Patents by Inventor Yuh-shen Song

Yuh-shen Song has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240386487
    Abstract: A method for detecting money laundering activity learns a writing style of a user based on edits by the user to writing prompts. The method further determines a first ratio of a first value and a second value associated with a cause vector in accordance with detecting a potential case for money laundering based on background information of the party and monitoring electronic transaction data, the first value indicating a number of true positives associated with the cause vector, the second value indicating a number of potential cases associated with the cause vector. The method also generates a report associated with the potential case in accordance with the first ratio being greater than or equal to a reporting threshold, the report including a narrative comprising one or more facts and one or more linking words associated with the learned writing style of the user.
    Type: Application
    Filed: July 30, 2024
    Publication date: November 21, 2024
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Patent number: 12143399
    Abstract: A central computer system enables a sender to certify a message, such as an email, and a recipient to verify the validity of the certified message. As a result of the certification, users of messages can avoid ransomware attacks and many other types of fraud caused by fraudulent messages.
    Type: Grant
    Filed: July 2, 2021
    Date of Patent: November 12, 2024
    Assignee: APEX TECHLINK, INC.
    Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Publication number: 20240338700
    Abstract: A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.
    Type: Application
    Filed: June 18, 2024
    Publication date: October 10, 2024
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Publication number: 20240330923
    Abstract: A computerized method electronically verifies identity data of a person by issuing an account for the person based on unverified identity data of the person. The method receives a request to verify an identity of the person associated with the account; and receives a portion of identity data provided by an identification document of the person. The method updates an identity profile of the person by combining the received portion of identity data with different portions of identity data previously received from different remote computer systems that requested verifying of the identity of the person associated with the account. The method compares the identity profile of the person to the unverified identity data of the person; and confirms the identity of the person associated with the account when no discrepancy between the identity profile of the person and the unverified identity data of the person is found.
    Type: Application
    Filed: June 7, 2024
    Publication date: October 3, 2024
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Patent number: 12086874
    Abstract: An intelligent alert system triggers potential cases based on a set of scenarios and sends the potential cases to investigators. After the investigation, the intelligent alert system records in a database the investigation results for each potential case, the associated set of scenarios that triggered the potential case, and the date and the time of such investigation. As a result, the intelligent alert system can gradually learn from the investigators and will automatically make decisions for some future potential cases with little human involvement.
    Type: Grant
    Filed: January 14, 2020
    Date of Patent: September 10, 2024
    Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Publication number: 20240257131
    Abstract: A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.
    Type: Application
    Filed: February 7, 2024
    Publication date: August 1, 2024
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Patent number: 12051070
    Abstract: A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.
    Type: Grant
    Filed: June 5, 2023
    Date of Patent: July 30, 2024
    Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Patent number: 12039532
    Abstract: A computerized method electronically verifies identity data of a customer by requesting the customer to provide identity data from a customer identification document during a financial transaction. The method updates an identity profile of the customer by combining the received portion of identity data with different portions of previously received identity data that were previously received from different merchants during different transactions between the customer and the different merchants. The method compares the identity profile to the unverified identity data of the customer when a number of transactions with the account is greater than a first transaction threshold, and approves the financial transaction when the identity profile matches the unverified identity data.
    Type: Grant
    Filed: May 26, 2023
    Date of Patent: July 16, 2024
    Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Publication number: 20240212048
    Abstract: A computer-implemented method for monitoring a customer to detect money laundering activity at a first computer system includes receiving, from a second computer system, customer data including transactional information of the customer. The method also includes generating a money laundering risk score based on the customer data. The method further includes selecting, based on whether the money laundering risk score is less than or greater than a threshold, a monitoring category from a first category and a second category to monitor transaction data related to transactions of the customer. The method also includes monitoring the transaction data associated with the customer based on a first monitoring standard in accordance with selecting the first category for the monitoring category. The method still further includes transmitting, to a third computer system, a suspicious money laundering activity report based on detecting suspicious money laundering activity while monitoring the transaction data.
    Type: Application
    Filed: January 12, 2024
    Publication date: June 27, 2024
    Applicant: AI OASIS, INC.
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Publication number: 20240171669
    Abstract: A method for alerting a responder by a first component uses a voice recognition module of the first component to receive a verbal command from the person to send an alert, and uses a location module of the first component to identify location information of the person in response to the verbal command. The method also uses a video recorder of the first component to record environment information of the person in response to the verbal command, and uses a predefined communication protocol to send the alert, the location information, and the environment information to a second component through a communications network. The method uses an artificial intelligence module of the second component to analyze the alert, the location information, and the environment information to identify a method to rescue the person. A drone is instructed to rescue the person based on the identified method to rescue the person.
    Type: Application
    Filed: November 17, 2023
    Publication date: May 23, 2024
    Inventor: Yuh-Shen SONG
  • Publication number: 20240153027
    Abstract: A computer-implemented method validates a user instruction by storing, at a first computer system, a transformation method associated with account information of the user, and associated with a government issued identification document of the user, the account information obtained from an item issued by a financial institution. The computer-implemented method also receives, at the first computer system from a second computer system, the account information and a message electronically transformed from the user instruction by the transformation method based on the government issued identification document of the user. The user instruction is unrecognizable from the message. The computer-implemented method transforms, at the first computer system, the message into the user instruction with the transformation method retrieved based on the received account information. The computer-implemented method approves an action based on the user instruction.
    Type: Application
    Filed: January 12, 2024
    Publication date: May 9, 2024
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Publication number: 20240144284
    Abstract: A computerized method verifies an issued check by receiving, from a check issuer computer system of a checking account holder at a payer financial institution, first check information comprising: a first routing number, account number, check number, and dollar amount associated with an issued check. The method also receives, from a computer system of a payee financial institution, second check information comprising a second routing number, account number, check number, and dollar amount from a received check. The second routing number, the second account number, the second check number, and/or the second dollar amount, are read by an electronic device at the payee financial institution. The method determines whether the first check information matches the second check information and sends, to the computer system of the payee financial institution in response to the first check information not matching the second check information, a message indicating potential fraud.
    Type: Application
    Filed: January 8, 2024
    Publication date: May 2, 2024
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Patent number: 11928681
    Abstract: A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.
    Type: Grant
    Filed: September 19, 2022
    Date of Patent: March 12, 2024
    Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Patent number: 11907957
    Abstract: A computerized method verifies an issued check. The method verifies that the first check information matches second check information. The first and second checking information includes first and second routing numbers, first and second account numbers, first and second check numbers, and first and second dollar amounts associated with an issued check and received check, respectively. The method sends to a computer system of a payee financial institution in response to verifying the first check information matches the second check information, a verification message indicating that the first check information matches the second check information. The method also receives an indicator from the payer financial institution after the issued check has cleared in the payer financial institution; and informs the payee financial institution after the issued check has cleared.
    Type: Grant
    Filed: March 23, 2023
    Date of Patent: February 20, 2024
    Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Patent number: 11908030
    Abstract: A computer-implemented method approves a transaction by storing, at a first computer system, first data identifying at least a portion of an identity of a user, an information locator associated with the first data, and a transformation method associated with the information locator. The computer-implemented method also receives, at the first computer system from a second computer system, the information locator when the user conducts the transaction, and second data converted from electronically obtained identification information of the user. An identity of the user cannot be identified from the second data. The computer-implemented method transforms, at the first computer system, the second data into third data based on the transformation method retrieved in response to the received information locator, and approves, by the first computer system, the transaction associated with the information locator when the third data corresponds to the first data.
    Type: Grant
    Filed: March 24, 2021
    Date of Patent: February 20, 2024
    Inventors: Yuh-Shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Patent number: 11908016
    Abstract: A computer-implemented method monitors a customer to detect money laundering activity at a first computer system by receiving a set of data related to at least a portion of transactional information of the customer, and transforming the set of data into a money laundering risk score of the customer. The method includes selecting a monitoring level to monitor data related to transactions of the customer based on the money laundering risk score. A first monitoring level is selected in response to the money laundering risk score being greater than a threshold. A second monitoring level is selected in response to the money laundering risk score being less than the threshold. The method includes transmitting at least a portion of personal data associated with the customer when the first monitoring level is selected and the first monitoring method detects that the customer matches a condition.
    Type: Grant
    Filed: January 31, 2023
    Date of Patent: February 20, 2024
    Assignee: AI OASIS, INC.
    Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Publication number: 20240031152
    Abstract: A computer system for verifying whether two existing sets of confidential electronic data are identical by transforming the two existing sets of confidential electronic data into two new sets of electronic data that are no longer confidential, and then comparing the two new sets of electronic data. As a result, the confidentiality of the two existing sets of electronic data is maintained.
    Type: Application
    Filed: October 3, 2023
    Publication date: January 25, 2024
    Applicant: AI OASIS, INC.
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Patent number: 11811927
    Abstract: A computer-implemented method for sharing information about a subject without disclosing identification information about the subject includes comparing, by a first computer system, a third set of data with a fourth set of data. The third set of data is converted by a transformation from a first set of identification data of a first subject provided by the first computer system. The fourth set of data is converted by the transformation from a second set of identification data of a second subject provided by a second computer system. The transformation renders the first subject unidentifiable from the third set of data and the second subject unidentifiable from the fourth set of data. The computer-implemented method also includes transmitting, from the first computer system to the second computer, a fifth set of data when the third set of data corresponds to the fourth set of data.
    Type: Grant
    Filed: August 23, 2022
    Date of Patent: November 7, 2023
    Assignee: AI OASIS, INC.
    Inventors: Yuh-shen Song, Catherine Lew, Alexander Song, Victoria Song
  • Publication number: 20230325835
    Abstract: A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.
    Type: Application
    Filed: June 5, 2023
    Publication date: October 12, 2023
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG
  • Publication number: 20230306424
    Abstract: A computerized method electronically verifies identity data of a customer by requesting the customer to provide identity data from a customer identification document during a financial transaction. The method updates an identity profile of the customer by combining the received portion of identity data with different portions of previously received identity data that were previously received from different merchants during different transactions between the customer and the different merchants. The method compares the identity profile to the unverified identity data of the customer when a number of transactions with the account is greater than a first transaction threshold, and approves the financial transaction when the identity profile matches the unverified identity data.
    Type: Application
    Filed: May 26, 2023
    Publication date: September 28, 2023
    Inventors: Yuh-shen SONG, Catherine LEW, Alexander SONG, Victoria SONG