Patents by Inventor Terrill J. Curtis
Terrill J. Curtis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10509890Abstract: A device for using rules in the processing of information includes a first interface that allows for secure communications, a first database, a second database, a second interface that allows for secure communications, and a detection component implemented at least partially in hardware, the first interface connecting to the first database, the first database connecting to the detection component, the second database connecting to the detection component, the second interface connecting to the detection component, the second database including a plurality of rule libraries, each rule library, of the plurality of rule libraries, storing a set of related rules, and a plurality of rule engines, each rule engine, of the plurality of rule engines, corresponding to a rule library, of the plurality of libraries, and the detection component including a rule selector, and a rule applicator to apply a selected rule to information.Type: GrantFiled: September 14, 2015Date of Patent: December 17, 2019Assignee: Verizon Patent and Licensing Inc.Inventors: John H. Van Arkel, James J. Wagner, Corrine L. Schweyen, Saralyn M. Mahone, David D. Tada, Terrill J. Curtis, Scott Hagins
-
Patent number: 10467379Abstract: A device may identify information associated with other devices, generate a first value for one or more indicators associated with the information, process, based on providing the information to a rules engine corresponding to a library of rules including the rule and receiving, from the rules engine and based on providing the information to the rules engine, information associated with a second value the information using a rule to generate the second value based on combining the first value with one or more third values, and output information regarding the second value to determine how to process the information.Type: GrantFiled: August 31, 2015Date of Patent: November 5, 2019Assignee: Verizon Patent and Licensing Inc.Inventors: John H. Van Arkel, James J. Wagner, Corrine L. Schweyen, Saralyn M. Mahone, David D. Tada, Terrill J. Curtis, Scott Hagins
-
Patent number: 10372878Abstract: A system for providing secure communications may include a management system to receive first information, the first information being received via a first secure connection, analyze the received information to form analyzed information, and provide the analyzed information, a processor device to receive the analyzed information, the analyzed information being received via a second secure connection between the processor device and the management system, and perform an action based on the analyzed information, and a clearinghouse device to receive second information, the second information being received via a third secure connection between the clearinghouse device and each provider device of a plurality of provider devices, process the second information to form the first information, and provide the first information to the management system via the first secure connection.Type: GrantFiled: August 27, 2015Date of Patent: August 6, 2019Assignee: Verizon Patent and Licensing Inc.Inventors: John H. Van Arkel, James J. Wagner, Corrine L. Schweyen, Saralyn M. Mahone, David D. Tada, Terrill J. Curtis, Scott Hagins
-
Patent number: 9390418Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: GrantFiled: August 18, 2008Date of Patent: July 12, 2016Assignee: Verizon Patent and Licensing Inc.Inventors: John Gavan, Kevin Paul, Jim Richards, Charles A Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn Mahone, Terrill J Curtis, James J Wagner
-
Publication number: 20160004826Abstract: A device for using rules in the processing of information includes a first interface that allows for secure communications, a first database, a second database, a second interface that allows for secure communications, and a detection component implemented at least partially in hardware, the first interface connecting to the first database, the first database connecting to the detection component, the second database connecting to the detection component, the second interface connecting to the detection component, the second database including a plurality of rule libraries, each rule library, of the plurality of rule libraries, storing a set of related rules, and a plurality of rule engines, each rule engine, of the plurality of rule engines, corresponding to a rule library, of the plurality of libraries, and the detection component including a rule selector, and a rule applicator to apply a selected rule to information.Type: ApplicationFiled: September 14, 2015Publication date: January 7, 2016Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20150370978Abstract: A device may identify information associated with other devices, generate a first value for one or more indicators associated with the information, process, based on providing the information to a rules engine corresponding to a library of rules including the rule and receiving, from the rules engine and based on providing the information to the rules engine, information associated with a second value the information using a rule to generate the second value based on combining the first value with one or more third values, and output information regarding the second value to determine how to process the information.Type: ApplicationFiled: August 31, 2015Publication date: December 24, 2015Inventors: John H. Van Arkel, James J. Wagner, Corrine L. Schweyen, Saralyn M. Mahone, David D. Tada, Terrill J. Curtis, Scott Hagins
-
Publication number: 20150363557Abstract: A system for providing secure communications may include a management system to receive first information, the first information being received via a first secure connection, analyze the received information to form analyzed information, and provide the analyzed information, a processor device to receive the analyzed information, the analyzed information being received via a second secure connection between the processor device and the management system, and perform an action based on the analyzed information, and a clearinghouse device to receive second information, the second information being received via a third secure connection between the clearinghouse device and each provider device of a plurality of provider devices, process the second information to form the first information, and provide the first information to the management system via the first secure connection.Type: ApplicationFiled: August 27, 2015Publication date: December 17, 2015Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20130006657Abstract: A healthcare fraud management system receives healthcare claims information associated with a particular entity, and receives historical healthcare information associated with the particular entity. The healthcare fraud management system also performs data mining techniques on the historical healthcare information to produce data mining information associated with the particular entity. The healthcare fraud management system generates reports, associated with the particular entity, based on the healthcare claims information, the historical healthcare information, and the data mining information, and outputs the generated reports to a clearinghouse or a claims processor.Type: ApplicationFiled: June 28, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20130006655Abstract: A healthcare fraud management system is configured to store multiple rules for detecting healthcare fraud, receive a healthcare claim involving a provider and a beneficiary, and obtain other healthcare fraud information associated with the provider or the beneficiary. The healthcare fraud management system is further configured to select rules, from the multiple rules, based on information associated with the claim, information associated with the provider or the beneficiary, and the other healthcare fraud information. The healthcare fraud management system is also configured to process the healthcare claim using the selected rules to generate a fraud score, and output, prior to payment of the healthcare claim, information regarding the fraud score to a clearinghouse or a claims processor to assist the clearinghouse or the claims processor in determining whether to accept, deny, or review the healthcare claim.Type: ApplicationFiled: June 28, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20130006668Abstract: A healthcare fraud management system receives healthcare claims, performs data reduction on information associated with the healthcare claims, and processes the reduced information associated with the healthcare claims by using a plurality of rules. The system also generates alarms, for the healthcare claims, based on the processing of the reduced information associated with the healthcare claims, generates scores for the alarms based on one or more predictive modeling rules, and prioritizes the healthcare claims, to create a list of prioritized healthcare claims, based on the generated scores for the alarms corresponding to the healthcare claims. The system further outputs, prior to payment of the healthcare claims, the list of the prioritized healthcare claims to a clearinghouse or a claims processor to assist the clearinghouse or the claims processor in determining whether to accept, deny, or review the healthcare claims.Type: ApplicationFiled: June 28, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20130006656Abstract: A healthcare fraud management system receives healthcare claims associated with a particular entity, selects rules, from a plurality of rules for detecting healthcare fraud, based on information associated with the healthcare claims, and processes the healthcare claims using the selected rules to generate alarms. The healthcare fraud management system prioritizes, based on the generated alarms, healthcare information associated with the particular entity in relation to healthcare information associated with other entities. The healthcare fraud management system provides for display, prior to payment of the healthcare claims, the prioritized healthcare information associated with the particular entity and the other entities.Type: ApplicationFiled: June 28, 2012Publication date: January 3, 2013Applicant: VERIZON PATENT AND LICENSING INC.Inventors: John H. VAN ARKEL, James J. WAGNER, Corrine L. SCHWEYEN, Saralyn M. MAHONE, David D. TADA, Terrill J. CURTIS, Scott HAGINS
-
Publication number: 20090129573Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as, for example, a rules-based thresholding engine and a profiling engine. The detection layer can include an AI-based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: ApplicationFiled: August 18, 2008Publication date: May 21, 2009Applicant: MCI COMMUNICATIONS CORPORATIONInventors: John Gavan, Kevin Paul, Jim Richards, Charles A. Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn Mahone, Terrill J. Curtis, James J. Wagner
-
Patent number: 7117191Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as a rules-based thresholding engine and a profiling engine. The detection layer can include an Artificial Intelligence based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: GrantFiled: September 8, 2003Date of Patent: October 3, 2006Assignee: MCI, Inc.Inventors: John Gavan, Kevin Paul, Jim Richards, Charles A. Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn M. Mahone, Terrill J. Curtis, James J. Wagner
-
Patent number: 6732082Abstract: A system, method and computer program product for processing event records. The present invention includes a detection layer, an analysis layer, an expert systems layer and a presentation layer. The layered system includes a core infrastructure and a configurable, domain-specific implementation. The detection layer employs one or more detection engines, such as a rules-based thresholding engine and a profiling engine. The detection layer can include an Artificial Intelligence based pattern recognition engine for analyzing data records, for detecting new and interesting patterns and for updating the detection engines to insure that the detection engines can detect the new patterns. In one embodiment, the present invention is implemented as a telecommunications fraud detection system. When fraud is detected, the detection layer generates alarms which are sent to the analysis layer. The analysis layer filters and consolidates the alarms to generate fraud cases.Type: GrantFiled: December 15, 1998Date of Patent: May 4, 2004Assignee: WorldCom, Inc.Inventors: John Gavan, Kevin Paul, Jim Richards, Charles A. Dallas, Hans Van Arkel, Cheryl Herrington, Saralyn M. Mahone, Terrill J. Curtis, James J. Wagner
-
Patent number: 6208720Abstract: A configurable and scalable rules-based thresholding system, method and computer program product for processing event records includes a core infrastructure and a configurable domain-specific implementation. The core infrastructure is generically employed regardless of the actual type of network being monitored. The domain-specific implementation is provided with user specific data and rules. The core infrastructure includes an event record enhancer which enhances events with additional data and a threshold detector which determines whether an enhanced event record, alone or in light of prior event records, exceeds one or more thresholds. The enhancer can access external databases for additional information related to an event record. In one embodiment, the enhancer generates feature vectors to represent enhanced event records. The threshold detector receives enhanced event records from the event record enhancer.Type: GrantFiled: April 23, 1998Date of Patent: March 27, 2001Assignee: MCI Communications CorporationInventors: Terrill J. Curtis, Charles A. Dallas, John Gavan, Cheryl Herrington, Saralyn Mahone, Kevin Paul, Jim Richards, Hans Van Arkel, James J. Wagner
-
Patent number: 6161110Abstract: A system, method and computer program product for interactively enhancing and presenting event data includes an enhancing portion and a presentation server. The enhancing portion includes a case enhancer that uses configuration data and an optional rules-based enhancing engine to enhance cases. The case enhancer includes a first informant that retrieves data from external data systems. The presentation server includes a presentation interface which interfaces one or more client workstations with a case data base. The presentation server also includes a second informant which interfaces the presentation interface with external data systems. The presentation server also includes an enforcer which interfaces the presentation interface with external action systems. A multi-level security system controls access to databases, the second informant and to the enforcer. In an exemplary embodiment, the security system includes a core infrastructure and a domain-specific implementation.Type: GrantFiled: May 7, 1998Date of Patent: December 12, 2000Assignee: MCI Communications CorporationInventors: Terrill J. Curtis, John Gavan, Kevin Paul
-
Patent number: 5805686Abstract: A fraud detection system is disclosed for telephone PBX calls. The system includes a fraud data server for buffering the call detail records relating to inbound 800 number calls and outbound international calls. A threshold manager is connected at its input to an output of the fraud data server for detecting numerical counts exceeding preselected threshold values, in predetermined fields of the call detail records, and generates an alarm. The output of the threshold manager is connected to an input of the fraud data server for buffering the alarm incident to respective call detail records. A computer workstation is connected to the fraud data server for receiving packets of call detail records relating to alarm data, in a filtered preselected format. The workstation includes a monitor for displaying the alarm data on a graphical interface.Type: GrantFiled: December 22, 1995Date of Patent: September 8, 1998Assignee: MCI CorporationInventors: Jens L. Moller, Matthew L. Galetti, Terrill J. Curtis, Trung Mai
-
Patent number: 5596632Abstract: Telephone fraud is monitored by effectively interfacing workstations with a fraud data server. Multiple customers may have their respective workstations coupled to the data server with attendant limited access to ensure security. A workstation manager and alarm manager cooperate with a management system database to process login and alarm detail requests from the various workstations. The managers are coupled to a single shared memory. The interface between the workstations and the fraud data server is by means of a message-based interface which standardizes the various functions of the workstation.Type: GrantFiled: August 16, 1995Date of Patent: January 21, 1997Assignee: MCI Communications CorporationInventors: Terrill J. Curtis, Jens L. Moller, Matthew L. Galetti