Patents by Inventor Zilong Tang
Zilong Tang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240086414Abstract: A method is provided for managing event access policies using a user interface. The method includes defining event access policies to be applied to incoming transactions, where each policy identifies a field identifier. The method further includes applying the event access policies to incoming transactions, resulting in the generation of event access records for each policy determined to apply to the incoming transactions. The event access records include field values captured from the transaction and a corresponding group identifier generated for the transaction. Additionally, event blocks are written to an event graph for the incoming transactions, independent of applying the event access policies. Each event block includes a group identifier, content, and a hash for the transaction. The method enables efficient and flexible management of event access policies that facilitate later transaction querying.Type: ApplicationFiled: June 16, 2023Publication date: March 14, 2024Inventors: Zilong Tang, James F. Chen
-
Patent number: 11822373Abstract: Implementations provide a secure and flexible encoding technique that enables data set owners to share data without losing interoperability or breaking data constraints. A device may receive a request to encode an input that includes a plurality of data portions. A device may identify protected data types within the data portions, transform raw text corresponding to a protected data type based on a seed and a base set to encoded text, and include the encoded text in an output. The seed and/or base set can be selected by a requestor. The output configuration can be defined as different from the configuration of the input. The encoded text retains a format of the raw text so the encoded text does not violate existing data constraints. The device may also ensure a minimum level of fidelity in the encoded text.Type: GrantFiled: June 8, 2023Date of Patent: November 21, 2023Assignee: HiFiData LLCInventors: Zilong Tang, Albert Tang
-
Publication number: 20230315894Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: ApplicationFiled: December 23, 2022Publication date: October 5, 2023Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Publication number: 20230246843Abstract: Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.Type: ApplicationFiled: March 31, 2023Publication date: August 3, 2023Inventor: Zilong Tang
-
Patent number: 11681719Abstract: Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.Type: GrantFiled: May 13, 2021Date of Patent: June 20, 2023Assignee: DrFirst.com, Inc.Inventors: Zilong Tang, James F. Chen
-
Patent number: 11621851Abstract: Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.Type: GrantFiled: September 20, 2021Date of Patent: April 4, 2023Assignee: DrFirst.com, Inc.Inventor: Zilong Tang
-
Patent number: 11537738Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: GrantFiled: August 28, 2020Date of Patent: December 27, 2022Assignee: DrFirst.com, Inc.Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Patent number: 11336633Abstract: Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.Type: GrantFiled: June 1, 2020Date of Patent: May 17, 2022Assignee: DrFirst.com, Inc.Inventor: Zilong Tang
-
Publication number: 20220006638Abstract: Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.Type: ApplicationFiled: September 20, 2021Publication date: January 6, 2022Inventor: Zilong Tang
-
Patent number: 11128469Abstract: Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.Type: GrantFiled: March 5, 2021Date of Patent: September 21, 2021Assignee: DrFirst.com, Inc.Inventor: Zilong Tang
-
Publication number: 20210288812Abstract: Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.Type: ApplicationFiled: March 5, 2021Publication date: September 16, 2021Inventor: Zilong Tang
-
Publication number: 20210263927Abstract: Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.Type: ApplicationFiled: May 13, 2021Publication date: August 26, 2021Inventors: Zilong Tang, James F. Chen
-
Patent number: 11010394Abstract: Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.Type: GrantFiled: February 15, 2019Date of Patent: May 18, 2021Assignee: DrFirst.com, Inc.Inventors: Zilong Tang, James F. Chen
-
Patent number: 10979230Abstract: Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise.Type: GrantFiled: November 30, 2020Date of Patent: April 13, 2021Assignee: DrFirst.com, Inc.Inventor: Zilong Tang
-
Publication number: 20210049295Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: ApplicationFiled: August 28, 2020Publication date: February 18, 2021Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Publication number: 20200366666Abstract: Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.Type: ApplicationFiled: June 1, 2020Publication date: November 19, 2020Inventor: Zilong Tang
-
Publication number: 20200356659Abstract: The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.Type: ApplicationFiled: July 30, 2020Publication date: November 12, 2020Inventors: James F. Chen, Chen Qian, Zilong Tang, Eric Rosenfeld
-
Patent number: 10783237Abstract: The present teaching relates to generating an identifier for a person. In one example, an actual name of the person is received. The identity of the person that is associated with the actual name of the person is proved at a pre-determined level of assurance (LOA) required by an identity management system. When the identity of the person has been proved, a peripheral name is solicited from the person. An identifier that includes the actual name and the peripheral name of the person is created. Whether the identifier is unique is determined. The steps of soliciting, creating, and determining are repeated until the identifier is unique. The peripheral name is associated with the person. The identifier is associated with the person.Type: GrantFiled: December 21, 2018Date of Patent: September 22, 2020Assignee: DRFIRST.COM, INC.Inventors: James F. Chen, Chen Qian, Zilong Tang, Eric Rosenfeld
-
Patent number: 10762232Abstract: Implementations provide self-consistent, temporary, secure storage of information. An example system includes short-term memory storing a plurality of key records and a cache storing a plurality of data records. The key records and data records are locatable using participant identifiers. Each key record includes a nonce and each data record includes an encrypted portion. The key records are deleted periodically. The system also includes memory storing instructions that cause the system to receive query parameters that include first participant identifiers and to obtain a first nonce. The first nonce is associated with the first participant identifiers in the short-term memory. The instructions also cause the system to obtain data records associated with the first participant identifiers in the cache, to build an encryption key using the nonce and the first participant identifiers, and to decrypt the encrypted portion of the obtained data records using the encryption key.Type: GrantFiled: December 13, 2018Date of Patent: September 1, 2020Assignee: DrFirst.com, Inc.Inventors: Zilong Tang, James F. Chen, Chen Qian
-
Publication number: 20200265046Abstract: Implementations provide a flexible schema for efficiently querying chainable event blocks on user-identified data fields. An example method includes receiving at least one query parameter and, responsive to receiving the at least one query parameter, identifying an event access data record that includes a group identifier and a field matching the query parameter. The method also includes locating potential responsive blocks, the potential responsive blocks being event blocks in a chain that include the group identifier, and each of the potential responsive blocks also including content and a hash of a predecessor block. The method also includes identifying a first block of the potential responsive blocks that has content that includes the field matching the query parameter, and providing the first block as a response to the query.Type: ApplicationFiled: February 15, 2019Publication date: August 20, 2020Inventors: Zilong Tang, James F. Chen