream service.
Sponsored Trust Relationship Management Between Multiple Racks
- Armonk NY, US Ching-Yun Chao - Austin TX, US Patrick L. Davis - Pflugerville TX, US Rohan Gandhi - Cedar Park TX, US Yuhsuke Kaneyasu - Tokyo, JP Lewis Lo - Toronto, CA Ki H. Park - Cary NC, US Ankit Patel - Austin TX, US Kin Ueng - Austin TX, US Iqbal M. Umair - Mississauga, CA Leonardo A. Uzcategui - Westminster CO, US Barbara J. Vander Weele - Austin TX, US
International Classification:
H04L 29/06 H04L 9/30
Abstract:
A new management node associated with a new rack sends at least a public key of the new management node to a first management node associated with a first rack and a plurality of autonomous management nodes. The first management node sends the new management node an access token trusted by at least a portion of the plurality of autonomous management nodes and a set of public keys corresponding to at least a portion of the plurality of autonomous management nodes. The new management node can send its public key and the access token to at least a portion of the plurality of autonomous management nodes. In response, the new management node can establish a mutual trust relationship with at least a portion of the plurality of autonomous management nodes.
Controlling Exposure Of Sensitive Data And Operation Using Process Bound Security Tokens In Cloud Computing Environment
- Armonk NY, US Ching-Yun Chao - Austin TX, US Bertrand Be-Chung Chiu - Austin TX, US Ki H. Park - Research Triangle Park NC, US
International Classification:
H04L 9/32 H04L 29/06
Abstract:
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request. The token-owning process signs the request to indicate that it endorses the request. A receiving server accepts a request if (1) the token-owning process endorses the request by signing the request; (2) the token is valid (token is signed by its issuer and the digital signature is verified and unexpired); (3) user entity, which can be a real user or a deployment or a server process, that is represented by the token has the authorization to access the specified resources; and (4) the token-owning process is authorized to endorse the user entity represented by the token to access the specified resources.
Sponsored Trust Relationship Management Between Multiple Racks
- Armonk NY, US Ching-Yun Chao - Austin TX, US Patrick L. Davis - Pflugerville TX, US Rohan Gandhi - Cedar Park TX, US Yuhsuke Kaneyasu - Tokyo, JP Lewis Lo - Toronto, CA Ki H. Park - Cary NC, US Ankit Patel - Austin TX, US Kin Ueng - Austin TX, US Iqbal M. Umair - Mississauga, CA Leonardo A. Uzcategui - Westminster CO, US Barbara J. Vander Weele - Austin TX, US
International Classification:
H04L 29/06 H04L 9/30
Abstract:
A new management node associated with a new rack sends at least a public key of the new management node to a first management node associated with a first rack and a plurality of autonomous management nodes. The first management node sends the new management node an access token trusted by at least a portion of the plurality of autonomous management nodes and a set of public keys corresponding to at least a portion of the plurality of autonomous management nodes. The new management node can send its public key and the access token to at least a portion of the plurality of autonomous management nodes. In response, the new management node can establish a mutual trust relationship with at least a portion of the plurality of autonomous management nodes.
Trust Relationship Management Amongst Racks In A Data Center
- Armonk NY, US John Yow-Chun Chang - Austin TX, US Ching-Yun Chao - Austin TX, US Patrick L. Davis - Pflugerville TX, US Rohan Gandhi - Cedar Park TX, US Hugh E. Hockett - Raleigh NC, US Yuhsuke Kaneyasu - Tokyo, JP Lewis Lo - Toronto, CA Matthew D. McClintock - Morrisville NC, US Scott C. Moonen - Holly Springs NC, US Ki H. Park - Cary NC, US Ankit Patel - Austin TX, US Kin Ueng - Austin TX, US Iqbal M. Umair - Mississauga, CA Leonardo A. Uzcategui - Westminster CO, US Barbara J. Vander Weele - Austin TX, US
International Classification:
H04L 9/32 H04L 29/08
Abstract:
A first management node of a first rack can be registered to a shared file storage system by establishing a mutual trust relationship between the first management node and the shared file storage system. The first management node can access a plurality of respective public keys and a plurality of respective certificates of authority that are stored in the shared file storage system and associated with a plurality of respective registered management nodes. The first management node can store a public key and a certificate of authority in the shared file storage system. The first management node can form mutual trust relationships with other registered management nodes. The first management node can validate authenticity of messages received from registered management nodes of the plurality of registered management nodes using a respective public key and a respective certificate of authority associated with a respective registered management node sending a message.
Construct Data Management Between Loosely Coupled Racks
- Armonk NY, US Ching-Yun Chao - Austin TX, US Patrick L. Davis - Pflugerville TX, US Rohan Gandhi - Cedar Park TX, US Yuhsuke Kaneyasu - Tokyo, JP Lewis Lo - Toronto, CA Ki H. Park - Cary NC, US Ankit Patel - Austin TX, US Kin Ueng - Austin TX, US Iqbal M. Umair - Mississauga, CA Leonardo A. Uzcategui - Westminster CO, US Barbara J. Vander Weele - Austin TX, US
International Classification:
H04L 12/911 H04L 29/08
Abstract:
A construct having a plurality of distributed resources can include a portion of a second rack having a plurality of computing devices controlled by a second management node. The second management node can determine it contains insufficient construct data such as user data, group data, resource data, or authorization policy data to execute an operation associated with the construct. The second management node can synchronize at least a portion of construct data with a first management node. The first management node can be associated with the construct and a mutual trust relationship can exist between the first management node and the second management node. The first management node and the second management node can comprise autonomous management nodes capable of functioning independent of the network.
Controlling Exposure Of Sensitive Data And Operation Using Process Bound Security Tokens In Cloud Computing Environment
- Armonk NY, US Ching-Yun Chao - Austin TX, US Bertrand Be-Chung Chiu - Austin TX, US Ki H. Park - Research Triangle Park NC, US
International Classification:
H04L 9/32 H04L 29/06
Abstract:
Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who is making the request, and uses its key to digitally sign the request. The token-owning process signs the request to indicate that it endorses the request. A receiving server accepts a request if (1) the token-owning process endorses the request by signing the request; (2) the token is valid (token is signed by its issuer and the digital signature is verified and unexpired); (3) user entity, which can be a real user or a deployment or a server process, that is represented by the token has the authorization to access the specified resources; and (4) the token-owning process is authorized to endorse the user entity represented by the token to access the specified resources.
License Records
Ki Jung Park
License #:
1201097560
Category:
Cosmetologist License
Ki Jung Park
License #:
1200010473
Category:
Cosmetologist Temporary Permit
Ki Ju Park
License #:
2705024670 - Active
Category:
Contractor
Issued Date:
Jul 17, 1995
Expiration Date:
Jul 31, 2017
Type:
Class A
Ki Ju Park
License #:
2705016621
Category:
Contractor
Ki Jung Park
License #:
1204017757
Category:
Cosmetology License and Cosmetologist Instructor Certificate
Ki Tai Park
License #:
0225149879
Category:
Real Estate Individual
Name / Title
Company / Classification
Phones & Addresses
Ki Taik Park Director
KI TAIK PARK, INC Business Services at Non-Commercial Site · Nonclassifiable Establishments
8989 W Rd APT 1426, Houston, TX 77064 9501 Long Pt Rd, Houston, TX 77055 12633 Memorial Dr, Houston, TX 77024
Ki Jo Park President, Principal
HILLSIDE FOODMART, INC Ret Groceries
4061 E Castro Vly Blvd #195, Castro Valley, CA 94552 249 Hillside Blvd, South San Francisco, CA 94080
Ki Sung Park Managing
TOPBE LLC
7122 Wood Holw Dr APT 36, Austin, TX 78731 1111 W 24 St, Austin, TX 78705
Ki Jo Park President
Saejin USA, Inc Management Consulting Services · Nonclassifiable Establishments
Longden Elementary School Temple City CA 1983-1984, Emperor Elementary School Temple City CA 1984-1985, Oak Avenue Intermediate School Temple City CA 1985-1986
Community:
Bruno Dohle, Peter Bentz, Larrry Stapleton, Janet Ervin