Patents by Inventor Alexander Song
Alexander Song has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12140109Abstract: Transpiration-cooled systems having permeable and non-permeable portions are provided. In one aspect, a nozzle for a rocket engine includes a non-permeable outer layer, a plurality of walls, a permeable layer, and a plurality of cooling channels. The non-permeable outer layer forms a predetermined shape of the nozzle and defines an interior space. The plurality of walls extend generally orthogonal to the non-permeable outer layer and into the interior space. The permeable layer is disposed between each set of adjacent walls of the plurality of walls. The permeable layer is spaced a distance from the non-permeable outer layer. The plurality of cooling channels are formed between the permeable layer, the non-permeable outer layer, and a set of adjacent walls of the plurality of walls. The plurality of cooling channels are configured to transport a fluid.Type: GrantFiled: March 30, 2023Date of Patent: November 12, 2024Assignee: Blue Origin, LLCInventors: Weidong Song, Kutter Kupke, Alexander Twaites
-
Publication number: 20240359551Abstract: The present disclosure relates to an off-road vehicle having different features such as a frame having a frame structure, an engine assembly, an exhaust assembly, an engine mount assembly, a suspension assembly, a plurality of wheels, a hitch assembly, and other associated components. Embodiments of the present disclosure also describe a removable frame member facilitating the installation of the engine assembly from a seating area into a rearward portion of the vehicle. The off-road vehicle may further include an engine air intake assembly, an engine cooling assembly, a continuously variable transmission (CVT) cooling assembly, a vehicle cabin cooling assembly, a CVT housing assembly, a door assembly, a dashboard assembly, and other components.Type: ApplicationFiled: July 3, 2024Publication date: October 31, 2024Inventors: Ethan Klaphake, Gregory Anderson, Brent Gilge, Daniel Song, Lucas Purcell, Zachary Pritchard, Hector Coronel Aispuro, Nathan Deselich, Alexander Tiemann, Alex Stirewalt, John Braniff, Derek Sorenson
-
Methods, systems, and apparatuses for handling dynamic spectrum sharing with uplink subcarrier shift
Patent number: 12120531Abstract: Embodiments described herein include methods, systems, and apparatuses for allowing a user equipment (UE) that supports dynamic spectrum sharing (DSS) with uplink (UL)-shift to access a cell and barring UEs that do not support DSS with UL-shift. Embodiments may use a cell barring field in a master information block and additional filters to indicate a barring state for a network node.Type: GrantFiled: October 22, 2020Date of Patent: October 15, 2024Assignee: APPLE INC.Inventors: Naveen Kumar R Palle Venkata, Alexander Sayenko, Anatoliy S. Ioffe, Fangli Xu, Haijing Hu, Leilei Song, Ralf Rossbach, Ruoheng Liu, Sarma V. Vangala, Yuqin Chen, Zhibin Wu -
Publication number: 20240328374Abstract: Transpiration-cooled systems having permeable and non-permeable portions are provided. In one aspect, a nozzle for a rocket engine includes a non-permeable outer layer, a plurality of walls, a permeable layer, and a plurality of cooling channels. The non-permeable outer layer forms a predetermined shape of the nozzle and defines an interior space. The plurality of walls extend generally orthogonal to the non-permeable outer layer and into the interior space. The permeable layer is disposed between each set of adjacent walls of the plurality of walls. The permeable layer is spaced a distance from the non-permeable outer layer. The plurality of cooling channels are formed between the permeable layer, the non-permeable outer layer, and a set of adjacent walls of the plurality of walls. The plurality of cooling channels are configured to transport a fluid.Type: ApplicationFiled: December 20, 2023Publication date: October 3, 2024Inventors: Weidong Song, Kutter Kupke, Alexander Twaites
-
Publication number: 20240328373Abstract: Transpiration-cooled systems having permeable and non-permeable portions are provided. In one aspect, a nozzle for a rocket engine includes a non-permeable outer layer, a plurality of walls, a permeable layer, and a plurality of cooling channels. The non-permeable outer layer forms a predetermined shape of the nozzle and defines an interior space. The plurality of walls extend generally orthogonal to the non-permeable outer layer and into the interior space. The permeable layer is disposed between each set of adjacent walls of the plurality of walls. The permeable layer is spaced a distance from the non-permeable outer layer. The plurality of cooling channels are formed between the permeable layer, the non-permeable outer layer, and a set of adjacent walls of the plurality of walls. The plurality of cooling channels are configured to transport a fluid.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Weidong Song, Kutter Kupke, Alexander Twaites
-
Publication number: 20240245973Abstract: Systems and methods for generating user interface elements associated with a guided workout are disclosed herein. For example, by analyzing location data associated with a user device, along with digital content corresponding to the guided workout, the system may generate user interface elements including graphical representations, segmented timelines, and performance metrics associated with a user's progress and performance while consuming the guided workout content. These interface elements may be displayed to the user during and/or after the workout and may allow for user interaction to view varying levels of detail associated with the interface elements.Type: ApplicationFiled: April 1, 2024Publication date: July 25, 2024Inventors: Joseph INTONATO, Katherine Lorelli WALLACE, Alexander Choong Sik LAWRENCE-RICHARDS, Ivy LEE, Feibi Wen MCINTOSH, Jaeyoon SONG, Dean Rex SILFEN, Dalton Lee CLAYBROOK
-
Publication number: 20240212048Abstract: A computer-implemented method for monitoring a customer to detect money laundering activity at a first computer system includes receiving, from a second computer system, customer data including transactional information of the customer. The method also includes generating a money laundering risk score based on the customer data. The method further includes selecting, based on whether the money laundering risk score is less than or greater than a threshold, a monitoring category from a first category and a second category to monitor transaction data related to transactions of the customer. The method also includes monitoring the transaction data associated with the customer based on a first monitoring standard in accordance with selecting the first category for the monitoring category. The method still further includes transmitting, to a third computer system, a suspicious money laundering activity report based on detecting suspicious money laundering activity while monitoring the transaction data.Type: ApplicationFiled: January 12, 2024Publication date: June 27, 2024Applicant: AI OASIS, INC.Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20240153027Abstract: A computer-implemented method validates a user instruction by storing, at a first computer system, a transformation method associated with account information of the user, and associated with a government issued identification document of the user, the account information obtained from an item issued by a financial institution. The computer-implemented method also receives, at the first computer system from a second computer system, the account information and a message electronically transformed from the user instruction by the transformation method based on the government issued identification document of the user. The user instruction is unrecognizable from the message. The computer-implemented method transforms, at the first computer system, the message into the user instruction with the transformation method retrieved based on the received account information. The computer-implemented method approves an action based on the user instruction.Type: ApplicationFiled: January 12, 2024Publication date: May 9, 2024Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20240144284Abstract: A computerized method verifies an issued check by receiving, from a check issuer computer system of a checking account holder at a payer financial institution, first check information comprising: a first routing number, account number, check number, and dollar amount associated with an issued check. The method also receives, from a computer system of a payee financial institution, second check information comprising a second routing number, account number, check number, and dollar amount from a received check. The second routing number, the second account number, the second check number, and/or the second dollar amount, are read by an electronic device at the payee financial institution. The method determines whether the first check information matches the second check information and sends, to the computer system of the payee financial institution in response to the first check information not matching the second check information, a message indicating potential fraud.Type: ApplicationFiled: January 8, 2024Publication date: May 2, 2024Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 11928681Abstract: A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.Type: GrantFiled: September 19, 2022Date of Patent: March 12, 2024Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11908030Abstract: A computer-implemented method approves a transaction by storing, at a first computer system, first data identifying at least a portion of an identity of a user, an information locator associated with the first data, and a transformation method associated with the information locator. The computer-implemented method also receives, at the first computer system from a second computer system, the information locator when the user conducts the transaction, and second data converted from electronically obtained identification information of the user. An identity of the user cannot be identified from the second data. The computer-implemented method transforms, at the first computer system, the second data into third data based on the transformation method retrieved in response to the received information locator, and approves, by the first computer system, the transaction associated with the information locator when the third data corresponds to the first data.Type: GrantFiled: March 24, 2021Date of Patent: February 20, 2024Inventors: Yuh-Shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11908016Abstract: A computer-implemented method monitors a customer to detect money laundering activity at a first computer system by receiving a set of data related to at least a portion of transactional information of the customer, and transforming the set of data into a money laundering risk score of the customer. The method includes selecting a monitoring level to monitor data related to transactions of the customer based on the money laundering risk score. A first monitoring level is selected in response to the money laundering risk score being greater than a threshold. A second monitoring level is selected in response to the money laundering risk score being less than the threshold. The method includes transmitting at least a portion of personal data associated with the customer when the first monitoring level is selected and the first monitoring method detects that the customer matches a condition.Type: GrantFiled: January 31, 2023Date of Patent: February 20, 2024Assignee: AI OASIS, INC.Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11907957Abstract: A computerized method verifies an issued check. The method verifies that the first check information matches second check information. The first and second checking information includes first and second routing numbers, first and second account numbers, first and second check numbers, and first and second dollar amounts associated with an issued check and received check, respectively. The method sends to a computer system of a payee financial institution in response to verifying the first check information matches the second check information, a verification message indicating that the first check information matches the second check information. The method also receives an indicator from the payer financial institution after the issued check has cleared in the payer financial institution; and informs the payee financial institution after the issued check has cleared.Type: GrantFiled: March 23, 2023Date of Patent: February 20, 2024Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20240031152Abstract: A computer system for verifying whether two existing sets of confidential electronic data are identical by transforming the two existing sets of confidential electronic data into two new sets of electronic data that are no longer confidential, and then comparing the two new sets of electronic data. As a result, the confidentiality of the two existing sets of electronic data is maintained.Type: ApplicationFiled: October 3, 2023Publication date: January 25, 2024Applicant: AI OASIS, INC.Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 11811927Abstract: A computer-implemented method for sharing information about a subject without disclosing identification information about the subject includes comparing, by a first computer system, a third set of data with a fourth set of data. The third set of data is converted by a transformation from a first set of identification data of a first subject provided by the first computer system. The fourth set of data is converted by the transformation from a second set of identification data of a second subject provided by a second computer system. The transformation renders the first subject unidentifiable from the third set of data and the second subject unidentifiable from the fourth set of data. The computer-implemented method also includes transmitting, from the first computer system to the second computer, a fifth set of data when the third set of data corresponds to the fourth set of data.Type: GrantFiled: August 23, 2022Date of Patent: November 7, 2023Assignee: AI OASIS, INC.Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20230325835Abstract: A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.Type: ApplicationFiled: June 5, 2023Publication date: October 12, 2023Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20230306424Abstract: A computerized method electronically verifies identity data of a customer by requesting the customer to provide identity data from a customer identification document during a financial transaction. The method updates an identity profile of the customer by combining the received portion of identity data with different portions of previously received identity data that were previously received from different merchants during different transactions between the customer and the different merchants. The method compares the identity profile to the unverified identity data of the customer when a number of transactions with the account is greater than a first transaction threshold, and approves the financial transaction when the identity profile matches the unverified identity data.Type: ApplicationFiled: May 26, 2023Publication date: September 28, 2023Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20230230092Abstract: A computerized method verifies an issued check. The method verifies that the first check information matches second check information. The first and second checking information includes first and second routing numbers, first and second account numbers, first and second check numbers, and first and second dollar amounts associated with an issued check and received check, respectively. The method sends to a computer system of a payee financial institution in response to verifying the first check information matches the second check information, a verification message indicating that the first check information matches the second check information. The method also receives an indicator from the payer financial institution after the issued check has cleared in the payer financial institution; and informs the payee financial institution after the issued check has cleared.Type: ApplicationFiled: March 23, 2023Publication date: July 20, 2023Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 11704667Abstract: A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.Type: GrantFiled: March 17, 2020Date of Patent: July 18, 2023Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11699153Abstract: A computerized system conducts customer identification processing for customers who remotely open accounts with personal identification information that cannot be verified through available data sources. The system receives a portion of identity data in response to a request for the customer to provide the portion of identity data from a customer identification document during a financial transaction. The system updates an identity profile of the customer by combining the portion of identity data with different portions of previously received identity data that were previously received from different merchants during transactions between the customer and the different merchants. Based on comparing the identity profile to unverified identity data of the customer, the system determines whether to maintain or terminate the account.Type: GrantFiled: November 22, 2021Date of Patent: July 11, 2023Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song