Patents by Inventor Tsz Ling Christina Leung

Tsz Ling Christina Leung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240104149
    Abstract: A computing system is provided, including one or more processors configured to provide a social media platform configured to serve a content feed to a user. The processor is further configured to generate user content interaction information by detecting user interactions with the content feed and provide a recommendation engine that selects content items for display in the content feed based on the generated user content interaction information. The processor is further configured to receive a refresh request to refresh the recommendation engine and refresh the recommendation engine at least in part by masking or resetting the user content interaction information upon receiving the refresh request. After the refresh, the processor is further configured to generate, via the recommendation engine, post-refresh content items based on the masked or reset user content interaction information, and transmit the post-refresh content items to the user device for display in the content feed.
    Type: Application
    Filed: September 27, 2022
    Publication date: March 28, 2024
    Inventors: Jordan Furlong, Han Cheng, Ciaran Farley, Alan Yee, Isha Mukesh Shah, Riley Gish, Amanda Hanna, Jinyi Lu, Wenrong Zhang, Yiming Chen, Tsz Ling Christina Leung
  • Patent number: 11886612
    Abstract: The invention is a system based on decentralized ledgers to enable compliance with privacy regulations. A consumer identifier (consumer ID) allows consent provenance to be saved in a shared decentralized ledger. The consent ID also empowers consumers to query as to how their data has been moved through the data supply chain. The consumer data itself is not stored in the blockchain, only consents and data transfer events. A consent API allows companies to enter the original consumer consent in a consent ledger; a data transfer API allows companies to record transfers from one to another; and a subscription API allows companies to be notified of changes to a given consent.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: January 30, 2024
    Assignee: LiveRamp, Inc.
    Inventors: Joe Hsy, Tsz Ling Christina Leung, Matt LeBaron, Arthur Coleman
  • Patent number: 11620365
    Abstract: A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field, with the value of the Key Character identifying the position within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file.
    Type: Grant
    Filed: April 21, 2021
    Date of Patent: April 4, 2023
    Assignee: LiveRamp, Inc.
    Inventors: Arthur Coleman, Tsz Ling Christina Leung, Michael Anderson, Matt LeBaron, Martin Rose
  • Patent number: 11586713
    Abstract: A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.
    Type: Grant
    Filed: December 6, 2021
    Date of Patent: February 21, 2023
    Assignee: LiveRamp, Inc.
    Inventors: Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
  • Patent number: 11568028
    Abstract: A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.
    Type: Grant
    Filed: December 6, 2021
    Date of Patent: January 31, 2023
    Assignee: LiveRamp, Inc.
    Inventors: Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
  • Publication number: 20220164418
    Abstract: A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.
    Type: Application
    Filed: December 6, 2021
    Publication date: May 26, 2022
    Inventors: Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
  • Publication number: 20220164419
    Abstract: A system for applying fingerprinting/watermarking of consumer data, and analyzing “wild files” of consumer data to assign a guilt score for a particular party who may have leaked the data, allows the owner of data sources (“Data Owners”) to identify and assert ownership of textual data that has been distributed outside of their firewall in the clear (i.e., without encryption), either intentionally or unintentionally, and assign guilt to parties misusing the data. The system can be used by Data Owners who transmit, lease, or sell data to individuals or organizations (“Trusted Third Parties” or “TTPs”) to recognize and assert ownership of their data in the case where one or more TTPs leaks the data (the leaked file is defined as a “Leaked Subset”) into the hands of others (“Bad Actors”) who either knowingly or unknowingly use the data illegally.
    Type: Application
    Filed: December 6, 2021
    Publication date: May 26, 2022
    Inventors: Arthur Coleman, Martin Rose, Tsz Ling Christina Leung, Michael Anderson
  • Publication number: 20220050915
    Abstract: The invention is a system based on decentralized ledgers to enable compliance with privacy regulations. A consumer identifier (consumer ID) allows consent provenance to be saved in a shared decentralized ledger. The consent ID also empowers consumers to query as to how their data has been moved through the data supply chain. The consumer data itself is not stored in the blockchain, only consents and data transfer events. A consent API allows companies to enter the original consumer consent in a consent ledger; a data transfer API allows companies to record transfers from one to another; and a subscription API allows companies to be notified of changes to a given consent.
    Type: Application
    Filed: September 10, 2019
    Publication date: February 17, 2022
    Inventors: Joe Hsy, Tsz Ling Christina Leung, Matt LeBaron, Arthur Coleman
  • Patent number: 11188301
    Abstract: A system and method for salting and fingerprinting database tables, text files, data feeds, and the like, first resorts the data according to a field or fields in the data set. A salting recipe is selected and applied to the sorted data. A fingerprint of the data is captured after sorting and salting. The data is then restored to its original order before being sent to a trusted third party. Because the data owner retains information concerning the sorting sorting sonar technique, salting technique, and the fingerprint, the data owner can reconstruct the unsalted file from the salted file, and can determine if a wild file contains data from the data file. The salting is difficult to detect by the bad actor, even if the bad actor is aware that the data has been salted.
    Type: Grant
    Filed: February 16, 2017
    Date of Patent: November 30, 2021
    Assignee: LiveRamp, Inc.
    Inventors: Charles Zinsmeyer, Tsz Ling Christina Leung, Matt LeBaron, Martin Rose, Ray Kraus, Arthur Coleman, Michael Anderson
  • Patent number: 11163745
    Abstract: A system and method for statistical fingerprinting of structured datasets begins by dividing the structured database into groups of data subsets. These subsets are created based on the structure of the data; for example, data delineated by columns and rows may be broken into subsets by designating each column as a subset. A fingerprint is derived from each subset, and then the fingerprint for each subset is combined in order to create an overall fingerprint for the dataset. By applying this process to a “wild file” of unknown provenance, and comparing the result to a data owner's files, it may be determined if data in the wild file was wrongfully acquired from the data owner.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: November 2, 2021
    Assignee: LiveRamp, Inc.
    Inventors: Arthur Coleman, Tsz Ling Christina Leung, Martin Rose, Chivon Powers, Natarajan Shankar
  • Publication number: 20210326414
    Abstract: A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field, with the value of the Key Character identifying the position within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file.
    Type: Application
    Filed: April 21, 2021
    Publication date: October 21, 2021
    Inventors: Arthur Coleman, Tsz Ling Christina Leung, Michael Anderson, Matt LeBaron, Martin Rose
  • Publication number: 20210200735
    Abstract: A system and method for statistical fingerprinting of structured datasets begins by dividing the structured database into groups of data subsets. These subsets are created based on the structure of the data; for example, data delineated by columns and rows may be broken into subsets by designating each column as a subset. A fingerprint is derived from each subset, and then the fingerprint for each subset is combined in order to create an overall fingerprint for the dataset. By applying this process to a “wild file” of unknown provenance, and comparing the result to a data owner's files, it may be determined if data in the wild file was wrongfully acquired from the data owner.
    Type: Application
    Filed: September 7, 2018
    Publication date: July 1, 2021
    Inventors: Arthur Coleman, Tsz Ling Christina Leung, Martin Rose, Chivon Powers, Natarajan Shankar
  • Publication number: 20210192071
    Abstract: Change fingerprinting is applied to a text file, database table, or data feed to determine the timeframe in which an identified “wild file” was generated, even when its file creation meta-data is missing. Each row in the data contains information on a single object. At least one column in the data contains an age for each object at the time the file was created. The age data can be used to determine the date the file was created, such as by using recognition processing or by looking at data that has been added or dropped from the file based on age. By identifying the timeframe in which the wild file was created, the data owner may greatly reduce the computational burden needed to determine if the wild file contains stolen data because it greatly reduces the universe of files that must be compared to the wild file.
    Type: Application
    Filed: February 8, 2017
    Publication date: June 24, 2021
    Inventors: Arthur Coleman, Martin Rose, Tsz Ling Christina Leung
  • Patent number: 11003747
    Abstract: A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field to represent a binary 0 or 1, with the value of the Key Character identifying the bit position of the binary 0 or 1 within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: May 11, 2021
    Assignee: LiveRamp, Inc.
    Inventors: Arthur Coleman, Tsz Ling Christina Leung, Michael Anderson, Matt LeBaron, Martin Rose
  • Publication number: 20210026598
    Abstract: A system and method for salting and fingerprinting database tables, text files, data feeds, and the like, first resorts the data according to a field or fields in the data set. A salting recipe is selected and applied to the sorted data. A fingerprint of the data is captured after sorting and salting. The data is then restored to its original order before being sent to a trusted third party. Because the data owner retains information concerning the sorting sorting sonar technique, salting technique, and the fingerprint, the data owner can reconstruct the unsalted file from the salted file, and can determine if a wild file contains data from the data file. The salting is difficult to detect by the bad actor, even if the bad actor is aware that the data has been salted.
    Type: Application
    Filed: February 16, 2017
    Publication date: January 28, 2021
    Inventors: Charles Zinsmeyer, Tsz Ling Christina Leung, Matt LeBaron, Martin Rose, Ray Kraus, Arthur Coleman, Michael Anderson
  • Publication number: 20200092595
    Abstract: A system and method for identifying a leaked data file and assigning guilt to one or more suspected leakers proceeds through a plurality of levels. At a first level, primary watermark detection occurs. Data is inserted into a subset of data to determine correlation with data in the suspected leaked file. The guilt probability that results is then weighted based on the number of bits matched. In a second level, another search process is performed for detecting additional salt-related patterns. The guilt score is then computed for every detected recipient identifier for the suspected leaked data file, and the relative guilt of these recipients is weighted. In a third layer, the statistical distribution of data in the suspected leaked file is compared with that of corresponding data in the reference files. After this layer is complete, the average of guilt scores across each of the layers is calculated.
    Type: Application
    Filed: March 9, 2018
    Publication date: March 19, 2020
    Inventors: Arthur Coleman, Chivon Powers, TSz Ling Christina Leung, Martin Rose, Matt LeBaron
  • Publication number: 20190034601
    Abstract: A system for “horizontal” salting of database tables, text files, and data feeds utilizes a key field and character position within that field (the “Key Character”) and a Salting Field, which contains content that can legitimately be in one of at least two states without impacting the usefulness of the data. A unique identifier, which is assigned to the recipient of the data, is hidden within the data by using the variations of the states in the Salting Field to represent a binary 0 or 1, with the value of the Key Character identifying the bit position of the binary 0 or 1 within the unique identifier. This type of salting is invisible to the recipient of the data file, does not alter the accuracy of the data, and can be made unique for a particular party receiving data files or unique for each data file.
    Type: Application
    Filed: December 22, 2016
    Publication date: January 31, 2019
    Inventors: Arthur Coleman, Tsz Ling Christina Leung, Michael Anderson, Matt LeBaron, Martin Rose