Patents by Inventor Hei Wong
Hei Wong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240152885Abstract: Methods and systems are presented for providing a framework to securely integrate third-party logic into electronic transaction processing workflow. Third-party programming code that implements different third-party logic may be obtained and stored in a repository. A transaction processing request is received from a third-party server, and an instance of a transaction processing module is instantiated within an operating runtime environment to process a transaction according to a workflow. When the instance of the transaction processing module has reached an interruption point, the instance of the transaction processing module is suspended, and a third-party programming code is executed within an isolated runtime environment. The third-party programming code is configured to provide an output value based on attributes of the transaction. The instance of the transaction processing module then determines whether to authorize or deny the transaction based in part on the output value.Type: ApplicationFiled: October 13, 2023Publication date: May 9, 2024Inventors: Shek Hei Wong, Chun Kiat Ho, Li Wei Lu
-
Publication number: 20240113644Abstract: Systems and methods are provided for controlling two or more linear generators each operating according to a repeated behavior to constitute a cycle. A control system utilizes control circuitry to determine a desired phase offset between operation cycles of a first linear generator and a second linear generator of the two or more linear generators. During operation, an actual phase offset between the first linear generator and the second linear generator is determined. The control circuitry of the control system is used to modify the operation of at least one of the first linear generator or the second linear generator to achieve the desired phase effect.Type: ApplicationFiled: November 4, 2021Publication date: April 4, 2024Inventors: Nick Schaeferle, Yuk Hei Wong, Patrick Gorzelic, Matthew Roelle
-
Patent number: 11938441Abstract: A fog-based self-powered system for collecting atmospheric water and generating electricity is presented. The system includes a mesh-based fog harvester for accumulating water droplets from atmospheric moisture. A droplet distributor receives accumulated water droplets from the mesh-based fog harvester. A droplet electrical generator harvests energy from the water droplets accumulated in the droplet distributor. The droplet electrical generator includes an electret surface for receiving the water droplets from the droplet distributor and at least two electrodes. A water reservoir receives water droplets from the droplet electrical generator.Type: GrantFiled: November 23, 2021Date of Patent: March 26, 2024Assignee: City University of Hong KongInventors: Zuankai Wang, Steven Wang, Chen Ling, Xiaoxue Yao, Yat Hei Wong
-
Patent number: 11823145Abstract: Methods and systems are presented for providing a framework to securely integrate third-party logic into electronic transaction processing workflow. Third-party programming code that implements different third-party logic may be obtained and stored in a repository. A transaction processing request is received from a third-party server, and an instance of a transaction processing module is instantiated within an operating runtime environment to process a transaction according to a workflow. When the instance of the transaction processing module has reached an interruption point, the instance of the transaction processing module is suspended, and a third-party programming code is executed within an isolated runtime environment. The third-party programming code is configured to provide an output value based on attributes of the transaction. The instance of the transaction processing module then determines whether to authorize or deny the transaction based in part on the output value.Type: GrantFiled: November 30, 2020Date of Patent: November 21, 2023Assignee: PayPal, Inc.Inventors: Shek Hei Wong, Chun Kiat Ho, Li Wei Lu
-
Publication number: 20230265066Abstract: Provided herein are a series of water-soluble photochromic naphthopyran compounds, a mixture and a polymer thin film comprising the same, and applications thereof in photochromic materials, especially water-soluble photochromic material. The present photochromic naphthopyran compounds display excellent water solubility in neutral pH environment, rapid light response and fast thermal bleaching.Type: ApplicationFiled: March 8, 2023Publication date: August 24, 2023Inventors: Chi Ming LEUNG, Chun Hei WONG, Chi Ho KWOK, Chenmin LIU
-
Patent number: 11729179Abstract: In one embodiment, in access gateway comprising at least one computer processor, a method for real-time data protection may include: (1) receiving a user login comprising a user identifier; (2) retrieving, using an in-memory entitlements graph, a role definition for the user identifier, wherein the role definition comprises allowed actions, entitled assets, and a system account; (3) receiving a selection of a requested asset from the entitled assets and a requested action from the allowed actions; (4) verifying the user's entitlement to access the requested asset and perform the requested action with the system account using the in-memory entitlement graph based on the user identifier, the system account, the requested asset, and the requested action; and (5) authorizing the user's entitlement to access the requested asset and perform the requested action with the system account substantially at a time of requested access.Type: GrantFiled: March 15, 2021Date of Patent: August 15, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph
-
Publication number: 20230129824Abstract: Systems and methods for cloud federated token just in time authorization are disclosed. A method may include: (1) receiving, by a cloud authentication services computer program, authenticating information for a user from an active directory federation service computer program; (2) querying, by the cloud authentication services computer program, a plurality of backend services to validate the authenticating information; (3) communicating, by the cloud authentication services computer program, validation to the active directory federation service computer program, wherein the active directory federation service computer program is configured to generate a security token comprising one or more assertion, wherein the assertion comprises a limit on a session with the user at a cloud platform, and wherein the cloud platform is configured to receive the security token and a trusted federated endpoint executed by the cloud platform is configured to enforce the limit on the session.Type: ApplicationFiled: October 21, 2021Publication date: April 27, 2023Inventors: Kanishka HETTIARACHCHI, Ricky Hei Wong CHAN, Renfei ZHANG, Ross S INDYKE, Vijay Basker BALAKRISHNAN, Vladimir BELINKIS, Joseph SCHILLING, Ramesh KRISHNAMURTHY
-
Patent number: 11546362Abstract: Systems and methods for data-driven infrastructure controls are disclosed. According to one embodiment, in an information processing apparatus comprising at least one computer processor, a computer-implemented method for automatically detecting anomalous user behavior within a unified entitlement framework may include: (1) receiving an access request for a technology asset from a user on a computing device, the access request comprising session data comprising one or more of user identification, user location, key strokes, and user computing device identification; (2) applying an entitlement-specific machine learning algorithm to the session data to generate an anomaly score; (3) storing the session data and associated anomaly score; (4) sending a review request to a manager; (5) receiving review results from the manager; and (6) updating the entitlement-specific machine learning algorithm based on the anomaly score and the review results from the manager.Type: GrantFiled: April 28, 2020Date of Patent: January 3, 2023Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph
-
Patent number: 11455713Abstract: Techniques are disclosed relating to determining whether document objects included in an image correspond to known document types. In some embodiments, a computing system maintains information specifying a set of known document types. In some embodiments, the computing system receives an image that includes objects. In some embodiments, the computing system analyzes, using a first neural network, the image to identify a document object and location information specifying a location of the document object within the image. In some embodiments, the computing system determines, using a second neural network, whether the document object within the image corresponds to a document type specified in the set of known document types, where the determining is performed based on the location information of the document object. In some embodiments, disclosed techniques may assist in automatically extracting information from documents, which in turn may advantageously decrease processing time for onboarding new customers.Type: GrantFiled: May 8, 2020Date of Patent: September 27, 2022Assignee: PayPal, Inc.Inventors: Quan Jin Ferdinand Tang, Jiyi Zhang, Xiaodong Yu, Shek Hei Wong, Long Phi Huynh, Quan Anh Nguyen, Hans Tananda, Kai Xie
-
Publication number: 20220176268Abstract: A fog-based self-powered system for collecting atmospheric water and generating electricity is presented. The system includes a mesh-based fog harvester for accumulating water droplets from atmospheric moisture. A droplet distributor receives accumulated water droplets from the mesh-based fog harvester. A droplet electrical generator harvests energy from the water droplets accumulated in the droplet distributor. The droplet electrical generator includes an electret surface for receiving the water droplets from the droplet distributor and at least two electrodes. A water reservoir receives water droplets from the droplet electrical generator.Type: ApplicationFiled: November 23, 2021Publication date: June 9, 2022Inventors: Zuankai WANG, Steven WANG, Chen LING, Xiaoxue YAO, Yat Hei WONG
-
Publication number: 20220172183Abstract: Methods and systems are presented for providing a framework to securely integrate third-party logic into electronic transaction processing workflow. Third-party programming code that implements different third-party logic may be obtained and stored in a repository. A transaction processing request is received from a third-party server, and an instance of a transaction processing module is instantiated within an operating runtime environment to process a transaction according to a workflow. When the instance of the transaction processing module has reached an interruption point, the instance of the transaction processing module is suspended, and a third-party programming code is executed within an isolated runtime environment. The third-party programming code is configured to provide an output value based on attributes of the transaction. The instance of the transaction processing module then determines whether to authorize or deny the transaction based in part on the output value.Type: ApplicationFiled: November 30, 2020Publication date: June 2, 2022Inventors: Shek Hei Wong, Chun Kiat Ho, Li Wei Lu
-
Publication number: 20220051125Abstract: There are provided systems and methods for intelligent clustering of account communities for account feature adjustment. A user may utilize an online account with the service provider to process transactions electronic. However, initially the account may be unverified or otherwise untrusted, and limits on electronic transaction processing may be imposed on the account. To provide intelligent feature adjustment, the service provider may utilize a machine learning technique to cluster verified accounts into communities based on their data representations. Thereafter, when a transaction by an unverified account violates a limit imposed on the unverified account, the service provider may process the unverified account using a machine learning model trained for account correlations to the community clusters in order to determine a corresponding community cluster of accounts and adjust a feature based on behaviors and traits of the verified accounts in the community cluster.Type: ApplicationFiled: August 11, 2020Publication date: February 17, 2022Inventors: Chun Kiat Ho, Jerry Tso, Junaid Zaheer Jaswal, Lin Song, Edwin Boaz Soenaryo, Shek Hei Wong, Harsha Singalreddy, Quan Jin Ferdinand Tang, Kai Xie
-
Publication number: 20210350516Abstract: Techniques are disclosed relating to determining whether document objects included in an image correspond to known document types. In some embodiments, a computing system maintains information specifying a set of known document types. In some embodiments, the computing system receives an image that includes objects. In some embodiments, the computing system analyzes, using a first neural network, the image to identify a document object and location information specifying a location of the document object within the image. In some embodiments, the computing system determines, using a second neural network, whether the document object within the image corresponds to a document type specified in the set of known document types, where the determining is performed based on the location information of the document object. In some embodiments, disclosed techniques may assist in automatically extracting information from documents, which in turn may advantageously decrease processing time for onboarding new customers.Type: ApplicationFiled: May 8, 2020Publication date: November 11, 2021Inventors: Quan Jin Ferdinand Tang, Jiyi Zhang, Xiaodong Yu, Shek Hei Wong, Long Phi Huynh, Quan Anh Nguyen, Hans Tananda, Kai Xie
-
Patent number: 11165854Abstract: An embodiment of the present invention may be directed to large scale screen capturing on operating systems across global data center deployments. The system performs monitoring and recording activities, reporting and auditing the activities and further implementing an autonomous (agentless) deployment model. The system may orchestrate a number of agents to execute on an asynchronous basis to capture and aggregate screen data as well as identify associated metadata in real time. The system may also publish the aggregated screen data.Type: GrantFiled: April 22, 2020Date of Patent: November 2, 2021Assignee: JPMorgan Chase Bank, N.A.Inventors: Ramesh Krishnamurthy, Ricky Hei Wong Chan, Vijaya Basker Balakrishnan, Ross S. Indyke, Renfei Zhang, Kanishka Hettiarachchi
-
Publication number: 20210337013Abstract: An embodiment of the present invention may be directed to performing monitoring and recording activities, reporting and auditing the activities and further implementing an autonomous (agentless) deployment model.Type: ApplicationFiled: April 22, 2020Publication date: October 28, 2021Inventors: Ramesh Krishnamurthy, Ricky Hei Wong Chan, Vijaya Basker Balakrishnan, Ross S. Indyke, Renfei Zhang, Kanishka Hettiarachchi
-
Publication number: 20210203663Abstract: In one embodiment, in access gateway comprising at least one computer processor, a method for real-time data protection may include: (1) receiving a user login comprising a user identifier; (2) retrieving, using an in-memory entitlements graph, a role definition for the user identifier, wherein the role definition comprises allowed actions, entitled assets, and a system account; (3) receiving a selection of a requested asset from the entitled assets and a requested action from the allowed actions; (4) verifying the user's entitlement to access the requested asset and perform the requested action with the system account using the in-memory entitlement graph based on the user identifier, the system account, the requested asset, and the requested action; and (5) authorizing the user's entitlement to access the requested asset and perform the requested action with the system account substantially at a time of requested access.Type: ApplicationFiled: March 15, 2021Publication date: July 1, 2021Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph
-
Patent number: 10951557Abstract: An information interaction method is applied to a first terminal installed with an interaction program, the first terminal is connected to a second terminal installed with a voice player and a lighting device, and the method includes: acquiring, by the first terminal, at least one type of interaction information of voice information, text information and expression information and at least one interaction effect of a sound effect and a lighting effect that are corresponding to the interaction information; and sending acquired effect data to the second terminal according to the interaction information and the interaction effect, the second terminal displaying the effect data.Type: GrantFiled: July 25, 2016Date of Patent: March 16, 2021Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Yi Lu, Suhyun Lee, Tat Hei Wong, Zehan She, Tingjun Hong, Qian Zhang, Jin Fang
-
Patent number: 10951624Abstract: In one embodiment, in access gateway comprising at least one computer processor, a method for real-time data protection may include: (1) receiving a user login comprising a user identifier; (2) retrieving, using an in-memory entitlements graph, a role definition for the user identifier, wherein the role definition comprises allowed actions, entitled assets, and a system account; (3) receiving a selection of a requested asset from the entitled assets and a requested action from the allowed actions; (4) verifying the user's entitlement to access the requested asset and perform the requested action with the system account using the in-memory entitlement graph based on the user identifier, the system account, the requested asset, and the requested action; and (5) authorizing the user's entitlement to access the requested asset and perform the requested action with the system account substantially at a time of requested access.Type: GrantFiled: December 14, 2018Date of Patent: March 16, 2021Assignee: JPMORGAN CHASE BANK, N.A.Inventors: Rejith G. Kurup, Kanishka Hettiarachchi, Vladimir Belinkis, Ish K. Ahluwalia, Ricky Hei Wong Chan, Dennis Joseph
-
Publication number: 20200344253Abstract: Systems and methods for data-driven infrastructure controls are disclosed. According to one embodiment, in an information processing apparatus comprising at least one computer processor, a computer-implemented method for automatically detecting anomalous user behavior within a unified entitlement framework may include: (1) receiving an access request for a technology asset from a user on a computing device, the access request comprising session data comprising one or more of user identification, user location, key strokes, and user computing device identification; (2) applying an entitlement-specific machine learning algorithm to the session data to generate an anomaly score; (3) storing the session data and associated anomaly score; (4) sending a review request to a manager; (5) receiving review results from the manager; and (6) updating the entitlement-specific machine learning algorithm based on the anomaly score and the review results from the manager.Type: ApplicationFiled: April 28, 2020Publication date: October 29, 2020Inventors: Rejith G. KURUP, Kanishka HETTIARACHCHI, Vladimir BELINKIS, Ish K. AHLUWALIA, Ricky Hei Wong CHAN, Dennis JOSEPH
-
Patent number: 10791189Abstract: Embodiments of the present invention relate to the field of internet technologies, and disclose a method for pushing application content and a related device and system. A main feature of the method for pushing application content is that application content included in an application can be updated or upgraded according to an operation behavior of a user on the application.Type: GrantFiled: May 23, 2018Date of Patent: September 29, 2020Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Tat Hei Wong, Jin Fang, Qian Zhang, Daping Yu, Jixing Guan, Jinsong Jin, Jun Cheng