Patents by Inventor Minghua Xu
Minghua Xu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240112160Abstract: A method is disclosed. The method comprises generating, by sender device or a sender computer associated with a sender, a base token in a token space associated with parameters. The base token can comprise one or more token attributes within the parameters, and an amount. The base token can then be signed, by the sender device or the sender computer, to form a minted token. The method may then include transmitting, by the sender device to a receiver device, a transfer request comprising the minted token.Type: ApplicationFiled: February 17, 2022Publication date: April 4, 2024Applicant: Visa International Service AssociationInventors: Minghua Xu, Shan Jin
-
Patent number: 11928016Abstract: Embodiments of the invention are directed to systems, method, and devices for detecting failures in distributed systems. A failure detection platform may identify anomalies in time series data, the time series data corresponding to historical network messages. The anomalies can be labeled and used to train a first predictive model. At least one other model may be trained using the time series data, the anomaly labels and a supervised machine-learning algorithm. A third model can be trained to identify a system failure based at least in part on the outputs provided by the first and the second model. The third model, once trained, can be utilized to predict a future system failure.Type: GrantFiled: December 9, 2019Date of Patent: March 12, 2024Assignee: VISA INTERNATIONAL SERVICE ASSOCIATIONInventor: Minghua Xu
-
Patent number: 11864919Abstract: A flexible, passive pressure sensor includes three LC tank circuits. The first LC tank circuit is a pressure sensing LC tank circuit, having a capacitance that varies in response to changes in environmental pressure. The second and third LC tank circuits are reference LC tank circuits, having capacitances that are relatively constant over changes in environmental pressure. A measurement tool measures the resonant frequencies of the three LC tank circuits and then computes a pressure measurement that accounts for changes in resonant frequencies in the LC tank circuits due to environmental effects and deforming.Type: GrantFiled: February 23, 2022Date of Patent: January 9, 2024Assignee: W. L. Gore & Associates, Inc.Inventor: Minghua Xu
-
Publication number: 20230401331Abstract: Embodiments of the present disclosure are directed to methods and systems used to determine private set intersections (PSIs) and execute private database joins (PDJs). Some embodiments are characterized by binning techniques that enables PSI and PDJ methods to be performed by worker nodes in a computing cluster in parallel, thus reducing execution time. A first party computing system and a second party computing system can each tokenize their respective datasets, then assign the datasets to bins. The bins can each be padded with dummy tokens. Then the first party computing system and second party computing system can execute several Nparallel PSI on pairs of corresponding bins. The results can then be combined to produce a tokenized intersection set, which can then be detokenized to produce the set intersection.Type: ApplicationFiled: October 6, 2021Publication date: December 14, 2023Applicant: Visa International Service AssociationInventors: Minghua Xu, Mihai Christodorescu, Wei Sun, Peter Rindal, Ranjit Kumaresan, Vinjith Nagaraja, Karankumar Hiteshbhai Patel
-
Publication number: 20230344649Abstract: A method includes a first device receiving, from a second device, an interaction request message comprising an amount and a second device certificate. The first device can verify the second device certificate using a server computer public key corresponding to a server computer private key. A trusted application in a secure element of the first device can determine whether or not the amount is less than an offline amount stored in the secure element. If the amount is less than the offline amount, the trusted application can determine an updated offline amount based on the amount. The trusted application can generate an interaction response message comprising the amount and a trusted application certificate. The first device can then provide the interaction response message to the second device.Type: ApplicationFiled: July 21, 2021Publication date: October 26, 2023Applicant: Visa International Service AssociationInventors: Mahdi Zamani, Ranjit Kumaresan, Mihai Christodorescu, Cuy Sheffield, Benjamin Price, Wanyun Gu, Minghua Xu, Srinivasan Raghuraman, Muhammad Saad, Mustafa Ozdayi, Mohammad Mohsen Minaei Bidgoli, Sourav Das
-
Publication number: 20230281334Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.Type: ApplicationFiled: May 11, 2023Publication date: September 7, 2023Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
-
Publication number: 20230218260Abstract: Embodiments of the present disclosure relate to transcutaneous sound sensors. In at least one embodiment, a transcutaneous sound sensor system comprises a mounting unit and a sound sensor. The mounting unit detachably connects to an electronics unit and mounts to skin on a body. The sound sensor senses sounds originating from inside the body. The sound sensor comprises an in-vivo portion and an ex-vivo portion. The in-vivo portion is configured to be inserted through and placed beneath the skin of the body. In addition, the in-vivo portion has a sound-sensing element configured to produce an electrical signal in response to a mechanical stress or strain on the sound-sensing element. The ex-vivo portion is configured to operably connect to the electronics unit when the electronics unit is connected to the mounting unit.Type: ApplicationFiled: May 7, 2021Publication date: July 13, 2023Inventors: John M. Squeri, Christopher J. Vecchio, Minghua Xu
-
Patent number: 11687666Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.Type: GrantFiled: January 12, 2021Date of Patent: June 27, 2023Assignee: Visa International Service AssociationInventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
-
Patent number: 11588649Abstract: Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.Type: GrantFiled: July 12, 2021Date of Patent: February 21, 2023Assignee: Visa International Service AssociationInventors: Minghua Xu, Jose Rios Trevino, Ying Hao
-
Publication number: 20230050481Abstract: A method performed by a user device is disclosed. The method comprising generating a secret and measuring a biometric template of a user operating the user device. The method then generates a plurality of secret shares of the secret and of the biometric template. The user device then transmits the secret shares of the secret and of the biometric template to a plurality of recovery devices. After, the user device may then initiate a recovery of the secret and measure a biometric measurement of the user. Data of the biometric measurement may be transmitted to the plurality of recovery devices, where the recovery devices perform a partial computation. The user device use the plurality of partial computations to determine a match between the biometric template and the biometric measurement. If the two biometrics match, the user device can reconstruct the secret using shares of the secret from the recovery devices.Type: ApplicationFiled: July 30, 2021Publication date: February 16, 2023Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel, Shengfei Gu, Sikhar Patranabis, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal, Shan Jin
-
Publication number: 20230023646Abstract: Embodiments of the invention are directed to systems, method, and devices for detecting failures in distributed systems. A failure detection platform may identify anomalies in time series data, the time series data corresponding to historical network messages. The anomalies can be labeled and used to train a first predictive model. At least one other model may be trained using the time series data, the anomaly labels and a supervised machine-learning algorithm. A third model can be trained to identify a system failure based at least in part on the outputs provided by the first and the second model. The third model, once trained, can be utilized to predict a future system failure.Type: ApplicationFiled: December 9, 2019Publication date: January 26, 2023Inventor: Minghua Xu
-
Publication number: 20230008976Abstract: Embodiments of the invention are directed to systems, methods, and devices for securely performing federated tasks (e.g., the generation and utilizing of machine-learning models). A secure platform computer may operate a secure memory space. Entities participating in a federated project may transmit respective portions of project data defining the federated project. Each entity may provide their respective (encrypted) data sets for the project that in turn can be used to generate a machine-learning model in accordance with the project data. The machine-learning model may be stored in the secure memory space and accessed through an interface provided by the secure platform computer Utilizing the techniques discussed herein, a machine-learning models may be generated and access to these models may be restricted while protect each participant's data set from being exposed to the other project participants.Type: ApplicationFiled: December 3, 2019Publication date: January 12, 2023Inventor: Minghua Xu
-
Publication number: 20220222366Abstract: Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.Type: ApplicationFiled: January 12, 2021Publication date: July 14, 2022Inventors: Vinjith Nagaraja, Minghua Xu, Karankumar Hiteshbhai Patel
-
Publication number: 20220188598Abstract: Provided are systems for authenticating an individual using image feature templates that include at least one processor to train a first machine learning model based on a training dataset of a plurality of images of a user, generate a plurality of image feature templates using the first machine learning model, wherein each image feature template of the plurality of image feature templates is associated with a positive authentication of the identity of the user during a time interval, generate a second machine learning model based on the plurality of image feature templates, generate a predicted image feature template using the second machine learning model, determine whether to authenticate the identity of the user based on an input image of the user, and perform an action based on determining whether to authenticate the identity of the user. Methods and computer program products are also provided.Type: ApplicationFiled: December 11, 2020Publication date: June 16, 2022Inventors: Shengfei Gu, Peng Wu, Yiwei Cai, Minghua Xu
-
Patent number: 11284840Abstract: A flexible, passive pressure sensor includes three LC tank circuits. The first LC tank circuit is a pressure sensing LC tank circuit, having a capacitance that varies in response to changes in environmental pressure. The second and third LC tank circuits are reference LC tank circuits, having capacitances that are relatively constant over changes in environmental pressure. A measurement tool measures the resonant frequencies of the three LC tank circuits and then computes a pressure measurement that accounts for changes in resonant frequencies in the LC tank circuits due to environmental effects and deforming.Type: GrantFiled: August 28, 2017Date of Patent: March 29, 2022Assignee: W. L. Gore & Associates, Inc.Inventor: Minghua Xu
-
Patent number: 11182384Abstract: Described herein are systems and methods in which key values associated with events are aggregated as those events are processed by an event processing engine. In some embodiments, the system maintains a number of key-value mappings associated with a plurality of key values to be updated. Each key value may be associated with a key log that can be accessed to quickly generate useful information while minimizing the number of operations needed to generate that information. The key log may be updated each time that the associated key value is updated in order to maintain a running history of key-value updates.Type: GrantFiled: July 25, 2016Date of Patent: November 23, 2021Assignee: Visa International Service AssociationInventor: Minghua Xu
-
Publication number: 20210344512Abstract: Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.Type: ApplicationFiled: July 12, 2021Publication date: November 4, 2021Inventors: Minghua Xu, Jose Rios Trevino, Ying Hao
-
System, Method, and Computer Program Product for Patient Authentication and Identity Risk Assessment
Publication number: 20210304316Abstract: Provided are a system, method, and computer program product for patient authentication and identity risk assessment. The method includes receiving an initial patient authorization request from a medical provider computing device. The initial patient authorization request includes a patient identifier communicated by a mobile device of a user to the medical provider computing device. The method also includes generating, using an identification risk assessment model and based at least partly on the initial patient authorization request, an authenticity score. The method further includes communicating the authenticity score to an insurance provider system to cause the insurance provider system to approve or decline the initial patient authorization request. The method further includes receiving a primary insurance provider response from the insurance provider system and communicating at least a portion of the primary insurance provider response to the medical provider computing device.Type: ApplicationFiled: March 10, 2021Publication date: September 30, 2021Inventors: William Joseph Leddy, III, Shengfei Gu, Minghua Xu -
Patent number: 11088853Abstract: Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.Type: GrantFiled: November 6, 2018Date of Patent: August 10, 2021Assignee: Visa International Service AssociationInventors: Minghua Xu, Jose Rios Trevino, Ying Hao
-
Publication number: 20210209604Abstract: Provided is a method for detecting group activities in a network. The method may include receiving interaction data associated with a plurality of interactions. For each account identifier associated with at least one interaction, a value may be determined for each of a first set of categories, and a vector may be generated based on the value for each category. The length of each vector may be determined. At least one relational graph may be generated based on the interaction data. Each relational graph may be associated with a respective category of a second set of categories. At least one cluster of nodes may be determined based on the relational graph(s). A score for each cluster may be determined based on the length of the vector associated with the account identifier of each node of the cluster of nodes. A system and computer program product are also disclosed.Type: ApplicationFiled: December 30, 2020Publication date: July 8, 2021Inventors: Liang Wang, Junpeng Wang, Chiranjeet Chetia, Shi Cao, Harishkumar Sundarji Majithiya, Roshni Ann Samuel, Minghua Xu, Wei Zhang, Hao Yang