Product, Service, Or Business Identity Fraud Patents (Class 705/318)
  • Patent number: 9940491
    Abstract: A location tracking system includes a tag configured to be uniquely associated with and affixed to an item, and automatically and periodically emit a first signal, a receiving transmitter having a Bluetooth signal reception functionality that is configured to automatically receive the first signal from the tag when the receiving transmitter is within a broadcast range of the tag without requiring pairing of the receiving transmitter and the tag and transmit a second signal, and a data system configured to be remotely accessible to the receiving transmitter and receive the second signal transmitted from the receiving transmitter. The second signal can be transmitted via a network to which the receiving transmitter is connected. An application can be installed in the receiving transmitter that allows the receiving transmitter to automatically receive the first signal and initiate transmission of the second signal from the receiving transmitter to the data system.
    Type: Grant
    Filed: November 9, 2015
    Date of Patent: April 10, 2018
    Assignee: ASCENT SOLUTIONS PTE LTD
    Inventors: Chee Kean Lim, Kia Boon Chew, Pui Lan Pauline Margaret Chung
  • Patent number: 9901831
    Abstract: Disclosed are systems and methods for online community management. The disclosed system allows for automatic identification and punishment of players exhibiting bad sportsmanship through a combination of automatic detection schemes and a peer reporting scheme. In addition to the sportsmanship check, the disclosed system also provides automatic checks for identifying potential cheaters and generating a potential cheaters list for review by admin staff. As a result of either classification system, players found to be either bad sports or cheaters are not allowed to participate in play with the general pool of players, but instead must play in an alternate pool. For extremely harmful conduct, players may be banned from the online community.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: February 27, 2018
    Assignee: TAKE-TWO INTERACTIVE SOFTWARE, INC.
    Inventors: Dan Conti, Evan Michaels, Pablo Aguilar Fruto
  • Patent number: 9858127
    Abstract: A platform architecture that is configurable to provide task specific application instances compatible with one or more hosts is provided with a method for using the architecture. In one example, the platform architecture provides a transducer functionality block, a conduit functionality block, an application functionality block, and an application programming interface (API) functionality block on which each task specific application instance is based.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: January 2, 2018
    Assignee: D. Alan Holdings, LLC
    Inventors: Douglas A. Standley, Randall E. Bye, Bill C. Hardgrave, David M. Sherr
  • Patent number: 9852476
    Abstract: Case management interface provides correlation among a plurality of transaction orders in an interactive graphical format. A visualization window displays a plurality of transaction orders that are visually connected based on one or more common data elements associated with the transaction orders. The visualization window can allow a user to interact with different elements of the display to analyze the relationship between order data elements, view order details, reject or accept orders or mark an order as suspect. Different layout options are available to enhance the visualization of the transaction order data.
    Type: Grant
    Filed: January 21, 2015
    Date of Patent: December 26, 2017
    Assignee: VISA INTERNATIONAL SERVICE ASSOCIATION
    Inventor: Cory H. Siddens
  • Patent number: 9836761
    Abstract: An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: December 5, 2017
    Assignee: Facebook, Inc.
    Inventors: Andrew G. Bosworth, Aruna Bharathi
  • Patent number: 9754311
    Abstract: The invention provides methods and apparatus for detecting when an online session is compromised. A plurality of device fingerprints may be collected from a user computer that is associated with a designated Session ID. A server may include pages that are delivered to a user for viewing in a browser at which time device fingerprints and Session ID information are collected. By collecting device fingerprints and session information at several locations among the pages delivered by the server throughout an online session, and not only one time or at log-in, a comparison between the fingerprints in association with a Session ID can identify the likelihood of session tampering and man-in-the middle attacks.
    Type: Grant
    Filed: November 3, 2015
    Date of Patent: September 5, 2017
    Assignee: The 41st Parameter, Inc.
    Inventor: Ori Eisen
  • Patent number: 9679321
    Abstract: The technology may receive a product identification from a merchant and evaluate the product identification against evaluation rules to determine a likelihood of whether the product identification is valid for a product associated with the product identification.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: June 13, 2017
    Assignee: Amazon Technologies, Inc.
    Inventor: Bradley John Pitzel
  • Patent number: 9659308
    Abstract: An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.
    Type: Grant
    Filed: November 30, 2016
    Date of Patent: May 23, 2017
    Assignee: Facebook, Inc.
    Inventors: Andrew G. Bosworth, Aruna Bharathi
  • Patent number: 9595162
    Abstract: In some embodiments, a computer-implemented method includes permitting a plurality of wagering game terminals to participate in a community game in a land-based gaming establishment. The method includes permitting a player device remote from the land-based gaming establishment to play an online game. The method also includes modifying, by at least one of one or more processors, the community game based on an event in the online game.
    Type: Grant
    Filed: May 6, 2014
    Date of Patent: March 14, 2017
    Assignee: BALLY GAMING, INC.
    Inventors: Tracey L. Wright, Dion K. Aoki, Andrew C. Guinn, Joel R. Jaffe, Robert L. Kyte, Bradley D. Schultz
  • Patent number: 9542694
    Abstract: An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.
    Type: Grant
    Filed: November 20, 2015
    Date of Patent: January 10, 2017
    Assignee: Facebook, Inc.
    Inventors: Andrew G. Bosworth, Aruna Bharathi
  • Patent number: 9202179
    Abstract: The invention relates to a multi-component device Z to document processes R comprising at least one step wherein a device Y collects information from all components Cij used to make the product Di of an individual process step i, a device X calculates a hash code for each component Cij, a device W calculates a hash code Ji from all hash codes components used in process step i, and a device T provides the product Di with a mark MDi comprising a visual representation of the hash code Ji, and to the use of this process in control and documentation of product or service quality, logistics, or manufacturing.
    Type: Grant
    Filed: March 12, 2012
    Date of Patent: December 1, 2015
    Inventors: Adalbert Gubo, Christina Schuette
  • Patent number: 9043358
    Abstract: A unified search service may collect information related to an enterprise from at least one of publicly available data and private enterprise data. In some implementations, crowd sourcing may be used to determine a source list of one or more sources of information. Authored content can be generated, such as by combining one or more items of information from the public data with one or more items of information from the private enterprise data. Further, in some implementations, a public index may be generated from the public data, and one or more affiliation indexes may be generated from the private enterprise data. For example, a first affiliation index may contain confidential enterprise information, while a second affiliation index may contain non-confidential enterprise information. A user's affiliation to the enterprise may be taken into consideration when determining which indexes to use when responding to a search request from the user.
    Type: Grant
    Filed: March 9, 2011
    Date of Patent: May 26, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Lili Cheng, Xuedong David Huang, Heung-Yeung Shum, Eric J. Horvitz, James H. Lewallen, Todd D. Newman, David S. Taniguchi
  • Publication number: 20150142683
    Abstract: The method of anti-counterfeit identification includes establishing a tracking platform to render and store enterprises' registration information (including registered names and telephone numbers) and security codes. A client connected to the tracking platform for inquiry is established, and manufacturers print on their products corresponding anti-counterfeit phone numbers, corporate security codes and commodity security codes obtained from the anti-counterfeit tracking platform. Commodity security systems are established by manufacturers for storage of commodity security codes and inquiry records. In each procedure of a commodity sales process, commodity security directly feeds back to corresponding manufacturer. Inquiry can be made via telephone or mobile, having reduced complexity of anti-counterfeit inquiries.
    Type: Application
    Filed: March 25, 2013
    Publication date: May 21, 2015
    Applicant: Xiang Yang Hao Zheng Industrial Cp., Ltd.
    Inventor: Chengwu Guo
  • Publication number: 20150134552
    Abstract: A system for authenticating and managing the ownership of an item comprises a tagging device affixed to the item, wherein the tagging device comprises tagging device data, an item information system receiving the tagging device data and associated item data and storing the tagging device data and the item data, an owner registration and transfer system receiving owner registration data and ownership change requests and storing the ownership history, and an authentication system receiving authentication requests and generating a response based upon the information stored in the system or a connected system.
    Type: Application
    Filed: November 7, 2014
    Publication date: May 14, 2015
    Inventors: Daniel W. ENGELS, Eric M. SMITH, Ross MANDEL
  • Publication number: 20150106283
    Abstract: Provided are an apparatus and method for providing a genuine certification service. The apparatus includes a certification information issuing unit configured to issue genuine certification information including at least one piece of certification chip identification (ID) information, product ID information, certification secret information, and certification verification information to a verification target product in response to an issuance request by a terminal operated by a producer of the verification target product, and a genuine certification executing unit configured to verify validity of the genuine certification information issued to the verification target product and execute genuine certification for the verification target product using the genuine certification information of which the validity is verified in response to a certification request by the terminal operated by the producer of the verification target product.
    Type: Application
    Filed: October 15, 2014
    Publication date: April 16, 2015
    Inventors: Seok Woo LEE, Sang Gyoo SIM, Duk Soo KIM, Gi Young JOO
  • Publication number: 20150106282
    Abstract: There are provided a device for determining a counterfeit and a method thereof. The device for determining a counterfeit includes a certification information receiving unit configured to receive certification identification information including at least one piece of certification chip identification information, product identification information, and certification verification information of a verification target product and state information of a device for performing genuine product certification from the device for performing genuine product certification, and a counterfeit determining unit configured to determine a counterfeit based on the received certification identification information or the state information of the device for performing genuine product certification. Therefore, genuine product certification of the verification target product is verified. As a result, it is possible to effectively protect intellectual property rights of producers and easily and accurately determine a counterfeit.
    Type: Application
    Filed: October 15, 2014
    Publication date: April 16, 2015
    Inventors: Seok Woo LEE, Sang Gyoo SIM, Duk Soo KIM
  • Publication number: 20150095247
    Abstract: In one embodiment, a method includes accessing a plurality of classified event profiles including a classification that identifies whether the corresponding classified event profile is associated with fraud or legitimate. The method also includes accessing a first cluster of classified event profiles each identified as being associated with fraud, and a second cluster of classified event profiles each identified as being legitimate. The method further includes determining a plurality of first sub-clusters of classified event profiles from the first cluster of classified event profiles, and a plurality of second sub-clusters of classified event profiles from the second cluster of classified event profiles.
    Type: Application
    Filed: October 2, 2013
    Publication date: April 2, 2015
    Applicant: Eventbrite, Inc.
    Inventor: Paul Duan
  • Publication number: 20150088770
    Abstract: The present invention relates to (a) a ticket management system for purchasing and allocating event tickets; (b) a ticket authentication system for authenticating tickets presented at an event; and (c) a secondary market system for the authorized resale of event tickets. These systems, individually and collectively, facilitate the reduction of ticket scalping by requiring the production of valid registered valued identification for the purchase, allocation, and resale of event tickets and the admittance to an event.
    Type: Application
    Filed: December 1, 2014
    Publication date: March 26, 2015
    Inventors: Alan Gelfand, Martin Ortmayr, Kevin Peng, Todd Edmondson
  • Publication number: 20150052069
    Abstract: A system and method for detecting fraudulent purchases and returns by significantly reducing the amount of loss any store front merchant endures from unforeseen criminal activity. To attain this, the present method generally comprises of opening concealed packages, checking items in packages, re-sealing packages and entering inventory on a computer software system. The re-sealing of packages is preferred to use a custom store logo seal. By opening and checking all incoming items from the beginning of the delivery, upon entering the store, the employees performing this method, begins with the simplest and least obvious means of accounting for inventory. If this step is sufficiently carried thorough, the employees have satisfied the merchant as to the correct quantity and quality of all inventories, when it first comes into the store.
    Type: Application
    Filed: August 16, 2014
    Publication date: February 19, 2015
    Inventor: Joseph John Hilo
  • Publication number: 20150046351
    Abstract: An exemplary system that includes a computing device receiving data that identifies a set of providers including a target provider. The computing device performs a link-based attribute pre-process on the data to identify, based on the set of providers, a node network structured around the target provider and to generate a set of link-based attributes for the target provider. The computing device classifies the target provider based on the set of link-based attributes.
    Type: Application
    Filed: August 6, 2013
    Publication date: February 12, 2015
    Applicant: Verizon Patent and Licensing Inc.
    Inventor: Mohammad Reza Tayebnejad
  • Publication number: 20150046352
    Abstract: In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a decryption/encryption module, and a network address. Upon assembly of a vehicle, the components form addressable nodes of that vehicle. Relevant digital information of all components is recorded in a proprietary, highly secure data base at the time of manufacture, and updated for vehicular repairs. Only registered agents may access the data base or submit updates to the federal network. During refueling or re-charging of a vehicle, a digital handshake compares public keys of the vehicular components to the proprietary data base, and confirms the integrity of at least some components by a public-key/private-key challenge and response.
    Type: Application
    Filed: August 9, 2013
    Publication date: February 12, 2015
    Inventor: Ronald R. Shea
  • Publication number: 20150032650
    Abstract: The Invention involves using GPS technology to determine where a person has been and then permitting posting of reviews of subjects only if the reviewer has visited that subject within a specified period of time.
    Type: Application
    Filed: July 24, 2013
    Publication date: January 29, 2015
    Inventor: Yakov Z. Mermelstein
  • Publication number: 20140379596
    Abstract: Techniques are provided for auditing and managing licenses for use of computer products. A license manager of a vendor receives an identifier of a computer product and a report of a set of licensed features enabled on the computer product. The license manager identifies a customer account associated with the identifier. The customer account includes a pool of entitlements acquired by the customer. The license manager compares the report with the entitlements in the pool, and with the customer's use of other computer products which draw entitlements from that pool, to generate a comparison result. An authorization decision of “in compliance” or “out of compliance” may be returned to the requesting computer product.
    Type: Application
    Filed: June 23, 2013
    Publication date: December 25, 2014
    Inventors: Richard PRUSS, Morry KATZ, Somyajit JENA, Alex WIGHT, Steve KOEHLER, Ben STRICKLAND
  • Publication number: 20140379595
    Abstract: Techniques are provided for associating license entitlements to a customer of computer software or hardware in a multi-tiered distribution channel. A partner of a vendor places an order for computer products on behalf of the end user customer. The order may go through several distribution channels before the vendor receives the order. Upon receiving the order, a vendor license manager generates entitlements based on the order and prompts the partner to provide a customer identifier corresponding to a customer account maintained on the vendor cloud. Once the license manager receives the customer identifier, the license manager provisions the license entitlements to the customer account.
    Type: Application
    Filed: June 23, 2013
    Publication date: December 25, 2014
    Inventors: Ian SLATTERY, Vincent NOLAN
  • Publication number: 20140379597
    Abstract: The present disclosure provides an authenticity verifying system capable of generating renewed database and updating unlock number upon occurrence of information leak, and comprises product (1) having lock device (11) with infrared ray transceiving unit (12) and keypad (14), and scratch card (13) with password and product serial number provided thereon; a manufacturer's verifying server (2) for verifying product authenticity through a commercial communication network; and an unlock number change device (3) responsive to leak of information stored in server (2) for downloading, from server (2), predetermined password that matches product (1) and renewed unlock number newly matched to the product serial number. Further, the present disclosure provides a method for verifying product authenticity through acquiring an unlock number, and comprises performing an unlock number acquiring process and applying the unlock number acquired to lock device (11) of product (1) to unlock lock device (11).
    Type: Application
    Filed: January 22, 2013
    Publication date: December 25, 2014
    Inventor: Hae-Tahk CHUNG
  • Publication number: 20140379593
    Abstract: Techniques are provided for managing multiple trusted relationships within a computer product licensing environment. In one example, a partner affiliated with a vendor and a customer of the vendor's products associate with each other. A vendor license manager monitors the license consumption of a customer using the vendor's products and periodically sends a consumption report to a license manager of the associated partner. If a customer's license consumption exceeds the bounds of a given license, the vendor license manager notifies the customer and the partner, and the partner assists the customer in maintaining compliance with the license.
    Type: Application
    Filed: June 23, 2013
    Publication date: December 25, 2014
    Inventors: Steve KOEHLER, Raymond R. SCHNULLE, Thomas E. CRAMER, JR.
  • Publication number: 20140379594
    Abstract: Techniques are provided for generating license agreements specific to a computer product (e.g., software or hardware). In one example, vendor license manager receives an order from a customer for a computer product having a product identifier. Upon identifying an agreement corresponding to the product identifier, the license manager further embeds terms and conditions based on specifications of the customer order. After the customer reviews the agreement and accepts, the license manager associates the product-specific agreement, the acceptance, and the order to a logical customer account.
    Type: Application
    Filed: June 23, 2013
    Publication date: December 25, 2014
    Inventors: John ALONGI, Satish SISTA
  • Publication number: 20140337241
    Abstract: Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or documents with modification dates that have changed when there would otherwise have been no need to change them and thus allows discovery of missing documents to discover fraud or to search for evidence after a fraud is suspected. In another embodiment, deltas in accounting system vendor invoice accounts are compared at different points in time, potentially exposing the practice of moving fraudulent vendor transactions into a large group of legitimate transactions for a legitimate vendor. Per period transaction totals for specific periods for legitimate vendors are compared over historical time for suspicious activity. A comparison of reports from the two different periods, using exact data and software from those separate periods (instead of reporting from “current” data), may raise a red flag otherwise missed.
    Type: Application
    Filed: July 29, 2014
    Publication date: November 13, 2014
    Inventors: Michael PRICE, Scott DeGRAFFENREID, Joseph DITO, Taylor PRICE
  • Publication number: 20140324716
    Abstract: The claimed subject matter relates to an architecture to produce disincentives to wearing counterfeit or stolen merchandise in public. In particular, the architecture utilizes a unique identifier associated with each unit of the product, and provides both a registration channel for receiving ownership registration and a verification channel to receive requests for verification. By way of illustration, the architecture can include associating a brand logotype that includes unique markings with each unit of a product, a private web service where the retailer may upload customer information at the time of sale, and a publicly available web service, where a third party may inquire about the ownership of a product containing a certain unique identifier.
    Type: Application
    Filed: April 29, 2013
    Publication date: October 30, 2014
    Inventors: Carolina Haber Florencio, Dinei Afonso Ferreira Florencio
  • Patent number: 8856923
    Abstract: Similarity-based fraud detection techniques are provided in adaptive authentication systems. A method is provided for determining if an event is fraudulent by obtaining a plurality of tagged events and one or more untagged events, wherein the tagged events indicate a likelihood of whether the corresponding event was fraudulent; constructing a graph, wherein each node in the graph represents an event and has a value representing a likelihood of whether the corresponding event was fraudulent and wherein similar transactions are connected via weighted links; diffusing through weights in the graph to assign values to nodes such that neighbors of nodes having non-zero values receive similar values as the neighbors; and classifying whether at least one of the one or more untagged events is fraudulent based on the assigned values.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: October 7, 2014
    Assignee: EMC Corporation
    Inventors: Eyal Kolman, Alon Kaufman, Yael Villa
  • Publication number: 20140297545
    Abstract: The present invention is directed to a mobile software application developed for a smart phone or mobile device, such as an iPhone, iPad, Android, or Blackberry personal digital assistant, equipped with a camera, image sensor, RFID detector, or NFC sensor, that enables a user to synchronize information to verify the present status of whether an OEM product is genuine, subject to recall or stolen, and further allows the user to communicate and share information about his or her experience with the product using social media and networking sites on the Internet.
    Type: Application
    Filed: September 12, 2013
    Publication date: October 2, 2014
    Inventors: Chachi Prasad, Krishnadas Trikkovil Pisharam
  • Publication number: 20140297546
    Abstract: Method and apparatus for predicting properties of a target object comprise application of a search manager for analyzing parameters of a plurality of databases for a plurality of objects, the databases comprising an electrical, electromagnetic, acoustic spectral database (ESD), a micro-body assemblage database (MAD) and a database of image data whereby the databases store data objects containing identifying features, source information and information on site properties and context including time and frequency varying data. The method comprises application of multivariate statistical analysis and principal component analysis in combination with content-based image retrieval for providing two-dimensional attributes of three dimensional objects, for example, via preferential image segmentation using a tree of shapes and to predict further properties of objects by means of k-means clustering and related methods.
    Type: Application
    Filed: June 16, 2014
    Publication date: October 2, 2014
    Applicant: University of Tennessee Research Foundation
    Inventors: J. Douglas Birdwell, Tse-Wei Wang, David J. Icove, Sally P. Horn
  • Publication number: 20140279296
    Abstract: Methods, devices, systems and computer program products use watermarks to allow a user to explore to obtain desired content and related items. One device includes an extended payload (EP) watermark extractor coupled to an audio input and to an enhanced response coordinator (ERC). The device also includes a copy control information (CCI) watermark detector coupled to the audio input and coupled to a copy management compliance logic component. The ERC is further coupled to the EP extractor and to a communication component. The device also includes a referred sale logic component coupled to the ERC to receive referral information that is indicative of one or more alternative options. The device further includes a digital service provider (DSP) client component coupled to the referred sale logic and also coupled to the communication component that allows the DSP client to communicate with DSPs and to receive one of the alternative options.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 18, 2014
    Applicant: VERANCE CORPORATION
    Inventors: Rade Petrovic, Joseph M. Winograd, Jian Zhao, Dean Angelico
  • Publication number: 20140279614
    Abstract: A method of detecting, preventing and monetizing unauthorized use and attempted unauthorized use of media content. In one embodiment, the method comprises providing a website containing what appears to be unlicensed or otherwise illegal media content; providing a user with the ability to view, hear or access at least a portion of the unlicensed or otherwise illegal media content; informing the user that the media content might be unlicensed or otherwise illegal or that, viewing, access, use or distribution of the media content might be illegal; and receiving contact or location information for the user that attempts to view, access, use or distribute the media content provided on the website.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Wayne D. Lonstein, Julie C. Lonstein
  • Publication number: 20140279615
    Abstract: User accounts can allow respective users to access any their respectively owned ticket. Each ticket in a group of tickets provides its owner the right to redeem the ticket to attend a particular event. A first user initially owns a ticket in the group. Ownership of the ticket is transferred from the first user to a second user, such that, subsequent to the transfer, the second user has the right to redeem the ticket but the first user does not. A code is generated for the ticket, the code being based on a characteristic of a device associated with the second user. The code is unique across codes in the group of tickets. Redeeming the ticket to attend the particular event includes analyzing the code.
    Type: Application
    Filed: March 10, 2014
    Publication date: September 18, 2014
    Applicant: LIVE NATION ENTERTAINMENT, INC.
    Inventors: Samuel Levin, David Scarborough
  • Publication number: 20140279516
    Abstract: Among other things, a physical device is determined to be validly issued by a party that issues physical devices that include security features. At least a portion of a photographic or video image of the physical device is processed automatically to determine if the physical device includes at least one of the security features.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Nicholas Rellas, Justin Robinson, Spencer Frazier, Theodore Kuklinski, Brandon Currul
  • Publication number: 20140279613
    Abstract: A device may receive a request, from a user, to determine whether an item is a counterfeit item. The device may perform, based on receiving the request, a comparison of at least one of: one or more images of one or more first portions of the item to one or more images of corresponding one or more first portions of the authentic item that corresponds to the item, or one or more sounds of one or more second portions of the item to one or more sounds of corresponding one or more second portions of the authentic item. The device may determine whether the item is a counterfeit item based on performing the comparison. The device may provide, to the user and based on determining whether the item is a counterfeit item, information indicating whether the item is a counterfeit item.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicants: VERIZON PATENT AND LICENSING, INC., VERIZON NEW JERSEY INC.
    Inventors: Woo Beum LEE, Michelle Felt, Jeffrey M. Walsh
  • Publication number: 20140258156
    Abstract: A method to create a reference library of known authentic die images includes die images which are known to be a correct representation of the manufacturer's original die mask set. Where actual literal copies of the original die mask set are unavailable, reasonable facsimile images are derived from images of known authentic ICs. The library of images, while mainly including a set of die images, can be further supplemented by package images, images of manufacturer's logos, text listings of known text markings, including, for example, known serial numbers and date codes, and graphical images from any suitable manufacturer publications. A system and method to determine the authenticity of ICs which includes a multi-faceted approach is also described.
    Type: Application
    Filed: February 28, 2014
    Publication date: September 11, 2014
    Inventors: Achilleas Tziazas, Mark Northrup
  • Publication number: 20140258155
    Abstract: Systems and methods are presented for accessing an application available from a data center of a program execution service. The metadata associated with a user computing device may be used to determine whether the user computing device is authorized to access the application through a virtual desktop instance. At least a portion of the application may be executed by the virtual desktop instance and provided to the user. Applications may be purchased, licensed, or rented by a user.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: AMAZON TECHNOLOGIES, INC.
    Inventor: AMAZON TECHNOLOGIES, INC.
  • Publication number: 20140250022
    Abstract: The present invention relates to a follow-up control method of a product online, and more particularly, to a method of registering a product to a management server after capturing the barcode of the product by using a portable device and performing a follow-up control of the product online by using the registered barcode. A follow-up control method of a product by using a portable device includes: identifying a product by capturing the barcode of the product with a portable device through a program built in the portable device or identifying a product by directly inputting product information into the portable device; registering the product by transmitting data regarding the identified product information to a management server; and performing a follow-up control on the product online by a user after the product registration is completed.
    Type: Application
    Filed: August 31, 2011
    Publication date: September 4, 2014
    Applicants: MINDWARECORPS CO., LTD., MINDWAREWORKS CO., LTD.
    Inventors: Jae In Lee, Jae Hak Lee, Sung Woo Park
  • Patent number: 8825558
    Abstract: A system and method for quality control in a high volume talent acquisition is disclosed. In one embodiment, a system for quality control in a high volume talent acquisition includes a processor, a quality talent acquisition database for storing a plurality of candidate e-dossiers and historical data associated with fraudulent practices used in the talent acquisition, memory operatively coupled to the processor and the quality talent acquisition database, and a quality talent acquisition module communicatively coupled to the processor and the quality talent acquisition database. The quality talent acquisition module includes a selection module for selecting one or more prospective candidates from the plurality of candidate e-dossiers, a fraud and non-compliance module for obtaining information associated with fraudulent practices, an e-dossier compilation module for compiling the candidate e-dossiers and a sampling module for sampling on a real-time basis the selected one or more candidates.
    Type: Grant
    Filed: October 11, 2010
    Date of Patent: September 2, 2014
    Assignee: Wipro Limited
    Inventors: Ajay Anantkumar Parikh, Padmini Mani Giri, Moumita C Bhattacharya, Sonali Garg, Swati Bhalla
  • Publication number: 20140244528
    Abstract: A fraud-detection system facilitates detecting fraudulent entities by computing weighted fraud-detecting scores for the individual entities. During operation, the system can obtain fraud warnings for a plurality of entities, and for a plurality of fraud types. The system computes, for a respective entity, a fraud-detection score which indicates a normalized cost of fraudulent transactions from the respective entity. The system then determines, from the plurality of entities, one or more anomalous entities whose fraud-detection score indicates anomalous behavior. The system can determine an entity that is likely to be fraudulent by comparing the entity's fraud-detection score to fraud-detection scores for other entities.
    Type: Application
    Filed: February 22, 2013
    Publication date: August 28, 2014
    Applicant: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: Ying Zhang, Juan J. Liu, Hoda M. A. Eldardiry
  • Publication number: 20140244529
    Abstract: A method of controlling a banknote processing apparatus for detecting, reporting, and integrally managing counterfeit banknotes includes detecting an injected banknote through an injection detecting unit; determining whether the injected banknote is a counterfeit banknote; obtaining counterfeit banknote information including a serial number of a banknote firmly determined as a counterfeit banknote; and transmitting the counterfeit banknote information including the serial number to a counterfeit banknote management system of a central bank through a communication unit when a counterfeit banknote report command previously set by a user is input. Since the blacklist of counterfeit banknotes established by the counterfeit banknote management system of the central bank is received and it is determined whether the injected banknote is a counterfeit banknote based on the received blacklist, accuracy of discriminating counterfeit banknotes of financial facilities including banks is improved.
    Type: Application
    Filed: September 5, 2013
    Publication date: August 28, 2014
    Applicant: KISAN ELECTRONICS CO., LTD.
    Inventor: Sang Hwan JANG
  • Patent number: 8819789
    Abstract: Login credentials for at least one website, such as a social networking website, are received from a user purporting to act on behalf of an entity, for example, in the context of registering the entity with a system for electronic bill payment. Social data relating to the entity is retrieved from the websites using the login credentials. The social data comprises a plurality of social connections, each reflecting a respective relationship between the entity and a respective third party. A plurality of relevant social connections comprising at least a subset of the plurality of social connections is determined, each social connection of the plurality of relevant social connections reflecting a relationship to a respective third party that is deemed to be reliable. A reliability rating of the entity is then determined based on the plurality of relevant social connections.
    Type: Grant
    Filed: June 13, 2012
    Date of Patent: August 26, 2014
    Assignee: Bill.com, Inc.
    Inventors: Mark Orttung, Darren Linscott
  • Publication number: 20140180940
    Abstract: The present invention provides a method and system for real time product verification by use of NFC technology. To start product verification, consumers use their NFC-reader-enabled mobile devices to tap the NFC-enabled tags of products or tap products they are interested in. After tapping, the product verification client applications in consumers' NFC-reader-enabled mobile devices will be automatically started, capture, save and process data in the NFC-enabled tags of products, create product verification requests with data in the NFC-enabled tags of products, send product verification requests to product verification servers, receive, save and process responses from product verification servers, and display verification results from responses on the screens of consumers' NFC-reader-enabled mobile devices.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Inventor: Jianping He
  • Patent number: 8756124
    Abstract: Embodiments of the present invention may be used in various regulation-heavy industries, such as pharmaceutical, biomedical, construction, energy, heavy industry, and similar industries with large regulatory and/or safety considerations. The present invention describes a track-and-trace solution based on unique item-level QR codes printed on product packaging and encoding unique URLs to enable granular, item-level product management. In some embodiments of the invention, the information presented to users who access these unique URLs is tailored based on product usability information provided from authorized supply chain participants, the role of the user in the supply chain, and/or regulation required data comprising product safety data as required by regulations from a regulatory agency. Embodiments of the invention may be used for the purposes of item authentication, anti-counterfeiting measures, product recall management, and the efficient distribution of supplementary product information.
    Type: Grant
    Filed: June 24, 2013
    Date of Patent: June 17, 2014
    Assignee: AgileQR, Inc.
    Inventors: Foster Joseph Sayers, III, Albert Ho, Charles Hyung Kim
  • Publication number: 20140164269
    Abstract: A method comprising performing following acts on a network server: receiving a communication from a client terminal operated by a client; performing a first authentication of the client terminal or client; in response to the first authentication, delivering a first service to the client; after delivering the first service, sending an offer for a second service to the client terminal; receiving an acceptance message for the second service from the client terminal; performing a second authentication of the client terminal and/or the client; in response to receiving the acceptance message for the second service from the client terminal and to the second authentication being successful, delivering a second service to the client; wherein the first authentication and the second authentication use different authentication techniques. Other aspects include a programmed data processing apparatus for carrying out the method and a tangible program carrier instructing the apparatus to perform the acts.
    Type: Application
    Filed: February 12, 2014
    Publication date: June 12, 2014
    Applicant: BOOKIT OY AJANVARAUSPALVELU
    Inventor: Jukka SALONEN
  • Patent number: 8751478
    Abstract: A computer-implemented method to associate a brand with search queries that produce search results with malicious websites is described. A plurality of search queries entered into a search engine is received from a plurality of devices. commonalities among the plurality of search queries received from the plurality of devices are identified. The commonalities from the search queries are associated with a brand. A notification regarding the association of the commonalities from the search queries with the brand is generated.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: June 10, 2014
    Assignee: Symantec Corporation
    Inventors: Kaushik Ramajayam, Chandrasekhar Cidambi
  • Patent number: 8731984
    Abstract: A method for receiving, processing and managing service requests from a user is disclosed. The method includes receiving the service request from a user at a concierge service, generating an itinerary from the service request, sending the itinerary to a server in a consumer relation management system and automatically coordinating the service items of the service request among one or more concierge services. A method for automatically notifying a credit or debit card issuer about the future travel plan of a user is also disclosed. The method includes using the generated itinerary to automatically populate a security profile, and transfer the data from the security profile to an issuer, where the issuer uses these data to authorize future transactions in different locations that would normally be declined.
    Type: Grant
    Filed: October 21, 2009
    Date of Patent: May 20, 2014
    Assignee: Visa International Service Association
    Inventors: Michael Rodriguez, Nicola Stiff
  • Publication number: 20140136431
    Abstract: Computer-implemented methods and systems are provided for inhibiting entry of unauthorized products in a supply chain. The methods and systems feature unique identifiers placed on products in the supply chain and Digitally Secured Electronic Titles (DSETs) for products. The DSETs are exchanged upon transfer of the products in the supply chain and tracked in an electronic registry.
    Type: Application
    Filed: November 13, 2013
    Publication date: May 15, 2014
    Applicant: TRACELINK, INC.
    Inventors: Shabbir M. Dahod, Peter J. Spellman