Patents by Inventor Alexander Song
Alexander Song has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12237072Abstract: A surgical exercise performed with a surgical robotic system is sensed by depth cameras, generating 3D point cloud data. Robot system data associated with the surgical robotic system is logged. Object recognition is performed on image data produced by the one or more depth cameras, to recognized objects, including surgical equipment and people, in the operating room (OR). The surgical exercise is digitized by storing the 3D point cloud data of unrecognized objects, a position and orientation associated with the recognized objects, and c) the robot system data.Type: GrantFiled: August 14, 2023Date of Patent: February 25, 2025Assignee: Verb Surgical Inc.Inventors: Blade A. Olson, Bernhard A. Fuerst, Alexander Barthel, Yiming Xu, Giacomo Taylor, Tianyu Song
-
Publication number: 20250046301Abstract: A display device includes a diffusion layer providing a single well, an optical element configured to receive light and output the received image light including a concentric series of lens segments made up of active facets, and a waveguide having an in-coupling grating and a waveguide body optically coupled to the image light, where a polarizing component is disposed over an output surface of the optical element. A method to improve a yield of silicon backplane displays includes connecting a diode having a resolution to a backplane and repairing a defect on a pixel display area by dividing the pixel display area into at least one subcircuit, while improving geometry stylization transfer for 3D models of real-world environments. A method for suppressing crosstalk for user conversations includes receiving multiple speech signals captured by multiple microphones and generating directional data for the multiple speech signals based on spatial filtering.Type: ApplicationFiled: July 29, 2024Publication date: February 6, 2025Inventors: Balasubramanian Sivakumar, Min Hyuk Choi, Gang Chen, Gyungmin Kim, Ahmet Tura, Hai Jung In, Weiwei Wang, Suhui Lee, Woong Hwang, Wanyue Song, Wai Sze Tiffany Lam, Wanli Chi, Nikolaos Sarafianos, Rakesh Ranjan, Alexander Sorkine Hornung, Seonghyeon Nam, Hyunyoung Jung, Ruiming Xie, Ju Lin, Niko Moritz, Frank Torsten Bernd Seide
-
Publication number: 20250037303Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for estimating a 3-D pose of an object of interest from image and point cloud data. In one aspect, a method includes obtaining an image of an environment; obtaining a point cloud of a three-dimensional region of the environment; generating a fused representation of the image and the point cloud; and processing the fused representation using a pose estimation neural network and in accordance with current values of a plurality of pose estimation network parameters to generate a pose estimation network output that specifies, for each of multiple keypoints, a respective estimated position in the three-dimensional region of the environment.Type: ApplicationFiled: March 22, 2024Publication date: January 30, 2025Inventors: Jingxiao Zheng, Xinwei Shi, Alexander Gorban, Junhua Mao, Andre Liang Cornman, Yang Song, Ting Liu, Ruizhongtai Qi, Yin Zhou, Congcong Li, Dragomir Anguelov
-
Publication number: 20250035071Abstract: Transpiration-cooled systems having permeable and non-permeable portions are provided. In one aspect, a nozzle for a rocket engine includes a non-permeable outer layer, a plurality of walls, a permeable layer, and a plurality of cooling channels. The non-permeable outer layer forms a predetermined shape of the nozzle and defines an interior space. The plurality of walls extend generally orthogonal to the non-permeable outer layer and into the interior space. The permeable layer is disposed between each set of adjacent walls of the plurality of walls. The permeable layer is spaced a distance from the non-permeable outer layer. The plurality of cooling channels are formed between the permeable layer, the non-permeable outer layer, and a set of adjacent walls of the plurality of walls. The plurality of cooling channels are configured to transport a fluid.Type: ApplicationFiled: October 11, 2024Publication date: January 30, 2025Inventors: Weidong Song, Kutter Kupke, Alexander Twaites
-
Patent number: 12209559Abstract: Transpiration-cooled systems having permeable and non-permeable portions are provided. In one aspect, a nozzle for a rocket engine includes a non-permeable outer layer, a plurality of walls, a permeable layer, and a plurality of cooling channels. The non-permeable outer layer forms a predetermined shape of the nozzle and defines an interior space. The plurality of walls extend generally orthogonal to the non-permeable outer layer and into the interior space. The permeable layer is disposed between each set of adjacent walls of the plurality of walls. The permeable layer is spaced a distance from the non-permeable outer layer. The plurality of cooling channels are formed between the permeable layer, the non-permeable outer layer, and a set of adjacent walls of the plurality of walls. The plurality of cooling channels are configured to transport a fluid.Type: GrantFiled: December 20, 2023Date of Patent: January 28, 2025Assignee: Blue Origin, LLCInventors: Weidong Song, Kutter Kupke, Alexander Twaites
-
Patent number: 12166882Abstract: A computer system for verifying whether two existing sets of confidential electronic data are identical by transforming the two existing sets of confidential electronic data into two new sets of electronic data that are no longer confidential, and then comparing the two new sets of electronic data. As a result, the confidentiality of the two existing sets of electronic data is maintained.Type: GrantFiled: October 3, 2023Date of Patent: December 10, 2024Assignee: APEX TECHLINK, INC.Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20240386487Abstract: A method for detecting money laundering activity learns a writing style of a user based on edits by the user to writing prompts. The method further determines a first ratio of a first value and a second value associated with a cause vector in accordance with detecting a potential case for money laundering based on background information of the party and monitoring electronic transaction data, the first value indicating a number of true positives associated with the cause vector, the second value indicating a number of potential cases associated with the cause vector. The method also generates a report associated with the potential case in accordance with the first ratio being greater than or equal to a reporting threshold, the report including a narrative comprising one or more facts and one or more linking words associated with the learned writing style of the user.Type: ApplicationFiled: July 30, 2024Publication date: November 21, 2024Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 12143399Abstract: A central computer system enables a sender to certify a message, such as an email, and a recipient to verify the validity of the certified message. As a result of the certification, users of messages can avoid ransomware attacks and many other types of fraud caused by fraudulent messages.Type: GrantFiled: July 2, 2021Date of Patent: November 12, 2024Assignee: APEX TECHLINK, INC.Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20240338700Abstract: A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.Type: ApplicationFiled: June 18, 2024Publication date: October 10, 2024Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20240330923Abstract: A computerized method electronically verifies identity data of a person by issuing an account for the person based on unverified identity data of the person. The method receives a request to verify an identity of the person associated with the account; and receives a portion of identity data provided by an identification document of the person. The method updates an identity profile of the person by combining the received portion of identity data with different portions of identity data previously received from different remote computer systems that requested verifying of the identity of the person associated with the account. The method compares the identity profile of the person to the unverified identity data of the person; and confirms the identity of the person associated with the account when no discrepancy between the identity profile of the person and the unverified identity data of the person is found.Type: ApplicationFiled: June 7, 2024Publication date: October 3, 2024Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 12086874Abstract: An intelligent alert system triggers potential cases based on a set of scenarios and sends the potential cases to investigators. After the investigation, the intelligent alert system records in a database the investigation results for each potential case, the associated set of scenarios that triggered the potential case, and the date and the time of such investigation. As a result, the intelligent alert system can gradually learn from the investigators and will automatically make decisions for some future potential cases with little human involvement.Type: GrantFiled: January 14, 2020Date of Patent: September 10, 2024Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20240257131Abstract: A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.Type: ApplicationFiled: February 7, 2024Publication date: August 1, 2024Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 12051070Abstract: A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.Type: GrantFiled: June 5, 2023Date of Patent: July 30, 2024Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 12039532Abstract: A computerized method electronically verifies identity data of a customer by requesting the customer to provide identity data from a customer identification document during a financial transaction. The method updates an identity profile of the customer by combining the received portion of identity data with different portions of previously received identity data that were previously received from different merchants during different transactions between the customer and the different merchants. The method compares the identity profile to the unverified identity data of the customer when a number of transactions with the account is greater than a first transaction threshold, and approves the financial transaction when the identity profile matches the unverified identity data.Type: GrantFiled: May 26, 2023Date of Patent: July 16, 2024Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20240212048Abstract: A computer-implemented method for monitoring a customer to detect money laundering activity at a first computer system includes receiving, from a second computer system, customer data including transactional information of the customer. The method also includes generating a money laundering risk score based on the customer data. The method further includes selecting, based on whether the money laundering risk score is less than or greater than a threshold, a monitoring category from a first category and a second category to monitor transaction data related to transactions of the customer. The method also includes monitoring the transaction data associated with the customer based on a first monitoring standard in accordance with selecting the first category for the monitoring category. The method still further includes transmitting, to a third computer system, a suspicious money laundering activity report based on detecting suspicious money laundering activity while monitoring the transaction data.Type: ApplicationFiled: January 12, 2024Publication date: June 27, 2024Applicant: AI OASIS, INC.Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20240153027Abstract: A computer-implemented method validates a user instruction by storing, at a first computer system, a transformation method associated with account information of the user, and associated with a government issued identification document of the user, the account information obtained from an item issued by a financial institution. The computer-implemented method also receives, at the first computer system from a second computer system, the account information and a message electronically transformed from the user instruction by the transformation method based on the government issued identification document of the user. The user instruction is unrecognizable from the message. The computer-implemented method transforms, at the first computer system, the message into the user instruction with the transformation method retrieved based on the received account information. The computer-implemented method approves an action based on the user instruction.Type: ApplicationFiled: January 12, 2024Publication date: May 9, 2024Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20240144284Abstract: A computerized method verifies an issued check by receiving, from a check issuer computer system of a checking account holder at a payer financial institution, first check information comprising: a first routing number, account number, check number, and dollar amount associated with an issued check. The method also receives, from a computer system of a payee financial institution, second check information comprising a second routing number, account number, check number, and dollar amount from a received check. The second routing number, the second account number, the second check number, and/or the second dollar amount, are read by an electronic device at the payee financial institution. The method determines whether the first check information matches the second check information and sends, to the computer system of the payee financial institution in response to the first check information not matching the second check information, a message indicating potential fraud.Type: ApplicationFiled: January 8, 2024Publication date: May 2, 2024Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 11928681Abstract: A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.Type: GrantFiled: September 19, 2022Date of Patent: March 12, 2024Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11908030Abstract: A computer-implemented method approves a transaction by storing, at a first computer system, first data identifying at least a portion of an identity of a user, an information locator associated with the first data, and a transformation method associated with the information locator. The computer-implemented method also receives, at the first computer system from a second computer system, the information locator when the user conducts the transaction, and second data converted from electronically obtained identification information of the user. An identity of the user cannot be identified from the second data. The computer-implemented method transforms, at the first computer system, the second data into third data based on the transformation method retrieved in response to the received information locator, and approves, by the first computer system, the transaction associated with the information locator when the third data corresponds to the first data.Type: GrantFiled: March 24, 2021Date of Patent: February 20, 2024Inventors: Yuh-Shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11907957Abstract: A computerized method verifies an issued check. The method verifies that the first check information matches second check information. The first and second checking information includes first and second routing numbers, first and second account numbers, first and second check numbers, and first and second dollar amounts associated with an issued check and received check, respectively. The method sends to a computer system of a payee financial institution in response to verifying the first check information matches the second check information, a verification message indicating that the first check information matches the second check information. The method also receives an indicator from the payer financial institution after the issued check has cleared in the payer financial institution; and informs the payee financial institution after the issued check has cleared.Type: GrantFiled: March 23, 2023Date of Patent: February 20, 2024Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song