Patents by Inventor William Tran

William Tran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240143583
    Abstract: A system comprising a client device and a server network, the client device configured to receive a query; transmit the query; receive a populated response; and display the populated response. The server network may be configured to receive the query; tokenize the query; generate an intent-match likelihood for each of a plurality of supported question intents; classify the query based on the intent-match likelihoods; evaluate each of the intent-match likelihoods to a confidence threshold; extract, via a Named Entity Recognition model, one or more entities from the query; determine one or more entity values for each of the one or more entities; query the at least one database to incorporate intent to the one or more entities and the one or more entity values; populate a response template with the one or more entity values and one or more specifics; and store the query and the populated response.
    Type: Application
    Filed: October 12, 2023
    Publication date: May 2, 2024
    Applicant: Sumitomo Pharma Co., Ltd.
    Inventors: Alan Jeffrey Menaged, Elliott Rain Morelli, Daniel Jaebin Park, Jonathan William Price, Daniel Benjamin Rand, Timothy Cao Tran
  • Patent number: 11941129
    Abstract: Embodiments disclosed are directed to a computing system that performs steps to perform enhanced device fingerprinting using user contacts data. The computing system receives, from an application, a first plurality of device attributes identifying a client device on which the application is being used. The first plurality of device attributes includes first device identification data and first user contacts data. Subsequently, when a user is attempting to perform a transaction using the application on the client device, the computing system receives, from the application, a second plurality of device attributes identifying the client device on which the application is being used. The second plurality of device attributes includes second device identification data and second user contacts data. The computing system compares the second plurality of device attributes to the first plurality of device attributes to determine whether the user is authorized to perform the transaction.
    Type: Grant
    Filed: March 31, 2021
    Date of Patent: March 26, 2024
    Assignee: Capital One Services, LLC
    Inventors: William Broome, Nicholas Capurso, Timothy Tran, Vu Thuy Ngo
  • Patent number: 11910187
    Abstract: Systems, methods, and computer program products for an application to securely record and propagate an invocation context for invoking other applications are described. The applications being invoked not only receive a user's authentication token, but also authentication tokens of an entire invocation chain. Accordingly, the applications being invoked can verify a chain of custody through verification of nested, cryptographically signed payloads of a chain of authentication tokens. An application can thus verify identities of each application in the chain of custody, as well as the invocation contexts (e. g. the HTTP request method and path) in which each application in the chain invoked the next application.
    Type: Grant
    Filed: August 3, 2020
    Date of Patent: February 20, 2024
    Assignee: Pivotal Software, Inc.
    Inventor: William Tran
  • Publication number: 20220362055
    Abstract: A punctum plug or lacrimal insert is constructed of a monolithic material, such that the punctum plug is configured to turn approximately 90 degrees upon insertion into a canaliculus of an eye. The punctum plug or lacrimal insert may include high-molecular-weight polysaccharide and added plasticizers.
    Type: Application
    Filed: May 13, 2022
    Publication date: November 17, 2022
    Inventors: Kenneth Curry, William Tran
  • Publication number: 20210021995
    Abstract: Systems, methods, and computer program products for an application to securely record and propagate an invocation context for invoking other applications are described. The applications being invoked not only receive a user's authentication token, but also authentication tokens of an entire invocation chain. Accordingly, the applications being invoked can verify a chain of custody through verification of nested, cryptographically signed payloads of a chain of authentication tokens. An application can thus verify identities of each application in the chain of custody, as well as the invocation contexts (e. g. the HTTP request method and path) in which each application in the chain invoked the next application.
    Type: Application
    Filed: August 3, 2020
    Publication date: January 21, 2021
    Inventor: William Tran
  • Patent number: 10735425
    Abstract: Systems, methods, and computer program products for an application to securely record and propagate an invocation context for invoking other applications are described. The applications being invoked not only receive a user's authentication token, but also authentication tokens of an entire invocation chain. Accordingly, the applications being invoked can verify a chain of custody through verification of nested, cryptographically signed payloads of a chain of authentication tokens. An application can thus verify identities of each application in the chain of custody, as well as the invocation contexts (e. g. the HTTP request method and path) in which each application in the chain invoked the next application.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: August 4, 2020
    Assignee: Pivotal Software, Inc.
    Inventor: William Tran
  • Publication number: 20180219863
    Abstract: Systems, methods, and computer program products for an application to securely record and propagate an invocation context for invoking other applications are described. The applications being invoked not only receive a user's authentication token, but also authentication tokens of an entire invocation chain. Accordingly, the applications being invoked can verify a chain of custody through verification of nested, cryptographically signed payloads of a chain of authentication tokens. An application can thus verify identities of each application in the chain of custody, as well as the invocation contexts (e. g. the HTTP request method and path) in which each application in the chain invoked the next application.
    Type: Application
    Filed: January 31, 2017
    Publication date: August 2, 2018
    Inventor: William Tran