Product, Service, Or Business Identity Fraud Patents (Class 705/318)
  • Patent number: 10552762
    Abstract: A method for determining specific conditions occurring on industrial equipment based upon received signal data from sensors attached to the industrial equipment is provided. Using a server computer system, signal data is received and aggregated into feature vectors. Feature vectors represent a set of signal data over a particular range of time. The feature vectors are clustered into subsets of feature vectors based upon attributes the feature vectors. One or more sample episodes are received, where a sample episode includes sample feature vectors and specific classification labels assigned to the sample feature vectors. A signal data model is created that includes the associated feature vectors, clusters, and assigned classification labels.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: February 4, 2020
    Assignee: Falkonry Inc.
    Inventors: Mohammad H. Firooz, Nikunj R. Mehta, Greg Olsen, Peter Nicholas Pritchard
  • Patent number: 10535093
    Abstract: The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks.
    Type: Grant
    Filed: August 28, 2018
    Date of Patent: January 14, 2020
    Assignee: The 41st Parameter, Inc.
    Inventor: Ori Eisen
  • Patent number: 10467654
    Abstract: Systems, methods, and other embodiments associated with forecasting customer channel choice using cross-channel loyalty are described. In one embodiment, a method includes accessing historical values for each of one or more loyalty variables for respective customers. The method also includes determining respective loyalty variable predictors for each of the one or more loyalty variables for each customer based on the historical values. In response to a trigger event associated with a given customer, the loyalty variable predictors for the customer are used to estimate a present value of each of the one or more loyalty variables for the customer. The present value of each of the loyalty variables is input to a forecast model that calculates, for each channel, a probability that the customer will make a purchase using the channel. The purchase probabilities are provided for use in selecting a marketing message for the customer.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: November 5, 2019
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Kiran V. Panchamgam, Su-Ming Wu
  • Patent number: 10423962
    Abstract: Systems, apparatus, and methods are provided for efficiently authorizing a transaction initiated by a consumer. An authorization can be generated before the consumer actually initiates the transaction. For example, a future transaction can be predicted, and an authorization can be generated for the predicted transaction. In this manner, the authorization can be ready and quickly used when the consumer does initiate the transaction. Previous transactions made by the consumer can be used to predict when the future transaction is likely. In various examples, the authorization can be sent to a specific merchant or to the consumer for use when the consumer initiates the predicted transaction, or saved by an authorization server for use in response to an authorization request from the merchant.
    Type: Grant
    Filed: August 18, 2017
    Date of Patent: September 24, 2019
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventors: Patrick Faith, Kevin P. Siegel, Ayman Hammad
  • Patent number: 10360562
    Abstract: Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: July 23, 2019
    Assignee: PayPal, Inc.
    Inventors: Sebastien Taveau, John Hastings Granbery
  • Patent number: 10296917
    Abstract: The present disclosure provides an authenticity verifying system capable of generating renewed database and updating unlock number upon occurrence of information leak, and comprises product (1) having lock device (11) with infrared ray transceiving unit (12) and keypad (14), and scratch card (13) with password and product serial number provided thereon; a manufacturer's verifying server (2) for verifying product authenticity through a commercial communication network; and an unlock number change device (3) responsive to leak of information stored in server (2) for downloading, from server (2), predetermined password that matches product (1) and renewed unlock number newly matched to the product serial number. Further, the present disclosure provides a method for verifying product authenticity through acquiring an unlock number, and comprises performing an unlock number acquiring process and applying the unlock number acquired to lock device (11) of product (1) to unlock lock device (11).
    Type: Grant
    Filed: January 22, 2013
    Date of Patent: May 21, 2019
    Inventor: Hae-Tahk Chung
  • Patent number: 10284579
    Abstract: A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender.
    Type: Grant
    Filed: March 22, 2017
    Date of Patent: May 7, 2019
    Assignee: VADE SECURE, INC.
    Inventor: Sebastien Goutal
  • Patent number: 10225432
    Abstract: Examples herein disclose receiving and identifier associated with a first void pantograph and identifying a second void pantograph based on the received identifier. The examples facilitate authentication of the first void pantograph by making available the second void pantograph.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: March 5, 2019
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Steven J Simske, Jason S Aronoff
  • Patent number: 10089679
    Abstract: The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks.
    Type: Grant
    Filed: July 20, 2017
    Date of Patent: October 2, 2018
    Assignee: The 41st Parameter, Inc.
    Inventor: Ori Eisen
  • Patent number: 10074141
    Abstract: A method for linking forensic data to transaction history includes: storing a plurality of consumer profiles, each profile including data related to a consumer including a consumer identifier associated with the related consumer and a plurality of transaction data entries, each entry including data related to a payment transaction involving the consumer including transaction data; receiving a forensic profile, the profile including forensic data obtained from a computing device; identifying a correspondence between the received forensic data and transaction data included in the stored transaction data entries to obtain a specific consumer identifier; identifying a specific consumer profile where the included consumer identifier corresponds to the specific consumer identifier; and transmitting at least the transaction data included in one or more transaction data entries included in the identified specific consumer profile.
    Type: Grant
    Filed: June 2, 2014
    Date of Patent: September 11, 2018
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventors: Kenny Unser, Kent Olof Niklas Berntsson, Jean-Pierre Gerard
  • Patent number: 10019744
    Abstract: A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device.
    Type: Grant
    Filed: February 14, 2014
    Date of Patent: July 10, 2018
    Assignee: Brighterion, Inc.
    Inventor: Akli Adjaoute
  • Patent number: 9940491
    Abstract: A location tracking system includes a tag configured to be uniquely associated with and affixed to an item, and automatically and periodically emit a first signal, a receiving transmitter having a Bluetooth signal reception functionality that is configured to automatically receive the first signal from the tag when the receiving transmitter is within a broadcast range of the tag without requiring pairing of the receiving transmitter and the tag and transmit a second signal, and a data system configured to be remotely accessible to the receiving transmitter and receive the second signal transmitted from the receiving transmitter. The second signal can be transmitted via a network to which the receiving transmitter is connected. An application can be installed in the receiving transmitter that allows the receiving transmitter to automatically receive the first signal and initiate transmission of the second signal from the receiving transmitter to the data system.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: April 10, 2018
    Assignee: ASCENT SOLUTIONS PTE LTD
    Inventors: Chee Kean Lim, Kia Boon Chew, Pui Lan Pauline Margaret Chung
  • Patent number: 9901831
    Abstract: Disclosed are systems and methods for online community management. The disclosed system allows for automatic identification and punishment of players exhibiting bad sportsmanship through a combination of automatic detection schemes and a peer reporting scheme. In addition to the sportsmanship check, the disclosed system also provides automatic checks for identifying potential cheaters and generating a potential cheaters list for review by admin staff. As a result of either classification system, players found to be either bad sports or cheaters are not allowed to participate in play with the general pool of players, but instead must play in an alternate pool. For extremely harmful conduct, players may be banned from the online community.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: February 27, 2018
    Assignee: TAKE-TWO INTERACTIVE SOFTWARE, INC.
    Inventors: Dan Conti, Evan Michaels, Pablo Aguilar Fruto
  • Patent number: 9858127
    Abstract: A platform architecture that is configurable to provide task specific application instances compatible with one or more hosts is provided with a method for using the architecture. In one example, the platform architecture provides a transducer functionality block, a conduit functionality block, an application functionality block, and an application programming interface (API) functionality block on which each task specific application instance is based.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: January 2, 2018
    Assignee: D. Alan Holdings, LLC
    Inventors: Douglas A. Standley, Randall E. Bye, Bill C. Hardgrave, David M. Sherr
  • Patent number: 9852476
    Abstract: Case management interface provides correlation among a plurality of transaction orders in an interactive graphical format. A visualization window displays a plurality of transaction orders that are visually connected based on one or more common data elements associated with the transaction orders. The visualization window can allow a user to interact with different elements of the display to analyze the relationship between order data elements, view order details, reject or accept orders or mark an order as suspect. Different layout options are available to enhance the visualization of the transaction order data.
    Type: Grant
    Filed: January 21, 2015
    Date of Patent: December 26, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventor: Cory H. Siddens
  • Patent number: 9836761
    Abstract: An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: December 5, 2017
    Assignee: Facebook, Inc.
    Inventors: Andrew G. Bosworth, Aruna Bharathi
  • Patent number: 9754311
    Abstract: The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks.
    Type: Grant
    Filed: November 3, 2015
    Date of Patent: September 5, 2017
    Assignee: The 41st Parameter, Inc.
    Inventor: Ori Eisen
  • Patent number: 9679321
    Abstract: The technology may receive a product identification from a merchant and evaluate the product identification against evaluation rules to determine a likelihood of whether the product identification is valid for a product associated with the product identification.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: June 13, 2017
    Assignee: Amazon Technologies, Inc.
    Inventor: Bradley John Pitzel
  • Patent number: 9659308
    Abstract: An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: May 23, 2017
    Assignee: Facebook, Inc.
    Inventors: Andrew G. Bosworth, Aruna Bharathi
  • Patent number: 9595162
    Abstract: In some embodiments, a computer-implemented method includes permitting a plurality of wagering game terminals to participate in a community game in a land-based gaming establishment. The method includes permitting a player device remote from the land-based gaming establishment to play an online game. The method also includes modifying, by at least one of one or more processors, the community game based on an event in the online game.
    Type: Grant
    Filed: May 6, 2014
    Date of Patent: March 14, 2017
    Assignee: BALLY GAMING, INC.
    Inventors: Tracey L. Wright, Dion K. Aoki, Andrew C. Guinn, Joel R. Jaffe, Robert L. Kyte, Bradley D. Schultz
  • Patent number: 9542694
    Abstract: An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: January 10, 2017
    Assignee: Facebook, Inc.
    Inventors: Andrew G. Bosworth, Aruna Bharathi
  • Patent number: 9202179
    Abstract: The invention relates to a multi-component device Z to document processes R comprising at least one step wherein a device Y collects information from all components Cij used to make the product Di of an individual process step i, a device X calculates a hash code for each component Cij, a device W calculates a hash code Ji from all hash codes components used in process step i, and a device T provides the product Di with a mark MDi comprising a visual representation of the hash code Ji, and to the use of this process in control and documentation of product or service quality, logistics, or manufacturing.
    Type: Grant
    Filed: March 12, 2012
    Date of Patent: December 1, 2015
    Inventors: Adalbert Gubo, Christina Schuette
  • Patent number: 9043358
    Abstract: A unified search service may collect information related to an enterprise from at least one of publicly available data and private enterprise data. In some implementations, crowd sourcing may be used to determine a source list of one or more sources of information. Authored content can be generated, such as by combining one or more items of information from the public data with one or more items of information from the private enterprise data. Further, in some implementations, a public index may be generated from the public data, and one or more affiliation indexes may be generated from the private enterprise data. For example, a first affiliation index may contain confidential enterprise information, while a second affiliation index may contain non-confidential enterprise information. A user's affiliation to the enterprise may be taken into consideration when determining which indexes to use when responding to a search request from the user.
    Type: Grant
    Filed: March 9, 2011
    Date of Patent: May 26, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Lili Cheng, Xuedong David Huang, Heung-Yeung Shum, Eric J. Horvitz, James H. Lewallen, Todd D. Newman, David S. Taniguchi
  • Publication number: 20150142683
    Abstract: The method of anti-counterfeit identification includes establishing a tracking platform to render and store enterprises' registration information (including registered names and telephone numbers) and security codes. A client connected to the tracking platform for inquiry is established, and manufacturers print on their products corresponding anti-counterfeit phone numbers, corporate security codes and commodity security codes obtained from the anti-counterfeit tracking platform. Commodity security systems are established by manufacturers for storage of commodity security codes and inquiry records. In each procedure of a commodity sales process, commodity security directly feeds back to corresponding manufacturer. Inquiry can be made via telephone or mobile, having reduced complexity of anti-counterfeit inquiries.
    Type: Application
    Filed: March 25, 2013
    Publication date: May 21, 2015
    Applicant: Xiang Yang Hao Zheng Industrial Cp., Ltd.
    Inventor: Chengwu Guo
  • Publication number: 20150134552
    Abstract: A system for authenticating and managing the ownership of an item comprises a tagging device affixed to the item, wherein the tagging device comprises tagging device data, an item information system receiving the tagging device data and associated item data and storing the tagging device data and the item data, an owner registration and transfer system receiving owner registration data and ownership change requests and storing the ownership history, and an authentication system receiving authentication requests and generating a response based upon the information stored in the system or a connected system.
    Type: Application
    Filed: November 7, 2014
    Publication date: May 14, 2015
    Inventors: Daniel W. ENGELS, Eric M. SMITH, Ross MANDEL
  • Publication number: 20150106282
    Abstract: There are provided a device for determining a counterfeit and a method thereof. The device for determining a counterfeit includes a certification information receiving unit configured to receive certification identification information including at least one piece of certification chip identification information, product identification information, and certification verification information of a verification target product and state information of a device for performing genuine product certification from the device for performing genuine product certification, and a counterfeit determining unit configured to determine a counterfeit based on the received certification identification information or the state information of the device for performing genuine product certification. Therefore, genuine product certification of the verification target product is verified. As a result, it is possible to effectively protect intellectual property rights of producers and easily and accurately determine a counterfeit.
    Type: Application
    Filed: October 15, 2014
    Publication date: April 16, 2015
    Inventors: Seok Woo LEE, Sang Gyoo SIM, Duk Soo KIM
  • Publication number: 20150106283
    Abstract: Provided are an apparatus and method for providing a genuine certification service. The apparatus includes a certification information issuing unit configured to issue genuine certification information including at least one piece of certification chip identification (ID) information, product ID information, certification secret information, and certification verification information to a verification target product in response to an issuance request by a terminal operated by a producer of the verification target product, and a genuine certification executing unit configured to verify validity of the genuine certification information issued to the verification target product and execute genuine certification for the verification target product using the genuine certification information of which the validity is verified in response to a certification request by the terminal operated by the producer of the verification target product.
    Type: Application
    Filed: October 15, 2014
    Publication date: April 16, 2015
    Inventors: Seok Woo LEE, Sang Gyoo SIM, Duk Soo KIM, Gi Young JOO
  • Publication number: 20150095247
    Abstract: In one embodiment, a method includes accessing a plurality of classified event profiles including a classification that identifies whether the corresponding classified event profile is associated with fraud or legitimate. The method also includes accessing a first cluster of classified event profiles each identified as being associated with fraud, and a second cluster of classified event profiles each identified as being legitimate. The method further includes determining a plurality of first sub-clusters of classified event profiles from the first cluster of classified event profiles, and a plurality of second sub-clusters of classified event profiles from the second cluster of classified event profiles.
    Type: Application
    Filed: October 2, 2013
    Publication date: April 2, 2015
    Applicant: Eventbrite, Inc.
    Inventor: Paul Duan
  • Publication number: 20150088770
    Abstract: The present invention relates to (a) a ticket management system for purchasing and allocating event tickets; (b) a ticket authentication system for authenticating tickets presented at an event; and (c) a secondary market system for the authorized resale of event tickets. These systems, individually and collectively, facilitate the reduction of ticket scalping by requiring the production of valid registered valued identification for the purchase, allocation, and resale of event tickets and the admittance to an event.
    Type: Application
    Filed: December 1, 2014
    Publication date: March 26, 2015
    Inventors: Alan Gelfand, Martin Ortmayr, Kevin Peng, Todd Edmondson
  • Publication number: 20150052069
    Abstract: A system and method for detecting fraudulent purchases and returns by significantly reducing the amount of loss any store front merchant endures from unforeseen criminal activity. To attain this, the present method generally comprises of opening concealed packages, checking items in packages, re-sealing packages and entering inventory on a computer software system. The re-sealing of packages is preferred to use a custom store logo seal. By opening and checking all incoming items from the beginning of the delivery, upon entering the store, the employees performing this method, begins with the simplest and least obvious means of accounting for inventory. If this step is sufficiently carried thorough, the employees have satisfied the merchant as to the correct quantity and quality of all inventories, when it first comes into the store.
    Type: Application
    Filed: August 16, 2014
    Publication date: February 19, 2015
    Inventor: Joseph John Hilo
  • Publication number: 20150046351
    Abstract: An exemplary system that includes a computing device receiving data that identifies a set of providers including a target provider. The computing device performs a link-based attribute pre-process on the data to identify, based on the set of providers, a node network structured around the target provider and to generate a set of link-based attributes for the target provider. The computing device classifies the target provider based on the set of link-based attributes.
    Type: Application
    Filed: August 6, 2013
    Publication date: February 12, 2015
    Applicant: Verizon Patent and Licensing Inc.
    Inventor: Mohammad Reza Tayebnejad
  • Publication number: 20150046352
    Abstract: In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a decryption/encryption module, and a network address. Upon assembly of a vehicle, the components form addressable nodes of that vehicle. Relevant digital information of all components is recorded in a proprietary, highly secure data base at the time of manufacture, and updated for vehicular repairs. Only registered agents may access the data base or submit updates to the federal network. During refueling or re-charging of a vehicle, a digital handshake compares public keys of the vehicular components to the proprietary data base, and confirms the integrity of at least some components by a public-key/private-key challenge and response.
    Type: Application
    Filed: August 9, 2013
    Publication date: February 12, 2015
    Inventor: Ronald R. Shea
  • Publication number: 20150032650
    Abstract: The Invention involves using GPS technology to determine where a person has been and then permitting posting of reviews of subjects only if the reviewer has visited that subject within a specified period of time.
    Type: Application
    Filed: July 24, 2013
    Publication date: January 29, 2015
    Inventor: Yakov Z. Mermelstein
  • Publication number: 20140379593
    Abstract: Techniques are provided for managing multiple trusted relationships within a computer product licensing environment. In one example, a partner affiliated with a vendor and a customer of the vendor's products associate with each other. A vendor license manager monitors the license consumption of a customer using the vendor's products and periodically sends a consumption report to a license manager of the associated partner. If a customer's license consumption exceeds the bounds of a given license, the vendor license manager notifies the customer and the partner, and the partner assists the customer in maintaining compliance with the license.
    Type: Application
    Filed: June 23, 2013
    Publication date: December 25, 2014
    Inventors: Steve KOEHLER, Raymond R. SCHNULLE, Thomas E. CRAMER, JR.
  • Publication number: 20140379597
    Abstract: The present disclosure provides an authenticity verifying system capable of generating renewed database and updating unlock number upon occurrence of information leak, and comprises product (1) having lock device (11) with infrared ray transceiving unit (12) and keypad (14), and scratch card (13) with password and product serial number provided thereon; a manufacturer's verifying server (2) for verifying product authenticity through a commercial communication network; and an unlock number change device (3) responsive to leak of information stored in server (2) for downloading, from server (2), predetermined password that matches product (1) and renewed unlock number newly matched to the product serial number. Further, the present disclosure provides a method for verifying product authenticity through acquiring an unlock number, and comprises performing an unlock number acquiring process and applying the unlock number acquired to lock device (11) of product (1) to unlock lock device (11).
    Type: Application
    Filed: January 22, 2013
    Publication date: December 25, 2014
    Inventor: Hae-Tahk CHUNG
  • Publication number: 20140379596
    Abstract: Techniques are provided for auditing and managing licenses for use of computer products. A license manager of a vendor receives an identifier of a computer product and a report of a set of licensed features enabled on the computer product. The license manager identifies a customer account associated with the identifier. The customer account includes a pool of entitlements acquired by the customer. The license manager compares the report with the entitlements in the pool, and with the customer's use of other computer products which draw entitlements from that pool, to generate a comparison result. An authorization decision of “in compliance” or “out of compliance” may be returned to the requesting computer product.
    Type: Application
    Filed: June 23, 2013
    Publication date: December 25, 2014
    Inventors: Richard PRUSS, Morry KATZ, Somyajit JENA, Alex WIGHT, Steve KOEHLER, Ben STRICKLAND
  • Publication number: 20140379594
    Abstract: Techniques are provided for generating license agreements specific to a computer product (e.g., software or hardware). In one example, vendor license manager receives an order from a customer for a computer product having a product identifier. Upon identifying an agreement corresponding to the product identifier, the license manager further embeds terms and conditions based on specifications of the customer order. After the customer reviews the agreement and accepts, the license manager associates the product-specific agreement, the acceptance, and the order to a logical customer account.
    Type: Application
    Filed: June 23, 2013
    Publication date: December 25, 2014
    Inventors: John ALONGI, Satish SISTA
  • Publication number: 20140379595
    Abstract: Techniques are provided for associating license entitlements to a customer of computer software or hardware in a multi-tiered distribution channel. A partner of a vendor places an order for computer products on behalf of the end user customer. The order may go through several distribution channels before the vendor receives the order. Upon receiving the order, a vendor license manager generates entitlements based on the order and prompts the partner to provide a customer identifier corresponding to a customer account maintained on the vendor cloud. Once the license manager receives the customer identifier, the license manager provisions the license entitlements to the customer account.
    Type: Application
    Filed: June 23, 2013
    Publication date: December 25, 2014
    Inventors: Ian SLATTERY, Vincent NOLAN
  • Publication number: 20140337241
    Abstract: Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or documents with modification dates that have changed when there would otherwise have been no need to change them and thus allows discovery of missing documents to discover fraud or to search for evidence after a fraud is suspected. In another embodiment, deltas in accounting system vendor invoice accounts are compared at different points in time, potentially exposing the practice of moving fraudulent vendor transactions into a large group of legitimate transactions for a legitimate vendor. Per period transaction totals for specific periods for legitimate vendors are compared over historical time for suspicious activity. A comparison of reports from the two different periods, using exact data and software from those separate periods (instead of reporting from “current” data), may raise a red flag otherwise missed.
    Type: Application
    Filed: July 29, 2014
    Publication date: November 13, 2014
    Inventors: Michael PRICE, Scott DeGRAFFENREID, Joseph DITO, Taylor PRICE
  • Publication number: 20140324716
    Abstract: The claimed subject matter relates to an architecture to produce disincentives to wearing counterfeit or stolen merchandise in public. In particular, the architecture utilizes a unique identifier associated with each unit of the product, and provides both a registration channel for receiving ownership registration and a verification channel to receive requests for verification. By way of illustration, the architecture can include associating a brand logotype that includes unique markings with each unit of a product, a private web service where the retailer may upload customer information at the time of sale, and a publicly available web service, where a third party may inquire about the ownership of a product containing a certain unique identifier.
    Type: Application
    Filed: April 29, 2013
    Publication date: October 30, 2014
    Inventors: Carolina Haber Florencio, Dinei Afonso Ferreira Florencio
  • Patent number: 8856923
    Abstract: Similarity-based fraud detection techniques are provided in adaptive authentication systems. A method is provided for determining if an event is fraudulent by obtaining a plurality of tagged events and one or more untagged events, wherein the tagged events indicate a likelihood of whether the corresponding event was fraudulent; constructing a graph, wherein each node in the graph represents an event and has a value representing a likelihood of whether the corresponding event was fraudulent and wherein similar transactions are connected via weighted links; diffusing through weights in the graph to assign values to nodes such that neighbors of nodes having non-zero values receive similar values as the neighbors; and classifying whether at least one of the one or more untagged events is fraudulent based on the assigned values.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: October 7, 2014
    Assignee: EMC Corporation
    Inventors: Eyal Kolman, Alon Kaufman, Yael Villa
  • Publication number: 20140297546
    Abstract: Method and apparatus for predicting properties of a target object comprise application of a search manager for analyzing parameters of a plurality of databases for a plurality of objects, the databases comprising an electrical, electromagnetic, acoustic spectral database (ESD), a micro-body assemblage database (MAD) and a database of image data whereby the databases store data objects containing identifying features, source information and information on site properties and context including time and frequency varying data. The method comprises application of multivariate statistical analysis and principal component analysis in combination with content-based image retrieval for providing two-dimensional attributes of three dimensional objects, for example, via preferential image segmentation using a tree of shapes and to predict further properties of objects by means of k-means clustering and related methods.
    Type: Application
    Filed: June 16, 2014
    Publication date: October 2, 2014
    Applicant: University of Tennessee Research Foundation
    Inventors: J. Douglas Birdwell, Tse-Wei Wang, David J. Icove, Sally P. Horn
  • Publication number: 20140297545
    Abstract: The present invention is directed to a mobile software application developed for a smart phone or mobile device, such as an iPhone, iPad, Android, or Blackberry personal digital assistant, equipped with a camera, image sensor, RFID detector, or NFC sensor, that enables a user to synchronize information to verify the present status of whether an OEM product is genuine, subject to recall or stolen, and further allows the user to communicate and share information about his or her experience with the product using social media and networking sites on the Internet.
    Type: Application
    Filed: September 12, 2013
    Publication date: October 2, 2014
    Inventors: Chachi Prasad, Krishnadas Trikkovil Pisharam
  • Publication number: 20140279614
    Abstract: A method of detecting, preventing and monetizing unauthorized use and attempted unauthorized use of media content. In one embodiment, the method comprises providing a website containing what appears to be unlicensed or otherwise illegal media content; providing a user with the ability to view, hear or access at least a portion of the unlicensed or otherwise illegal media content; informing the user that the media content might be unlicensed or otherwise illegal or that, viewing, access, use or distribution of the media content might be illegal; and receiving contact or location information for the user that attempts to view, access, use or distribute the media content provided on the website.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Wayne D. Lonstein, Julie C. Lonstein
  • Publication number: 20140279296
    Abstract: Methods, devices, systems and computer program products use watermarks to allow a user to explore to obtain desired content and related items. One device includes an extended payload (EP) watermark extractor coupled to an audio input and to an enhanced response coordinator (ERC). The device also includes a copy control information (CCI) watermark detector coupled to the audio input and coupled to a copy management compliance logic component. The ERC is further coupled to the EP extractor and to a communication component. The device also includes a referred sale logic component coupled to the ERC to receive referral information that is indicative of one or more alternative options. The device further includes a digital service provider (DSP) client component coupled to the referred sale logic and also coupled to the communication component that allows the DSP client to communicate with DSPs and to receive one of the alternative options.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 18, 2014
    Applicant: VERANCE CORPORATION
    Inventors: Rade Petrovic, Joseph M. Winograd, Jian Zhao, Dean Angelico
  • Publication number: 20140279516
    Abstract: Among other things, a physical device is determined to be validly issued by a party that issues physical devices that include security features. At least a portion of a photographic or video image of the physical device is processed automatically to determine if the physical device includes at least one of the security features.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Nicholas Rellas, Justin Robinson, Spencer Frazier, Theodore Kuklinski, Brandon Currul
  • Publication number: 20140279615
    Abstract: User accounts can allow respective users to access any their respectively owned ticket. Each ticket in a group of tickets provides its owner the right to redeem the ticket to attend a particular event. A first user initially owns a ticket in the group. Ownership of the ticket is transferred from the first user to a second user, such that, subsequent to the transfer, the second user has the right to redeem the ticket but the first user does not. A code is generated for the ticket, the code being based on a characteristic of a device associated with the second user. The code is unique across codes in the group of tickets. Redeeming the ticket to attend the particular event includes analyzing the code.
    Type: Application
    Filed: March 10, 2014
    Publication date: September 18, 2014
    Applicant: LIVE NATION ENTERTAINMENT, INC.
    Inventors: Samuel Levin, David Scarborough
  • Publication number: 20140279613
    Abstract: A device may receive a request, from a user, to determine whether an item is a counterfeit item. The device may perform, based on receiving the request, a comparison of at least one of: one or more images of one or more first portions of the item to one or more images of corresponding one or more first portions of the authentic item that corresponds to the item, or one or more sounds of one or more second portions of the item to one or more sounds of corresponding one or more second portions of the authentic item. The device may determine whether the item is a counterfeit item based on performing the comparison. The device may provide, to the user and based on determining whether the item is a counterfeit item, information indicating whether the item is a counterfeit item.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicants: VERIZON PATENT AND LICENSING, INC., VERIZON NEW JERSEY INC.
    Inventors: Woo Beum LEE, Michelle Felt, Jeffrey M. Walsh
  • Publication number: 20140258156
    Abstract: A method to create a reference library of known authentic die images includes die images which are known to be a correct representation of the manufacturer's original die mask set. Where actual literal copies of the original die mask set are unavailable, reasonable facsimile images are derived from images of known authentic ICs. The library of images, while mainly including a set of die images, can be further supplemented by package images, images of manufacturer's logos, text listings of known text markings, including, for example, known serial numbers and date codes, and graphical images from any suitable manufacturer publications. A system and method to determine the authenticity of ICs which includes a multi-faceted approach is also described.
    Type: Application
    Filed: February 28, 2014
    Publication date: September 11, 2014
    Inventors: Achilleas Tziazas, Mark Northrup
  • Publication number: 20140258155
    Abstract: Systems and methods are presented for accessing an application available from a data center of a program execution service. The metadata associated with a user computing device may be used to determine whether the user computing device is authorized to access the application through a virtual desktop instance. At least a portion of the application may be executed by the virtual desktop instance and provided to the user. Applications may be purchased, licensed, or rented by a user.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: AMAZON TECHNOLOGIES, INC.
    Inventor: AMAZON TECHNOLOGIES, INC.