Product, Service, Or Business Identity Fraud Patents (Class 705/318)
  • Publication number: 20110184877
    Abstract: Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a predictive threat rating for user accounts. In one implementation, a first threat score representing a first time period may be calculated. The first threat score may be compared with aspects of the same user accounts for a second time period. Weighting schemes may be applied to certain activities, controls, and/or user accounts. Further aspects relate to apparatuses configured to execute methods for ranking individual user accounts. Certain embodiments may not block transmissions that violate predefine rules, however, indications of such improper transmission may be considered when constructing a threat rating. Blocked transmissions enforced upon a user account may also be received. Certain activity, such as accessing the internet, may be monitored for the presence of a security threat and/or an ethics threat.
    Type: Application
    Filed: January 26, 2010
    Publication date: July 28, 2011
    Applicant: Bank of America Corporation
    Inventors: Brian McHugh, Ronald Ramcharran, Peter J. Langsam, Timothy C. Metzger
  • Publication number: 20110184878
    Abstract: A managed service for the detection of fraud and/or anomalous transactions is disclosed. In one implementation, the managed service receives data from customers over a wide area network, the data for each customer relating to information that the customer would like monitored for anomalous transactions. The service may analyze data from the customers based on Benford's law to detect potential anomalous transactions in the data from the customers. The managed service may further report occurrences of detected potential anomalous transactions to the customer.
    Type: Application
    Filed: April 6, 2011
    Publication date: July 28, 2011
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventor: Ralph S. HOEFELMEYER
  • Publication number: 20110178942
    Abstract: A method of selecting security actions is provided. The method comprises estimating a maximum forecast loss, identifying general, sector specific, and targeted threats. The method further comprises forecasting a security loss based on the estimated maximum forecast loss and the threats, estimating a reduction in the security loss based on a first investment on a general threat countermeasure, on a second investment on a sector specific countermeasure, and on a third investment on a targeted threat countermeasure. The method further comprises allocating at least a portion of a security investment budget among the first, the second, and the third investments to maximize the estimated reduction in security loss. An aspect disclosed comprises a method that determines rates of return on security investment and selects security investments based on the rates of return. An aspect disclosed comprises a system for forecasting a security loss based on a security investment.
    Type: Application
    Filed: January 18, 2010
    Publication date: July 21, 2011
    Applicant: iSIGHT PARTNERS, INC.
    Inventors: John P. Watters, Frederick Doyle
  • Publication number: 20110173116
    Abstract: Embodiments include systems and methods of detecting and assessing multiple types of risks related to mortgage lending. One embodiment includes a system and method of detecting and assessing risks including fraud risks, early payment default risks, and risks related to fraudulently stated income on loan applications. One embodiment includes a computerized method that includes creating a combined risk detection model based on a plurality of risk detection models and using the combined risk detection model to evaluate loan application data and generate a combined risk score that takes into account interaction of different types of risks individually and collectively detected by the plurality of risk detection models.
    Type: Application
    Filed: January 13, 2010
    Publication date: July 14, 2011
    Applicant: FIRST AMERICAN CORELOGIC, INC.
    Inventors: Rui Yan, Hoi-Ming Chi, Seongjoon Koo, James Baker
  • Publication number: 20110173105
    Abstract: An apparatus (such as a AAA node of a core/operator network) receives from a relying party an initial credit control request that bears first information comprising a relying party identifier, a service context identifier for a service to be provided by the relying party, and a token that authenticates a subscriber. The first information is extracted and forwarded to a core network accounting server that stores account information for the subscriber. The relying party is not within the core network. In reply to forwarding the extracted first information, the apparatus receives from the accounting server a credit control answer that bears second information comprising the relying party identifier, the service context identifier, and a grant indicating the subscriber may be charged a fee for the service to be provided by the relying party. The second information is extracted and forwarded to the relying party.
    Type: Application
    Filed: January 8, 2010
    Publication date: July 14, 2011
    Inventors: Achill Schirilla, Silke Holtmanns, Hannes Tschofenig
  • Publication number: 20110166948
    Abstract: Methods and systems for preventing fraud by a customer at a fuel dispenser within a retail fueling environment are disclosed. According to one method, an authorization to access programming mode (AAPM) signal is received at the fuel dispenser from an authorization terminal coupled to the fuel dispenser. A request is received at the fuel dispenser to enter a programming mode of operation (PMO). The PMO is entered at the fuel dispenser to allow fuel dispenser settings of the fuel dispenser to be changed after receiving the AAPM signal and the request to enter the PMO.
    Type: Application
    Filed: March 18, 2011
    Publication date: July 7, 2011
    Applicant: GILBARCO INC.
    Inventor: Benjamin Tasso Siler
  • Publication number: 20110167010
    Abstract: Methods and systems for use in enabling verification by entities on a path across a supply network of an item identification means traversing said path, the network comprising: at least one supplier entity able to introduce into the network an item identification means having stored therein an item identifier and a digital signature associated with said supplier entity, and to forward said item identification means along a path across said network; at least one intermediate entity able to receive said item identification means from said at least one supplier entity or from another intermediate entity in said network and forward said item identification means along said path; and at least one receiver entity able to receive said item identification means from an intermediate entity in said network.
    Type: Application
    Filed: September 9, 2009
    Publication date: July 7, 2011
    Inventors: Andrea Soppera, Trevor Burbridge
  • Publication number: 20110161108
    Abstract: Systems and methods for detecting diversion in drug dispensing transactions are provided. The systems and methods described provide an integrated platform for collecting and analyzing data that describes a user's drug dispensing transactions and determines a diversion score for the user that indicates the relative severity of the user's diversion activities. The diversion score may be weighted to reflect the relative importance of a respective category of diversion activity to the identification of drug diverters with respect to other categories. Furthermore, in determining a user's diversion score, the user's transaction data may be compared with transaction data regarding the user's peers. In this way, for example, high diversion scores may indicate a high occurrence of suspicious activity, and users having high diversion scores may be further monitored and investigated to determine whether the particular user is indeed diverting drugs for illegitimate use.
    Type: Application
    Filed: December 30, 2009
    Publication date: June 30, 2011
    Inventors: George Brad MILLER, William Kaper, John Brewster
  • Publication number: 20110153512
    Abstract: An apparatus is provided for authentication of an item or a label by storing unique random serial numbers or codes in a remote secure storage that can be used to authenticate the item or the label, generating a pointer to each stored unique random serial number/code and storing the generated pointer(s) in a client data storage. During or prior to a production run of the item(s) or label(s): the generated point(s) are sent from the client data storage to one or more media devices, the generated pointer(s) are obtained from the media device using a post-content manager, the unique random serial number(s)/code(s) are obtained from the server via the post-content manager using the generated pointer(s), the obtained unique random serial number(s)/code(s) are sent to the media device, and the received unique random serial number(s)/code(s) are imprinted on the item(s) or the label(s) using the media device.
    Type: Application
    Filed: March 1, 2011
    Publication date: June 23, 2011
    Applicant: DT Labs, LLC
    Inventor: Douglas Peckover
  • Publication number: 20110153479
    Abstract: A method for managing payment of digital certificates includes receiving a request to issue a digital certificate to a subscriber, capturing and saving payment information of the subscriber, performing a first authentication and verification of the subscriber at a first time, and performing at least one additional authentication and verification of the subscriber at least once every authentication period. A long-lived certificate is issued to the subscriber provided the subscriber is authenticated and verified. The long-lived certificate is valid for an expiration period. However, the long-lived certificate is revoked if (1) the additional authentications and verification produce invalid results, or (2) if payment is not received during a payment period. The authentication period is shorter than the expiration period and there are at least a first and a second authentication period within the expiration period. The expiration period is longer than the authentication period.
    Type: Application
    Filed: December 23, 2009
    Publication date: June 23, 2011
    Applicant: VeriSign, Inc.
    Inventors: Quentin Liu, Kathleen Elizabeth Barnes, Richard F. Andrews
  • Publication number: 20110153473
    Abstract: A comprehensive platform for merchandising intellectual property (IP) and conducting IP transactions is disclosed. A standardized data collection method enables IP assets to be characterized, rated and valuated in a consistent manner. Project management, workflow and data security functionality enable consistent, efficient and secure interactions between the IP Marketplace participants throughout the IP transaction process. Business rules, workflows, valuation models and rating methods may be user defined or based upon marketplace, industry or technology standards.
    Type: Application
    Filed: December 17, 2009
    Publication date: June 23, 2011
    Applicant: American Express Travel Related Services Company, Inc.
    Inventor: Tracey R. Thomas
  • Publication number: 20110137803
    Abstract: The present disclosure relates to secure electronic receipt systems and methods. The present invention removes the need for paper-based receipts while preserving security through use of a digital signature on each electronic receipt verifying the transaction and other data related to the transaction. In an exemplary embodiment, the present invention includes a trusted email server, an authentication server, a point-of-sale (POS) terminal or the like, and a smart card or the like. A buyer can utilize the smart card to instruct the terminal to provide an electronic receipt. The terminal can utilize the trusted email server and the authentication server to digitally sign the electronic receipt with credentials trusted by the buyer, and these credentials can later be utilized to verify the electronic receipt.
    Type: Application
    Filed: December 3, 2009
    Publication date: June 9, 2011
    Inventor: Bruce Willins
  • Publication number: 20110125658
    Abstract: A method of categorizing a recent transaction as anomalous includes a) receiving information about a recent transaction and b) accessing information about one or more historical transactions. The one or more historical transactions have at least one party in common with the recent transaction. The method also includes c) determining a similarity value between the recent transaction and a transaction i of the one or more historical transactions and d) determining if the similarity value is greater than or equal to a predetermined threshold value. The method further includes e) if the similarity is greater than or equal to the predetermined threshold value, categorizing the recent transaction as not anomalous or f) if the similarity is less than the predetermined threshold value, determining if there are additional transactions. If there are additional transactions, incrementing counter i and repeating steps c) through f).
    Type: Application
    Filed: November 25, 2009
    Publication date: May 26, 2011
    Applicant: VeriSign, Inc.
    Inventors: Eyal S. Lanxner, Shay Raz
  • Publication number: 20110106715
    Abstract: A family-type organization of businesses and consumers bound together by strict organization rules may provide protection to all members from errors, intentional errors, lying, cheating, misrepresentations, false documentation, and many other types of fraud or illegal activities in business transactions within the family by use of credit or debit cards carrying a logo to identify the cards as belonging to the organization. In one embodiment, the logo may be described as a USA MOTHER HEN brand of card.
    Type: Application
    Filed: April 13, 2010
    Publication date: May 5, 2011
    Inventors: Stephen J. Bizilia, Lori Elizabeth McCarthy
  • Patent number: 7937321
    Abstract: A managed service for the detection of fraud and/or anomalous transactions is disclosed. In one implementation, the managed service receives data from customers over a wide area network, the data for each customer relating to information that the customer would like monitored for anomalous transactions. The service may analyze data from the customers based on Benford's law to detect potential anomalous transactions in the data from the customers. The managed service may further report occurrences of detected potential anomalous transactions to the customer.
    Type: Grant
    Filed: January 16, 2007
    Date of Patent: May 3, 2011
    Assignee: Verizon Patent and Licensing Inc.
    Inventor: Ralph S. Hoefelmeyer
  • Publication number: 20110099117
    Abstract: A physical uncloneable function (PUF) pattern is used for verifying a physical condition of an item. The PUF pattern is arranged to be damaged in the event that said item is exposed to a predetermined environmental condition. Verification of the physical condition of the item, is carried out by obtaining a measured response from the PUF pattern, and comparing the measured response with a stored response in respect of the PUF.
    Type: Application
    Filed: June 17, 2009
    Publication date: April 28, 2011
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Hendrik Jan Jozef Hubertus Schepers, Boris Skoric
  • Publication number: 20110093403
    Abstract: The present invention relates generally to the field of self-validating documents in supply chain management, documentation services and method for creating the same.
    Type: Application
    Filed: October 21, 2010
    Publication date: April 21, 2011
    Applicant: Decernis, LLC
    Inventors: Andrew B. Waldo, Yong Zou, Clive Raven, Kevin Kenny
  • Publication number: 20110093113
    Abstract: Manufactured goods are marked or labeled with a secure unique identifier. A central checking centre allows users to verify the authenticity of a particular good such as a cigarette pack or carton via any convenient interface such as the internet or a cell phone. A system of secret sharing allows secure authentication of each item and prevents code breaking or misuse.
    Type: Application
    Filed: July 19, 2010
    Publication date: April 21, 2011
    Applicant: Philip Morris USA Inc.
    Inventors: Alain Sager, Philippe Chatelain, Erwan Fradet, Jacques Weiss, Marc Chemla
  • Publication number: 20110087610
    Abstract: Systems and methods enable members of a secure transaction network to readily identify the appropriate trusted service manager (TSM) to support a particular transaction. A global directory of TSM providers is provided that a secure service provider can use for determining which TSM provider is the authorized manager of a security domain for the particular transaction. In aspect the directory of TSM providers may be stored within a mobile device secure element. In another aspect, the directory of TSM providers may be stored in a central TSM repository. In a further aspect, the directory of TSM providers may be distributed among a number of secondary TSM repositories. The appropriate TSM may be identified based upon a secure element identifier and an application identifier provided by a secure element as part of the transaction. Communication of the identifiers from mobile devices may be via cellular or near field communication links.
    Type: Application
    Filed: March 4, 2010
    Publication date: April 14, 2011
    Inventors: Asif Batada, Moshe Levy
  • Patent number: 7917443
    Abstract: A subset of unique codes are generated from a set of codes. The subset of codes are stored in a database on a secure server and each of the codes is marked on a corresponding instantiation of the product. The marked instantiations are distributed. During their distribution, the marked instantiations are verified for authenticity and for routing. This verification is performed by reading or scanning the codes on the instantiations, and transmitting that information to the secure server for comparison against the codes and other information located in the database contained therein.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: March 29, 2011
    Assignee: Verify Brand LLC
    Inventor: David Dillon
  • Publication number: 20110067024
    Abstract: This specification discloses a system and method of downloading add-on elements to extend software functions. After the server generates the payment file for the add-on elements selected by the client according to the selected payment method, the payment file is transmitted to the client. After the client successfully verifies the rights limitation data in the payment file, the add-on elements are loaded for the user to customize the software. This also achieves the effects of combining with programs and data of some third-party manufacturers.
    Type: Application
    Filed: November 25, 2009
    Publication date: March 17, 2011
    Applicant: INVENTEC CORPORATION
    Inventors: Chaucer Chiu, Xiao Hui Shao
  • Publication number: 20110066564
    Abstract: Methods, devices, and systems for analyzing negotiated negotiable instruments for unlawful activity are described. A computer system, including a computer readable storage device and a processor may be provided. A plurality of electronic files may be received. Each of these electronic files of the plurality of electronic files may include an electronic image of at least a portion of a negotiable instrument and include a plurality of data fields. The plurality of electronic files may be divided into subsets based on whether data is available in particular data fields of the electronic files. Based upon the subset an electronic file is made a member of, various selection criteria may be applied to determine if the electronic file is a candidate for suspicious and/or illegal activity. Also, a listing of candidates for suspicious and/or illegal activity may be presented to a user.
    Type: Application
    Filed: September 11, 2009
    Publication date: March 17, 2011
    Applicant: The Western Union Company
    Inventors: Jeannie Larsen, Allen Hofmann, Eyal Tzarfati
  • Publication number: 20110055081
    Abstract: A system, apparatus, and method for providing a mechanism for loading a prepaid card, such as a payroll card, with funds from a source other than the employer of the cardholder. The invention permits a cardholder to request that their employer provided payroll card (or other form of prepaid card) be charged or loaded with funds from an alternate source of funding. In response to the request, one or more background, credit, or other forms of security checks or investigations may be performed to ensure that accurate data regarding the cardholder is available and that there are no indications that the request might be an attempt to commit a fraudulent act.
    Type: Application
    Filed: March 4, 2010
    Publication date: March 3, 2011
    Inventor: Brett Vasten
  • Patent number: 7870078
    Abstract: In one embodiment, this invention analyzes demographic data that is associated with a specific street address when presented as an address change on an existing account or an address included on a new account application when that address is different from the reference address (e.g., a credit bureau type header data). The old or reference address and the new address, the new account application address or fulfillment address demographic attributes are gathered, analyzed, compared for divergence and scaled to reflect the relative fraud risk.
    Type: Grant
    Filed: October 30, 2003
    Date of Patent: January 11, 2011
    Assignee: ID Insight Incorporated
    Inventors: Robert T. Clark, Adam Elliott
  • Publication number: 20100325051
    Abstract: A method for reducing piracy in software activation may be implemented on a computer readable medium storing software instructions that execute the method, which includes steps for receiving a media identifier of a media and a device identifier from a first remote device executing the media, the device identifier being based on a combination of a user-configurable parameter and a non-user-configurable parameter of the first remote device, granting a usage license for the media to the first remote device, correlating the usage license with the media identifier and the device identifier, generating a sale metric for the media based on a number of usage license granted, determining a piracy metric of the media based on availability of illegal copies of the media, and charging a publisher of the media a fee based on the sale and piracy metrics.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 23, 2010
    Inventor: Craig Stephen Etchegoyen
  • Publication number: 20100274679
    Abstract: A system and method is described for alerting authorities or taking other corrective authoritative action to a possibly fraudulent credit card transaction. A cardholder is notified that a transaction has just taken place and is given an opportunity to indicate that he or she did not authorize the transaction. If so indicated, and depending on how recent the transaction was (e.g. 15 seconds ago) then an alert is automatically sent to the merchant, store security, or local police. In addition, a store camera can be automatically activated to zoom in and record the perpetrator of the fraudulent transaction.
    Type: Application
    Filed: January 14, 2010
    Publication date: October 28, 2010
    Inventor: Ayman Hammad
  • Publication number: 20100274688
    Abstract: A server computer is disclosed. It comprises a processor and a computer readable medium coupled to the processor.
    Type: Application
    Filed: February 25, 2010
    Publication date: October 28, 2010
    Inventor: Ayman Hammad
  • Publication number: 20100268654
    Abstract: A subset of unique codes are generated from a set of codes. The subset of codes are stored in a database on a secure server and each of the codes is marked on a corresponding instantiation of the product. The marked instantiations are distributed. During their distribution, the marked instantiations are verified for authenticity and for routing. This verification is performed by reading or scanning the codes on the instantiations, and transmitting that information to the secure server for comparison against the codes and other information located in the database contained therein.
    Type: Application
    Filed: May 27, 2010
    Publication date: October 21, 2010
    Applicant: MEYERS PRINTING COMPANY
    Inventor: David Dillon
  • Publication number: 20100262516
    Abstract: An electronic commerce system and method for processing auxiliary order information in an on-line open market are provided. The system includes an on-line market server for brokering the on-line transaction on the Internet, wherein the on-line market server, when entrusted with partial or full processing of acquisition of auxiliary order documents for an object for sale requested for purchase from the buyer, acquires the auxiliary order documents from an issuing authority and requests the seller to deliver the object for sale, based on the auxiliary order documents; and at least one database for storing information related to the buyer and the seller.
    Type: Application
    Filed: December 1, 2008
    Publication date: October 14, 2010
    Applicant: GMARKET INC.
    Inventor: Young Bae Ku
  • Publication number: 20100257111
    Abstract: A method of issuing electronic vouchers (Vi) which a user (U) may submit to a merchant (M) in exchange for goods or services comprises the steps of: an issuer (I) receiving an electronic declaration (Di?1) from the user (U), the issuer verifying the electronic declaration (Di?1), and the issuer issuing a new electronic voucher (Vi) for use with the merchant (M) only if the electronic declaration comprises a signature (SM) of a merchant on a previous electronic voucher (Vi?1). The vouchers (Vi) and declarations (Di?1) are preferably blinded by the user such that the user remains anonymous. However, the electronic vouchers (Vi) may contain the identity (Q) of the user (U), which identity may be revealed when a voucher is submitted more than once.
    Type: Application
    Filed: July 30, 2008
    Publication date: October 7, 2010
    Applicant: Nederlandse Organisatie voor toegepast- natuurwetenschappelijk Onderzoek TNO
    Inventors: Thijs Veugen, Luuk Danes
  • Publication number: 20100250457
    Abstract: The present invention discloses, inter alia, an authentication item manufactured on product units for encoding the product units as being authentic. The authentication item is an intensity-modulating surface comprising a plurality of adjacent protrusions such that the intensity-modulating surface has alternating height. Each of the protrusions has at least two slopes of respective different orientation. When being in an authenticating position with respect to incident electromagnetic radiation employed for authentication, the authentication item modulates the intensity of the electromagnetic radiation in a manner that generates an intensity profile which is characteristic of the authentication item. In the authentication position, the propagation direction of the incident electromagnetic radiation is at least approximately parallel to one of the at least two slopes of the plurality of protrusions.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 30, 2010
    Applicant: CSEM Centre Suisse d'Electronique et de Microtechnique SA-Recherche et Développement
    Inventors: Peter SEITZ, Joachim Nüesch
  • Publication number: 20100241531
    Abstract: The invention is a system supporting a payment and inspection service used to securely purchase merchandise on an online sale website. A buyer or seller can select using the payment and inspection service. The buyer pays the payment and inspection service, which holds the payment in an escrow account. The seller ships the item to a store where the payment and inspection service is located. The buyer goes to the store and, while being monitored by an agent or employee of the service, the buyer inspects the merchandise. If the buyer accepts the item, he leaves the store with the item and the service releases the payment from the escrow account to the seller. If the buyer does not want to accept the item (he rejects the item), the item is then repacked and returned to the seller, and the service returns the payment, less cost of shipping the item back to the seller, to the buyer.
    Type: Application
    Filed: May 11, 2010
    Publication date: September 23, 2010
    Inventor: Steve Lundquist
  • Publication number: 20100228658
    Abstract: A system for providing creditworthiness information based on a credit application, including: at least one database storing a plurality of information elements corresponding to credit information; and at least one server configured to: receive at least one data file including first additional information elements and store the additional data elements in the at least one database using batch processing; receive at least one record including second additional information elements and storing the second additional information elements in the database substantially contemporaneously with their being received; receive creditworthiness requests; automatically query the at least one database including the information elements, first additional information elements and second additional information elements dependently upon the received requests substantially contemporaneously with the requests being received to generate query results; and automatically transmit creditworthiness indicative information based upon the
    Type: Application
    Filed: March 5, 2010
    Publication date: September 9, 2010
    Applicant: CLARITY SERVICES, INC.
    Inventors: Brian Jeffrey Ketelsen, Timothy Ranney
  • Publication number: 20100217719
    Abstract: A method of validating a cartridge for use with a controller device. The method includes reading a cartridge identifier from at least one of memory of the cartridge and memory of the controller device, obtaining known content associated with the cartridge based on the cartridge identifier, reading actual content from memory of the cartridge, comparing the known content with the actual content, and permitting communication between the controller device and the cartridge when the known content matches the actual content.
    Type: Application
    Filed: February 22, 2010
    Publication date: August 26, 2010
    Applicant: Provo Craft and Novelty, Inc.
    Inventors: Andrew J. Olsen, Paul J. Hepworth, Mark L. Gray, Matthew B. Strong
  • Publication number: 20100217427
    Abstract: A method of operating a controller device of an electronic cutting machine. The method includes writing a controller device identifier to memory of the cartridge, writing a cartridge identifier to memory of the controller device, and permitting communication between the controller device and the cartridge.
    Type: Application
    Filed: February 22, 2010
    Publication date: August 26, 2010
    Applicant: Provo Craft and Novelty, Inc.
    Inventors: Mark L. Gray, Andrew J. Olsen, Paul J. Hepworth, Tim Pruss, Matthew B. Strong
  • Publication number: 20100211524
    Abstract: The present invention is directed at a system and method to rate lender profiles to determine the level of risk that is present in the loans originated or purchased by a particular lender will be based on a misrepresentation or as a result of material inaccuracies in the financial information provided by or on behalf of the borrower. The rating is preferably based on a variety of factors including at least one of, for example, prefunding controls, post closing controls, product mix, and/or loan source.
    Type: Application
    Filed: April 19, 2010
    Publication date: August 19, 2010
    Inventor: Arthur J. Prieston
  • Publication number: 20100198740
    Abstract: A computer-implemented system and method for providing a legitimacy rating of a content source are provided. A request for a document is received. An electronic document associated with a content source is passed by a document provider in response to the request. A legitimacy rating of the content source is passed. Examples of legitimacy rating information include, for example, a history rating of the content source based on the length of time the document provider has published documents associated with the content source and a transaction volume rating of the content source based on the number of electronic documents associated with the content source that are passed by the document provider.
    Type: Application
    Filed: January 29, 2010
    Publication date: August 5, 2010
    Applicant: Google Inc.
    Inventors: Johnny Chen, Mohit Aron
  • Publication number: 20100198739
    Abstract: This invention implements a process for a genuine brand name product(s) authentication on the spot—both physical market places of all kinds worldwide, and virtual/Internet-based retailers, auctioneers and such—conducted for genuine mobile devices (cell phones, mobile phones, any mobile communication equipment and/or combinations thereof; any known or future stationary communication equipment including but not limited to desktop, laptop, notebook personal/corporate computers/stations and/or variations thereof); for genuine pharmaceutical drugs/medications/medicine and devices; and for any other genuine products, legitimate manufacturers of which suffer losses due to the counterfeiting and piracy activities worldwide. The authentication is done by means of electronic text messaging (SMS) to-and-from an Internet-based database and using the respective manufacturer/authenticator-assigned unique I.D.'s (similar, but not limited, to IMEI for mobile devices of all kinds).
    Type: Application
    Filed: February 1, 2010
    Publication date: August 5, 2010
    Inventor: Alexander V. Kent
  • Publication number: 20100191593
    Abstract: Wireless personal area network (Zigbee, Bluetooth, UWB) and wireless identification technologies (Near Field Communication (NFC), Radio Frequency Identification (RFID)) are implemented in particular client server functions and communications. Connected with an Authentication Server, a wireless HUB authenticates user identification and provides the user with access to secure data communication with a wireless terminal such as a cellular phone or a PDA. A Location Server provides user locations via methods such as RSSI, TDOA, and GPS and sends location information to a Center Control Server and the Authentication Server. With location information, the Center Control Server initiates and optimizes secure information processes and coordinates the functions of servers and user terminals.
    Type: Application
    Filed: January 8, 2010
    Publication date: July 29, 2010
    Inventors: Tiehong Wang, Tiejun Wang, Guang Zeng, Ning Wang
  • Publication number: 20100191661
    Abstract: Methods and Systems of detecting and reporting fraud in real-time are described. The system receives an event, over a network, from a first on-line transaction processing platform. The event includes a first identity identifier that identifies a first identity and information that identifies a first activity performed by the first identity. The system generates reporting information based on the event. The reporting information includes a first score that is associated with the first identity. The first score is a measure of a likelihood that the first identity has performed a fraudulent activity. Finally, the system communicates the first score, over the network, to the first on-line transaction processing platform. The system communicates the first score in response to receiving the event.
    Type: Application
    Filed: November 24, 2009
    Publication date: July 29, 2010
    Inventors: Daniel L. Pritchett, Dhanurjay A.S. Patil, Wayne Fenton, Mark A. Sikes, Sharad Murthy, Philip Wright, Jaya Kolhatkar
  • Publication number: 20100179914
    Abstract: A method of marking an individual product with a unique code. The method can include associating the product with an indicia comprising photoactive, reflective or electromagnetic particles or combinations thereof or one or more photoactive, reflective or electromagnetic films or substrates that includes a random physical property, measuring the random physical property, and marking the product with the measured value that is specific to the product, optionally in combination with a barcode, RFID tag, lot number or the like for the product.
    Type: Application
    Filed: December 8, 2009
    Publication date: July 15, 2010
    Applicant: BASF SE
    Inventors: Ron J. Levin, Dwight Pakan, Greg Coughlin
  • Publication number: 20100174660
    Abstract: A method, comprising: receiving a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction; obtaining evidentiary information pertaining to the end user equipment based on the second identifier; storing in a database a record that associates the first identifier with the evidentiary information; and retrieving one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier. Where the online transaction is effected over a network after the end user equipment has gained access thereto, the evidentiary information may include information pertaining to a subscriber whose credentials were used by the end user equipment to gain access to the network. The information pertaining to the subscriber may include personal information about the subscriber.
    Type: Application
    Filed: December 5, 2007
    Publication date: July 8, 2010
    Applicant: BCE INC.
    Inventors: David William Clark, Stéphane Maxime François Fortier, Jean Bouchard
  • Publication number: 20100174570
    Abstract: A method of risk monitoring in online business is disclosed. The method captures parameters of a user request and business data of processing the request by a business processing system; packs the parameters and the business data into an event object; analyzes the event object according to risk monitoring rules; and generates a risk record if a risk is determined to exist in an operation event that produces the business data. The method further determines a risk processing mode according to the risk record and a risk processing configuration, and processes the risk of the operation event in the risk processing mode. Also disclosed is a system for risk monitoring in online business.
    Type: Application
    Filed: March 23, 2007
    Publication date: July 8, 2010
    Applicant: Alibaba Group Holding Limited
    Inventors: Li Cheng, Lei Li
  • Publication number: 20100175126
    Abstract: A method for registering an electronic device includes receiving from a point-of-sale interface a transaction code and purchaser information associated with a purchase of an electronic device. While the transaction code is associated with the purchase of the electronic device, it does not uniquely identify the electronic device purchased. The method also includes receiving from the electronic device the transaction code and a device identifier that uniquely identifies the electronic device. The purchaser information and the device identifier are associated via the transaction code for registering the electronic device.
    Type: Application
    Filed: March 23, 2010
    Publication date: July 8, 2010
    Inventor: Theodosios Thomas
  • Publication number: 20100174661
    Abstract: A device wirelessly broadcasts branding information associated with a consumer product attached to the device. The branding information is sent to a receiver located remotely from the product.
    Type: Application
    Filed: December 2, 2009
    Publication date: July 8, 2010
    Applicant: QUALCOMM INCORPORATED
    Inventors: Kenneth Kaskoun, Barry Matsumori, Nicholas Yu, Matthew Nowak
  • Publication number: 20100169195
    Abstract: A method of interfering with unauthorized distribution of protected content via a computer network comprises receiving a query for content from a requesting device connected to the network; determining whether the query relates to the protected content; and in the event that the query relates to the protected content, automatically taking an interfering action in respect of the requesting device. An apparatus, computer program and system of network sentries is also provided.
    Type: Application
    Filed: February 3, 2006
    Publication date: July 1, 2010
    Inventor: Bernard Trest
  • Publication number: 20100153231
    Abstract: Online sale of software product use licenses through a data network by offering software products (SOFT) through vendor sites, purchasing a license on-line on one of said vendor sites, and activating said license on-line by a different licensing site. A specific component (COMP) is provided with the software product (SOFT) and identifying data (IDV) of the vendor site are transmitted during the download of the software product (SOFT). When the component (COMP) is executed in an equipment, the component (COMP) locally accesses said data (IDV) and identifying data (IDL) of the licensing site and activates the license by setting up an on-line communication with the licensing site.
    Type: Application
    Filed: February 25, 2010
    Publication date: June 17, 2010
    Applicant: MEDIA PATENTS, S.L.
    Inventor: Alvaro Fernández Gutiérrez
  • Publication number: 20100153230
    Abstract: A system and method for instantly printing PC postage before establishing a postage meter account. The method includes the steps of a meter vendor obtaining a first meter license from the Post for a first meter; loaning the use of a first meter licensed in the customer's zip code to a customer; requesting a second meter license for the customer; initializing the first meter for use by the customer; and transferring the first meter to the Customer's meter license when the second meter license is received. Alternatively, when the second meter license is received a second meter is assigned to the customer and the first meter is reassigned to the meter vendor.
    Type: Application
    Filed: February 8, 2010
    Publication date: June 17, 2010
    Applicant: Pitney Bowes Inc.
    Inventors: Felix Bator, David B. Chamberlin, James A. Euchner, Thomas J. Foth, Andrei Obrea, David L. Rich, David W Riley
  • Publication number: 20100145813
    Abstract: A system and method to authenticate products. The method includes storing identity data corresponding to products to be sold into a database, accessing the database at a point-of-sale of a product, and determining the authenticity of the product at the point-of-sale by comparing the product's identity data with the identity data stored in the database.
    Type: Application
    Filed: December 7, 2009
    Publication date: June 10, 2010
    Applicant: ADVANCED PROGRAMS GROUP, LLC
    Inventor: Bekim Veseli
  • Publication number: 20100145867
    Abstract: A computer-implemented method of verifying the authenticity of a product. The method comprises receiving an identification code associated with said product, and receiving at least one data item, the or each data item relating to a respective characteristic of said product. Said identification code is processed to determine at least one characteristic associated with said identification code; and output data indicating the authenticity of said product is generated by processing said at least one data item relating to a characteristic of said product and said at least one characteristic associated with said identification code.
    Type: Application
    Filed: October 31, 2007
    Publication date: June 10, 2010
    Inventors: Mark Robert Fowkes, James Christopher Butcher