Patents by Inventor Perry McGee
Perry McGee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11907350Abstract: User identification with blended response from dual-layer identification service. In one embodiment, a server comprising an electronic processor configured to detect an access request by a user of a user interface device, retrieve a plurality of input profile records from an input profile record repository, perform an identification of the user with one or more passive biometrics models and the plurality of input profile records that are retrieved, generate an identification response and an additional identification request based on an outcome of the identification of the user, control the communication interface to transmit the additional identification request to the second server via the network, receive a second identification response from the second server, and generate a blended response by modifying one or more characteristics of the identification response with the second identification response, the blended response indicating the identification of the user.Type: GrantFiled: September 30, 2021Date of Patent: February 20, 2024Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Sik Suen Chan, Anton Laptiev, Perry McGee, Carrie Ka Lai Cheung, Parin Prashant Shah, Hanhan Wu, Cristian Frentiu
-
Patent number: 11645389Abstract: Systems, methods, devices, and computer readable media related to fraud detection. Fraud detection is achieved using a flexible scripting language and syntax that simplifies the generation of fraud detection rules. The rules are structured as conditional IF-THEN statements that include data objects referred to as Anchors and Add-Ons. The Anchors and Add-Ons used to generate the rules also correspond to a distinct data path for the retrieval data from any of a variety of data sources. The retrieval of data from the various data sources is optimized based on data dependencies within the rules. By knowing the data dependencies of each rule and utilizing parallelization of rule execution, the retrievals of data from the data sources is achieved efficiently so the rules can be executed quickly.Type: GrantFiled: September 11, 2019Date of Patent: May 9, 2023Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Yi Wei Tseng, Randy Lukashuk, Perry McGee, Amiran Gigiberia, Andrew Giblin, Kenny Wan, Andrian Sevastyanov
-
Patent number: 11531754Abstract: Systems, methods, devices, and computer readable media related to fraud detection. Fraud detection is achieved using a flexible scripting language and syntax that simplifies the generation of fraud detection rules. The rules are structured as conditional IF-THEN statements that include data objects referred to as Anchors and Add-Ons. The Anchors and Add-Ons used to generate the rules also correspond to a distinct data path for the retrieval data from any of a variety of data sources. The generated rules with distinct data paths are then converted using a transpiler from the scripting language into native language source code (e.g., PHP, Java, etc.) for deployment in a particular environment. The rules are then executed in real-time in the environment to detect potential fraudulent activity.Type: GrantFiled: September 11, 2019Date of Patent: December 20, 2022Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Yi Wei Tseng, Randy Lukashuk, Perry McGee, Amiran Gigiberia, Andrew Giblin, Kenny Wan, Andrian Sevastyanov
-
Publication number: 20220391908Abstract: Systems, methods, and non-transitory computer-readable media for authentication and authorizing a payment request. In one embodiment, the system includes a server including a first memory and a first electronic processor communicatively connected to the first memory. The first electronic processor is configured to receive the payment request, three-domain secure (3DS) data, and fast ID online (FIDO) data, output an authentication request that includes a portion of the 3DS data and a portion of the FIDO data, receive an authentication response based on the 3DS data and the FIDO data, the authentication response including one or more authentications, output the payment request based on the authentication response, and receive an authorization or a denial of the payment request.Type: ApplicationFiled: June 6, 2022Publication date: December 8, 2022Inventors: Igor Opushnyev, Mansur Mirani, Perry McGee, Ranjita Shankar Iyer, Ryan B.J. Crowe
-
Publication number: 20220191234Abstract: Enterprise cybersecurity systems and methods related to receiving or accessing a real-time cybersecurity request, automatically transmitting a live mode request to a first cybersecurity microservice to generate cybersecurity risk-scoring information, receiving a response to the live mode request, calculating a cybersecurity score, automatically populating cybersecurity response data based on the calculated cybersecurity score, and automatically transmitting the cybersecurity response data to the enterprise client electronic device. The enterprise cybersecurity system and method also includes, after the cybersecurity response data has been transmitted to the enterprise client electronic device, automatically transmitting a test mode request to at least one test mode cybersecurity microservice, wherein the test mode request includes real-time data extracted from the real-time cybersecurity request.Type: ApplicationFiled: December 14, 2021Publication date: June 16, 2022Inventors: Justin Fox, Sunita Khera, Lian Jiang Fu, Perry McGee, Igor Opushnyev
-
Publication number: 20220103548Abstract: User identification with an input profile record (IPR). In one embodiment, a server includes a memory and an electronic processor. The electronic processor is configured to receive a plurality of input profile records (IPRs) associated with a first user, the plurality of IPRs each based on a plurality of user inputs and indicative of identity of the first user, control the memory to store the plurality of IPRs in the input profile record repository, receive a current IPR associated with a second user, determine whether the second user is the first user by comparing a first one or more biometric features based on the plurality of IPRs and a second one or more biometric features based on the current IPR, and responsive to determining that the second user is the first user, output an identity confirmation that the second user is the first user.Type: ApplicationFiled: September 30, 2021Publication date: March 31, 2022Inventors: Perry McGee, Sik Suen Chan, Anton Laptiev, Cristian Frentiu
-
Publication number: 20220100834Abstract: User identification with blended response from dual-layer identification service. In one embodiment, a server comprising an electronic processor configured to detect an access request by a user of a user interface device, retrieve a plurality of input profile records from an input profile record repository, perform an identification of the user with one or more passive biometrics models and the plurality of input profile records that are retrieved, generate an identification response and an additional identification request based on an outcome of the identification of the user, control the communication interface to transmit the additional identification request to the second server via the network, receive a second identification response from the second server, and generate a blended response by modifying one or more characteristics of the identification response with the second identification response, the blended response indicating the identification of the user.Type: ApplicationFiled: September 30, 2021Publication date: March 31, 2022Inventors: Sik Suen Chan, Anton Laptiev, Perry McGee, Carrie Ka Lai Cheung, Parin Prashant Shah, Hanhan Wu, Cristian Frentiu
-
Publication number: 20220076263Abstract: Systems, methods, and non-transitory computer readable media for generating a configurable data container that includes a first data field, exporting the configurable data container for use by a client-side device, receiving a modification to the configurable data container, automatically binding the second data field to a second data path for retrieval of a second data value to be used in a second fraud detection rule, generating an updated configurable data container, and exporting the updated configurable data container for use by the client-side device. The first data field corresponds to a first data path for retrieval of a first data value to be used in a first fraud detection rule. The configurable data container includes a server-side schema and a client-side schema. Each of the server-side schema and the client-side schema is configured to validate a first input data value corresponding to the first data field.Type: ApplicationFiled: September 10, 2020Publication date: March 10, 2022Inventors: Andrian Sevastyanov, Yi Wei Tseng, Perry McGee, Sunita Khera
-
Publication number: 20200082413Abstract: Systems, methods, devices, and computer readable media related to fraud detection. Fraud detection is achieved using a flexible scripting language and syntax that simplifies the generation of fraud detection rules. The rules are structured as conditional IF-THEN statements that include data objects referred to as Anchors and Add-Ons. The Anchors and Add-Ons used to generate the rules also correspond to a distinct data path for the retrieval data from any of a variety of data sources. The retrieval of data from the various data sources is optimized based on data dependencies within the rules. By knowing the data dependencies of each rule and utilizing parallelization of rule execution, the retrievals of data from the data sources is achieved efficiently so the rules can be executed quickly.Type: ApplicationFiled: September 11, 2019Publication date: March 12, 2020Inventors: Yi Wei Tseng, Randy Lukashuk, Perry McGee, Amiran Gigiberia, Andrew Giblin, Kenny Wan, Andrian Sevastyanov
-
Publication number: 20200082079Abstract: Systems, methods, devices, and computer readable media related to fraud detection. Fraud detection is achieved using a flexible scripting language and syntax that simplifies the generation of fraud detection rules. The rules are structured as conditional IF-THEN statements that include data objects referred to as Anchors and Add-Ons. The Anchors and Add-Ons used to generate the rules also correspond to a distinct data path for the retrieval data from any of a variety of data sources. The generated rules with distinct data paths are then converted using a transpiler from the scripting language into native language source code (e.g., PHP, Java, etc.) for deployment in a particular environment. The rules are then executed in real-time in the environment to detect potential fraudulent activity.Type: ApplicationFiled: September 11, 2019Publication date: March 12, 2020Inventors: Yi Wei Tseng, Randy Lukashuk, Perry McGee, Amiran Gigiberia, Andrew Giblin, Kenny Wan, Andrian Sevastyanov