Patents by Inventor Hyunsuk HAN
Hyunsuk HAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240372874Abstract: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.Type: ApplicationFiled: July 19, 2024Publication date: November 7, 2024Applicant: Lendingclub Bank, National AssociationInventors: Saverio Sgro, Hyunsuk Han
-
Patent number: 12074885Abstract: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.Type: GrantFiled: October 11, 2022Date of Patent: August 27, 2024Assignee: LendingClub Bank, National AssociationInventors: Hyunsuk Han, Saverio Sgro
-
Publication number: 20240250954Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.Type: ApplicationFiled: April 3, 2024Publication date: July 25, 2024Applicant: Lendingclub Bank, National AssociationInventors: Hyunsuk Han, Mahesh Acharya
-
Patent number: 11956246Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.Type: GrantFiled: November 16, 2022Date of Patent: April 9, 2024Assignee: LendingClub Bank, National AssociationInventors: Hyunsuk Han, Mahesh Acharya
-
Patent number: 11757882Abstract: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.Type: GrantFiled: October 24, 2022Date of Patent: September 12, 2023Assignee: LENDINGCLUB BANK, NATIONAL ASSOCIATIONInventors: Hyunsuk Han, Mahesh Acharya
-
Publication number: 20230096498Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.Type: ApplicationFiled: November 16, 2022Publication date: March 30, 2023Inventors: Hyunsuk Han, Mahesh Acharya
-
Publication number: 20230038476Abstract: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.Type: ApplicationFiled: October 24, 2022Publication date: February 9, 2023Inventors: Hyunsuk Han, Mahesh Acharya
-
Publication number: 20230031484Abstract: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.Type: ApplicationFiled: October 11, 2022Publication date: February 2, 2023Inventors: Hyunsuk Han, Saverio Sgro
-
Patent number: 11522867Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.Type: GrantFiled: December 31, 2020Date of Patent: December 6, 2022Assignee: LendingClub Bank, National AssociationInventors: Hyunsuk Han, Mahesh Acharya
-
Patent number: 11483312Abstract: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.Type: GrantFiled: March 31, 2020Date of Patent: October 25, 2022Assignee: LendingClub Bank, National AssociationInventors: Hyunsuk Han, Mahesh Acharya
-
Patent number: 11470090Abstract: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.Type: GrantFiled: March 31, 2020Date of Patent: October 11, 2022Assignee: LendingClub Bank, National AssociationInventors: Hyunsuk Han, Saverio Sgro
-
Patent number: 11392574Abstract: Techniques are described herein to handle situations in which multiple systems can change different copies of the same data item. Optimistic locking and time stamps are used to ensure consistency between the systems without incurring the performance penalties associated with two-phase commit. Specifically, when propagating a change to a data item from a first system to a second system, the second system compares the first system's “pre-update” value of the data item with its current value of the data item. If the pre-update value from the first system does not match the current value in the second system, then a conflict has occurred. Upon detecting a conflict, both systems use timestamps associated with the respective conflicting changes to determine which conflicting change “wins”. The winning change is applied by all systems whose changes did not win.Type: GrantFiled: January 9, 2018Date of Patent: July 19, 2022Assignee: LendingClub Bank, National AssociationInventors: David Taubler, Hyunsuk Han, Yana Nikitina, Abhijit Karpe, Raul Acevedo
-
Patent number: 11329800Abstract: Proof-of-Dynamic-Quorum is a consensus mechanism for blockchain networks that selects a dynamic quorum of nodes to validate a proposed block based on digital data included in the proposed block. In an embodiment, a request to add a proposed block to a blockchain is received by a node of a blockchain network. A composite key value is generated based on one or more values within the proposed block. Based on a composite-key-value-to-quorum-participants mapping that is indicated in one or more blocks that are already present in the blockchain, a validating quorum is determined to determine whether the proposed block is to be added to the blockchain. When each node of the validating quorum indicates that the proposed block is accepted, the receiving node writes the proposed block to the blockchain. Proof-of-Dynamic-Quorum enables real-world authority data to be considered when performing a consensus algorithm in a blockchain network.Type: GrantFiled: October 20, 2019Date of Patent: May 10, 2022Assignee: LendingClub Bank, National AssociationInventors: Hyunsuk Han, Jayakrishnan Nair, Amitkumar Tank, Srinivas Ambikapathi
-
Publication number: 20210306346Abstract: Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.Type: ApplicationFiled: December 31, 2020Publication date: September 30, 2021Inventors: HYUNSUK HAN, MAHESH ACHARYA
-
Publication number: 20210306344Abstract: Techniques are described herein for dynamically-tiered authentication, which allows the authentication tier (AT) associated with a session to be automatically downgraded based on the session satisfying one or more downgrade criteria. Automatically downgrading a session eliminates some authentication-based privileges for the session without eliminating all privileges for the session. A session satisfies downgrade criteria based on: an explicit request for session downgrading; client interaction with the application; and/or activity on the device on which the client runs. For example, if a client authenticates to a third AT, but only performs actions in the application that are associated with the first AT during a pre-defined amount of time, the AT associated with the session is automatically downgraded. The session is either downgraded from the third AT to the first AT, or downgraded in intervals until the current or more recently accessed tiers are consistent with the current AT of the session.Type: ApplicationFiled: March 31, 2020Publication date: September 30, 2021Inventors: Hyunsuk Han, Saverio Sgro
-
Publication number: 20210306334Abstract: Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.Type: ApplicationFiled: March 31, 2020Publication date: September 30, 2021Inventors: Hyunsuk Han, Mahesh Acharya
-
Publication number: 20210119768Abstract: Proof-of-Dynamic-Quorum is a consensus mechanism for blockchain networks that selects a dynamic quorum of nodes to validate a proposed block based on digital data included in the proposed block. In an embodiment, a request to add a proposed block to a blockchain is received by a node of a blockchain network. A composite key value is generated based on one or more values within the proposed block. Based on a composite-key-value-to-quorum-participants mapping that is indicated in one or more blocks that are already present in the blockchain, a validating quorum is determined to determine whether the proposed block is to be added to the blockchain. When each node of the validating quorum indicates that the proposed block is accepted, the receiving node writes the proposed block to the blockchain. Proof-of-Dynamic-Quorum enables real-world authority data to be considered when performing a consensus algorithm in a blockchain network.Type: ApplicationFiled: October 20, 2019Publication date: April 22, 2021Inventors: Hyunsuk Han, Jayakrishnan Nair, Amitkumar Tank, Srinivas Ambikapathi
-
Patent number: 10437689Abstract: When a particular event record requires a particular service, but that service has failed for the event, an error record that includes an aggregate identifier (AgID) is stored for the event in an error queue. Storing an error record in the error queue causes the service to notify a remediation team to fix the failed event. All events with the AgID in the error record are put on hold and an error record is created for each of these events. The remediation team generates a fixed version of the event record and causes the system to retry the failed service for the event based on the fixed version. If the fixed version of the event is successfully processed, then any other events with the same AgID that have error records in the error queue, are routed in order of enqueue time through the event processor to be handled.Type: GrantFiled: December 28, 2017Date of Patent: October 8, 2019Assignee: LendingClub CorporationInventors: David Taubler, Hyunsuk Han, Yana Nikitina, John Daum, Wira Pradjinata, Igor Petrunya
-
Publication number: 20190213270Abstract: Techniques are described herein to handle situations in which multiple systems can change different copies of the same data item. Optimistic locking and time stamps are used to ensure consistency between the systems without incurring the performance penalties associated with two-phase commit. Specifically, when propagation a change to a data item from a first system to a second system, the second system compares the first system's “pre-update” value of the data item with its current value of the data item. If the pre-update value from the first system does not match the current value in the second system, then a conflict has occurred. Upon detecting a conflict, both systems use timestamps associated with the respective conflicting changes to determine which conflicting change “wins”. The winning change is applied by all systems whose changes did not win.Type: ApplicationFiled: January 9, 2018Publication date: July 11, 2019Inventors: David Taubler, Hyunsuk Han, Yana Nikitina, Abhijit Karpe, Raul Acevedo
-
Publication number: 20190205221Abstract: When a particular event record requires a particular service, but that service has failed for the event, an error record that includes an aggregate identifier (AgID) is stored for the event in an error queue. Storing an error record in the error queue causes the service to notify a remediation team to fix the failed event. All events with the AgID in the error record are put on hold and an error record is created for each of these events. The remediation team generates a fixed version of the event record and causes the system to retry the failed service for the event based on the fixed version. If the fixed version of the event is successfully processed, then any other events with the same AgID that have error records in the error queue, are routed in order of enqueue time through the event processor to be handled.Type: ApplicationFiled: December 28, 2017Publication date: July 4, 2019Inventors: David Taubler, Hyunsuk Han, Yana Nikitina, John Daum, Wira Pradjinata, Igor Petrunya