Business Or Product Certification Or Verification Patents (Class 705/317)
-
Patent number: 8626671Abstract: Computer-implemented methods and systems for data breach compliance are disclosed. Organization related information may be received. Breach information relating to a data breach event of the organization may be received. The breach information may include, for example, breach event description information, compromised personally identifiable information, and remediation action information. A breach report may be generated based on the breach information, the organization related information, and one or more rules related to data breach. At least one reporting entity may be determined based on the organization related information, the breach information, and the one or more rules. The breach report may be output.Type: GrantFiled: January 17, 2013Date of Patent: January 7, 2014Assignee: CSRSI, Inc.Inventor: Warren Ross Federgreen
-
Patent number: 8626766Abstract: Systems and methods for ranking and importing business listings are provided. In one aspect, a processor receives a plurality of business listing groups, where each business listing group includes business listings. The processor selects a sample set of business listings from each business listing group for verification. The processor determines ranks for the business listing groups based on verification information indicating the accuracy of the business data in the selected sample set of business listings. The processor selects the highest ranked business listing group based on the verification information and imports the business listings in the selected business listing group into a set of business listing records for presentment to a user.Type: GrantFiled: September 28, 2011Date of Patent: January 7, 2014Assignee: Google Inc.Inventors: Anurag Srivastava, Sachin Jain
-
Patent number: 8626545Abstract: Systems and methods of a job distribution platform for aggregating performance data in a worker profile for workers in performing crowd sourced tasks are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of generating and storing performance data when a worker performs one or more tasks distributed online to their respective computing devices by a job distribution platform which crowd sources tasks over a network to remote workers. The tasks can span current jobs and a history of previous jobs distributed to the worker and the job performance data for the worker is collected for current and previous jobs. New jobs can be assigned to a worker selected based on performance data of the worker.Type: GrantFiled: October 17, 2011Date of Patent: January 7, 2014Assignee: CrowdFlower, Inc.Inventors: Christopher R. Van Pelt, Ryan Cox, Alex Sorokin, Michael Juster
-
Publication number: 20140006296Abstract: Included are embodiments for information compliance risk assessment. Some embodiments include providing a plurality of questions to a user to determine a characteristic of a project that a user wishes to perform, determining, from the characteristic, a compliance area that is associated with the project, and determining a compliance officer associated with the compliance area to assist in completing the project. Some embodiments include determining a policy within the compliance area for completing the project, receiving an indication of compliance with the policy from the user, and providing the compliance officer with access to the indication of compliance and an option to indicate that the compliance area has been completed with adherence to the policy. Still some embodiments include receiving conformation from the compliance officer that the compliance area has been completed with adherence to the policy and providing the indication to the user for display.Type: ApplicationFiled: July 1, 2013Publication date: January 2, 2014Inventors: Sandra Renee Hughes, Jeffrey M. Rozek
-
Publication number: 20140006295Abstract: A method and system for identifying and tracking ownership of a power tool, a power tool battery pack, or another device (“the device”) by storing a chain-of-custody in a memory therein. Initially, a serial number that uniquely identifies the device as well as first owner information, such as the manufacturer, are stored in the chain-of-custody memory. When ownership changes, such as when the device is received by a retailer, the chain-of-custody memory is updated to include the new (second) owner information. When the device is sold by the retailer, the ownership information is updated again to include the new (third) owner information. Reading and writing to the chain-of-custody memory may be performed wirelessly using an external wireless device, such as a handheld unit. Additionally, reading and writing to the chain-of-custody memory may occur via a secure transmission to avoid improper access to the memory.Type: ApplicationFiled: June 28, 2013Publication date: January 2, 2014Inventors: Jeffrey M. Zeiler, Leslie J. Reading
-
Publication number: 20130346328Abstract: A method for distributing requests for artifacts to a regulated institution for risk assessment includes: storing a client profile including a risk rating value corresponding to a risk that the related regulated institution will not be compliant with a set of regulations; identifying a plurality of artifacts to be provided by the regulated institution, each artifact including a frequency, a weight, one of a plurality of waves, and one of a plurality of categories; assigning a priority value to each of the categories; grouping each artifact into a plurality of buckets, each bucket including artifacts that include a common wave and a common category, and wherein the artifacts are evenly distributed into the buckets; and generating a request schedule, wherein the request schedule is a schedule for the distribution of requests for artifacts included in each bucket over a predetermined period of time.Type: ApplicationFiled: August 23, 2013Publication date: December 26, 2013Applicant: Neighborbench LLCInventors: Kenneth Price AGLE, Ken WOLFF, Eric HELFRICH
-
Publication number: 20130346327Abstract: An exemplary method and system for monitoring water rights includes obtaining water rights data from a water rights agency database, maintaining a database of water rights data, receiving a user definition of an alert basis, scanning the water rights database to identify data representative of one or more relevant water rights events, and providing alerts of the relevant water rights events.Type: ApplicationFiled: June 21, 2013Publication date: December 26, 2013Inventors: Jesse R. Lassley, Collin J. Green, Michael Bemis
-
Publication number: 20130346326Abstract: A system and method for ensuring compliance with pay-to-play laws. In one embodiment of the invention, the computer-implemented system and method facilitates compliance with pay-to-play laws of different jurisdictions having varying requirements. The pay-to-play compliance system and method also provides reporting functionality, and integration with other internal databases and systems in order to minimize the amount of information required to be entered by a user. In addition, the compliance system supports a refund mechanism whereby an individual who has over-contributed can report a refund amount consistent with pay-to-play laws.Type: ApplicationFiled: December 5, 2012Publication date: December 26, 2013Applicant: Massachusetts Mutual Life Insurance CompanyInventors: Hugh Barrett, Tanya Ellen Lane, Janet DeGazon
-
Patent number: 8612322Abstract: A method and related system obtains consent from a user for electronic delivery of sensitive information. The user operating a first computer accesses a web page on a server system to input the consent. The web page prompts for the consent from the user. Once the consent is received at the server system, the consent is stored and sensitive information is delivered electronically to an e-mail address specified by the user. Once consent is indicated, it is communicated from the individual's computer to another computer such as a server over, for example, a modem connection. Having secured the individual's consent, the additional sensitive information may be delivered to the individual's computer as, for example, a URL attachment to an email message.Type: GrantFiled: February 14, 2011Date of Patent: December 17, 2013Assignee: Broadridge Content Solutions, Inc.Inventors: Stephen V. Burakoff, Sergiu S. Simmel, Robert A. Fein, Alex Magary, Leonard Driscoll, Garett Wiley
-
Publication number: 20130332376Abstract: The present relates to a method and system for performing dynamic test compliance in a multi level supply chain hierarchy. The method and system receive specifications for a type of component, allocate a unique identifier to a component corresponding to the type of component, execute a suite of tests on the component, and generate a compliance certificate for the component. The compliance certificate comprises the unique identifier of the component; and a compliance status, indicative of a compliance of the component. The compliance status is a function of the specifications, and of results of the suite of tests. The compliance certificates of components included in a product are further analyzed. For instance, the method and system determine which of the components included in a product have a compliance status set to non compliant. The multi level supply chain hierarchy comprises the OEM and a hierarchy of supply chain partners.Type: ApplicationFiled: June 12, 2012Publication date: December 12, 2013Inventors: Pascal PILON, Philipe Desaulniers, Nicolas Roy
-
Publication number: 20130332377Abstract: A computer-implemented method, including receiving, with a receiver or a computer, a search request for information regarding an agent; processing, with the computer or with a second computer, the search request; generating, with the computer or with a second computer, a message in response to the search request, wherein the message contains information identifying at least one agent in response to the search request; and transmitting, from a transmitter, the first computer, or the second computer, the message to a communication device used by or associated with a user.Type: ApplicationFiled: June 25, 2013Publication date: December 12, 2013Inventor: Raymond Anthony Joao
-
Patent number: 8606648Abstract: A vehicle history information system and a method for determining the potential for curbstoning. In one embodiment, the vehicle history information system includes a vehicle history database with at least one vehicle history dataset related to a particular vehicle, the vehicle history dataset having at least one vehicle history record regarding the particular vehicle, and a record analysis module adapted to analyze the vehicle history dataset of the particular vehicle to determine whether there is a potential for curbstoning the particular vehicle based on the vehicle history record. In one implementation, the vehicle history record is an auto auction record which may indicate a sale of the particular vehicle and/or an offer for sale of the particular vehicle.Type: GrantFiled: April 26, 2004Date of Patent: December 10, 2013Assignee: Carfax, Inc.Inventors: Gerald A. Bayer, David L. Silversmith
-
Publication number: 20130325731Abstract: A method performed by a computing device and having one or more processors and memory storing one or more programs for execution by the one or more processors, comprising information including a representation of at least one compliance issue is received. The information is analyzed to determine at least one entity to which the at least one compliance issue is pertinent. The information is forwarded to the at least one entity in response to a determination that the legal change is pertinent to the at least one entity. A response is received from the at least one entity a response including a representation as to how the at least one entity intends to address the compliance issue.Type: ApplicationFiled: April 26, 2013Publication date: December 5, 2013Applicant: UNITED SERVICES AUTOMOBILE ASSOCIATION (USAA)Inventors: N. Michelle Guarnery, Michael Foley, Stephanie Higby, Kellie Weber
-
Publication number: 20130325732Abstract: A heat transfer composition comprising trans-1,3,3,3-tetrafluoropropene (R-1234ze(E)), difiuoromethane (R-32) and 1,1-difluoroethane (R-152a).Type: ApplicationFiled: July 19, 2013Publication date: December 5, 2013Applicant: MEXICHEM AMANCO HOLDING S.A. DE C.V.Inventor: Robert E. Low
-
Publication number: 20130317996Abstract: Systems and methods of tracking the status of product instantiations are provided. The status of production instantiations are determined based upon a highest level within a product packaging hierarchy in which the status applies to all product instantiations. The status is then updated for the determined level using an random unique code string assigned to the product packaging at the determined level.Type: ApplicationFiled: May 24, 2012Publication date: November 28, 2013Applicant: Verify BrandInventors: Jason GEYEN, Steve Miller
-
Publication number: 20130315437Abstract: The present disclosure is directed to an automated precious metal bullion authentication apparatus and system that, without human intervention, develops and disseminates information to enable a user to distinguish between genuine and non-genuine precious metals bullion items. The systems and devices may work together with third-party hardware or software and, with Internet access, may be utilized 24/7, 365 days a year. The system or device enables a user to receive directly at a point of sale, or anywhere in public or private, information regarding whether an item is genuine or not. Information regarding genuineness of an item may be provided to the user before, during, or after a monetary or non-monetary exchange or transaction between individuals or entities. The system or device identifies and authenticates precious metal bullion items automatically through a multiplicity of procedures and renders a conclusion based on data from acquired digital images and other physical measurements.Type: ApplicationFiled: March 13, 2013Publication date: November 28, 2013Applicant: SECURITY PACIFIC CAPITAL CORPORATIONInventors: Michael B. KERSCHNER, Donald L. GARDNER
-
Patent number: 8595145Abstract: Disclosed is a method by which suretyship bonds and guaranties can be purchased and deployed over the Internet in real time, providing automatic application evaluation and policy binding. The principal's credit card information is used in a repeating cycle of pre-authorized charges so that the card account serves as effective collateral. A bond seal image, safeguarded against piracy, appears in Web pages indicating the existence of bond coverage. A dynamically updated gauge displays the margin of coverage available under the bond at any given moment. Means of integrating the information technology of auction site and surety company are also disclosed. The invention makes possible an unprecedented level of security in user-to-user auction environments and eliminates the need for online escrow services. Means of accepting bidder deposit accounts is also disclosed, enabling automatic, electronic payment the moment an Internet auction closes and eliminating the need for online payment services.Type: GrantFiled: November 22, 2010Date of Patent: November 26, 2013Inventor: Shelton E. Harrison, Jr.
-
Publication number: 20130311387Abstract: A predictive model provides a detection system for the risk associated with organizational representatives of an organization not being in compliance with laws, regulations, and organizational policies. The system produces a score, which measures the likelihood of non-compliance for organizational representatives, larger organizational units, or the entire organization. The predictive model is part of a system that analyzes individual interactions between representatives and their counterparts outside the organization for scoring. The system stores data about these interactions in a database, which is used to derive variables for the predictive model, and processes the model outputs.Type: ApplicationFiled: April 11, 2013Publication date: November 21, 2013Inventor: Jurgen Schmerler
-
Publication number: 20130311386Abstract: One example of the system and method described herein may be used to create and manage encapsulated workflow packages, which may include package identifiers specified with a universal endpoint address schema that can be used to route documents and manage document workflows. In particular, the encapsulated workflow packages may embed, among other things, full on-ramping requirements associated with documents captured therein, including any necessary workflow steps applicable to devices, entities, or other receiving destinations that may participate in on-ramping data further embedded therein. Accordingly, the encapsulated workflow packages may embed native business intelligence that can control governance, risk, and compliance across organizational boundaries.Type: ApplicationFiled: March 15, 2013Publication date: November 21, 2013Inventors: Mehdi Tehranchi, Henric HARUTUNIAN, Kaveh PARSEE
-
Publication number: 20130311388Abstract: A fact checking system verifies the correctness of information and/or characterizes the information by comparing the information with one or more sources. The fact checking system automatically monitors, processes, fact checks information and indicates a status of the information.Type: ApplicationFiled: July 19, 2013Publication date: November 21, 2013Inventor: Lucas J. Myslinski
-
Publication number: 20130311385Abstract: The technology disclosed in this specification includes a method and a system for monitoring external party (partner, supplier, subsidiary or similar organization) security events and monitoring compliance of third party security logs and configuration files within agreed upon rules. The embodiment a) integrates with system logging utilities to collect event information, b) identifies events that are relevant to an established set of rules, c) reports the events to the primary party, d) receives on the third party system audit requests from the primary party and executes the audit actions on the third party systems, e) performs the required verifications on the third party specified in the audit requests, f) sends the audit results back to the primary party.Type: ApplicationFiled: May 18, 2012Publication date: November 21, 2013Inventor: Park S. Foreman
-
Patent number: 8589308Abstract: A web-based grant management application and method is described. Registration information pertaining to a grant requestor is received at a web-based portal. A local, computer readable compliance database is maintained. The compliance database includes an exclusion list of grant requestors that have been excluded from receiving a grant. The grant management application determines an exclusion status for the grant requestor by comparing the registration information to the exclusion list. The grant requestor is informed of its exclusion status via the web-based portal. If the grant requestor's exclusion status is satisfactory, then the web-based portal receives grant information pertaining to a grant sought. Based on the grant information and the registration information, a custom set of business rules is derived to automatically manage the receipt, review, tracking, reconciliation and analysis of the grant sought.Type: GrantFiled: February 7, 2011Date of Patent: November 19, 2013Assignee: Polaris Solutions, LLCInventor: Andreas J. Bender
-
Patent number: 8577486Abstract: Systems, methods, and other embodiments associated with contextualizing energy consumption are described. One example method includes accessing stored energy consumption data and stored operation status data from production-related equipment; correlating the operation status data with the energy consumption data; and categorizing energy consumed by the production-related equipment as value-added or non-value-added based, at least in part, on the correlating of the operation status data with the energy consumption data. The example methods may also include determining an energy classification for an energy-consuming entity; identifying child entities of the energy-consuming entity; accessing energy consumption data for the energy-consuming entity and the child entities; aggregating the energy consumption data for the energy-consuming entity and the child entities; and classifying the aggregated energy consumption data with the energy classification for the energy-consuming entity.Type: GrantFiled: January 14, 2011Date of Patent: November 5, 2013Assignee: Oracle International CorporationInventors: Hakki Ozgur Unver, Giri Tippireddy, Aravindan Sankaramurthy, Yong Feng
-
Publication number: 20130290200Abstract: Systems and methods may provide automated compliance and operations management services. User tracking information may be received and stored. The tracking information may be analyzed to generate information for compliance or operations management, which may be provided to a recipient. Systems and methods may automate the process of monitoring, collecting, storing, analyzing, and utilizing data and information. Alerts may be generated. Reports may be compiled and delivered to a reporting entity, and may be used for compliance, tracking, monitoring or operations management. Some data may be fed directly into other existing systems and databases including, but not limited to, payroll processing systems, tax enterprise resource planning systems, human resource (HR) systems, time-keeping systems and billing systems. Proposed systems and methods may be used by individuals, enterprises, or other entities that gather data for regulatory or other compliance or operations management.Type: ApplicationFiled: April 29, 2013Publication date: October 31, 2013Applicant: MONAEO, LLC.Inventors: Anupam Singhal, Nishant Mittal
-
Publication number: 20130290199Abstract: A method is described for using a telematics system to monitor compliance with a vehicle use agreement. Monitoring is facilitated by vehicle sensors and GPS components. The method includes receiving information from onboard vehicle sensors, applying the vehicle data received from onboard vehicle sensors with pre-stored information pertaining to the vehicle use agreement, and determining whether the information acquired from onboard vehicle sensors indicates potential non-compliance with the use agreement. Information pertaining to the use agreement is stored in an onboard telematics unit or in a database maintained by a Telematics Service Provider. Upon identification of potential non-compliance with the vehicle use agreement, the telematics system notifies an interested party. Furthermore, interested parties are provided with options for addressing the detected potential non-compliance with the vehicle use agreement.Type: ApplicationFiled: April 30, 2012Publication date: October 31, 2013Applicant: GENERAL MOTORS LLCInventors: Esteban Camacho, Dexter C. Lowe, Shpetim S. Veliu, David A. Lohmeier
-
Publication number: 20130282600Abstract: A computer system receives an audit report from an audit proceeding. Predefined patterns are recognized in the audit report. One or more audit issues may be associated with each recognized pattern. Suitable remedial action may be generated for each identified audit issue, and dispatched to one or more actors who are then responsible for attending to the remedial action.Type: ApplicationFiled: April 23, 2012Publication date: October 24, 2013Applicant: SAP AGInventor: Ying Zeng
-
Publication number: 20130275318Abstract: Disclosed herein is a transformation system for at least one component of a single or multi-component nutritional substance. The transformation system obtains information regarding the nutritional substance to be transformed, the desired transformation, and the desired properties, including nutritional content, of the transformed nutritional substance, and dynamically modifies the transformation in response to this information. Also disclosed herein is an information system that enables the rapid determination of a nutritional substance's compliance, or non-compliance, with a consumer's nutritional substance requirements.Type: ApplicationFiled: April 11, 2013Publication date: October 17, 2013Inventor: Eugenio Minvielle
-
Publication number: 20130275317Abstract: A computer system and a computer-implemented method for managing digital media objects is described.Type: ApplicationFiled: April 11, 2013Publication date: October 17, 2013Applicant: Alamy LimitedInventors: James L. WEST, Kaldip S. CHOHAN, John S. SCHILIZZI, Richard G. TAYLOR
-
Publication number: 20130275316Abstract: A system for certification of animals, owners, attendants, venues, enterprises, and events relies on identification, traceability, and evaluation against selected criteria. Data maintained during agricultural production includes production, raising, selling, holding, treating, harvesting products like milk or wool, slaughter, transfer of ownership or venue, and veterinary and pharmacological interventions, whether medicaments, preventives, protocols, treatments, or inspections administered. Record keeping and selection, analysis, and notifications are according to criteria (particularly risks, exposures, or both) specified by any entity requesting or requiring a certification of a condition or lack thereof. Warnings may be triggered and distributed timely. Mobile units avoid traditional deficiencies in data, analysis, risk assessment, and timeliness.Type: ApplicationFiled: March 14, 2013Publication date: October 17, 2013Inventor: Chia-Chi Teng
-
Publication number: 20130268417Abstract: A request for custom credit card sales account information is received at a server from a merchant employing a mobile device. The request includes an indication of a particular reporting type of the custom credit card sales account information. The server requests credit card sales account information from a financial service provider. The financial service provider is different than an entity hosting the server. The server receives the credit card sales account information from the financial service provider. The server filters the credit card sales account information based on the particular reporting type. The server generates a filtered custom credit card sales account based on the filtering. The server provides the filtered custom credit card sales account information to the mobile device.Type: ApplicationFiled: April 5, 2013Publication date: October 10, 2013Applicant: My Clear Reports, LLCInventor: Amedeo Dino Sgueglia
-
Publication number: 20130268449Abstract: Methods and systems for mobility device tracking within a facility. Device information is received, stored and updated. The location is tracked within the facility. Information related to interactions with the mobility device are stored. A compliance report is generated based on the stored interaction information.Type: ApplicationFiled: April 10, 2012Publication date: October 10, 2013Inventor: Craig Mateer
-
Publication number: 20130268450Abstract: A method of securing a chain of custody of a specimen of a donor prevents tampering with or accidental mismanagement of the specimen. The method includes providing a tamper evident seal operable to indicate that an assaying device has been tampered with once the seal is sealed, the seal including a label having at least one portion including a machine-readable indicia area. The assaying device comprises a collection cup and a cap that carries at least one test strip.Type: ApplicationFiled: June 3, 2013Publication date: October 10, 2013Inventors: Murray I. Lappe, David A. Birkner, John w. Goodin, Keith Patten, Bill Whitford
-
Patent number: 8554606Abstract: A system and method for managing sponsorships by a sponsor, in which the party requesting the sponsorship requests to use content owned and protected by the sponsor, such as trademarks, logos, and copyrighted material. An embodiment of the method involves receiving, at a computer network site, a request for sponsorship from a requestor and responding to the request by sending either an approval or a rejection. If an approval is sent, the method further involves providing the requestor with access to content of the sponsor through the site. As part of providing this access, the method can involve requiring the requestor to accept an agreement posted on the site. The method can also include monitoring the requestor's actual use of the content.Type: GrantFiled: August 8, 2012Date of Patent: October 8, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Marcus Delgado, Sandra J. Evans, Harrison P. Lantz, Amy L. Sherwood, David L. Furth
-
Patent number: 8554692Abstract: The disclosure relates to a computerized method and system for tracking consumer replaceable units (CRU) used in products such as printing systems. In the method the CRUM ID and destination of the consumable is retrieved on shipment from a supplier. When the consumer replaceable unit is installed in a device such as printing system, the device reports the installation back to a management application. The management application then proceeds to authorize the consumable for the reporting printing system, offer to transfer ownership, or when the printing system is not a managed device then offers a customer the option of being billed for the consumable. The management application has the option of disabling printing with customer replaceable unit when reassignment or intent to purchase is not available. When the consumable is returned the management application can ascertain if the customer replaceable unit was used by its assigned printing device.Type: GrantFiled: March 31, 2011Date of Patent: October 8, 2013Assignee: Xerox CorporationInventors: Matthew O. Scrafford, Jason C. Tsongas
-
Publication number: 20130262328Abstract: A computer-implemented method and system data breach compliance is disclosed. Organization related information may be received. Breach information relating to a data breach event of the organization may be received. The breach information may include, for example, breach event description information, compromised personal identification information, and remediation action information. A breach report may be generated based on the breach information, the organization related information, and one or more rules related to data breach. At least one reporting entity may be determined based on the organization related information, the breach information, and the one or more rules. The breach report may be output.Type: ApplicationFiled: March 30, 2012Publication date: October 3, 2013Applicant: CSRSI, Inc.Inventor: Warren Ross Federgreen
-
Publication number: 20130262329Abstract: Computer-implemented methods and systems for data breach compliance are disclosed. Organization related information may be received. Breach information relating to a data breach event of the organization may be received. The breach information may include, for example, breach event description information, compromised personally identifiable information, and remediation action information. A breach report may be generated based on the breach information, the organization related information, and one or more rules related to data breach. At least one reporting entity may be determined based on the organization related information, the breach information, and the one or more rules. The breach report may be output.Type: ApplicationFiled: January 17, 2013Publication date: October 3, 2013Applicant: CSRSI, INC.Inventor: Warren Ross Federgreen
-
Publication number: 20130254128Abstract: Method for detecting and exhibiting infringements of regulations and breaches of rules, wherein the latter are detected by means of a hand-held computer, wherein the infringement of regulations or the breach of rules is established by an inspector and is input by said inspector into the hand-held computer, and a printed notification, relating to the infringement of regulations or the breach of rules, is handed over or left behind.Type: ApplicationFiled: March 25, 2013Publication date: September 26, 2013Applicant: Schweers Informationstechnologie GmbHInventor: Schweers Informationstechnologie GmbH
-
Publication number: 20130254127Abstract: An authentication method and an authentication system of an electronic product are provided. The authentication method includes following steps: an electronic device is connected to a first authentication module via a network; the electronic device outputs first authentication information of the electronic product to the first authentication module; the first authentication module verifies the first authentication information and generates second authentication information corresponding to the electronic product; the first authentication module is connected to a second authentication module via the network; the first authentication module outputs the second authentication information to the second authentication module; and the second authentication module verifies the second authentication information. The present disclosure provides a multi-authentication method and an authentication system of the electronic product to activate corresponding services from service providers.Type: ApplicationFiled: March 12, 2013Publication date: September 26, 2013Applicant: ASUSTEK COMPUTER INC.Inventors: Hsin-Yi LEE, Chi-An LU, Meih-Suan WANG
-
Patent number: 8544091Abstract: Some embodiments provide an advocate system to facilitate automated online presence verification for different entities on behalf of the entities. The advocate system places service providers on notice that profiles and information hosted by them and that form the online presence for a particular entity should first be verified with that particular entity. The advocate system further facilitates online presence verification by 1) directly or indirectly connecting the service providers that are placed on notice with the appropriate authoritative entities to facilitate the verification of the profiles and information, 2) selectively targeting service providers hosting profiles and information that are unverified, 3) automatedly verifying hosted profiles and information based on a verified profile lists and verified information that authoritative entities provide to a central repository.Type: GrantFiled: December 18, 2012Date of Patent: September 24, 2013Assignee: Credibility Corp.Inventor: Jeffrey M. Stibel
-
Publication number: 20130246292Abstract: A compliance computer creates compliance documents referencing one or more rules with which an entity must comply and/or a jurisdiction and topic related to rules with which the company must comply. For example, the compliance documents may identify one or more jurisdictions in which the company operates, one or more topics associated with the company, and/or specific provisions set by specific rules. A transmission object is created based on the compliance documents. The transmission object includes general information pertinent to the rules and/or the entity (e.g., jurisdictional or topical information). An operator server receives one or more transmission objects from one or more compliance computers. The operator server identifies rules pertinent to each transmission object and conducts a search to determine whether any of those rules have been modified. The operator server sends a signal that is associated with the one or more compliance rules to the compliance computer.Type: ApplicationFiled: March 16, 2012Publication date: September 19, 2013Inventors: Zane Dick, Gary Lalonde, Janna Pulver, Rowan C. Seidel, Lora Thody
-
Publication number: 20130246291Abstract: A compliance computer creates compliance documents referencing one or more rules with which an entity must comply and/or a jurisdiction and topic related to rules with which the company must comply. For example, the compliance documents may identify one or more jurisdictions in which the company operates, one or more topics associated with the company, and/or specific provisions set by specific rules. A transmission object is created based on the compliance documents. The transmission object includes general information pertinent to the rules and/or the entity (e.g., jurisdictional or topical information). An operator server receives one or more transmission objects from one or more compliance computers. The operator server identifies rules pertinent to each transmission object and conducts a search to determine whether any of those rules have been modified. The operator server sends a signal that is associated with the one or more compliance rules to the compliance computer.Type: ApplicationFiled: March 16, 2012Publication date: September 19, 2013Inventors: Zane Dick, Gary Lalonde, Janna Pulver, Rowan C. Seidel, Lora Thody
-
Publication number: 20130246293Abstract: A system and method for verifying that an individual, such as a DJ, has lawfully obtained a copy of material, such as music audio and music videos. The system and method allows potential employers to verify with an independent source that an individual has met the requisite showing to be certified. The verification/certification can be represented by a membership card, logo, identification number, or the like.Type: ApplicationFiled: June 4, 2012Publication date: September 19, 2013Inventor: David Casto
-
Publication number: 20130238516Abstract: A merchandising system and method allow a retailer to determine whether a retail store is in compliance with an electronic retail merchandising program implemented by the retailer. A merchandising display configured to display an item of merchandise at the retail store is provided. A control module is configured to provide information relating to the item of merchandise when a customer interacts with the item of merchandise and to communicate with a network to report data relating to the merchandising display. The retailer may analyze the data obtained from the merchandising system and reported to the network in various ways to determine whether a retail store is in compliance with the electronic retail merchandising program.Type: ApplicationFiled: March 7, 2013Publication date: September 12, 2013Applicant: INVUE SECURITY PRODUCTS INC.Inventors: Andrew W. Moock, Phillip Stein
-
Patent number: 8533075Abstract: The present invention describes a biomedical track-and-trace solution based on unique item-level QR codes printed on product packaging and encoding unique URLs to enable granular, item-level product management. In some embodiments of the invention, the information presented to users who access these unique URLs is tailored based on the role of the user in the supply chain. Embodiments of the invention may be used for the purposes of item authentication, anti-counterfeiting measures, product recall management, and the efficient distribution of supplementary product information.Type: GrantFiled: February 13, 2013Date of Patent: September 10, 2013Assignee: AgileQR, Inc.Inventors: Foster Joseph Sayers, III, Albert Ho, Charles Hyung Kim
-
Publication number: 20130232087Abstract: An electronic registration system which facilitates authorized product returns and reduces the incidence of improper returns. A retailer sales associate is prompted to enter individual product identification information such as an individual serial number. This individual product identification information is then stored in a data base along with the date on which the product was sold and an appropriate UPC code, SKU number or manufacturer code. A check digit algorithm may be used to verify the serial number prior to storage. A sales receipt may be imprinted with at least the date of the transaction and the serial number. When a product is returned, the retailer may cross-reference the serial number on the product with that on the receipt to verify the sales receipt. Otherwise, the database may be searched for pertinent sales information.Type: ApplicationFiled: April 15, 2013Publication date: September 5, 2013Applicant: Nintendo of America, Inc.Inventors: Philip Michael ROGERS, Peter Joseph JUNGER
-
Patent number: 8527321Abstract: The system includes a comparison unit that identifies products in an initial assortment of products, a desired assortment of products and the performance metric for each product. The comparison unit compares the initial assortment of products and the desired assortment of products to determine kept products, added product and deleted products. The system includes an interaction unit simulating the interaction of the kept products, the added products and the deleted products based on the performance metric. The system generates simulation results identifying the interactions between the kept products, the added products and the deleted products.Type: GrantFiled: March 25, 2010Date of Patent: September 3, 2013Assignee: Accenture Global Services LimitedInventor: Joseph S. Bottom
-
Publication number: 20130226810Abstract: A system for certifying the status of a will having a security device adapted to be affixed to a will. A server creates an account reference number and a version identification; the version identification corresponds to a version of a will to which the security device is affixed The security device contains information, which includes at the least one of the account reference number and the version identification. A remote computing device communicates with the server and communicates information contained in the security device to the server. A database communicates with the server and stores the version identification and account reference number. The server maps the version identification to the account reference number. A system that will locate the last and legitimate will regardless of which version of the will is initially referenced.Type: ApplicationFiled: February 24, 2012Publication date: August 29, 2013Inventor: Wayne Moffett
-
Publication number: 20130226819Abstract: Validating business objects is described, including: receiving from a client device associated with a requesting user a validation request associated with a business object; determining identification information associated with the business object from the validation request; obtaining historical data associated with the business object based at least in part on identification information associated with the business object, wherein the historical data includes data associated with one or more previous buyers of the business object; and selecting at least one previous buyer from the one or more previous buyers to validate the business object.Type: ApplicationFiled: February 25, 2013Publication date: August 29, 2013Applicant: ALIBABA GROUP HOLDING LIMITEDInventor: Alibaba Group Holding Limited
-
Patent number: 8521655Abstract: An engine, system and method for providing cloud-based business intelligence data, responsively to received company information, including a local front end comprising a graphical user interface capable of locally querying a user for an electronic location of the received company information, and ones of the business intelligence data to be displayed on the graphical user interface upon upload of the received company information from the electronic location, and further including an at least partially remote back end, comprising an accessing engine capable of accessing the electronic location for uploading to the cloud of only ones of the received company information indicative of the ones of the business data intelligence to be displayed, and a charging engine for charging an account of a user of the front end $1 per the ones of the business intelligence data to be displayed.Type: GrantFiled: December 6, 2011Date of Patent: August 27, 2013Assignee: BizEquity LLCInventor: Michael M. Carter
-
Patent number: RE44542Abstract: A method and system for verifying a check that is being used for an on-line transaction, utilizes a hash code value either printed directly on the check, or obtained from an insert card provided by a check printer. To conduct an on-line transaction using a check, the customer enters in data obtained from a MICR line of the check, whereby the data includes a one-way hash value that is based on the data provided on the MICR line as well as private data not provided on the MICR line. A web server of an e-tailer for which the customer seeks to make the on-line transaction, receives the data entered by the customer. The web server of the e-tailer transmits, to a check verifier, the data entered by the customer. The check verifier verifies whether or not the check is valid, by comparing the hash code value entered in by the customer with a hash code value that is separately calculated by the check verifier, based on private data of the customer obtained by the check verifier from a database.Type: GrantFiled: June 27, 2008Date of Patent: October 15, 2013Assignee: Pyfrm Holdings Limited Liability CompanyInventors: William D. Meadow, Randall A. Gordie, Jr., Sanjay P. Ahuja