Patents by Inventor Hyunsuk HAN

Hyunsuk HAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240160313
    Abstract: The present disclosure provides a touch sensor embedded light emitting diode display device and a touch display panel. The device includes a substrate, a light emitting diode (LED) disposed over the substrate. The LED includes a first electrode and a second electrode. The device includes a pixel electrode electrically connected to the first electrode and a common electrode electrically connected to the second electrode. The device includes a driving transistor disposed over the substrate. The transistor includes an active layer, a source electrode, a drain electrode, and a gate electrode. The device includes a relay electrode electrically connecting the source electrode or drain electrode to the pixel electrode. The device includes a first touch sensor electrode disposed spaced apart from the light emitting diode and including the same conductive material as the pixel electrode.
    Type: Application
    Filed: November 2, 2023
    Publication date: May 16, 2024
    Inventors: Sungsu HAN, SangHyuck BAE, HwiDeuk LEE, Hyunsuk CHO
  • Patent number: 11956246
    Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.
    Type: Grant
    Filed: November 16, 2022
    Date of Patent: April 9, 2024
    Assignee: LendingClub Bank, National Association
    Inventors: Hyunsuk Han, Mahesh Acharya
  • Publication number: 20240097771
    Abstract: The disclosure relates to a method for processing a communication path in a portable communication device, which includes: identifying whether at least some of a plurality of active elements included in a communication circuit disposed between an antenna and a communication processor are in an abnormal state and, based on an abnormal state of a first active element supporting delivery of a signal of a first frequency band among the plurality of active elements being detected, controlling the portable communication device to deliver the signal of the first frequency band based on a second active element different form the first active element among the plurality of active element, and a portable communication device supporting the same.
    Type: Application
    Filed: August 24, 2023
    Publication date: March 21, 2024
    Inventors: Suho JIN, Jaebum BAE, Dongju LEE, Hyeontae CHO, Yonggil HAN, Bongsub KIM, Jinwan AN, Jonghoon WOO, Hyunsuk CHOI
  • Patent number: 11757882
    Abstract: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.
    Type: Grant
    Filed: October 24, 2022
    Date of Patent: September 12, 2023
    Assignee: LENDINGCLUB BANK, NATIONAL ASSOCIATION
    Inventors: Hyunsuk Han, Mahesh Acharya
  • Publication number: 20230096498
    Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.
    Type: Application
    Filed: November 16, 2022
    Publication date: March 30, 2023
    Inventors: Hyunsuk Han, Mahesh Acharya
  • Publication number: 20230038476
    Abstract: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.
    Type: Application
    Filed: October 24, 2022
    Publication date: February 9, 2023
    Inventors: Hyunsuk Han, Mahesh Acharya
  • Publication number: 20230031484
    Abstract: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.
    Type: Application
    Filed: October 11, 2022
    Publication date: February 2, 2023
    Inventors: Hyunsuk Han, Saverio Sgro
  • Patent number: 11522867
    Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.
    Type: Grant
    Filed: December 31, 2020
    Date of Patent: December 6, 2022
    Assignee: LendingClub Bank, National Association
    Inventors: Hyunsuk Han, Mahesh Acharya
  • Patent number: 11483312
    Abstract: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: October 25, 2022
    Assignee: LendingClub Bank, National Association
    Inventors: Hyunsuk Han, Mahesh Acharya
  • Patent number: 11470090
    Abstract: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: October 11, 2022
    Assignee: LendingClub Bank, National Association
    Inventors: Hyunsuk Han, Saverio Sgro
  • Patent number: 11392574
    Abstract: Techniques are described herein to handle situations in which multiple systems can change different copies of the same data item. Optimistic locking and time stamps are used to ensure consistency between the systems without incurring the performance penalties associated with two-phase commit. Specifically, when propagating a change to a data item from a first system to a second system, the second system compares the first system's “pre-update” value of the data item with its current value of the data item. If the pre-update value from the first system does not match the current value in the second system, then a conflict has occurred. Upon detecting a conflict, both systems use timestamps associated with the respective conflicting changes to determine which conflicting change “wins”. The winning change is applied by all systems whose changes did not win.
    Type: Grant
    Filed: January 9, 2018
    Date of Patent: July 19, 2022
    Assignee: LendingClub Bank, National Association
    Inventors: David Taubler, Hyunsuk Han, Yana Nikitina, Abhijit Karpe, Raul Acevedo
  • Patent number: 11329800
    Abstract: Proof-of-Dynamic-Quorum is a consensus mechanism for blockchain networks that selects a dynamic quorum of nodes to validate a proposed block based on digital data included in the proposed block. In an embodiment, a request to add a proposed block to a blockchain is received by a node of a blockchain network. A composite key value is generated based on one or more values within the proposed block. Based on a composite-key-value-to-quorum-participants mapping that is indicated in one or more blocks that are already present in the blockchain, a validating quorum is determined to determine whether the proposed block is to be added to the blockchain. When each node of the validating quorum indicates that the proposed block is accepted, the receiving node writes the proposed block to the blockchain. Proof-of-Dynamic-Quorum enables real-world authority data to be considered when performing a consensus algorithm in a blockchain network.
    Type: Grant
    Filed: October 20, 2019
    Date of Patent: May 10, 2022
    Assignee: LendingClub Bank, National Association
    Inventors: Hyunsuk Han, Jayakrishnan Nair, Amitkumar Tank, Srinivas Ambikapathi
  • Publication number: 20210306334
    Abstract: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.
    Type: Application
    Filed: March 31, 2020
    Publication date: September 30, 2021
    Inventors: Hyunsuk Han, Mahesh Acharya
  • Publication number: 20210306344
    Abstract: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.
    Type: Application
    Filed: March 31, 2020
    Publication date: September 30, 2021
    Inventors: Hyunsuk Han, Saverio Sgro
  • Publication number: 20210306346
    Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.
    Type: Application
    Filed: December 31, 2020
    Publication date: September 30, 2021
    Inventors: HYUNSUK HAN, MAHESH ACHARYA
  • Publication number: 20210119768
    Abstract: Proof-of-Dynamic-Quorum is a consensus mechanism for blockchain networks that selects a dynamic quorum of nodes to validate a proposed block based on digital data included in the proposed block. In an embodiment, a request to add a proposed block to a blockchain is received by a node of a blockchain network. A composite key value is generated based on one or more values within the proposed block. Based on a composite-key-value-to-quorum-participants mapping that is indicated in one or more blocks that are already present in the blockchain, a validating quorum is determined to determine whether the proposed block is to be added to the blockchain. When each node of the validating quorum indicates that the proposed block is accepted, the receiving node writes the proposed block to the blockchain. Proof-of-Dynamic-Quorum enables real-world authority data to be considered when performing a consensus algorithm in a blockchain network.
    Type: Application
    Filed: October 20, 2019
    Publication date: April 22, 2021
    Inventors: Hyunsuk Han, Jayakrishnan Nair, Amitkumar Tank, Srinivas Ambikapathi
  • Patent number: 10437689
    Abstract: When a particular event record requires a particular service, but that service has failed for the event, an error record that includes an aggregate identifier (AgID) is stored for the event in an error queue. Storing an error record in the error queue causes the service to notify a remediation team to fix the failed event. All events with the AgID in the error record are put on hold and an error record is created for each of these events. The remediation team generates a fixed version of the event record and causes the system to retry the failed service for the event based on the fixed version. If the fixed version of the event is successfully processed, then any other events with the same AgID that have error records in the error queue, are routed in order of enqueue time through the event processor to be handled.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: October 8, 2019
    Assignee: LendingClub Corporation
    Inventors: David Taubler, Hyunsuk Han, Yana Nikitina, John Daum, Wira Pradjinata, Igor Petrunya
  • Publication number: 20190213270
    Abstract: Techniques are described herein to handle situations in which multiple systems can change different copies of the same data item. Optimistic locking and time stamps are used to ensure consistency between the systems without incurring the performance penalties associated with two-phase commit. Specifically, when propagation a change to a data item from a first system to a second system, the second system compares the first system's “pre-update” value of the data item with its current value of the data item. If the pre-update value from the first system does not match the current value in the second system, then a conflict has occurred. Upon detecting a conflict, both systems use timestamps associated with the respective conflicting changes to determine which conflicting change “wins”. The winning change is applied by all systems whose changes did not win.
    Type: Application
    Filed: January 9, 2018
    Publication date: July 11, 2019
    Inventors: David Taubler, Hyunsuk Han, Yana Nikitina, Abhijit Karpe, Raul Acevedo
  • Publication number: 20190205221
    Abstract: When a particular event record requires a particular service, but that service has failed for the event, an error record that includes an aggregate identifier (AgID) is stored for the event in an error queue. Storing an error record in the error queue causes the service to notify a remediation team to fix the failed event. All events with the AgID in the error record are put on hold and an error record is created for each of these events. The remediation team generates a fixed version of the event record and causes the system to retry the failed service for the event based on the fixed version. If the fixed version of the event is successfully processed, then any other events with the same AgID that have error records in the error queue, are routed in order of enqueue time through the event processor to be handled.
    Type: Application
    Filed: December 28, 2017
    Publication date: July 4, 2019
    Inventors: David Taubler, Hyunsuk Han, Yana Nikitina, John Daum, Wira Pradjinata, Igor Petrunya
  • Publication number: 20150349545
    Abstract: Disclosed herein is an apparatus for wirelessly transmitting power. The apparatus for wirelessly transmitting power includes a transmission coil configured to change a magnetic field in response to an AC current, a shielding unit configured to restrict the propagation of the magnetic field generated from the transmission coil, and a casing configured to surround the transmission coil and the shielding unit. The transmission coil is formed in a single layer form by winding a wire along the sides of an isosceles triangle having a height greater than a base in the same plane, and the transmission coil may have a perimeter height of 52±0.5 mm, an inside height of 34±0.5 mm, a perimeter width of 46±0.5 mm, an inside width of 28±0.5 mm, and a thickness of 1.1±0.3 mm. The transmission coil may be formed by winding the wire on the sides of the isosceles triangle eight times.
    Type: Application
    Filed: June 2, 2015
    Publication date: December 3, 2015
    Applicant: HITACHI-LG DATA STORAGE KOREA, INC.
    Inventors: Hyunmin LEE, Kangnyung LEE, Hyunsuk HAN