BackgroundCheck.run
Search For

Michael H Lo, 63Tucson, AZ

Michael Lo Phones & Addresses

Tucson, AZ   

Laguna Woods, CA   

Long Beach, CA   

Hawthorne, CA   

Manchester, IA   

San Gabriel, CA   

7782 E Castle Valley Way, Tucson, AZ 85750   

Work

Company: Gcl solar energy, inc. (investment Apr 2010 Position: Associate

Education

School / High School: UCLA ANDERSON SCHOOL OF MANAGEMENT- Los Angeles, CA Jun 2009 Specialities: M.B.A. in Strategy and Finance

Ranks

Licence: California - Active Date: 1981

Mentions for Michael H Lo

Career records & work history

Lawyers & Attorneys

Michael Lo Photo 1

Michael Yin-Yam Lo, Alhambra CA - Lawyer

Address:
Law Offices Of Michael Y. Lo
506 North Garfield Avenue Suite 280, Alhambra, CA 91801
Licenses:
California - Active 1981
Specialties:
Corporate / Incorporation - 25%
Commercial - 25%
Bankruptcy / Debt - 25%
Immigration - 25%

License Records

Michael R Lo Biondo

Licenses:
License #: 1683 - Expired
Category: Nursing Home Administrator
Issued Date: Jan 1, 1972

Michael Lo resumes & CV records

Resumes

Michael Lo Photo 46

Michael Lo

Work:
GCL SOLAR ENERGY, INC. (Investment Apr 2010 to Present
Associate
CIRRUS ASSET MANAGEMENT, INC - Calabasas, CA Mar 2009 to Oct 2009
Associate
ARC INVESTMENT PARTNERS LLC (Investment - Beverly Hills, CA Jun 2008 to Sep 2008
Summer Associate
SINOTRUST INVESTMENT TRUST CO Oct 2005 to Feb 2007
Research Associate
T. ROWE PRICE - Baltimore, MD Jun 2003 to Sep 2005
Business Analyst
Education:
UCLA ANDERSON SCHOOL OF MANAGEMENT - Los Angeles, CA Jun 2009
M.B.A. in Strategy and Finance
UNIVERSITY OF MARYLAND BALTIMORE COUNTY - Baltimore, MD May 2004
B.S. in Management Information Systems

Publications & IP owners

Us Patents

Online Predictive Memory

US Patent:
6078918, Jun 20, 2000
Filed:
Apr 2, 1998
Appl. No.:
9/054178
Inventors:
Bradley P. Allen - Manhattan Beach CA
Jeffrey M. Greif - Venice CA
David L. Adam - San Francisco CA
John B. Jensen - Hermosa Beach CA
Michael W. Lo - Marina Del Rey CA
Cormac Twomey - Marina Del Rey CA
Assignee:
Trivada Corporation - Culver City CA
International Classification:
G06F 1700
US Classification:
707 6
Abstract:
One embodiment of the present invention provides a system for making predictions about data records from an incoming stream of data records. This system operates by discovering predictive relationships in an online manner between fields in records in the incoming stream of data records as the incoming stream of data records is received. These predictive relationships can used to predict values in fields based on other field values in the same record. This facilitates cleansing of data by allowing transaction values to be validated based upon predictions made from other field values in the same transaction record. It also allows missing field values to be predicted based upon the other field values. A variation of this embodiment provides for filtering transaction records based upon discovered predictive relationships and routing the transaction records to other servers in real-time. Another embodiment forms association rules between fields in records in the incoming stream of records, and outputs these association rules for viewing by a human decision-maker.

Systems And Methods For Identifying Data Breaches

US Patent:
2019037, Dec 12, 2019
Filed:
Jun 9, 2018
Appl. No.:
16/004357
Inventors:
- Mountain View CA, US
Michael Lo - Culver City CA, US
Srini Chillappa - Culver City CA, US
Simon Tiku - Culver City CA, US
Viral Mehta - Culver City CA, US
John Meehan - Culver City CA, US
International Classification:
H04L 29/06
G06F 21/62
Abstract:
The disclosed computer-implemented method for detecting unauthorized data shares may include (1) providing a user of an anonymized inbox with an email alias to use for a particular online entity, (2) identifying one or more emails sent to the email alias from one or more different entities that are different from the particular online entity, (3) determining, based on the one or more emails having been sent by the different entities, that the particular online entity has shared the user's email alias with other entities, and (4) creating a privacy score for the particular online entity based at least in part on the determination that the particular online entity has shared the user's email alias with other entities. Various other methods, systems, and computer-readable media are also disclosed.

Systems And Methods For Anonymizing User Accounts

US Patent:
2019018, Jun 13, 2019
Filed:
Dec 8, 2017
Appl. No.:
15/836505
Inventors:
- Mountain View CA, US
Michael Lo - Culver City CA, US
John Meehan - Culver City CA, US
Srinivas Chillappa - Mountain View CA, US
Simon Tiku - Culver City CA, US
Viral Mehta - Culver City CA, US
International Classification:
G06F 21/62
H04L 29/06
H04L 9/32
Abstract:
The disclosed computer-implemented method for anonymizing user accounts may include (i) receiving an instruction to anonymize a user account to protect a user's personally identifiable information, (ii) accessing, by a security program, a settings portal for the user account in response to receiving the instruction to anonymize the user account, (iii) replacing, by the security program, original values within at least two fields within the settings portal for the user account with anonymized values to mask the user's personally identifiable information, and (iv) storing the anonymized values within a protected vault to enable the user to login to the user account. Various other methods, systems, and computer-readable media are also disclosed.

Device-Based Pin Authentication Process To Protect Encrypted Data

US Patent:
2015017, Jun 25, 2015
Filed:
Dec 23, 2013
Appl. No.:
14/139204
Inventors:
- Mountain View CA, US
Brian POWELL - El Segundo CA, US
Srinivas CHILLAPPA - Culver City CA, US
Michael W. LO - Rowland Heights CA, US
Mahesh KAMSALA - Sherman Oaks CA, US
Assignee:
SYMANTEC CORPORATION - Mountain View CA
International Classification:
G06F 21/62
H04L 29/06
Abstract:
Techniques are disclosed for providing a device-based PIN authentication process used to protect encrypted data stored on a computing system, such as a tablet or mobile device. A client component and a server component each store distinct cryptographic keys needed to access encrypted data on the client. The mobile device stores a vault encryption key used to decrypt encrypted sensitive data stored on the mobile device. The vault key is encrypted using a first encryption key and stored on the mobile device. The first encryption key is itself encrypted using a second encryption key. The second encryption key is derived from the PIN value.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.