Patents by Inventor Noel Brandt
Noel Brandt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12081588Abstract: Techniques and systems for detecting malicious activity within a network are provided herein. A method for detecting malicious activity within a network may include receiving, by a network-based authentication system, a network transaction. The network-based authentication system may identify a first attribute of the network transaction. The method may also include selecting, by the network-based authentication system, a first learning statistical model and a second learning statistical model from a plurality of models for handling the network transaction. Each of the first learning statistical model and the second learning statistical model may create a likelihood that the network transaction is authentic. The first learning statistical model may calculate a first score and the second learning statistical score may calculate a second score. Based on a comparison of the first score to a first threshold and the second score to a second threshold, the network transaction may be authenticated.Type: GrantFiled: January 13, 2023Date of Patent: September 3, 2024Assignee: The Western Union CompanyInventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
-
Publication number: 20230156036Abstract: Techniques and systems for detecting malicious activity within a network are provided herein. A method for detecting malicious activity within a network may include receiving, by a network-based authentication system, a network transaction. The network-based authentication system may identify a first attribute of the network transaction. The method may also include selecting, by the network-based authentication system, a first learning statistical model and a second learning statistical model from a plurality of models for handling the network transaction. Each of the first learning statistical model and the second learning statistical model may create a likelihood that the network transaction is authentic. The first learning statistical model may calculate a first score and the second learning statistical score may calculate a second score. Based on a comparison of the first score to a first threshold and the second score to a second threshold, the network transaction may be authenticated.Type: ApplicationFiled: January 13, 2023Publication date: May 18, 2023Applicant: The Western Union CompanyInventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
-
Publication number: 20230071195Abstract: Techniques and systems for determining a malicious derivative entity within a network are provided herein. A method for determining a malicious derivative entity may include receiving, by a network-based authentication system, a plurality of network transactions. A first attribute of a network transaction within the plurality of network transactions may be identified. The method may also include identifying a plurality of entities for the first attribute. The network-based authentication system may generate a first visual representation of a relationship between the first attribute and the plurality of derivative entities. Each of the derivative entities and the first attribute may be represented as nodes within the first visual representation. A first score for each of the nodes may be determined based on a degree of centrality of the nodes within the first visual representation. One network transaction may be blocked based on at least one node exceeding a first threshold.Type: ApplicationFiled: November 17, 2022Publication date: March 9, 2023Applicant: The Western Union CompanyInventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
-
Patent number: 11558420Abstract: Techniques and systems for detecting malicious activity within a network are provided herein. A method for detecting malicious activity within a network may include receiving, by a network-based authentication system, a network transaction. The network-based authentication system may identify a first attribute of the network transaction. The method may also include selecting, by the network-based authentication system, a first learning statistical model and a second learning statistical model from a plurality of models for handling the network transaction. Each of the first learning statistical model and the second learning statistical model may create a likelihood that the network transaction is authentic. The first learning statistical model may calculate a first score and the second learning statistical score may calculate a second score. Based on a comparison of the first score to a first threshold and the second score to a second threshold, the network transaction may be authenticated.Type: GrantFiled: July 14, 2020Date of Patent: January 17, 2023Assignee: The Western Union CompanyInventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
-
Publication number: 20220383336Abstract: Systems and methods for identifying and mitigating non-compliances include determining an agent location of a money service business for review, obtaining a photograph and geographic coordinates of the agent location, and collecting field data at the agent location through a mobile application. Such information are sent from the mobile application to a central server of a third party vendor for a series of quality checks and stored at the central server. Such information may be used for further corrective action against the agent location reviewed.Type: ApplicationFiled: August 11, 2022Publication date: December 1, 2022Applicant: The Western Union CompanyInventors: Manju Rai, Murali Ravichandran, Jacqueline Molnar, Noel Brandt, Niren Kinikar
-
Patent number: 11509687Abstract: Techniques and systems for determining a malicious derivative entity within a network are provided herein. A method for determining a malicious derivative entity may include receiving, by a network-based authentication system, a plurality of network transactions. A first attribute of a network transaction within the plurality of network transactions may be identified. The method may also include identifying a plurality of entities for the first attribute. The network-based authentication system may generate a first visual representation of a relationship between the first attribute and the plurality of derivative entities. Each of the derivative entities and the first attribute may be represented as nodes within the first visual representation. A first score for each of the nodes may be determined based on a degree of centrality of the nodes within the first visual representation. One network transaction may be blocked based on at least one node exceeding a first threshold.Type: GrantFiled: July 14, 2020Date of Patent: November 22, 2022Assignee: The Western Union CompanyInventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
-
Patent number: 11423415Abstract: Systems and methods for identifying and mitigating non-compliances include determining an agent location of a money service business for review, obtaining a photograph and geographic coordinates of the agent location, and collecting field data at the agent location through a mobile application. Such information are sent from the mobile application to a central server of a third party vendor for a series of quality checks and stored at the central server. Such information may be used for further corrective action against the agent location reviewed.Type: GrantFiled: January 29, 2021Date of Patent: August 23, 2022Assignee: The Western Union CompanyInventors: Manju Rai, Murali Ravichandran, Jacqueline Molnar, Noel Brandt, Niren Kinikar
-
Publication number: 20210150540Abstract: Systems and methods for identifying and mitigating non-compliances include determining an agent location of a money service business for review, obtaining a photograph and geographic coordinates of the agent location, and collecting field data at the agent location through a mobile application. Such information are sent from the mobile application to a central server of a third party vendor for a series of quality checks and stored at the central server. Such information may be used for further corrective action against the agent location reviewed.Type: ApplicationFiled: January 29, 2021Publication date: May 20, 2021Applicant: The Western Union CompanyInventors: Manju Rai, Murali Ravichandran, Jacqueline Molnar, Noel Brandt, Niren Kinikar
-
Publication number: 20210067548Abstract: Techniques and systems for detecting malicious activity within a network are provided herein. A method for detecting malicious activity within a network may include receiving, by a network-based authentication system, a network transaction. The network-based authentication system may identify a first attribute of the network transaction. The method may also include selecting, by the network-based authentication system, a first learning statistical model and a second learning statistical model from a plurality of models for handling the network transaction. Each of the first learning statistical model and the second learning statistical model may create a likelihood that the network transaction is authentic. The first learning statistical model may calculate a first score and the second learning statistical score may calculate a second score. Based on a comparison of the first score to a first threshold and the second score to a second threshold, the network transaction may be authenticated.Type: ApplicationFiled: July 14, 2020Publication date: March 4, 2021Applicant: The Western Union CompanyInventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
-
Publication number: 20210067524Abstract: Techniques and systems for determining a malicious derivative entity within a network are provided herein. A method for determining a malicious derivative entity may include receiving, by a network-based authentication system, a plurality of network transactions. A first attribute of a network transaction within the plurality of network transactions may be identified. The method may also include identifying a plurality of entities for the first attribute. The network-based authentication system may generate a first visual representation of a relationship between the first attribute and the plurality of derivative entities. Each of the derivative entities and the first attribute may be represented as nodes within the first visual representation. A first score for each of the nodes may be determined based on a degree of centrality of the nodes within the first visual representation. One network transaction may be blocked based on at least one node exceeding a first threshold.Type: ApplicationFiled: July 14, 2020Publication date: March 4, 2021Applicant: The Western Union CompanyInventors: Noel Brandt, Robert Enzaldo, Charles Champion, Brent Lemieux
-
Patent number: 10929854Abstract: Systems and methods for identifying and mitigating non-compliances include determining an agent location of a money service business for review, obtaining a photograph and geographic coordinates of the agent location, and collecting field data at the agent location through a mobile application. Such information are sent from the mobile application to a central server of a third party vendor for a series of quality checks and stored at the central server. Such information may be used for further corrective action against the agent location reviewed.Type: GrantFiled: December 9, 2015Date of Patent: February 23, 2021Assignee: The Western Union CompanyInventors: Manju Rai, Murali Ravichandran, Jacqueline Molnar, Noel Brandt, Niren Kinikar
-
Patent number: 10565592Abstract: A money transfer system includes a risk assessment system and a risk modeling system. The risk assessment system uses rules engines and Z scores to assess, on a real time basis, risk factors associated with money transfers. The risk modeling system develops risk scores based on historical transaction data in order to create a risk model. The risk model may be analyzed over time to refine the rules engines and take other actions to understand and reduce the risk of improper activity in connection with money transfers.Type: GrantFiled: July 29, 2013Date of Patent: February 18, 2020Assignee: The Western Union CompanyInventors: Robert Enzaldo, Alec Hall, Alexander Varaken, Bryant Gofstein, Hiran Modi, Hollis Baugh, Niren Kinikar, Noel Brandt, Viren Patel
-
Publication number: 20170098221Abstract: Systems and methods for identifying and mitigating non-compliances include determining an agent location of a money service business for review, obtaining a photograph and geographic coordinates of the agent location, and collecting field data at the agent location through a mobile application. Such information are sent from the mobile application to a central server of a third party vendor for a series of quality checks and stored at the central server. Such information may be used for further corrective action against the agent location reviewed.Type: ApplicationFiled: December 9, 2015Publication date: April 6, 2017Applicant: The Western Union CompanyInventors: Manju Rai, Murali Ravichandran, Jacqueline Molnar, Noel Brandt, Niren Kinikar
-
Publication number: 20130346287Abstract: A money transfer system includes a risk assessment system and a risk modeling system. The risk assessment system uses rules engines and Z scores to assess, on a real time basis, risk factors associated with money transfers. The risk modeling system develops risk scores based on historical transaction data in order to create a risk model. The risk model may be analyzed over time to refine the rules engines and take other actions to understand and reduce the risk of improper activity in connection with money transfers.Type: ApplicationFiled: July 29, 2013Publication date: December 26, 2013Applicant: The Western Union CompanyInventors: Robert Enzaldo, Alec Hall, Alexander Varaken, Bryant Gofstein, Hiran Modi, Hollis Baugh, Niren Kinikar, Noel Brandt, Viren Patel
-
Patent number: 8527418Abstract: A money transfer system includes a risk assessment system and a risk modeling system. The risk assessment system uses rules engines and Z scores to assess, on a real time basis, risk factors associated with money transfers. The risk modeling system develops risk scores based on historical transaction data in order to create a risk model. The risk model may be analyzed over time to refine the rules engines and take other actions to understand and reduce the risk of improper activity in connection with money transfers.Type: GrantFiled: December 27, 2011Date of Patent: September 3, 2013Assignee: The Western Union CompanyInventors: Robert Enzaldo, Richard Alec Hall, Alexander Varakin, Bryant Gofstein, Hiran Modi, Hollis Baugh, Niren Kinkar, Noel Brandt, Viren Patel
-
Publication number: 20130132275Abstract: A money transfer system includes a risk assessment system and a risk modeling system. The risk assessment system uses rules engines and Z scores to assess, on a real time basis, risk factors associated with money transfers. The risk modeling system develops risk scores based on historical transaction data in order to create a risk model. The risk model may be analyzed over time to refine the rules engines and take other actions to understand and reduce the risk of improper activity in connection with money transfers.Type: ApplicationFiled: December 27, 2011Publication date: May 23, 2013Applicant: The Western Union CompanyInventors: Robert Enzaldo, Richard Alec Hall, Alexander Varakin, Bryant Gofstein, Hiran Modi, Hollis Baugh, Niren Kinkar, Noel Brandt, Viren Patel
-
Publication number: 20070073617Abstract: A system and method for evaluating records of money transfers for suspicious or irregular transaction patterns. A fraud processing server evaluates money transfer records by blocks, each block consisting of records having the same characteristic relating to location, such as the country where the transfer originates. A second characteristic of the records, such as value, sending agent, or time-of-day, is aggregated and compared to a threshold value. If the threshold value is met, the block of records is analyzed to identify individual records that are suspicious or irregular.Type: ApplicationFiled: September 26, 2006Publication date: March 29, 2007Applicant: First Data CorporationInventors: Seth Tolbert, Noel Brandt, Robert Bulkley, Robert Degen