Product, Service, Or Business Identity Fraud Patents (Class 705/318)
  • Publication number: 20130006877
    Abstract: Some embodiments of the inventive subject matter are directed to incorporating a plurality of nanoparticles with a physical structure of an object. The object is transportable via locations associated with a chain of supply. Some embodiments are further directed to writing charges to modifiable portions of the plurality of nanoparticles incorporated with the physical structure of the object. Some embodiments are further directed to configuring the charges on the modifiable portions of the plurality of nanoparticles as data. The data describes one or more characteristics of the object and components of the object. The data is accessible via the locations associated with the chain of supply.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 3, 2013
    Applicant: International Business Machines Corporation
    Inventors: Bradford O. Brooks, Scott W. Pollyea, Srinivas B. Tummalapenta, Hamza Yaswi
  • Publication number: 20120323809
    Abstract: A food product management system comprises a database configured to store data describing a plurality of relationships, each of the plurality of relationships defining a relationship between a producer, a food product, and a combination of stable isotopes, the food products being associated with the combinations of the stable isotopes that are different from producer to producer; a terminal device configured to receive results of an analysis of the combination of stable isotopes contained in one of the food products; and a management computer operatively connected to the database and the terminal device, and configured to receive the results of the analysis from the terminal device and to identify the producer of the one of the food products with reference to the database based on the results of the analysis.
    Type: Application
    Filed: June 14, 2011
    Publication date: December 20, 2012
    Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLC
    Inventor: Toshimi Fukui
  • Patent number: 8335491
    Abstract: A system for verifying the authenticity of an item. At least one cellular telephone has an image recorder, a receiver and a transmitter. A cellular telephone network receives a recorded image transmitted by the cellular telephone and forwards the recorded image to at least one remote server. An image-recognition device is accessible to the remote server, the image recognition device being configured to decode a latent image embedded within the recorded image and to generate a dataset corresponding to the latent image. A processor accessible to the remote server generates a response corresponding to the dataset and indicating the authenticity status of the item, the response being forwarded from the remote server to the receiver of the cellular telephone by means of the cellular telephone network.
    Type: Grant
    Filed: January 25, 2011
    Date of Patent: December 18, 2012
    Inventor: Aram Kovach
  • Publication number: 20120317043
    Abstract: A method and system for facilitating verification of ownership of a first jewelry-related item are disclosed. In at least some embodiments, the method includes receiving at a central terminal, from a mobile device via an internet-type communications medium, a certificate number associated with a first certificate corresponding to the first jewelry-related item, where the central terminal is at least one of operated and controlled by an entity that provides guarantees or warranties in relation to a plurality of certificates that respectively pertain to respective jewelry items, the plurality of certificates including the first certificate. The method additionally includes searching a database associated with the central terminal for ownership data pertaining to the first jewelry-related item, and sending the ownership data from the central terminal for receipt by the mobile device.
    Type: Application
    Filed: August 20, 2012
    Publication date: December 13, 2012
    Inventor: Steven K. Yeko, SR.
  • Patent number: 8327253
    Abstract: A system and method are described for creating photo stories using video. The method includes receiving a user request to upload a user-specified video stream; determining whether the video stream meets one or more predetermined requirements, uploading the video stream; analyzing the video stream to select video frames for extraction based on a set of predetermined frame selection criteria; extracting the selected video frames from the video image; selecting a story book template to be used with the video images; and generating a preview of the story book template with the video images within a graphical user interface (GUI), the user editing the story book template with text and/or moving or modifying the video frames within the preview.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: December 4, 2012
    Assignee: Shutterfly, Inc.
    Inventors: Edward Han, Kelly Berger
  • Patent number: 8311826
    Abstract: In one embodiment, the invention provides a method, comprising: (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in the database.
    Type: Grant
    Filed: October 20, 2011
    Date of Patent: November 13, 2012
    Assignee: Victrio, Inc.
    Inventor: Anthony Rajakumar
  • Publication number: 20120271773
    Abstract: A counterfeit product detection method and system for detecting whether a product is genuine or counterfeit. The method allows a consumer to check whether a product is authentic or counterfeit by way of using a sequential serial number assigned to the particular product by the manufacturer of the product. Alternatively, the authenticity of the product can be verified at the point of purchase at the retailer or over the telephone by way of the sequential serial number. The method provides a way for a manufacturer's recall to reach the consumers who purchase the product.
    Type: Application
    Filed: April 19, 2012
    Publication date: October 25, 2012
    Inventor: Kenneth H. Pieri
  • Publication number: 20120259789
    Abstract: Methods of allowing a customer to access information related to an order of a commodity include entering the information into a central database, updating a content of a web-based application with the information within the central database, and allowing the customer to access the information via the web-based application. Systems for allowing a customer to access information related to an order of a commodity include a server configured to store the information in a central database, one or more terminals having one or more applications configured to enter the information into the central database, and a web-based application configured to allow the customer to access the information within the central database.
    Type: Application
    Filed: January 18, 2012
    Publication date: October 11, 2012
    Applicant: TRACE PRODUCE, LLC
    Inventors: James G. Farmer, Charles W. Farmer, Joseph W. Farmer
  • Publication number: 20120254051
    Abstract: An anti-counterfeiting method assigns a product code to a product, and reproduces the product code on the product. The reproduced product code has at least an overt code and a covert code. At normal conditions, the overt code is visible but the covert code is concealed from viewing by a concealment means such as a scratch-off material. A consumer is allowed to conditionally remove the concealment means to reveal the covert code, and send the overt code and the revealed covert code to a verification center to verify the authenticity of the product. At least the complete product code is large enough to identify the product, while the covert code is just large enough to discourage counterfeiting yet at the same time small enough to make it easy for the consumer to uncover.
    Type: Application
    Filed: April 4, 2011
    Publication date: October 4, 2012
    Inventors: ZeMing M. Gao, Pingyi Yan
  • Publication number: 20120254050
    Abstract: The disclosure relates to a computerized method and system for tracking consumer replaceable units (CRU) used in products such as printing systems. In the method the CRUM ID and destination of the consumable is retrieved on shipment from a supplier. When the consumer replaceable unit is installed in a device such as printing system, the device reports the installation back to a management application. The management application then proceeds to authorize the consumable for the reporting printing system, offer to transfer ownership, or when the printing system is not a managed device then offers a customer the option of being billed for the consumable. The management application has the option of disabling printing with customer replaceable unit when reassignment or intent to purchase is not available. When the consumable is returned the management application can ascertain if the customer replaceable unit was used by its assigned printing device.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 4, 2012
    Applicant: XEROX CORPORATION
    Inventors: Matthew O. SCRAFFORD, Jason C. Tsongas
  • Publication number: 20120254052
    Abstract: An anti-counterfeiting method associates the first code with an article to be authenticated to identify the article, and associates a second code with the first code as a confirmation code to verify the first code. Both the first code and the second code are reproduced on the article. The reproduced first code is overt code while the reproduced second code is covert and concealed from normal viewing by a concealment means such as a scratch-off material. An authorized person (e.g., a consumer) is allowed to conditionally remove the concealment to reveal the covert code. The first code and the revealed second code are used to verify the authenticity of the product with a verification center. During the verification, the first code identifies the article, while the second code verifies the first code to test the authenticity of the associated article.
    Type: Application
    Filed: April 4, 2011
    Publication date: October 4, 2012
    Inventors: ZeMing M. Gao, Pingyi Yan
  • Patent number: 8271588
    Abstract: Systems and methods for filtering fraudulent email messages are described. In one embodiment, a method includes receiving an email message, determining whether the email message is indicative of fraud, and creating a fraud filter based on the email message if the email message is fraudulent.
    Type: Grant
    Filed: September 24, 2004
    Date of Patent: September 18, 2012
    Assignee: Symantec Corporation
    Inventors: Mark Bruno, David Cowings, Sanford Jensen, Dylan Morss, Ken Schneider
  • Patent number: 8266033
    Abstract: Methods, devices, and systems for analyzing negotiated negotiable instruments for unlawful activity are described. A computer system, including a computer readable storage device and a processor may be provided. A plurality of electronic files may be received. Each of these electronic files of the plurality of electronic files may include an electronic image of at least a portion of a negotiable instrument and include a plurality of data fields. The plurality of electronic files may be divided into subsets based on whether data is available in particular data fields of the electronic files. Based upon the subset an electronic file is made a member of, various selection criteria may be applied to determine if the electronic file is a candidate for suspicious and/or illegal activity. Also, a listing of candidates for suspicious and/or illegal activity may be presented to a user.
    Type: Grant
    Filed: February 27, 2012
    Date of Patent: September 11, 2012
    Assignee: The Western Union Company
    Inventors: Jeannie Larsen, Allen Hofmann, Eyal Tzarfati
  • Publication number: 20120215704
    Abstract: Example embodiments relate to identification of regions in which unauthorized products are available. For example, in some embodiments, requests for verification of authenticity of a product may be received. Each request may be associated with a verification code and location data identifying a physical location of the product. Based on the requests, example embodiments may then determine whether a particular region including the physical location identified by the location data is likely to be a region in which unauthorized products are available.
    Type: Application
    Filed: February 23, 2011
    Publication date: August 23, 2012
    Inventors: Shell S. Simpson, Paul L. Jeran
  • Patent number: 8250637
    Abstract: An entity resolution system and alert analysis system configured to process inbound identity records and to generate alerts based on relevant identities, entities, conditions, activities, or events is disclosed. One process of resolving identity records and detecting relationships between entities may be performed using a pre-determined or configurable entity resolution rules. Further, the entity resolution system may include an alert analysis system configured to allow analysts to review and analyze alerts, entities, and identities, as well as provide comments or assign a disposition to alerts generated by the entity resolution system. Furthermore, the entity resolution system may be configured to handle duplicate alerts, i.e., one or more identical or near-identical alerts generated using the same entities and/or identities as well as assign a relevance score to the particular entities and identities included in the alert.
    Type: Grant
    Filed: April 29, 2008
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: Thomas B. Allen, Barry M. Caceres
  • Publication number: 20120197813
    Abstract: In exemplary embodiments, an apparatus and method for verifying experts on a consultation system is provided. Identity and credential information is received at a web server from a potential expert. A selection of a category that the potential expert wants to be admitted is also received. The identity information and at least a portion of the credential information may be verified. The potential expert is accepted as an expert based in part on a result of the verifying of the identity and credential information. Once accepted, an account associated with the potential expert is activated to allow the potential expert to become an expert and to allow the expert to provide answers on the consultation system when the potential expert is accepted.
    Type: Application
    Filed: April 4, 2012
    Publication date: August 2, 2012
    Applicant: PEARL.COM LLC
    Inventors: Andrew Paul Kurtzig, Emily Allison Su-lan Reber Porter
  • Publication number: 20120179615
    Abstract: A method that involves product authentication includes associating a serial number of a device with a first consumer product, thereby allowing an authenticity of the first consumer product to be verified using the device, determining whether the first consumer product is authentic using the serial number, and associating the serial number of the device with a second consumer product after the first consumer product is sold and after the device has been returned for recycling, thereby allowing an authenticity of the second consumer product to be verified using the device.
    Type: Application
    Filed: January 7, 2011
    Publication date: July 12, 2012
    Inventors: Kam-Fai TANG, Victor H. YOUNG
  • Publication number: 20120179614
    Abstract: A method for use in a process to authenticate a consumer product includes receiving a serial number from a device through a network, wherein the device is configured to detachably couple to the consumer product, determining a validity of the serial number, transmitting a number to the device through the network, using the number to generate a reference verification number in accordance with a predetermined algorithm, receiving a calculated verification number from the device through the network, and comparing the calculated verification number with the reference verification number to determine whether the consumer product is authentic.
    Type: Application
    Filed: January 7, 2011
    Publication date: July 12, 2012
    Inventors: Kam-Fai TANG, Victor H. YOUNG
  • Publication number: 20120179517
    Abstract: A product authentication device for use with a consumer product includes an integrated circuit, a housing containing the integrated circuit, a coupling mechanism for detachably coupling the housing to the consumer product, and a communication interface for receiving an input from a transmitting device, wherein the integrated circuit is configured to use the input to generate an output in accordance with a predetermined algorithm for verifying an authenticity of the consumer product.
    Type: Application
    Filed: January 7, 2011
    Publication date: July 12, 2012
    Inventors: Kam-Fai TANG, Victor H. YOUNG
  • Publication number: 20120084220
    Abstract: Systems and methods are provided for generating a certificate of compliance for a product. A product control system (PCS) retrieves specification and/or regulatory data for a particular product and compares the retrieved data to test result data obtained for that particular product. The PCS generates a product certification if the test result data indicates that the product is in compliance with the specification data and/or the regulatory data. A product test plan generation system (PTPGS) enables a user to interact with a user interface to retrieve a test plan for a particular product. The test plan can be used to obtain test results for the particular product.
    Type: Application
    Filed: January 7, 2011
    Publication date: April 5, 2012
    Applicant: INTERTEK CONSUMER GOODS NA
    Inventors: Gene Rider, Karen Ng, Joseph Mohorovic, Xiao Chen, Ruben Suarez, Mark Mrozek, Brian Check, Stephanie Fok, Erick Ramos
  • Patent number: 8150751
    Abstract: Methods, devices, and systems for analyzing negotiated negotiable instruments for unlawful activity are described. A computer system, including a computer readable storage device and a processor may be provided. A plurality of electronic files may be received. Each of these electronic files of the plurality of electronic files may include an electronic image of at least a portion of a negotiable instrument and include a plurality of data fields. The plurality of electronic files may be divided into subsets based on whether data is available in particular data fields of the electronic files. Based upon the subset an electronic file is made a member of, various selection criteria may be applied to determine if the electronic file is a candidate for suspicious and/or illegal activity. Also, a listing of candidates for suspicious and/or illegal activity may be presented to a user.
    Type: Grant
    Filed: September 11, 2009
    Date of Patent: April 3, 2012
    Assignee: The Western Union Company
    Inventors: Jeannie Larsen, Allen Hofmann, Eyal Tzarfati
  • Publication number: 20120078739
    Abstract: The exemplary embodiments described herein relate to the field of electronic registration (ER) of purchased products and, more particularly, to an improved electronic registration system that enables the tracking and/or identifying of fraudulent gift cards that are purchased or linked to fraudulent item returns. In certain exemplary embodiments, transaction information for gift cards is stored in and/or connected to an ER database such that fraudulent activities associated with the gift card and/or items linked to the gift card may be tracked and/or identified—even potentially long after the gift card has been initially provided.
    Type: Application
    Filed: September 23, 2010
    Publication date: March 29, 2012
    Applicant: Nintendo of America, Inc.
    Inventor: Maridee Joy Maraz
  • Patent number: 8140418
    Abstract: There is provided a method and system for real-time authorization of cardholder-not-present transactions. An authorization request application may be implemented on an electronic device, such as a cellular phone, a personal media player, or a computer. A cardholder may register a card account, such as a credit account, a debit account, a gift card account, and so forth, for participation in the real-time authorization program. The cardholder may then receive authorization requests when cardholder-not-present transactions are attempted. Via the authorization request application, the cardholder may approve or decline the authorization request. In addition, the cardholder may configure settings for automatically responding to missed authorization requests. The authorization request application may also allow the cardholder to flag automatically approved requests as unauthorized within a certain time period after an automatic approval response is sent, thereby enabling prompt detection of fraudulent activity.
    Type: Grant
    Filed: January 9, 2009
    Date of Patent: March 20, 2012
    Assignee: Apple Inc.
    Inventors: Brandon J Casey, Gary Wipfler, Erik Cressall
  • Publication number: 20120041887
    Abstract: An arrangement for enabling an acting party, e.g. a natural person or an automatic inspection line, to retrieve information from a product (150), e.g. for genuineness verification, includes an optical device (102) for optically receiving auxiliary information from the product, a processing system (103) for retrieving instruction data from a database (104) on the basis of the auxiliary information, and a data interface (105) for delivering the instruction data to the acting party for enabling the acting party to retrieve the information. In the genuineness verification application, the verification is provided with two separate components. A first component resides in the auxiliary information on the surface of the product and a second component resides in the instruction data. The division of the genuineness verification into the two components makes it more difficult for a counterfeit manufacturer to analyze the counterfeit protection and to follow changes in the counterfeit protection.
    Type: Application
    Filed: March 29, 2010
    Publication date: February 16, 2012
    Applicant: TEKNOLOGIAN TUTKIMUSKESKUS VTT
    Inventors: Eero Hurme, Jouko Hyvakka, Caj Sodergard
  • Patent number: 8117097
    Abstract: A method and system is provided that evaluates several pieces of information associated with bank accounts at the time they are opened in order to assess the level of fraud risk that the new account creates for the bank. When a new customer establishes an account the various information collected during the account establishment process is analyzed using a logic algorithm that makes a risk assessment. The logic algorithm assigns a risk level wherein the highest risk accounts may be refused immediately while the next highest risk tier is flagged for further monitoring. Once flagged for monitoring, the account is subject to increased scrutiny based on various customer attributes to identify any problematic patterns. If all transactions are normal, the scrutiny flag lapses. If risky transactions continue, a hold is placed on the account and additional investigation is undertaken to either clear or close the account.
    Type: Grant
    Filed: December 9, 2009
    Date of Patent: February 14, 2012
    Assignee: Citizens Financial Group, Inc.
    Inventor: Aaron A. Abbott
  • Publication number: 20120036078
    Abstract: A method for systematically coordinating the collection, analysis and storage of payroll information provided to government agencies by government contractors pursuant to applicable regulations is disclosed. The method includes collecting payroll information from contractors, performing an automated compliance check on the payroll information collected from contractors, storing verified payroll information in at least one database, and performing an automated fraud check on payroll information. The method also includes notifying auditors of instances of possible fraud, notifying auditors of instances of non-compliance, sorting payroll information in the at least one database according to geographic and skill categories, and providing reports to agencies.
    Type: Application
    Filed: October 10, 2011
    Publication date: February 9, 2012
    Inventors: T. Phillip Dean, Richard Edwin DeHority, James Michael DeHority, Woodrow W. Chamberlain
  • Patent number: 8094037
    Abstract: Methods and systems for identifying an appliance comprising receiving indication of an appliance coupling to a communication port on a communication network and retrieving, over the communication network, a first identification assigned to the appliance during manufacturing of the appliance. The appliance is validated using the first identification and a status of the appliance is determined.
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: January 10, 2012
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventor: Robert A. Unger
  • Publication number: 20110307361
    Abstract: Systems, methods, apparatus, and computer program products are provided for initiating shipment of and payment for shipping a parcel. For example, in one embodiment, a customer/user can receive a message on a user device from a carrier that includes an authorization code for shipping a parcel. After the customer/user ships the parcel, the carrier can charge a variety of accounts for the shipping charges, including a wireless services provider associated with the user device. In another embodiment, the customer/user can interact with a kiosk to ship the parcel. In this embodiment, the carrier can also charge a variety of accounts for the shipping charges, including a wireless services provider.
    Type: Application
    Filed: June 11, 2010
    Publication date: December 15, 2011
    Inventors: Sathiyan Parameswaran, Bruce Besserer, Nicholas Costides, Mark Hilbush
  • Publication number: 20110302096
    Abstract: An authentication service provides authentication information to help potential buyers determine the legitimacy of an offer to sell a good or service. For example, an authentication service stores registration information that indicates (a) that a particular item was purchased by a particular party, and (b) contact information that indicates a particular address for communicating with the party. When the registered owner of an item wants to sell the item, the owner sends an intent-to-sell message to the authentication service. In response to receiving the intent-to-sell message, the authentication service sends access information to the particular address. The access information specifies a manner of receiving authentication information about the item from the authentication service. The registered owner includes the access information in his or her advertisements for the item.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 8, 2011
    Applicant: APPLE INC.
    Inventor: T. Ethan Lowry
  • Publication number: 20110302094
    Abstract: A method, system, and computer usable program product for improved manufacturing and distribution to avoid counterfeit products in a supply chain are provided in the illustrative embodiments. For manufacturing to avoid a counterfeit product, a product to be manufactured is selected. Production volume information is determined, the production volume information including a number of units of the product to be produced. An identifier of a manufacturer of the product, an identifier of the product, and the production volume information are sent and several sets of identifiers are received. Each set of identifiers include identifiers corresponding to a customer reference number (CRN), a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). One set of identifiers is uniquely associated with one unit of the product being produced. A unit of the product is manufactured such that the unit includes a corresponding set of identifiers.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 8, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sanjay Mecheri Kesavan, Nataraj Nagaratnam, Lohitashwa Thyagaraj
  • Publication number: 20110302093
    Abstract: A method, system, and computer usable program product for mitigating distribution or consumption of counterfeit products in a supply chain are provided in the illustrative embodiments. A first set of identifiers is generated to associate with a product to be manufactured. The first set of identifiers includes identifiers corresponding to a customer reference number (CRN), a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). The first set of identifiers is associated with the product and a status indicator. The status indicator is set to a first value representative of the product being an original product and the product being available for sale. The first set of identifiers is transmitted to another second application.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 8, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sanjay Mecheri Kesavan, Nataraj Nagaratnam, Lohitashwa Thyagaraj
  • Publication number: 20110302095
    Abstract: A method, system, and computer usable program product for pre and post purchase identification of counterfeit products in a supply chain are provided in the illustrative embodiments. A customer reference number (CRN) associated with a unit of product is identified. The unit of product has associated therewith a unique set of identifiers including the CRN, a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). The CRN is sent to a second application and a message is received from the second application in response to sending the CRN. If the message includes a second CAN that is not the same as the CAN associated with the unit, the unit is determined to be a counterfeit product.
    Type: Application
    Filed: June 2, 2010
    Publication date: December 8, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sanjay Mecheri Kesavan, Nataraj Nagaratnam, Lohitashwa Thyagaraj
  • Patent number: 8073691
    Abstract: In one embodiment, the invention provides a method, comprising: (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in the database.
    Type: Grant
    Filed: May 29, 2007
    Date of Patent: December 6, 2011
    Assignee: Victrio, Inc.
    Inventor: Anthony Rajakumar
  • Patent number: 8050992
    Abstract: A secure card comprising biometric data of an individual for identifying or confirming authority of the individual. Prior to issuing the secure card a cardholder's biometric data is stored in the secure cards memory. When the secure card is used the cardholder inputs biometric data. This input biometric data is then compared to the biometric data stored in the card. If the input biometric data matches the stored biometric data the identity of the cardholder is confirmed. The secure card also comprises a transparent input area to separate the cardholder from an identity verification machine.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: November 1, 2011
    Inventor: Ming-Yuan Wu
  • Publication number: 20110264459
    Abstract: Various techniques are described that enable a smaller insurer (or an insurer with a less developed dataset) to be able to characterize whether certain healthcare insurance claim elements are potentially fraudulent or erroneous. Datasets from larger insurers (with well developed datasets) and/or datasets from a consortium of insurers can be leverage by the smaller insurer. Related techniques, apparatus, systems, and articles are also described.
    Type: Application
    Filed: April 22, 2010
    Publication date: October 27, 2011
    Applicant: FAIR ISAAC CORPORATION
    Inventors: Michael Tyler, Nitin Basant, Robin P, Shafi Rahman
  • Patent number: 8041620
    Abstract: Methods and systems for detecting fraud based on velocity counts are disclosed.
    Type: Grant
    Filed: September 4, 2009
    Date of Patent: October 18, 2011
    Assignee: Authorize.Net LLC
    Inventors: Jim Collins, Avinash Kalgi, John Medlong, Paul Lisagor
  • Publication number: 20110251969
    Abstract: Various aspects of the invention provide systems and methods for verifying the authenticity of a product. One aspect of the invention provides a method of verifying the authenticity of a product through a plurality of stages of a supply chain. The method includes: providing a product having a plurality of distinct hidden unique identifiers incorporated with the product; and at each of at least one of the plurality of stages of the supply chain, verifying the authenticity of a revealed unique identifier, thereby verifying the authenticity of the product. Another aspect of the invention provides a product including a plurality of distinct hidden unique identifiers. The plurality of distinct unique identifiers can be selectively revealed. Another aspect of the invention provides a tamper-evident package including a plurality of distinct hidden unique identifiers. The plurality of distinct unique identifiers can be selectively revealed.
    Type: Application
    Filed: April 7, 2011
    Publication date: October 13, 2011
    Applicant: SPROXIL, INC
    Inventors: Ashifi Gogo, Alden Zecha
  • Publication number: 20110238538
    Abstract: Aggregating customer records to conduct due diligence to facilitate business transaction includes receiving a request to aggregate customer transaction records, wherein the customer transaction records are stored when a customer conducts a transaction with a selected one of a first company and a second company. A plurality of customer transaction records are determined from a first enterprise. The plurality of customer transaction records are aggregated from the first enterprise, wherein the plurality of customer transaction records comprises records associated with the first company and records associated with the second company. The aggregated customer transaction records are communicated in response to the request.
    Type: Application
    Filed: March 24, 2010
    Publication date: September 29, 2011
    Applicant: Bank of America Corporation
    Inventors: Thayer S. Allison, JR., Sudeshna Banerjee, Debashis Ghosh, Hemant A. Kagade, Mark V. Krein, David Joa, Kurt D. Newman
  • Publication number: 20110238589
    Abstract: An efficient and scalable system for identifying a commodity having a specific, unique topocompositional profile has been developed that includes: enrolling at least one commodity in order to capture its topocompositional profile; matching the at least one commodity with a plurality of commodities in a commodity database; and integrating the topocompositional profile into a commodity grading system. A method of identifying a commodity having a specific, unique topocompositional profile, includes enrolling at least one commodity in order to capture its topocompositional profile; matching the at least one commodity with a plurality of commodities in a commodity database; and integrating the topocompositional profile into a commodity grading system.
    Type: Application
    Filed: March 25, 2010
    Publication date: September 29, 2011
    Inventors: Don Willis, James Freeman, David Rosenberg
  • Publication number: 20110238590
    Abstract: A method providing a social network of products and certificates of authenticity for products. The method includes providing a product provider interface for uploading product information; generating unique product identifiers and certificates of authenticity for the products; and distributing the unique product identifiers and the and certificates of authenticity to product providers. Additionally the method includes providing an end user interface that enables end users to register ownerships of products, keeping record of products registered to end users, providing to product providers end user information comprising information about products registered to end users, and making information about registered product ownerships available to other end users through the end user interface.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 29, 2011
    Applicant: Thinglink LLC
    Inventor: Ulla-Maaria Engestrom
  • Publication number: 20110231316
    Abstract: Provided herein is a method, system and non-transitory computer readable medium storing instructions related to receiving and storing product code information from plural surveyor surveillance devices and compensating a party associated with each surveyor device that provides information potentially related to a improper transacted sales of a product associated with a gathered product code. The information gathered from the surveillance devices can assist in investigating whether existing products are genuine or counterfeit by identifying non-valid and/or non-registered product codes and improper sales transactions associated with product codes received from the surveillance devices.
    Type: Application
    Filed: March 9, 2011
    Publication date: September 22, 2011
    Applicant: CUMMINS INTELLECTUAL PROPERTIES, INC.
    Inventor: John T. CARROLL, III
  • Publication number: 20110225101
    Abstract: A subset of unique codes are generated from a set of codes. The subset of codes are stored in a database on a secure server and each of the codes is marked on a corresponding instantiation of the product. The marked instantiations are distributed. During their distribution, the marked instantiations are verified for authenticity and for routing. This verification is performed by reading or scanning the codes on the instantiations, and transmitting that information to the secure server for comparison against the codes and other information located in the database contained therein.
    Type: Application
    Filed: March 16, 2011
    Publication date: September 15, 2011
    Applicant: VERIFY BRAND LLC
    Inventor: David Dillon
  • Publication number: 20110225019
    Abstract: A method of categorizing a brand comprising the steps of: (i) Collecting a brand-related search term from a user via an interface; (ii) Scanning a computer network (optionally the Internet) for data containing the brand; (iii) Scanning one or more pre-selected data sources for data containing the brand; (iv) Returning search results from the two said scanning steps; (v) Comparing the search results with a set of keywords associated with one or more predetermined categories; (vi) Suggesting one or more categories for the brand based on the results of the keyword search; (vii) Ranking the suggested categories in order of relevance to the brand;
    Type: Application
    Filed: October 14, 2009
    Publication date: September 15, 2011
    Inventors: David Taylor, Benjamin Lehman, Duncan Bucknell
  • Publication number: 20110225100
    Abstract: A system, method and graphical user interface display for validating, monitoring and otherwise reviewing the sales and distribution of medicines, to reduce the instances of counterfeit medicines. A pharmaceutical company provides medicines to users, either directly or through representatives for the pharmaceutical company. The products have associated identifying codes that are used to track the sales of the products. The system provides verifications of the medicines, as well as statistical analysis of the sales and distribution. The verifications and comparisons of the distribution and sales of the medicines can be reviewed by the user or on a dashboard user interface. The system further allows pharmaceutical companies provided the medicines to provide response messages to users.
    Type: Application
    Filed: December 20, 2010
    Publication date: September 15, 2011
    Applicant: PHARMASECURE, INC.
    Inventors: Puneet M. Sangal, Nathan J. Sigworth, N. Taylor Thompson, Sarah M. Hine
  • Publication number: 20110220560
    Abstract: A process, system, and component configuration are described that discourages customer acceptance/use of will-fit, reconditioned, and counterfeit product components, by determining whether or not a serviceable product component is genuine. If a component is determined to not be genuine, then appropriate action may be taken to warn operators and document such findings. For example, one or more markers are disposed or otherwise put on the subject serviceable product component and serves as a targeted feature, and/or a particular characteristic of the filter itself is identified as the targeted feature. A sensor is used to detect the targeted feature and obtain information unique to the serviceable product component. The targeted feature(s) identifies the particular serviceable component as genuine and forms the basis for determining whether a genuine component has been installed. In some circumstances, a fluid filter product is the component that is the subject detection.
    Type: Application
    Filed: March 9, 2011
    Publication date: September 15, 2011
    Applicant: CUMMINS FILTRATION IP, INC.
    Inventors: Barry M. Verdegan, John T. Carroll, III, Matthew L. Schneider, Michael T Zuroski, Nathan A. Whitaker, James L. Walls
  • Publication number: 20110218930
    Abstract: Systems and methods for providing validated customer feedback information about a service provider. Generally, the method includes providing a customer with a digital ratings device, such as digital pen, that is capable of receiving feedback information from the customer and uploading the information to a third-party provider. As the customer uses the digital ratings device to provide the information, the device may associate the information with temporal data, such as the time, date, and location at which the customer provided the information. In some cases, the temporal data is checked to ensure that the customer is actually one of the provider's customers. Because the information is validated as coming from a verified customer, the information is often more reliable than it would be if it were submitted anonymously. Thus, the validated information may present a substantially fair representation of the provider and be useful to potential customers.
    Type: Application
    Filed: March 8, 2010
    Publication date: September 8, 2011
    Applicant: IVERIFICATION SERVICES, LLC
    Inventor: Jonathan K. Black
  • Publication number: 20110213723
    Abstract: A method for providing a product use agreement. The method includes sending, to a user in response to a request for a product, a message that includes an address for accessing the product use agreement. The method further includes receiving, from the user, a call at the address and audibly playing, to the user, a pre-recorded product use agreement recording. The pre-recorded product use agreement recording includes a legal agreement for using the product between the user and a business entity providing the product. The method further includes receiving, from the user, acceptance of the product use agreement based on the pre-recorded product use agreement recording, and providing access to the product based on acceptance of the product use agreement.
    Type: Application
    Filed: February 26, 2010
    Publication date: September 1, 2011
    Applicant: INTUIT INC.
    Inventors: Susannette Burroughs, Sharon K. Matsumura
  • Publication number: 20110202436
    Abstract: Behavior associated with credit misuse is referred to herein as “intentional misuse of credit” (IMOC) behavior and individuals who exhibit IMOC behavior are referred to herein as IMOC individuals. Embodiments of the present invention provide systems, methods, and computer program products for reviewing, on a daily basis, financial-transaction data taken across a plurality of individual consumers, identifying individual consumers whose financial-transaction data indicates IMOC behavior, and flagging those individual consumers as IMOC individuals.
    Type: Application
    Filed: February 15, 2010
    Publication date: August 18, 2011
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Sreedevi Gummuluri, Yanghong Shao, Debashis Ghosh, Sudeshna Banerjee
  • Publication number: 20110196722
    Abstract: Techniques are described herein for providing a marketplace for CAPTCHA developers. A CAPTCHA is a type of challenge-response test that a content provider may present to users for authorizing the users to access content that is hosted by the content provider. CAPTCHA developers may propose CAPTCHAs for testing in the marketplace. A server is configured to provide instances of proposed CAPTCHAs to users along with instances of reference CAPTCHAs that have known difficulties to determine the relative difficulties of the proposed CAPTCHAs for the users. The server may determine a reward to be provided to a developer of a proposed CAPTCHA based on a difficulty that the predetermined automated systems encounter when they attempt to solve the proposed CAPTCHA and an ease with which the users solve the proposed CAPTCHA. The server may determine rewards to be provided to developers of predetermined automated systems that solve the proposed CAPTCHAs.
    Type: Application
    Filed: February 5, 2010
    Publication date: August 11, 2011
    Applicant: YAHOO! INC.
    Inventors: Kunal Punera, Anirban Dasgupta, Shanmugasundaram Ravikumar
  • Publication number: 20110191200
    Abstract: The present invention generally relates to authenticating online transactions, and more specifically, to method and system for determining a potentially fraudulent online transaction request based on a risk parameter associated with a user in a networking platform such as, a social networking platform. The method comprises receiving an online transaction request from a user. Thereafter, determining the risk parameter of the user based on one or more profile parameters associated with the user or one or more peer users associated with the user in the community. Based on the risk parameter of the user the online transaction request of the user is authenticated.
    Type: Application
    Filed: February 4, 2010
    Publication date: August 4, 2011
    Inventors: Lex Bayer, Simon Ru, Mark Rose