Fraud Detection Or Control Patents (Class 379/114.14)
-
Patent number: 12026780Abstract: Systems and methods are disclosed with respect to using a distributed ledger, such as a blockchain, for managing loss histories for individuals and/or assets, such as real estate, homes, and vehicles, and/or for creating and maintaining loss history reports for individuals and/or insurable assets. The loss histories or loss history reports may be individual or insured specific, or may be insurable or insured asset specific.Type: GrantFiled: January 12, 2018Date of Patent: July 2, 2024Assignee: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANYInventors: Ronny S. Bryant, Stacie A. McCullough, Mitchell J. Hill, Jacob J. Alt, Jaime Skaggs, Shawn M. Call, Eric Bellas, Vicki King, Melinda Teresa Magerkurth
-
Patent number: 11979521Abstract: Data stream based event sequence anomaly detection for mobility customer fraud analysis is presented herein. A system obtains a sequence of events comprising respective modalities of communication that correspond to a subscriber identity associated with a communication service—the sequence of events having occurred within a defined period. Based on defined classifiers representing respective fraudulent sequences of events, the system determines, via a group of machine learning models corresponding to respective machine learning processes, whether the sequence of events satisfies a defined condition with respect to likelihood of representing a fraudulent sequence of events of the respective fraudulent sequences of events. In response to the sequence of events being determined to satisfy the defined condition, the system sends, via a user interface of the system, a notification indicating that the sequence of events has been determined to represent the fraudulent sequence of events.Type: GrantFiled: May 14, 2021Date of Patent: May 7, 2024Assignee: AT&T Intellectual Property I, L.P.Inventors: Ryan Steckel, Ana Armenta, Prince Paulraj, Chih Chien Huang
-
Patent number: 11961117Abstract: Systems and methods are provided in the field of online advertising and malicious software. In some embodiments, an apparatus for determining a degree of deceptiveness associated with a session presenting at least one online advertisement includes means for capturing electronic interactions among at least two entities involved in the session, the captured interactions including interaction-related properties and time, means for processing to filter a plurality of attributes for the one or more relations from the captured electronic interactions, each attribute defining a data type and corresponding data value, wherein the extraction is performed by integration with the two or more entities, apply one or more models to each of the one or more relations, and determine a degree of deceptiveness for each of the one or more relations based on the one or more applied models.Type: GrantFiled: January 24, 2022Date of Patent: April 16, 2024Assignee: The Nielsen Company (US), LLCInventors: Mohammad Ali Shiravi Khozani, Ehsan Mokhtari, Hadi Shiravi Khozani, Sergei Frankoff
-
Patent number: 11950019Abstract: A hub apparatus (20) is designated to be used in a video communication system comprising the hub apparatus (20) and a plurality of mobile terminals (10a-10d) configured to be wirelessly connectable to the hub apparatus (20).Type: GrantFiled: October 30, 2021Date of Patent: April 2, 2024Assignee: HUDDLE ROOM TECHNOLOGY S.R.L.Inventor: Mario Ferrari
-
Patent number: 11750607Abstract: Disclosed are systems, methods, and non-transitory computer-readable storage media for identifying accounts having shared credentials. In some implementations, a content management system can collect user login context data when a user logs in to or accesses a user account of the content management system. For example, the content management system can collect client device data, client application data, internet protocol (IP) address data, and/or other data from the user's device when the user logs in to the user account. The content management system can analyze the login context data to determine patterns that indicate that the user account login credentials are being shared among multiple users.Type: GrantFiled: May 28, 2021Date of Patent: September 5, 2023Assignee: Dropbox, Inc.Inventors: Kapil Yedidi, Anton Mityagin, Sean Byrne, Andrew Scheff
-
Patent number: 11669844Abstract: Disclosed herein are systems and methods executing a server that perform various processes for generating alerts containing various data fields indicating threats of fraud or attempts to penetrate an enterprise network. Analyst computers may query and fetch alerts from a database, and then present the alerts to be addressed by an analyst according to the priority level of the respective alerts.Type: GrantFiled: November 19, 2020Date of Patent: June 6, 2023Assignee: United Services Automobile Association (USAA)Inventors: Jansey Comeaux, Stephen Bradley Daughdrill, Gregory Sansone, Veronica Santiago
-
Patent number: 11563860Abstract: A method for identifying a fraudulent phone number is provided. The method includes receiving a user report dataset indicating fraudulent activity corresponding to a phone number, and responsive to receiving the user report dataset, identifying a record in a database corresponding to the phone number. The method further includes tagging the record to identify the phone number as being associated with fraudulent activity.Type: GrantFiled: October 16, 2020Date of Patent: January 24, 2023Assignee: Somos, Inc.Inventors: Sriram Sharma, Michael Kimmel, Suk Yee Wong, William Carter, Manisha Bhat, Pamela J. Carter, Sanjeev Chauhan, Ryan Karnas, Alan Stiffler, Dewang Lakhani
-
Patent number: 11531754Abstract: Systems, methods, devices, and computer readable media related to fraud detection. Fraud detection is achieved using a flexible scripting language and syntax that simplifies the generation of fraud detection rules. The rules are structured as conditional IF-THEN statements that include data objects referred to as Anchors and Add-Ons. The Anchors and Add-Ons used to generate the rules also correspond to a distinct data path for the retrieval data from any of a variety of data sources. The generated rules with distinct data paths are then converted using a transpiler from the scripting language into native language source code (e.g., PHP, Java, etc.) for deployment in a particular environment. The rules are then executed in real-time in the environment to detect potential fraudulent activity.Type: GrantFiled: September 11, 2019Date of Patent: December 20, 2022Assignee: MASTERCARD TECHNOLOGIES CANADA ULCInventors: Yi Wei Tseng, Randy Lukashuk, Perry McGee, Amiran Gigiberia, Andrew Giblin, Kenny Wan, Andrian Sevastyanov
-
Patent number: 11470194Abstract: Embodiments described herein provide for passive caller verification and/or passive fraud risk assessments for calls to customer call centers. Systems and methods may be used in real time as a call is coming into a call center. An analytics server of an analytics service looks at the purported Caller ID of the call, as well as the unaltered carrier metadata, which the analytics server then uses to generate or retrieve one or more probability scores using one or more lookup tables and/or a machine-learning model. A probability score indicates the likelihood that information derived using the Caller ID information has occurred or should occur given the carrier metadata received with the inbound call. The one or more probability scores be used to generate a risk score for the current call that indicates the probability of the call being valid (e.g., originated from a verified caller or calling device, non-fraudulent).Type: GrantFiled: August 13, 2020Date of Patent: October 11, 2022Assignee: PINDROP SECURITY, INC.Inventors: John Cornwell, Terry Nelms, II
-
Patent number: 11444972Abstract: Systems and methods are disclosed for identifying human users on a network.Type: GrantFiled: January 10, 2020Date of Patent: September 13, 2022Assignee: Yahoo Assets LLCInventors: Donald J. McQueen, Lachlan A. Maxwell, William C. Wakefield, III
-
Patent number: 11425247Abstract: A method may include determining that a digit pattern has been input on a user device to initiate a call; transmitting the digit pattern to a device that stores a list of digit patterns to which calls are not to be completed; receiving, from the device, data that indicates whether the digit pattern is on the list of digit patterns; prohibiting the call from being initiated with a network when the data indicates that the digit pattern is on the list of digit patterns; and initiating the call with the network when the data indicates that the digit pattern is not on the list of digit patterns.Type: GrantFiled: February 11, 2021Date of Patent: August 23, 2022Assignee: Verizon Patent and Licensing Inc.Inventors: Kashif Khan, Danysel Barthelme, Ronald E. Collier, II, Ertao Li, Steve L. Padilla, Gaurav M. Patel, Shawn R. Pugh, Shujaat Ali Siddique, Daniel L. Walker
-
Patent number: 11363138Abstract: A method, computer program product, and computing system for receiving input information concerning a conversation between a caller and a recipient; processing the input information to assess a fraud-threat-level; defining a targeted response based, at least in part, upon the fraud-threat-level assessed, wherein the targeted response is intended to refine the assessed fraud-threat-level; and effectuating the targeted response.Type: GrantFiled: October 23, 2020Date of Patent: June 14, 2022Assignee: NUANCE COMMUNICATIONS, INC.Inventor: Haydar Talib
-
Patent number: 11356473Abstract: Novel tools and techniques are provided for implementing web-based monitoring and detection of fraudulent or unauthorized use of voice calling service. In various embodiments, a computing system might receive, from a user device associated with an originating party, a request to initiate a call session with a destination party, the request comprising user information associated with the originating party and a destination number associated with the destination party; might query a database with session data (including user information) to access permission data and configuration data; and might configure fraud logic using received configuration data from the database. The computing system might analyze the session data and permission data using the configured fraud logic to determine whether the originating party is permitted to establish the requested call session with the destination party; if so, might initiate one or more first actions; and, if not, might initiate one or more second actions.Type: GrantFiled: April 9, 2020Date of Patent: June 7, 2022Assignee: Level 3 Communications, LLCInventors: Andrew J. Broadworth, Matthew McCarthy
-
Patent number: 11210325Abstract: Embodiments are directed towards real time display of event records and extracted values based on at least one extraction rule, such as a regular expression. A user interface may be employed to enable a user to have an extraction rule automatically generate and/or to manually enter an extraction rule. The user may be enabled to manually edit a previously provided extraction rule, which may result in real time display of updated extracted values. The extraction rule may be utilized to extract values from each of a plurality of records, including event records of unstructured machine data. Statistics may be determined for each unique extracted value, and may be displayed to the user in real time. The user interface may also enable the user to select at least one unique extracted value to display those event records that include an extracted value that matches the selected value.Type: GrantFiled: April 29, 2017Date of Patent: December 28, 2021Assignee: SPLUNK Inc.Inventors: R. David Carasso, Micah James Delfino, Johnvey Hwang
-
Patent number: 11212579Abstract: A method, executed by a processor, is used to determine presence of a viewer at a media device. The method includes receiving viewer biometric data captured by a biometric capture device associated with the media device; determining a category of the viewer based on the captured viewer biometric data; comparing the captured viewer biometric data to a reference to determine a possible identity of the viewer, by: determining a presence probability for the viewer based on a match between the biometric data and the reference, and determining a confidence level for the probability; and when the probability and confidence level equal or exceed a threshold, determining the viewer is present at the media device.Type: GrantFiled: August 17, 2020Date of Patent: December 28, 2021Assignee: Google LLCInventors: Ken Krieger, Andrew Joseph Alexander Gildfind, Nicholas Salvatore Arini, Simon Michael Rowe, Raimundo Mirisola
-
Patent number: 11206289Abstract: Novel tools and techniques are provided for implementing monitoring and detection of fraudulent or unauthorized use in telephone conferencing systems or voice networks. In various embodiments, a computing system might monitor call activity through telephone conferencing system or voice network. In response to detecting use of the telephone conferencing system or voice network by at least one party based on the monitored call activity, the computing system might identify incoming and/or outgoing associated with a call initiated by the at least one party. The computing system might analyze the identified incoming and/or outgoing call data to determine whether the call initiated by the at least one party constitutes at least one of fraudulent use or unauthorized use of the telephone conferencing system or voice network. If so, the computing system might initiate one or more first actions.Type: GrantFiled: October 14, 2019Date of Patent: December 21, 2021Assignee: Level 3 Communications, LLCInventors: Adam Uzelac, Andrew J. Broadworth, Robert P. Slaughter
-
Patent number: 11184481Abstract: One example method of operation may include collecting call metric data over a predefined period of time for identified calls, querying the call metric data to identify whether one or more call filtering criteria parameters require changes, determining one or more call filtering criteria parameters require changes based on a deviation from one or more expected call metric data values included in the call metric data, modifying one or more of the call filtering criteria parameters, and updating an active call scam model stored on a call processing server based on the one or more call filtering parameters.Type: GrantFiled: April 9, 2019Date of Patent: November 23, 2021Assignee: FIRST ORION CORP.Inventors: Mark Hamilton Botner, Collin Michael Turney, Daniel Francis Kliebhan, Robert Francis Piscopo, Jr., Charles Donald Morgan, Jamelle Adnan Brown, Chee-Fung Choy, Samuel Kenton Welch, Nysia Inet George, Andrew Collin Shaddox
-
Patent number: 11165990Abstract: A hub apparatus (20) is designated to be used in a video communication system comprising the hub apparatus (20) and a plurality of mobile terminals (10a-10d) configured to be wirelessly connectable to the hub apparatus (20).Type: GrantFiled: December 19, 2018Date of Patent: November 2, 2021Assignee: Huddle Room Technology S.R.L.Inventor: Mario Ferrari
-
Patent number: 11080619Abstract: In one embodiment, a network assurance system that monitors a network forms a cluster of similarly behaving wireless access points (APs). The cluster includes APs associated with different software versions. The network assurance system trains a machine learning-based failure prediction model for the cluster based on a set of features of the APs in the cluster. The network assurance system proactively triggers a client in the network to roam from a first AP to a second AP, based on the failure prediction model predicting a failure of the first AP. The network assurance system quarantines the failure prediction model when a new software version is associated with one or more of the APs.Type: GrantFiled: January 8, 2018Date of Patent: August 3, 2021Assignee: Cisco Technology, Inc.Inventors: Jean-Philippe Vasseur, Vinay Kumar Kolar
-
Patent number: 11070672Abstract: A method of adapting customer care handling automated workflows. The method comprises creating records of calls by a subscriber to a customer care handling system, analyzing the records of calls by a customer care handling adaptation application, comparing by the application a frequency of calls to customer care and a frequency of account credits granted to the subscriber to a correlation threshold, where the correlation threshold is randomly varied within predefined correlation values, tagging the wireless communication service account of the subscriber by the application as manipulative of customer care, receiving a call from the subscriber to the customer care handling system, determining by the customer care handling system that the subscriber is tagged as manipulative of customer care, and adapting the handling automated workflow for the subscriber by the customer care handling system based on the determination that the subscriber is tagged as manipulative of customer care.Type: GrantFiled: April 3, 2019Date of Patent: July 20, 2021Assignee: Sprint Communications Company L.P.Inventors: Michael A. Gailloux, Kenneth W. Samson
-
Patent number: 11030229Abstract: Embodiments are directed towards real time display of event records and extracted values based on at least one extraction rule, such as a regular expression. A user interface may be employed to enable a user to have an extraction rule automatically generate and/or to manually enter an extraction rule. The user may be enabled to manually edit a previously provided extraction rule, which may result in real time display of updated extracted values. The extraction rule may be utilized to extract values from each of a plurality of records, including event records of unstructured machine data. Statistics may be determined for each unique extracted value, and may be displayed to the user in real time. The user interface may also enable the user to select at least one unique extracted value to display those event records that include an extracted value that matches the selected value.Type: GrantFiled: April 29, 2017Date of Patent: June 8, 2021Assignee: SPLUNK Inc.Inventors: R. David Carasso, Micah James Delfino, Johnvey Hwang
-
Patent number: 10878428Abstract: Disclosed herein are systems and methods executing a server that perform various processes for generating alerts containing various data fields indicating threats of fraud or attempts to penetrate an enterprise network. Analyst computers may query and fetch alerts from a database, and then present the alerts to be addressed by an analyst according to the priority level of the respective alerts.Type: GrantFiled: May 8, 2018Date of Patent: December 29, 2020Assignee: United Services Automobile Association (USAA)Inventors: Jansey Comeaux, Stephen Bradley Daughdrill, Gregory Sansone, Veronica Santiago
-
Patent number: 10771624Abstract: Techniques for authenticating pending communication sessions between user devices are disclosed herein. In an example, a data store performs operations to: store device authentication information for an initiating device specific to a pending communication session between the initiating device and a receiving device, wherein the first authentication information comprises at least a timestamp and identifier for the initiating device; store second authentication information from a service provider of the initiating device; provide the second authentication information to a service provider of the receiving device to authenticate the pending communication session prior to routing the pending communication to the receiving device; and provide the first authentication information to the receiving device to verify authenticity of the pending communication session.Type: GrantFiled: April 4, 2019Date of Patent: September 8, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Russell Andrew Penar, Amer Aref Hassan
-
Patent number: 10757058Abstract: One embodiment provides a method comprising intercepting an incoming communication for a user, and determining whether to classify the incoming communication as a suspicious incoming communication based on content of the incoming communication and a learned classification model or learned signatures. The method further comprises monitoring one or more outgoing communications from the user, and invoking an action relating to scam prevention in response to determining an outgoing communication from the user is linked to a suspicious incoming communication.Type: GrantFiled: February 17, 2017Date of Patent: August 25, 2020Assignee: International Business Machines CorporationInventors: Nathalie Baracaldo Angel, Pawan R. Chowdhary, Heiko H. Ludwig, Robert J. Moore, Amir J. Safavi
-
Patent number: 10750010Abstract: One example method of operation may include extracting a calling device telephone number from a received call message, querying a verification table for the calling device telephone number, identifying the calling device telephone number and a corresponding service provider network identifier from the verification table, querying a mapping table for the service provider network identifier, and identifying whether a match between the service provider network identifier and a service provider code exists as an entry in the mapping table.Type: GrantFiled: December 31, 2019Date of Patent: August 18, 2020Assignee: FIRST ORION CORP.Inventors: Julie Sara Fowler, Daniel Francis Kliebhan
-
Patent number: 10719677Abstract: A method of reading machine-readable labels on sample receptacles held by a sample rack. In the method, an absolute position of the sample rack is measured as the sample rack moves between first and second positions in a housing. During movement between the first and second positions, an image is acquired of a machine-readable label associated with each sample receptacle held by the sample rack. The image of each machine-readable label is thereafter decoded.Type: GrantFiled: December 3, 2018Date of Patent: July 21, 2020Assignee: Gen-Probe IncorporatedInventors: Norbert D. Hagen, David Opalsky, Rolf Silbert
-
Patent number: 10674010Abstract: A computer system is described that is configured to enable customers of an organization to self-monitor account activity and modify account access settings via a contact center of the organization. The contact center control system is configured to provide an interactive call history associated with the customer's accounts with the organization. Using the call history, the customer may perform self-monitoring of calls into the contact center that access the customer's accounts, and notify the organization if any of the calls appear suspicious. The contact center control system is configured provide a user interface through which the customer may modify account access settings including changing which types of authentication methods are enabled to access the customer's accounts, and blocking account access by callers from certain phone numbers. The contact center control system may allow the customer to turn off all access to the customer's accounts via the contact center.Type: GrantFiled: May 21, 2019Date of Patent: June 2, 2020Assignee: Wells Fargo Bank, N.A.Inventors: Julio Jiron, Kevin King, Beth S. Moss, James Lyle Schafer, Kalyan Subramanian, Chris Theodore Kalaboukis, Raziq Yaqub
-
Patent number: 10616411Abstract: A fraud analysis computing system is provided. The system includes a network interface configured to communicate data over a network and a processing circuit including one or more processors coupled to non-transitory memory. The processing circuit is configured to monitor incoming call data generated during an incoming call between a user and an incoming caller, detect a fraud trigger within the incoming call data, and complete a fraud interception activity in response to detection of the fraud trigger.Type: GrantFiled: August 21, 2017Date of Patent: April 7, 2020Assignee: Wells Fargo Bank, N.A.Inventors: Michael H. Chang, Kevin R. Cieslak, Jeffrey A. Cornman, Chris Kalaboukis, Beth S. Moss, Christina Zappala Ongpin, Ramanathan Ramanathan, Darrell L. Suen
-
Patent number: 10567402Abstract: Disclosed herein are systems and methods executing a security server that perform various processes using alert elements containing various data fields indicating threats of fraud or attempts to penetrate an enterprise network. Using alert elements, the security server generate integrated alerts that are associated with customers of the system and assign a risk score for the integrated alerts, which the security server uses to store and sort the integrated alerts according to a priority, based on the relative risk scores. Analyst computers may query and fetch integrated alerts from an integrate alert database, and then present the integrate alerts to be addressed by an analyst according to the priority level of the respective integrated alerts. This allows to ensure that the right customer, is worked by the right analyst, at the right time, to maximize fraud prevention and minimize customer impact.Type: GrantFiled: April 13, 2018Date of Patent: February 18, 2020Assignee: United Services Automobile Association (USAA)Inventors: Jansey Comeaux, Michael Scott McQuarrie, Gregory Sansone, Veronica Santiago
-
Patent number: 10537291Abstract: A system and method for monitoring a medical procedure performed in a clinical environment is provided. An audio recorder is configured to produce a verbal data signal that is representative of a verbal communication occurring in the clinical environment, and a data analyzer is configured to detect an adverse condition based upon the verbal data signal. An alert module is configured to alert an operator upon the detection of an adverse condition.Type: GrantFiled: October 3, 2017Date of Patent: January 21, 2020Assignee: VALCO ACQUISITION LLC AS DESIGNEE OF WESLEY HOLDINGS, LTDInventors: David W. Wagner, Marco Zenati, J. C. Flaherty, R. M. Flaherty, Jason Maron
-
Patent number: 10440045Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: October 2, 2018Date of Patent: October 8, 2019Assignee: Upguard, Inc.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 10341391Abstract: A processing device in one embodiment comprises a processor coupled to a memory and is configured to obtain data characterizing a plurality of network sessions for a given user identifier. The network sessions are initiated from one or more user devices over at least one network and may comprise respective virtual private network (VPN) sessions. The processing device is further configured to extract features from the obtained data, to detect at least one potentially anomalous network session among the plurality of network sessions for the given user identifier by applying the extracted features to a support vector machine model, and to apply a rules-based verification process to the detected potentially anomalous network session in order to verify that the detected potentially anomalous network session is an anomalous network session. An alert is generated based on a result of the rules-based verification process and transmitted to a security agent.Type: GrantFiled: May 16, 2016Date of Patent: July 2, 2019Assignee: EMC IP Holding Company LLCInventors: Shikhar Pandey, Kartikeya Putturaya, Chandra Sekar Rao Munaganuri Venkata, Gupta Abhishek
-
Patent number: 10334444Abstract: A predetermined event occurring on a client device is detected. The predetermined event can be in the form of a user-initiated action, an audio command, geolocation information, a breaking of a wireless connection, or exceeding a relative distance. The detection of the predetermined event triggers a switch of the current access mode of the client device to a more secure access mode. Access mode switches on other client devices may also be triggered. Additional actions may be executed on the client device and the other associated client devices to further secure these devices.Type: GrantFiled: March 27, 2018Date of Patent: June 25, 2019Assignee: Symantec CorporationInventor: Daniel Kowalyshyn
-
Patent number: 10269027Abstract: A method and system are configured to assess a fee for communication facilitation. An electronic publication system includes a publication module configured to generate a user interface. The user interface includes search result information associated with a first entity and communication initiation information associated with the first entity. The communication initiation information includes identification information configured to identify a contact module of the first entity. The communication initiation information may be selectable to facilitate communication with the first entity. The publication system also includes a receiving module configured to receive a lead data record from a communication system for communication between the first entity and a second entity via the contact module. The publication system also includes a fee assessment module configured to receive the lead data record and to assess a fee to the first entity.Type: GrantFiled: July 18, 2012Date of Patent: April 23, 2019Assignee: eBay Inc.Inventors: Arturo Manuel Zacarias, Valerie K. Shirk, Erik Anderson Stuart
-
Patent number: 10257674Abstract: A system and method for triggering on platform usage can include at a platform, receiving and storing a trigger configuration of an account; operating a platform comprising internally executing a process on behalf of an account and publishing at least one event when executing the process; at the platform, incrementing a counter in response to the at least one event and if the stored trigger configuration species a usage key associated with a category of counted events of the at least one event; monitoring counters in a context of an associated trigger; and processing the trigger upon the counter satisfying condition of an associated trigger.Type: GrantFiled: June 21, 2018Date of Patent: April 9, 2019Assignee: Twilio, Inc.Inventors: Evan Cooke, Timothy Milliron, Adam Ballai, Matthew D. Nowack, Robert C. Hagemann, III
-
Patent number: 10200531Abstract: For mitigating potential fraud, a processor detects potential fraud in a communication from a caller through a communication device. The processor further generates a fraud alert in response to the potential fraud. In addition, the processor mitigates the potential fraud in response to a fraud policy being satisfied.Type: GrantFiled: March 14, 2017Date of Patent: February 5, 2019Assignee: LENOVO (Singapore) PTE. LTD.Inventors: Jian Li, Ming Qian, Song Wang
-
Patent number: 10178228Abstract: A method and an apparatus for classifying a telephone dialing test audio based on AI is provided. Data of a telephone dialing test audio is acquired first, then the data of the telephone dialing test audio is processed via a preset classifier so as to obtain similarities among the data of the telephone dialing test audio and telephone types in the preset classifier, in which the preset classifier is a deep-learning model determined by historical data of telephone dialing test audios and their corresponding telephone types; finally, the telephone type corresponding to the telephone dialing test audio is determined according to the similarities. With the method and apparatus, the telephone dialing test audio is classified via machine learning to determine whether a user is a normal user, thus human costs is saved and an efficiency of dialing test is increased.Type: GrantFiled: October 21, 2017Date of Patent: January 8, 2019Assignee: BAIDU ONLINE NETWORK TECHNOLOGY (BEIJING) CO., LTD.Inventors: Chao Li, Xiangang Li, Jue Sun
-
Patent number: 10169316Abstract: Techniques are provided for performing automated operations to construct XML documents from source data based on user annotations of source data. A document received from a user includes source data and one or more annotations by the user regarding at least one subset of the source data. The received annotated document is parsed based on the user annotations. Parsing the received document includes generating data structures corresponding to the subsets of the source data based on the user annotations, and constructing a target XML document based on the generated data structures that includes information extracted from the annotated subsets of source data.Type: GrantFiled: May 25, 2016Date of Patent: January 1, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pu Liu, Victor M. Lourenco
-
Patent number: 10146973Abstract: Systems for reading machine-readable labels, for example, two-dimensional barcodes, include a housing, a reader configured to read the machine-readable labels on sample receptacles as a sample rack holding the sample receptacles move between a first position and a second position within the housing. The system includes a processing and control unit configured to decode a read image of the machine-readable labels on each sample receptacle, and configured to associate a decoded read images with the corresponding sample receptacles based on measured positions of the sample rack when the machine-readable label was read.Type: GrantFiled: April 6, 2016Date of Patent: December 4, 2018Assignee: GEN-PROBE INCORPORATEDInventors: Norbert D. Hagen, David Opalsky, Rolf Silbert
-
Patent number: 10142364Abstract: An internal network can include a plurality of linked internal nodes, each internal node being configured to communicate with other internal nodes or with one or more external servers over an external network. The internal network can analyze the configuration of the internal nodes and the network traffic between internal nodes of the internal network and external servers. Based on the analysis, a network vulnerability score measuring the vulnerability of the internal network to attack can be determined. If the vulnerability score is below a threshold, the internal network can be isolated from the external network, for example by preventing internal nodes from communicating with or over the external network.Type: GrantFiled: September 21, 2016Date of Patent: November 27, 2018Assignee: Upguard, Inc.Inventors: Michael Franz Baukes, Alan James Sharp-Paul
-
Patent number: 10129756Abstract: Methods, program products, and systems for proactively securing mobile devices are described. A mobile device can proactively determine whether the mobile device is associated with a security risk and the level of the security risk. Upon determining a security risk, the mobile device can transmit coordinates of its current geographic location to a server. To protect privacy of authorized users, the transmission can be disabled by entering a password. If multiple failed password attempts are detected, the mobile device can proactively increase a security level of the device, and selectively protect files or other content stored on the mobile device. In some implementations, the mobile device can be transitioned into a surveillance mode where the mobile device records or captures information associated with one or more of user actions, ambient sound, images, a trajectory of the device, and transmits the recorded or captured information to the network resource.Type: GrantFiled: January 13, 2016Date of Patent: November 13, 2018Assignee: Apple Inc.Inventor: Hooman Borghei
-
Patent number: 10111102Abstract: A system and method for monitoring telephone calls to detect fraudulent activity and take corrective action is described. The system receives a group of telephone calls having associated call characteristics and analyzes the group of telephone calls to identify and store a first set of distributions of call characteristics that are indicative of normal activity, fraudulent activity, or indeterminate activity. The system receives one or more subsequent telephone calls to be analyzed. The system analyzes the received one or more telephone calls to identify a second set of distributions of call characteristics associated with the received telephone call. The system then compares the second set of distributions of call characteristics to the stored first set of distributions of call characteristics to assess a probability that the one or more received telephone calls represents normal, fraudulent, or indeterminate activity.Type: GrantFiled: November 21, 2014Date of Patent: October 23, 2018Assignee: Marchex, Inc.Inventors: Jason Flaks, Ziad Ismail
-
Patent number: 10109281Abstract: Embodiments of techniques or systems for fraud detection are provided herein. A communication may be received where the communication includes one or more voice signals from an individual. Frequency responses associated with these voice signals may be determined and analyzed and utilized to determine whether or not potential fraudulent activity is occurring. For example, if a frequency response is greater than a frequency threshold, potential fraudulent activity may be determined. Further, frequency responses may be cross referenced with voice biometrics, voice printing, or fraud pathway detection results. In this way, voice stress or frequency responses may be utilized to build other databases related to other types of fraud detection, thereby enhancing one or more aspects of fraud detection. For example, a database may include a voice library, a pathway library, or a frequency library which include characteristics associated with fraudulent activity, thereby facilitating identification of such activity.Type: GrantFiled: September 26, 2016Date of Patent: October 23, 2018Assignee: WELLS FARGO BANK, N.A.Inventor: Raymond F. Jones
-
Patent number: 10091349Abstract: A system and method for fraud detection for a telephony platform based on an analysis of call detail records (CDRs) that are generated by the telephony platform. The analysis is based on collecting, organizing, transforming, analyzing, and quantifying the CDR data into a plurality of data analytics and data correlations and then applying fuzzy logic to the data analytics to generate a fraud risk rating for each incoming call into the platform.Type: GrantFiled: July 11, 2017Date of Patent: October 2, 2018Assignee: VAIL SYSTEMS, INC.Inventors: Srinivasa Rao, Todd Whiteley
-
Patent number: 10043189Abstract: Embodiments of techniques or systems for fraud detection are provided herein. A communication may be received where the communication includes one or more voice signals from an individual. Frequency responses associated with these voice signals may be determined and analyzed and utilized to determine whether or not potential fraudulent activity is occurring. For example, if a frequency response is greater than a frequency threshold, potential fraudulent activity may be determined. Further, frequency responses may be cross referenced with voice biometrics, voice printing, or fraud pathway detection results. In this way, voice stress or frequency responses may be utilized to build other databases related to other types of fraud detection, thereby enhancing one or more aspects of fraud detection. For example, a database may include a voice library, a pathway library, or a frequency library which include characteristics associated with fraudulent activity, thereby facilitating identification of such activity.Type: GrantFiled: January 30, 2017Date of Patent: August 7, 2018Assignee: Wells Fargo Bank, N.A.Inventor: Raymond F. Jones
-
Patent number: 10043190Abstract: Embodiments of techniques or systems for fraud detection are provided herein. A communication may be received where the communication includes one or more voice signals from an individual. Frequency responses associated with these voice signals may be determined and analyzed and utilized to determine whether or not potential fraudulent activity is occurring. For example, if a frequency response is greater than a frequency threshold, potential fraudulent activity may be determined. Further, frequency responses may be cross referenced with voice biometrics, voice printing, or fraud pathway detection results. In this way, voice stress or frequency responses may be utilized to build other databases related to other types of fraud detection, thereby enhancing one or more aspects of fraud detection. For example, a database may include a voice library, a pathway library, or a frequency library which include characteristics associated with fraudulent activity, thereby facilitating identification of such activity.Type: GrantFiled: February 13, 2017Date of Patent: August 7, 2018Assignee: WELLS FARGO BANK, N.A.Inventor: Raymond F. Jones
-
Patent number: 10044855Abstract: Various systems and methods for a collaborative phone reputation system are described herein. A system for implementing a collaborative phone reputation system includes a compute device comprising: a call handling module to detect, at the compute device, an incoming call for a user of the compute device; a scoring module to determine a local probabilistic score that the incoming call is desirable for the user; and an execution module to perform an action at the compute device based on the local probabilistic score.Type: GrantFiled: August 29, 2016Date of Patent: August 7, 2018Assignee: Intel CorporationInventors: Igor Tatourian, Rita H Wouhaybi, Hong Li, Tobias Kohlenberg
-
Patent number: 9930189Abstract: Methods and systems for providing a rating system that allow for customers to create a database of toll-free numbers that are abused by malicious consumers which may be cloud-based and allow for service providers to dip prior to completing or accepting calls.Type: GrantFiled: December 30, 2015Date of Patent: March 27, 2018Assignee: Somos, Inc.Inventor: Sanjeev Chauhan
-
Patent number: 9876900Abstract: The present invention discloses a centralized, digital, computer-based telephone call management system for authenticating users of a telephone system in an institutional facility. The system includes the capacity to allow an institution to control, record, monitor, and bill and report usage and access to a telephone network. The telephone call management system further includes both accounting and management software for use in controlling, monitoring, billing, recording, and reporting usage and access. Also, it can operate over both a Public Switch Telephone Network (PSTN) and a Voice over Internet Protocol (VOIP) infrastructure.Type: GrantFiled: August 20, 2015Date of Patent: January 23, 2018Assignee: Global Tel*Link CorporationInventor: Stephen Hodge
-
Patent number: 9864799Abstract: Embodiments of the present invention provide methods, computer program products, and systems for automatically generating a display to present different terms. Embodiments of the present invention can be used to identify a first and a second user using applications in a software as a service (SaaS) environment and store, for the first and the second user, a first term associated with the first user and a second term associated with the second user in the SaaS environment. Responsive to identifying the first term associated with the first user and the second term associated with the second user have functionally equivalent definitions, embodiments of the present invention can replace the second term associated with the second user with the first term associated with the first user and generate a display for the first term associated with the first user that replaced the second term associated with the second user.Type: GrantFiled: January 19, 2017Date of Patent: January 9, 2018Assignee: International Business Machines CorporationInventors: Rhonda L. Childress, Donna M. Hickey, Randy S. Johnson, John F. Kelley, Tedrick N. Northway, Bradley K. Wells