Patents by Inventor Yolanda Liu
Yolanda Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12243057Abstract: A method for storing a cryptocurrency private key offline, including: encrypting the cryptocurrency private key using a primary encryption key; sharding the encrypted cryptocurrency private key into a plurality of alpha shards; generating beta shards by encrypting the alpha shards with secondary encryption keys; and storing representations of the beta shards offline. The method can additionally or alternatively include: retrieving the representations of the beta shards from the offline storage; decrypting the beta shards into the alpha shards based on the secondary encryption keys; reconstructing the encrypted cryptocurrency private key by recombining the alpha shards; and decrypting the encrypted cryptocurrency private key with the primary encryption key.Type: GrantFiled: April 17, 2019Date of Patent: March 4, 2025Assignee: Coinbase, Inc.Inventors: Philip Martin, Julian Borrey, Yolanda Liu, Zachary Blacher, Robert John Kearney
-
Publication number: 20250045742Abstract: Methods, systems, and devices for data management are described. A datacenter may include one or more servers and an offline key storage system. The datacenter may receive, via a server and from a multi-party computation (MPC) coordinator, a first request to access a key share associated with an MPC node. The server may transmit a second request for the key share associated with the MPC node via a first cross domain communication path to an offline key storage system. The offline key storage system may verify a digital signature included with the second request. The offline key storage system may transmit a response including the key share that is encrypted using an encryption key associated with the MPC node to the server via a second cross domain communication path. The server may transmit a communication including the encrypted key share to the MPC coordinator.Type: ApplicationFiled: July 31, 2023Publication date: February 6, 2025Inventors: Yolanda Liu, Leonardo D. M. Machado, Pavel Zakharov, Roman Popenov, Lary Liu, Brian Ko
-
Publication number: 20250037132Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: ApplicationFiled: March 8, 2024Publication date: January 30, 2025Inventors: Lawrence Hutchison DOUGLAS, Jr., Yolanda LIU, Clayton JOHNSON
-
Publication number: 20240242095Abstract: A method for controlling an artificial intelligence (AI) device can include obtaining, via a processor in the AI device, a knowledge base including a plurality of nodes, and flattening, via the processor, the knowledge base by transforming the knowledge base into a first plurality of documents to form a first index, each of the first plurality of documents identifying a node within the knowledge base. Also, the method can further include receiving, via the processor, a user query, retrieving, via the processor, a subset of documents based on the first plurality of documents and the user query, and performing, via the processor, a task related to knowledge base question answering (KBQA) based on the subset of documents.Type: ApplicationFiled: January 18, 2024Publication date: July 18, 2024Applicant: LG ELECTRONICS INC.Inventors: Manasa BHARADWAJ, Yipeng JI, Yolanda LIU, Borislav MAVRIN
-
Publication number: 20240211482Abstract: A method for controlling an artificial intelligence (AI) device can include obtaining, via a processor in the AI device, a knowledge base including a plurality of nodes, and flattening, via the processor, the knowledge base by transforming the knowledge base into a first plurality of documents, each of the first plurality of documents identifying a node within the knowledge base. Also, the method can further include receiving, via the processor, a user query, performing, via the processor, matching based on the user query and the first plurality of documents to generate a ranked results list, reducing, via the processor, the ranked results list based on a reducing operation to generate a reduced list, and outputting, via the processor, linked entities based on the reduced list.Type: ApplicationFiled: December 21, 2023Publication date: June 27, 2024Applicant: LG ELECTRONICS INC.Inventors: Manasa BHARADWAJ, Yipeng JI, Yolanda LIU, Borislav MAVRIN, Touqir SAJED, Ali PESARANGHADER
-
Patent number: 11941631Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: GrantFiled: March 5, 2019Date of Patent: March 26, 2024Assignee: Capital One Services, LLCInventors: Lawrence Hutchison Douglas, Jr., Yolanda Liu, Clayton Johnson
-
Patent number: 11943350Abstract: In certain embodiments, the use of re-usable cold storage keys to sign messages may be facilitated. In some embodiments, an offline computer system (operating within an offline computing environment) may obtain, from a removable computer-readable storage medium, signing key shards corresponding to a signing private key and a blockchain transaction to be signed, where the signing key shards satisfy a key shard threshold that is (i) a number of key shards required for reconstructing the signing private key and (ii) less than a number of key shards derived from the signing private key using a ceremony key. The offline computer system may form a ciphertext of the signing private key using the signing key shards and reconstruct the signing private key by decrypting the ciphertext using the ceremony key. The offline computer system may sign the blockchain transaction using the signing private key.Type: GrantFiled: October 16, 2020Date of Patent: March 26, 2024Assignee: Coinbase, Inc.Inventors: Yolanda Liu, Ryan Sears, Alan Leung, Zachary Blacher, Jeremy Suurkivi
-
Publication number: 20230315827Abstract: Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.Type: ApplicationFiled: June 7, 2023Publication date: October 5, 2023Applicant: Capital One Services, LLCInventors: Clayton JOHNSON, Lawrence DOUGLAS, Yolanda LIU
-
Patent number: 11755702Abstract: Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.Type: GrantFiled: March 13, 2019Date of Patent: September 12, 2023Assignee: Capital One Services, LLCInventors: Clayton Johnson, Lawrence Douglas, Yolanda Liu
-
Patent number: 11004082Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: GrantFiled: September 28, 2018Date of Patent: May 11, 2021Assignee: Capital One Services, LLCInventors: Lawrence Hutchison Douglas, Jr., Yolanda Liu, Clayton Johnson
-
Publication number: 20210119781Abstract: Systems and methods for signing messes using re-usable cold storage keys.Type: ApplicationFiled: October 16, 2020Publication date: April 22, 2021Inventors: Yolanda Liu, Ryan Sears, Alan Leung, Zachary Blacher, Jeremy Suurkivi
-
Publication number: 20210019971Abstract: A method of operating an access control system containing one or more hierarchies, each of the one or more hierarchies includes one or more access levels is provided. The method including: computing one or more hierarchies; and assigning a primary access level of the one or more access levels within a primary hierarchy of the one or more hierarchies to a first credential; and determining that access levels vertically below the primary access level in the primary hierarchy are implicitly assigned to the first credential when assigning the primary access level of the one or more access levels within the primary hierarchy of the one or more hierarchies to the first credential.Type: ApplicationFiled: April 17, 2019Publication date: January 21, 2021Inventors: Philip Martin, Julian Borrey, Yolanda Liu, Zachary Blacher, Robert John Kearney
-
Publication number: 20200104850Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: ApplicationFiled: September 28, 2018Publication date: April 2, 2020Inventors: Lawrence Hutchison DOUGLAS, JR., Yolanda Liu, Clayton Johnson
-
Publication number: 20200104852Abstract: A first user device may receive, from a second user device, a request to communicatively couple to the first user device, and may establish a communication session with the second user device after receiving the request. The first user device may identify, after establishing the communication session, an inappropriate activity of the second user device relating to the communication session, and perform a set of actions based on identifying the inappropriate activity. The set of actions may include causing the communication session to be restricted, and providing, to a trust platform, a score for the second user device. The score may permit the trust platform to derive a composite score, indicative of a level of trustworthiness of the second user device, that enables other user devices, associated with the trust platform, to determine whether to grant access requests submitted by the second user device.Type: ApplicationFiled: March 5, 2019Publication date: April 2, 2020Inventors: Lawrence Hutchison DOUGLAS, JR., Yolanda LIU, Clayton JOHNSON
-
Publication number: 20200042682Abstract: Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.Type: ApplicationFiled: March 13, 2019Publication date: February 6, 2020Applicant: Capital One Services, LLCInventors: Clayton JOHNSON, Lawrence DOUGLAS, Yolanda LIU
-
Publication number: 20190318356Abstract: A method for storing a cryptocurrency private key offline, including: encrypting the cryptocurrency private key using a primary encryption key; sharding the encrypted cryptocurrency private key into a plurality of alpha shards; generating beta shards by encrypting the alpha shards with secondary encryption keys; and storing representations of the beta shards offline. The method can additionally or alternatively include: retrieving the representations of the beta shards from the offline storage; decrypting the beta shards into the alpha shards based on the secondary encryption keys; reconstructing the encrypted cryptocurrency private key by recombining the alpha shards; and decrypting the encrypted cryptocurrency private key with the primary encryption key.Type: ApplicationFiled: April 17, 2019Publication date: October 17, 2019Inventors: Philip Martin, Julian Borrey, Yolanda Liu, Zachary Blacher, Robert John Kearney
-
Patent number: 10402553Abstract: Systems and methods for authenticating a user, the method including receiving an image of a user of a device, identifying a first facial descriptor of the user from the received image and from previously captured images of the user, and determining a difference between the first facial descriptor from the received image and that from the previously captured images. The method further includes identifying a second facial descriptor of a non-user from the previously captured images of the user, and applying facial recognition to images stored in a plurality of second social networking profiles associated with a first social networking profile of the user to identify the second facial descriptor from the images stored in the second social networking profiles. Based on the difference and the second facial descriptor, the user may be authenticated.Type: GrantFiled: July 31, 2018Date of Patent: September 3, 2019Assignee: Capital One Services, LLCInventors: Clayton Johnson, Lawrence Douglas, Yolanda Liu