Patents by Inventor Shen SONG
Shen SONG has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230153835Abstract: A method for conducting a transaction with a consumer device includes receiving user input selecting a store as a party to the transaction with a consumer associated with the consumer device. The method also includes transmitting, to the account computer system, first identification information of the store and second identification information of the consumer device. The method further includes receiving, from the account computer system, a passcode based on transmitting the first identification information of the store. The method also includes receiving, from the account computer system, a payment amount due. The method still further includes transmitting the passcode to the store to finalize the transaction.Type: ApplicationFiled: January 19, 2023Publication date: May 18, 2023Inventors: Alexander SONG, Yuh-Shen SONG, Catherine LEW
-
Patent number: 11640611Abstract: Verifying a check includes receiving, from a check issuer computer system, first check information comprising a first routing number, a first account number, a first check number, and a first dollar amount associated with an issued check. The verifying also includes receiving from a computer system of a payee financial institution, second check information comprising a second routing number, a second account number, a second check number, and a second dollar amount from a received paper check. The method includes verifying that the first check information corresponds to the second check information and sending, to the computer system of the payee financial institution in response to the first check information matching the second check information, a verification message indicating that the first check information corresponds to the second check information.Type: GrantFiled: December 8, 2021Date of Patent: May 2, 2023Inventors: Yuh-Shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11599945Abstract: A computer system uses risk-based principles to identify customers who have conducted money laundering activities. A money laundering risk score is derived from transactional information, background information, and/or due diligence information for each customer of a group of customers. Customers with higher money laundering risks are identified and monitored more closely. The computer system also assists a user to identify at least one transaction that has caused the identified customer to have a money laundering risk score that is in the higher percentiles of the customers.Type: GrantFiled: January 12, 2021Date of Patent: March 7, 2023Assignee: AI OASIS, INC.Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11593806Abstract: A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.Type: GrantFiled: February 14, 2020Date of Patent: February 28, 2023Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11580562Abstract: Users can conduct financial transactions in a secure manner without the need to use any traditional financial instrument, such as credit card, debit card, ATM card, gift card, stored value card, prepaid card, cash, check, coupon, token, ticket, voucher, certificate, note, security, etc. In addition, users' identities are kept confidential in the transactions without violating the Anti-Money Laundering and Anti-Terrorist Financing requirements.Type: GrantFiled: October 19, 2012Date of Patent: February 14, 2023Inventors: Alexander Song, Yuh-Shen Song, Catherine Lew
-
Patent number: 11580464Abstract: A method for managing customers for a store includes generating first account identification information from stored account information of a customer. The method also includes transmitting a list of candidate payees within a predefined distance of a current geolocation of a personal communication device of the customer and identifying the store as a party to a transaction with the customer based on feedback. The method still further includes receiving, from the store, a transaction message indicating the customer is a counterparty to the transaction, the transaction message comprising second account identification information received at the communication device of the store from the customer. The method also includes determining the first account identification information matches the second account identification information.Type: GrantFiled: December 24, 2020Date of Patent: February 14, 2023Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20230019588Abstract: A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.Type: ApplicationFiled: September 19, 2022Publication date: January 19, 2023Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20220407699Abstract: A computer-implemented method for sharing information about a subject without disclosing identification information about the subject includes comparing, by a first computer system, a third set of data with a fourth set of data. The third set of data is converted by a transformation from a first set of identification data of a first subject provided by the first computer system. The fourth set of data is converted by the transformation from a second set of identification data of a second subject provided by a second computer system. The transformation renders the first subject unidentifiable from the third set of data and the second subject unidentifiable from the fourth set of data. The computer-implemented method also includes transmitting, from the first computer system to the second computer, a fifth set of data when the third set of data corresponds to the fourth set of data.Type: ApplicationFiled: August 23, 2022Publication date: December 22, 2022Applicant: AI OASIS, INC.Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 11469892Abstract: A computer-implemented method for sharing information about a subject without disclosing identification information of the subject includes comparing, by a computer system, a third set of data with a fourth set of data. The third set of data is converted by a transformation from a first set of data. The first set of data comprises identification information of a first subject. The fourth set of data is converted by the transformation from a second set of data. The second set of data comprises identification information of a second subject. The transformation renders the first subject unidentifiable from the third set of data and the second subject unidentifiable from the fourth set of data. The computer-implemented method also determines, by the computer system, that the first subject corresponds to the second subject when the third set of data corresponds to the fourth set of data.Type: GrantFiled: March 24, 2021Date of Patent: October 11, 2022Assignee: AI OASIS, INC.Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20220217154Abstract: A central computer system enables a sender to certify a message, such as an email, and a recipient to verify the validity of the certified message. As a result of the certification, users of messages can avoid ransomware attacks and many other types of fraud caused by fraudulent messages.Type: ApplicationFiled: July 2, 2021Publication date: July 7, 2022Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20220180361Abstract: A computerized method for transactional approval stores, at a first computer system, first user identification data associated with a user. The first user identification data is insufficient to confirm an identity of the user. The computerized method stores, at the first computer system, first account identification data associated with the first user identification data. The computerized method receives, at the first computer system, second account identification data associated with a transaction, the second account identification data received from a second computer system. The computerized method also receives, at the first computer system, electronically obtained identification data associated with the transaction.Type: ApplicationFiled: February 23, 2022Publication date: June 9, 2022Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20220101329Abstract: Verifying a check includes receiving, from a check issuer computer system, first check information comprising a first routing number, a first account number, a first check number, and a first dollar amount associated with an issued check. The verifying also includes receiving from a computer system of a payee financial institution, second check information comprising a second routing number, a second account number, a second check number, and a second dollar amount from a received paper check. The method includes verifying that the first check information corresponds to the second check information and sending, to the computer system of the payee financial institution in response to the first check information matching the second check information, a verification message indicating that the first check information corresponds to the second check information.Type: ApplicationFiled: December 8, 2021Publication date: March 31, 2022Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 11288676Abstract: A method stores, at a first computer system, first data associated with a user, a first portion of a first account number associated with the first data, and third data associated with the first data. An identity of the user is unidentifiable from the first data. The method receives, at the first computer system, a second portion of a second account number from a second computer system, second data generated by the second computer system based on electronically obtained identification information. The method transmits, by the first computer system, a message associated with the user based on the third data when the second data corresponds to the first data and the second portion of the second account number corresponds to the first portion of the first account number. The message is for completing a transaction, preventing a crime, making a statement, triggering a response, and/or giving an instruction.Type: GrantFiled: June 2, 2020Date of Patent: March 29, 2022Assignee: AI OASIS, INC.Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Publication number: 20220084023Abstract: A computerized system conducts customer identification processing for customers who remotely open accounts with personal identification information that cannot be verified through available data sources. The system receives a portion of identity data in response to a request for the customer to provide the portion of identity data from a customer identification document during a financial transaction. The system updates an identity profile of the customer by combining the portion of identity data with different portions of previously received identity data that were previously received from different merchants during transactions between the customer and the different merchants. Based on comparing the identity profile to unverified identity data of the customer, the system determines whether to maintain or terminate the account.Type: ApplicationFiled: November 22, 2021Publication date: March 17, 2022Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Patent number: 11227286Abstract: A method for verifying a name on a check include receiving, from a check issuer computer system, a first payee name and first check information and associating the first payee name with the first check information. The method also includes receiving second check information electronically read by a first device at the payee financial institution. The method further includes receiving a second payee name electronically read from an identification document and comparing the first check information with the second check information. The method still further includes verifying that the first payee name corresponds to the second payee name when the first payee name matches the second payee name; and sending, in response to the verification, a name verification message indicating the first payee name corresponds to the second payee name.Type: GrantFiled: April 13, 2018Date of Patent: January 18, 2022Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11210667Abstract: A computerized system conducts customer identification processing for customers who remotely open accounts with personal identification information that cannot be verified through available data sources.Type: GrantFiled: July 15, 2019Date of Patent: December 28, 2021Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
-
Patent number: 11128387Abstract: Embodiments of the present disclosure relate to a device, method and computer readable storage medium for wireless data transmission. In example embodiments, the device includes a first NCO configured to shift a frequency of a pre-distorted downlink baseband signal by a first offset to generate a first signal. The baseband signal is associated with a plurality of allocated carriers. The device also includes an RF processing unit including an LO configured to generate an LO signal at an LO frequency. The LO frequency is within a protection area of one of the plurality of allocated carriers or equal to a center frequency of the one of the plurality of allocated carriers. The device also includes a power amplifier configured to generate, based on a modulated baseband signal, an amplified signal for transmission. The device also includes a second NCO configured to shift a frequency of the amplified signal by a second offset to generate a second signal for generation of a pre-distortion coefficient.Type: GrantFiled: April 8, 2018Date of Patent: September 21, 2021Assignee: Nokia Solutions and Networks OyInventors: Shen Song, Long Chen, Jianjiang Yang
-
Publication number: 20210211285Abstract: A computer-implemented method for sharing information about a subject without disclosing identification information of the subject includes comparing, by a computer system, a third set of data with a fourth set of data. The third set of data is converted by a transformation from a first set of data. The first set of data comprises identification information of a first subject. The fourth set of data is converted by the transformation from a second set of data. The second set of data comprises identification information of a second subject. The transformation renders the first subject unidentifiable from the third set of data and the second subject unidentifiable from the fourth set of data. The computer-implemented method also determines, by the computer system, that the first subject corresponds to the second subject when the third set of data corresponds to the fourth set of data.Type: ApplicationFiled: March 24, 2021Publication date: July 8, 2021Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20210209711Abstract: A computer-implemented method approves a transaction by storing, at a first computer system, first data identifying at least a portion of an identity of a user, an information locator associated with the first data, and a transformation method associated with the information locator. The computer-implemented method also receives, at the first computer system from a second computer system, the information locator when the user conducts the transaction, and second data converted from electronically obtained identification information of the user. An identity of the user cannot be identified from the second data. The computer-implemented method transforms, at the first computer system, the second data into third data based on the transformation method retrieved in response to the received information locator, and approves, by the first computer system, the transaction associated with the information locator when the third data corresponds to the first data.Type: ApplicationFiled: March 24, 2021Publication date: July 8, 2021Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
-
Publication number: 20210133884Abstract: A computer system uses risk-based principles to identify customers who have conducted money laundering activities. A money laundering risk score is derived from transactional information, background information, and/or due diligence information for each customer of a group of customers. Customers with higher money laundering risks are identified and monitored more closely. The computer system also assists a user to identify at least one transaction that has caused the identified customer to have a money laundering risk score that is in the higher percentiles of the customers.Type: ApplicationFiled: January 12, 2021Publication date: May 6, 2021Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG