Patents by Inventor Yolanda Liu
Yolanda Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11941631Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: GrantFiled: March 5, 2019Date of Patent: March 26, 2024Assignee: Capital One Services, LLCInventors: Lawrence Hutchison Douglas, Jr., Yolanda Liu, Clayton Johnson
-
Patent number: 11943350Abstract: In certain embodiments, the use of re-usable cold storage keys to sign messages may be facilitated. In some embodiments, an offline computer system (operating within an offline computing environment) may obtain, from a removable computer-readable storage medium, signing key shards corresponding to a signing private key and a blockchain transaction to be signed, where the signing key shards satisfy a key shard threshold that is (i) a number of key shards required for reconstructing the signing private key and (ii) less than a number of key shards derived from the signing private key using a ceremony key. The offline computer system may form a ciphertext of the signing private key using the signing key shards and reconstruct the signing private key by decrypting the ciphertext using the ceremony key. The offline computer system may sign the blockchain transaction using the signing private key.Type: GrantFiled: October 16, 2020Date of Patent: March 26, 2024Assignee: Coinbase, Inc.Inventors: Yolanda Liu, Ryan Sears, Alan Leung, Zachary Blacher, Jeremy Suurkivi
-
Publication number: 20230315827Abstract: Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.Type: ApplicationFiled: June 7, 2023Publication date: October 5, 2023Applicant: Capital One Services, LLCInventors: Clayton JOHNSON, Lawrence DOUGLAS, Yolanda LIU
-
Patent number: 11755702Abstract: Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.Type: GrantFiled: March 13, 2019Date of Patent: September 12, 2023Assignee: Capital One Services, LLCInventors: Clayton Johnson, Lawrence Douglas, Yolanda Liu
-
Patent number: 11004082Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: GrantFiled: September 28, 2018Date of Patent: May 11, 2021Assignee: Capital One Services, LLCInventors: Lawrence Hutchison Douglas, Jr., Yolanda Liu, Clayton Johnson
-
Publication number: 20210119781Abstract: Systems and methods for signing messes using re-usable cold storage keys.Type: ApplicationFiled: October 16, 2020Publication date: April 22, 2021Inventors: Yolanda Liu, Ryan Sears, Alan Leung, Zachary Blacher, Jeremy Suurkivi
-
Publication number: 20210019971Abstract: A method of operating an access control system containing one or more hierarchies, each of the one or more hierarchies includes one or more access levels is provided. The method including: computing one or more hierarchies; and assigning a primary access level of the one or more access levels within a primary hierarchy of the one or more hierarchies to a first credential; and determining that access levels vertically below the primary access level in the primary hierarchy are implicitly assigned to the first credential when assigning the primary access level of the one or more access levels within the primary hierarchy of the one or more hierarchies to the first credential.Type: ApplicationFiled: April 17, 2019Publication date: January 21, 2021Inventors: Philip Martin, Julian Borrey, Yolanda Liu, Zachary Blacher, Robert John Kearney
-
Publication number: 20200104852Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: ApplicationFiled: March 5, 2019Publication date: April 2, 2020Inventors: Lawrence Hutchison DOUGLAS, JR., Yolanda LIU, Clayton JOHNSON
-
Publication number: 20200104850Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: ApplicationFiled: September 28, 2018Publication date: April 2, 2020Inventors: Lawrence Hutchison DOUGLAS, JR., Yolanda Liu, Clayton Johnson
-
Publication number: 20200042682Abstract: Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.Type: ApplicationFiled: March 13, 2019Publication date: February 6, 2020Applicant: Capital One Services, LLCInventors: Clayton JOHNSON, Lawrence DOUGLAS, Yolanda LIU
-
Publication number: 20190318356Abstract: A method for storing a cryptocurrency private key offline, including: encrypting the cryptocurrency private key using a primary encryption key; sharding the encrypted cryptocurrency private key into a plurality of alpha shards; generating beta shards by encrypting the alpha shards with secondary encryption keys; and storing representations of the beta shards offline. The method can additionally or alternatively include: retrieving the representations of the beta shards from the offline storage; decrypting the beta shards into the alpha shards based on the secondary encryption keys; reconstructing the encrypted cryptocurrency private key by recombining the alpha shards; and decrypting the encrypted cryptocurrency private key with the primary encryption key.Type: ApplicationFiled: April 17, 2019Publication date: October 17, 2019Inventors: Philip Martin, Julian Borrey, Yolanda Liu, Zachary Blacher, Robert John Kearney
-
Patent number: 10402553Abstract: Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.Type: GrantFiled: July 31, 2018Date of Patent: September 3, 2019Assignee: Capital One Services, LLCInventors: Clayton Johnson, Lawrence Douglas, Yolanda Liu