Patents by Inventor Akli Adjaoute

Akli Adjaoute has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150339673
    Abstract: A method for minimizing merchant data breach damage depends on computers and financial networks to carry out its steps. Every payment card transaction witnessed each day by a network server is assessed by a “jury” of fraud classification algorithms and assigned a fraud-risk-verdict. Those payment transactions receiving a high-risk-fraud verdict are retained and sorted into a table according to transaction date, cardholder, and merchant. The raw verdicts are normalized and standardized according to merchant size groups, e.g., to even the comparisons that will be made. A daily tally is made for each merchant of the number of suspected-card-visits, the number of highly-probable-card-visits, and the number of total-card-visits. A merchant data-breach alert is issued if a final score and sum of the normalized verdicts exceeds a threshold.
    Type: Application
    Filed: July 31, 2015
    Publication date: November 26, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20150227935
    Abstract: A financial payment authorization data processing system comprises a payment transaction request fraud scoring data structure that suffers occasionally from falsely scoring a legitimate transaction by a cardholder as fraudulent and would otherwise “decline” the transaction request. A so-called “false positive”. The financial payment authorization data processing system further includes a smart agent data structure to individually follow past transaction data and behaviors, and to provide its artificial intelligence observations on the magnitude, type, and quality of payment card revenues and business routinely engaged in by the cardholder who's transaction request is on the table. The computed level of transaction risk that is acceptable is raised in proportion to the cardholder's business value. As a further expedient, such quality cardholders would never be subject to a “declined transaction” if the requested payment transaction was less than some liberal minimum.
    Type: Application
    Filed: April 18, 2015
    Publication date: August 13, 2015
    Applicant: Brighterion, Inc.
    Inventor: Akli Adjaoute
  • Publication number: 20150221149
    Abstract: A WiFi Wallet includes an app that installs on a smartphone or other mobile device having a wireless local area network connection manager and mobile telephone network access. Local preexisting wireless access points and routers are adjusted to transmit type (R)SSID service set identifiers in their beacons and to invite brand-named guest network logons. The WiFi wallet app is provisioned with a matching password for the (R)SSID that will gain it Internet access. Once on the Internet, the WiFi wallet app logs onto a network server to deposit an encrypted cardholder token. A location identifier for the particular local wireless access points and router naturally tags on. The network server generates an anonymous WiFi Wallet token and sends it to the user over mobile telephone network and the host location over secure Internet. At checkout, lock-open, or secure log-in, the user displays their token to the host location security barrier.
    Type: Application
    Filed: April 10, 2015
    Publication date: August 6, 2015
    Inventors: Richard Brewster Main, Akli Adjaoute
  • Publication number: 20150213276
    Abstract: Independent and addressable smart agent data structures are assignable and discernible in large populations of them. Each provides for the recording and profiling of the corresponding constituent transaction behaviors of identifiable entities decodable in a stream of incoming transaction records. Each smart agent data structure comprises an array of attributes that together render the available details reported in the stream of incoming transaction records.
    Type: Application
    Filed: March 31, 2015
    Publication date: July 30, 2015
    Applicant: Brighterion, Inc.
    Inventor: Akli Adjaoute
  • Publication number: 20150206214
    Abstract: A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device.
    Type: Application
    Filed: March 31, 2015
    Publication date: July 23, 2015
    Applicant: Brighterion, Inc.
    Inventor: Akli Adjaoute
  • Publication number: 20150195300
    Abstract: A network computer system is protected from malicious attacks by its own system administrators by a large number of addressable and assignable smart-agents that are individually allocated to independently follow and represent those system administrators, the jobs those system administrated are assigned to work on, and the system resource tasks that such system administrators can employ in furtherance of the completion of a particular job.
    Type: Application
    Filed: February 28, 2015
    Publication date: July 9, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20150095146
    Abstract: A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device.
    Type: Application
    Filed: April 2, 2014
    Publication date: April 2, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20150081324
    Abstract: Real-time fraud prevention software-as-a-service (SaaS) products include computer instruction sets to enable a network server to receive medical histories, enrollments, diagnosis, prescription, treatment, follow up, billings, and other data as they occur. The SaaS includes software instruction sets to combine, correlate, categorize, track, normalize, and compare the data sorted by patient, healthcare provider, institution, seasonal, and regional norms. Fraud reveals itself in the ways data points deviate from norms in nonsensical or inexplicable conduct. The individual behaviors of each healthcare provider are independently monitored, characterized, and followed by self-spawning smart agents that can adapt and change their rules as the healthcare providers evolve. Such smart agents will issue flags when their particular surveillance target is acting out of character, outside normal parameters for them. Fraud controls can therefore be much tighter than those that have to accommodate those of a diverse group.
    Type: Application
    Filed: August 8, 2014
    Publication date: March 19, 2015
    Applicant: Brighterion, Inc
    Inventor: Akli Adjaoute
  • Publication number: 20150073981
    Abstract: A merchant data breach process comprises processing daily payment transaction data with a risk and compliance platform to obtain a fraud score for each constituent transaction. Constituent transactions with high risk fraud scores are sorted into a table according to the transaction date, cardholder, and merchant. The table data is scored according to suspected card visits, highly probable visits, and all card visits. The scores are normalized according to merchant size grouping through the use of multipliers. The normalized scores are summed together day-by-day into a final score. A timely warning of an underlying and expanding security rupture caused by a merchant data breach is issued for damage control and law enforcement.
    Type: Application
    Filed: October 28, 2014
    Publication date: March 12, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20150066771
    Abstract: An artificial intelligence fraud management system comprises real-time analytics process for analyzing the behavior of a user from the transaction events they generate over a network. An initial population of smart agent profiles is stored in a computer file system and more smart agent profiles are added as required as transaction data is input. Vectors are assigned to point to a run of profile data that all share the same atomic time interval. The vectors are rolled around to point to newer time intervals as they occur, retiring vectors to expired time intervals, and reassigning those vectors to point to the newer atomic time intervals. Vectors correspond to particular smart agent profiles (P) and are collected into lists stored in profile blocks with a meta-data header. Transactions that involve a particular entity are made quickly accessible and retrievable by such vectors.
    Type: Application
    Filed: October 22, 2014
    Publication date: March 5, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20150046224
    Abstract: An artificial intelligence fraud management system comprises a real-time analytics process for analyzing the behavior of a user from the transaction events they generate over a network. An initial population of smart agent profiles is stored in a computer file system and more smart agent profiles are added as required as transaction data is input. Transactions in particular merchant category codes (MCC) are likely to be followed by predictable related transactions. A forecast of those likely future transactions is calculated and used to desensitize corresponding smart agent profile datapoints. Fewer false positives are produced and overall fraud management performance is improved.
    Type: Application
    Filed: October 22, 2014
    Publication date: February 12, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20150046216
    Abstract: A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device.
    Type: Application
    Filed: October 23, 2014
    Publication date: February 12, 2015
    Applicant: Brighterion, Inc.
    Inventor: Akli Adjaoute
  • Publication number: 20150046332
    Abstract: An artificial intelligence fraud management solution comprises a development system to generate a population of virtual smart agents corresponding to every cardholder, merchant, and device ID that hinted at during modeling and training. Each smart agent is nothing more than a pigeonhole and summation of various aspects of every transaction in a real-time profile of less than ninety days and a long-term profile of transactions older than ninety days. Actors and entities are built of no more than the attributes the express in each transaction. In fact, smart agents themselves take no action on their own and are not capable of gesticulations. They are merely attributes, descriptors, what can be seen on the surface.
    Type: Application
    Filed: October 23, 2014
    Publication date: February 12, 2015
    Applicant: Brighterion, Inc.
    Inventor: Akli Adjaoute
  • Publication number: 20150046181
    Abstract: Real-time fraud prevention software-as-a-service (SaaS) products include computer instruction sets to enable a network server to receive medical histories, enrollments, diagnosis, prescription, treatment, follow up, billings, and other data as they occur. The SaaS includes software instruction sets to combine, correlate, categorize, track, normalize, and compare the data sorted by patient, healthcare provider, institution, seasonal, and regional norms. Fraud reveals itself in the ways data points deviate from norms in nonsensical or inexplicable conduct. The individual behaviors of each healthcare provider are independently monitored, characterized, and followed by self-spawning smart agents that can adapt and change their rules as the healthcare providers evolve. Such smart agents will issue flags when their particular surveillance target is acting out of character, outside normal parameters for them. Fraud controls can therefore be much tighter than those that have to accommodate those of a diverse group.
    Type: Application
    Filed: October 19, 2014
    Publication date: February 12, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20150039512
    Abstract: An artificial intelligence cross-channel fraud management system comprises a parallel arrangement of single-channel, fully trained fraud models that each integrate several artificial intelligence classifiers like neural networks, case based reasoning, decision trees, genetic algorithms, fuzzy logic, and rules and constraints. These are further integrated by the expert programmers and development system with smart agents and associated real-time profiling, recursive profiles, and long-term profiles. The trainable general payment fraud models are trained into channel specialists with channel-filtered supervised and unsupervised data to produce each channels payment fraud model. This then is applied by a commercial client to process real-time cross-channel transactions and authorization requests for fraud scores. A detection of fraud in one channel is used to immediately sensitize all the other fraud channel models to the involved accountholder.
    Type: Application
    Filed: October 17, 2014
    Publication date: February 5, 2015
    Applicant: Brighterion, Inc.
    Inventor: Akli Adjaoute
  • Publication number: 20150039513
    Abstract: A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device.
    Type: Application
    Filed: October 19, 2014
    Publication date: February 5, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20150032589
    Abstract: An artificial intelligence fraud management solution comprises an expert programmer development system to build trainable general payment fraud models that integrate several artificial intelligence classifiers like neural networks, case based reasoning, decision trees, genetic algorithms, fuzzy logic, and rules and constraints. These are further integrated by the expert programmers and development system with smart agents and associated real-time profiling, recursive profiles, and long-term profiles. The trainable general payment fraud models are trained with supervised and unsupervised data to produce an applied payment fraud model. This then is applied by a commercial client to process real-time transactions and authorization requests for fraud scores.
    Type: Application
    Filed: October 15, 2014
    Publication date: January 29, 2015
    Applicant: BRIGHTERION, INC.
    Inventor: Akli Adjaoute
  • Publication number: 20140164178
    Abstract: A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device.
    Type: Application
    Filed: February 14, 2014
    Publication date: June 12, 2014
    Inventor: Akli Adjaoute
  • Patent number: 8458069
    Abstract: A fraud detection engine is provided that analyzes transactions for fraudulent transactions. The transactions may include credit card or debit card transactions. The fraud detection engine may identify possible sources of fraud. The fraud detection engine may identify possible phony acceptors that masquerade as genuine merchants. The fraud detection engine may identify compromising points where accounts become compromised and are prone to fraudulent transactions thereafter. The fraud detection engine may receive and analyze transaction data in real-time or in batch mode. The fraud detection engine may use fuzzy logic. The fraud detection engine may use artificial intelligence such as case-based reasoning or business rules.
    Type: Grant
    Filed: March 4, 2011
    Date of Patent: June 4, 2013
    Assignee: Brighterion, Inc.
    Inventor: Akli Adjaoute
  • Publication number: 20120226613
    Abstract: A fraud detection engine is provided that analyzes transactions for fraudulent transactions. The transactions may include credit card or debit card transactions. The fraud detection engine may identify possible sources of fraud. The fraud detection engine may identify possible phony acceptors that masquerade as genuine merchants. The fraud detection engine may identify compromising points where accounts become compromised and are prone to fraudulent transactions thereafter. The fraud detection engine may receive and analyze transaction data in real-time or in batch mode. The fraud detection engine may use fuzzy logic. The fraud detection engine may use artificial intelligence such as case-based reasoning or business rules.
    Type: Application
    Filed: March 4, 2011
    Publication date: September 6, 2012
    Inventor: Akli Adjaoute