Personal Security, Identity, Or Safety Patents (Class 705/325)
  • Patent number: 10600029
    Abstract: Disclosed in some examples are methods, systems, devices, and machine readable mediums for calculating an entity potential score for an entity that meets a defined entity selection criteria. The entity potential score quantifies an estimated likelihood that the entity will be successful in a predetermined timeframe by meeting predefined entity success criteria. Information on the entity may be determined (e.g., employee information, industry, financial information), various component subscores may be calculated and an entity potential score may be calculated for the entity. This entity potential score may be presented to one or more members of the network accessible computer-based service. For example, the entity potential score may be displayed along with a web-page describing the entity. The entity potential score may be searchable such that a user may specify a maximum, minimum, or range of entity potential scores as a search criteria for a search for entities.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: March 24, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Chen Wang, Luwei Zhang, Weizhen Wang
  • Patent number: 10592310
    Abstract: A system and method involves detecting operational social disruptive events on a global scale, modeling data in conjunction with linguistics analysis to establish responsive actions, and generating visualization and executing models for communicating information.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: March 17, 2020
    Assignee: Georgetown University
    Inventors: Peter Chao-yuan Li, Jeffrey R. Collmann, Jane W. Blake, Mark G. Polyak, James M. Wilson, Jae In Yoon, Manabu Torii, Carla S. Thomas
  • Patent number: 10580306
    Abstract: Systems and methods for improved accident response technology are disclosed. According to certain aspects, a server may receive an indication of an occurrence of an accident event, and may identify a set of vehicles currently operating and suited to assist with the accident event. The server may transmit a notification to one or more of the vehicles that indicates the accident event and enables a vehicle operator to select whether to assist with the accident event. The server may reward the vehicle operator for assisting with the accident event.
    Type: Grant
    Filed: January 18, 2018
    Date of Patent: March 3, 2020
    Assignee: BLUEOWL, LLC
    Inventors: Steven J. Harris, Eric Dahl, Kenneth J. Sanchez
  • Patent number: 10581714
    Abstract: Techniques and systems for providing a trend server outside a content provider network to communicate with the content provider network to build a trend record based on responses received from the content provider network for monitoring certain activity trend or tendency in the content provider network and provide an alert when the content provider network behaves abnormally.
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: March 3, 2020
    Assignee: OPENTV, INC.
    Inventor: Kevin Staunton-Lambert
  • Patent number: 10552590
    Abstract: An authentication agent for an information handling system includes a request module, a threshold table, and a comparison module. The request module receives a first request to access a secure resource of the information handling system, determines a first access level associated with the first request, and requests first confidence level information from the information handling system. The threshold table includes a first confidence threshold associated with the first access level. The comparison module compares the first confidence level information with the first confidence threshold. The authentication agent grants access to the secure resource at the first access level when the first confidence level information is greater than the first confidence threshold.
    Type: Grant
    Filed: January 13, 2016
    Date of Patent: February 4, 2020
    Assignee: Dell Products, LP
    Inventors: Daniel Hamlin, Charles D. Robison, Jr., Carrie Elaine Gates
  • Patent number: 10546657
    Abstract: Methods, systems and computer program products are provided for reducing the risk of sexual assault in a facility. Objective, clinical, and subjective information is obtained about a person housed within the facility. The obtained information is converted into respective groups of variables and weighted coefficients are assigned to selected ones of the variables. The respective groups of variables are processed via an algorithm to derive a risk number for the person. The risk number represents a risk of the person being vulnerable to rape within the facility or a risk of the person being a sexual predator within the facility. One or more other persons within the facility are identified that may be a potential sexual victim of the person and/or that may be a potential sexual abuser of the person based upon the risk number and respective risk numbers of each of the one or more other persons.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: January 28, 2020
    Assignee: CENTINAL GROUP, LLC
    Inventors: Gary G. Leonhardt, Mark R. Cervi, Peter Romary
  • Patent number: 10540875
    Abstract: A server application that includes a receiving module for receiving a plurality of user information from a first mobile computing device, including a user name, user contact information, a plan having an end time and plan location, an emergency contact name, emergency contact information and a list of estimated emergency services required by the user in case of an emergency. The application includes an initiation module for reading the user information, creating a user record, and storing it in an attached database. A transmitting module detects the end time of the plan, then generates and sends a first message to the user. If the user does not respond, a transmitting module generates and sends a second message to the emergency contact. If the emergency contact does not respond, a transmitting module sends a third message to an emergency response organization requesting estimated emergency response services.
    Type: Grant
    Filed: February 10, 2016
    Date of Patent: January 21, 2020
    Assignee: Allwater Marine Group, LLC
    Inventors: Joseph B. Abeyta, William C Walsh, Jr.
  • Patent number: 10440052
    Abstract: Systems, computer products, and methods are described herein for improvements for identifying if an interaction between a user and an entity have been misappropriated. A classical computer may be utilized to analyze data inputs related to a particular interaction and to determine if the interaction is potentially misappropriated based on a trigger activated by one or more of the inputs. If the classical computer identifies that the interaction is potentially misappropriated, then the inputs may be provided to a quantum optimizer to analyze the inputs in greater depth in order to provide a more in depth analysis of the interaction. Because the quantum optimizer is able to analyze more inputs than a classical computer it can provide a more accurate analysis of the interaction. For example, the quantum optimizer assigns qubits to the inputs and analyzes the inputs to determine if the potentially misappropriated interaction is likely misappropriated or not.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: October 8, 2019
    Assignee: BANK OF AMERICA CORPORATION
    Inventors: Jisoo Lee, Sandeep Kumar Chauhan, Stephen A. Corrado
  • Patent number: 10375104
    Abstract: According to one embodiment, a computer-implemented method performed by a computing device comprising at least one processor, the method comprising determining a threat score for a user action in a computer application and calculating a decayed threat score based on the determined threat score and a damping factor. The threat score being indicative of a risk presented by the user action, the decayed threat score being a modified threat score for the user action, and the damping factor being a constant value used to reduce the determined threat score.
    Type: Grant
    Filed: December 27, 2016
    Date of Patent: August 6, 2019
    Assignee: SYMANTEC CORPORATION
    Inventors: Shang-Chieh Wu, Ranjani Gunupudi, Rehan Jalil
  • Patent number: 10360405
    Abstract: According to one embodiment, an anonymization apparatus according to an embodiment is configured to execute a determination process, a division process, and a process of recursively executing at least the determination process and the division process, and to thereafter execute anonymization. A number-of-kinds calculation circuit calculates a number of kinds of different attribute values for each of a plurality of attributes, before the determination process is executed. A determination circuit determines the attribute to be noticed, based on also the calculated number of kinds. A sort circuit sorts a plurality of personal data items, based on the calculated number of kinds, before the division process is executed.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: July 23, 2019
    Assignees: KABUSHIKI KAISHA TOSHIBA, TOSHIBA SOLUTIONS CORPORATION
    Inventors: Masanobu Koike, Pakin Osotkraphun
  • Patent number: 10311655
    Abstract: Systems and methods for assessing accident events are disclosed According to certain aspects, an electronic device may access sensor data associated with operation of a vehicle, and analyze the sensor data to determine that an accident event has occurred. In response, the electronic device may dynamically and automatically retrieve additional sensor data from at least one additional electronic device via a short range communication. The electronic device may compile or aggregate the additional sensor data with the original sensor data to provide a thorough representation of the accident event.
    Type: Grant
    Filed: January 18, 2018
    Date of Patent: June 4, 2019
    Assignee: BLUEOWL, LLC
    Inventors: Eric Dahl, Steven J. Harris, Kenneth J. Sanchez
  • Patent number: 10296980
    Abstract: The disclosed embodiments include methods and systems for providing digital identification cards are disclosed. In one aspect, the disclosed embodiments may provide digital identification cards, such as proof of insurance cards, to mobile devices that are compliant with one or more standards set by identification-requiring organizations, such as a department of motor vehicles. Certain disclosed embodiments may update digital identification cards based on changes to user information or formatting information associated with one or more identification-requiring organizations.
    Type: Grant
    Filed: March 28, 2016
    Date of Patent: May 21, 2019
    Assignee: Governmemt Employees Insurance Company (GEICO)
    Inventors: Peter Meoli, Matthew Slocum, Anthony James, Derek Switzer
  • Patent number: 10284601
    Abstract: There are disclosed techniques for use in authentication. In one embodiment, the techniques comprise generating first and second distributions. The first distribution relating to risk scores expected to be produced by an authentication system in connection with requests to access a computerized resource. The expected risk scores are based on a normalization process configured to produce risk scores by normalizing raw risk scores in connection with requests. The second distribution relates to risk scores actually produced by the authentication system in connection with requests. The actual risk scores include risk scores normalized by the normalization process. The techniques also comprise comparing the first and second distributions by determining a Kolmogorov-Smirnov distance between the respective distributions. The techniques also comprise initiating, based on the comparison, a failover of the normalization process to a new normalization process for use by the authentication system.
    Type: Grant
    Filed: May 17, 2017
    Date of Patent: May 7, 2019
    Assignee: EMC IP Holding Company LLC
    Inventors: Ika Bar-Menachem, Marcelo Blatt, Tomer Meidan, Elad Koren, Oded Peer, Shachar Israeli
  • Patent number: 10257211
    Abstract: An apparatus, computer-readable medium, and computer-implemented method for detecting anomalous user behavior, including storing user activity data collected over an observation interval, the user activity data comprising a plurality of data objects and corresponding to a plurality of users, grouping a plurality of data objects into a plurality of clusters, calculating one or more outlier metrics corresponding to each cluster, calculating an irregularity score for each of one or more data objects in the plurality of data objects, generating one or more object postures for the one or more data objects, comparing each of at least one object posture in the one or more object postures with one or more previous object postures corresponding to a same user as the object posture to identify anomalous activity of one or more users in the plurality of users.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: April 9, 2019
    Assignee: Informatica LLC
    Inventor: Igor Balabine
  • Patent number: 10229378
    Abstract: A method for providing incentive to mentors of at-risk mentees is described. The method comprises the steps of determining an at-risk mentee's behavior and progress in a period of time, determining the mentee's income and income tax payments during the same period of time, and calculating a financial incentive to the mentee's mentor, wherein the amount of the financial incentive is calculated based on the mentee's behavior and/or income tax payment during the period of time.
    Type: Grant
    Filed: September 15, 2016
    Date of Patent: March 12, 2019
    Inventor: David A. Dill
  • Patent number: 10223749
    Abstract: Retirement planning methods and systems for use with an individual investor having a retirement plan comprising assets and future liabilities. One or more computing devices perform the methods. Embodiments of the methods include determining a net present value of the assets and a net present value of the future liabilities. A funded ratio is calculated as a function of the net present value of the assets and the net present value of the future liabilities. If the funded ratio is less than a predetermined threshold value, the retirement plan is at risk of being underfunded. If the funded ratio is greater than the predetermined threshold value, the retirement plan is not at risk of being underfunded. An indication may be displayed indicating whether the retirement plan is at risk of being underfunded.
    Type: Grant
    Filed: November 7, 2013
    Date of Patent: March 5, 2019
    Assignee: RUSSELL INVESTMENTS GROUP INC.
    Inventors: Rod Steven Greenshields, Grant Walter Gardner, Samuel David Pittman, Steven M. Murray, Yuan-An Fan
  • Patent number: 10133998
    Abstract: A method for providing incentive to mentors of at-risk mentees is described. The method includes the steps of determining an at-risk mentee's prospects in the absence of mentoring, and then tracking behavior and progress in a period of time, determining the mentee's achievement of important milestones, avoidance of costs to society, and/or income and income tax payments during the same period of time, and calculating a financial incentive to the mentee's mentor, wherein the amount of the financial incentive is calculated based on the mentee's behavior, achievement of important milestones, avoidance of costs to society, and/or income tax payments during the period of time.
    Type: Grant
    Filed: June 14, 2017
    Date of Patent: November 20, 2018
    Inventor: David A. Dill
  • Patent number: 10009354
    Abstract: Methods and apparatuses for a computerized system are disclosed. A data processing device receives information from at least one source of log information in the computerized system and detects, based at least in part on said received log information, at least one security protocol related event at a first host device, the at least one security protocol related event being initiated by a second host device. Information is then stored for determination of a trust relationship record based on the detected at least one security protocol related event and information of the second host device.
    Type: Grant
    Filed: February 3, 2017
    Date of Patent: June 26, 2018
    Assignee: SSH Communications Security OYJ
    Inventors: Tommi Linnakangas, Marko Teiste, Antti Huima, Tatu J. Ylonen
  • Patent number: 10007844
    Abstract: Some implementations may include a method for watermarking an identification document, the method including: receiving a digitally watermarked digital facial portrait of the person, the digital facial portrait embedded with at least one digital watermark identifying payload data linking the digital facial portrait to the person portrayed in the digital facial portrait; receiving results of comparison between the digital facial portrait of the person and the person presenting the digitally watermarked digital facial portrait; retrieving the at least one digital watermark in response to receiving comparison results that the person portrayed in the digital facial portrait is the person presenting the digitally watermarked digital facial portrait; and determining that the digital facial portrait is authentic based on the retrieved at least one digital watermark.
    Type: Grant
    Filed: August 27, 2014
    Date of Patent: June 26, 2018
    Assignee: MorphoTrust USA, LLC
    Inventors: Daniel Poder, Robert Andrew Eckel
  • Patent number: 9940473
    Abstract: An information processing device of the present invention includes: a cluster information acquisition unit which acquires information indicating a cluster which is a set of records in an anonymized state in which at least a portion of attribute values of set-valued attributes, which can include one value or a plurality of values included in the records, is removed from the cluster which is a set of records including an attribute value so that the cluster satisfies a predetermined anonymity; and a set-valued attribute refinement unit which discloses at least a portion of attribute values from among removed attribute values of the set-valued attributes of records included in the cluster acquired by the cluster acquisition, and divides the cluster into clusters which satisfy the predetermined anonymity based on the disclosed attribute values.
    Type: Grant
    Filed: January 6, 2014
    Date of Patent: April 10, 2018
    Assignee: NEC CORPORATION
    Inventor: Tsubasa Takahashi
  • Patent number: 9934542
    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.
    Type: Grant
    Filed: September 22, 2014
    Date of Patent: April 3, 2018
    Assignee: Infosys Limited
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena, Krishna Chaitanya Telikicherla
  • Patent number: 9916466
    Abstract: The present application discloses systems and methods for systems and methods of creating, administrating, assigning, and managing lockout-tagout (LOTO) procedures and other safety compliance procedures.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: March 13, 2018
    Assignee: MASTER LOCK CANADA, INC.
    Inventors: Franco F. Daino, Mark Frederiksen, Somen Mondal, Matthew Paterson, Shaun Ricci
  • Patent number: 9886681
    Abstract: A physical network presence management system includes a processor; and a memory communicatively coupled to the processor. The memory includes executable code stored thereon such that the executable code, when executed by the processor, causes the processor to implement a network browser; in which the processor is configured to: track content uploaded to a network through the network browser; periodically search the network for content related to the user authored by a source other than the user; the searching being based on a unique set of identifiers associated with the user; dynamically update the set of unique identifiers based on contextual trends within content returned as a result of the searching; and aggregate content published by the user with the content returned as a result of the searching to create an aggregate report of the presence of the user on the network.
    Type: Grant
    Filed: November 24, 2009
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: John Morgan Lance, Eleni Anna Rundle, Anuphinh Phimmasorn Wanderski
  • Patent number: 9799197
    Abstract: A fall protection harness or fall protection static line includes one or more straps, an electrical sensing device coupled to the one or more straps, a computer processor coupled to the electrical sensing device, and a transmitter coupled to the computer processor. The one or more straps are made up of an electrically non-conducting thread and an electrically conducting thread. The electrically non-conducting thread and the electrically conducting thread are intertwined, or the electrically conductive thread is intertwined with itself. The electrical sensing device detects a disruption in current in the electrically conducting thread, a disruption in voltage in the electrically conducting thread, or a change in resistance in the electrically conducting thread, which indicates damage to the fall protection harness or a fall by a person wearing the fall protection harness.
    Type: Grant
    Filed: February 1, 2016
    Date of Patent: October 24, 2017
    Assignee: Honeywell International Inc.
    Inventors: Hai D. Pham, Steve D. Huseth, Gina Marie Theisen
  • Patent number: 9740926
    Abstract: A method for identity verification using biometric data is disclosed herein. The method comprises receiving, by a processor, an image of an identification document and receiving a video associated with a face of a user. A predefined number of frames is selected in the video. Based on the selection, it is determined whether the video depicts a live person. Additionally, the face of the user in the video is compared with the image of the identification document and, based on the comparing, results of the identity verification are provided.
    Type: Grant
    Filed: February 12, 2016
    Date of Patent: August 22, 2017
    Assignee: IDchecker, Inc.
    Inventors: Michael Hagen, Pierre de Boer, Istvan Mandak
  • Patent number: 9728087
    Abstract: An approach is provided for vehicle accident response using diagnostic data burst transmission. In the approach, a set of vehicle data is collected during operation of a vehicle. When an impact is detected, the set of vehicle data is transmitted using a short range wireless communication technology to any receivers that are proximate to the vehicle, such as a second vehicle that was involved in the impact. The vehicle data may include intra-vehicle data, such as the vehicle identification number (VIN) of the vehicle, as well as extra-vehicle data, such as a timestamp.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: August 8, 2017
    Assignee: International Business Machines Corporation
    Inventors: Gregory P. Davis, David B. Kumhyr
  • Patent number: 9715809
    Abstract: A fall protection harness has a magnetic sensor coupled to it, and a computer processor is coupled to the magnetic sensor. Upon damage to the fall protection harness, the magnetic sensor senses the damage, the magnetic sensor generates a first signal to the computer processor, and the computer processor generates a second signal indicating the damage.
    Type: Grant
    Filed: December 8, 2015
    Date of Patent: July 25, 2017
    Assignee: Honeywell International Inc.
    Inventors: Hai D. Pham, Steve D. Huseth, David Joseph Wunderlin
  • Patent number: 9635116
    Abstract: Disclosed in some examples is a method including receiving a plurality of transaction records, each of the transaction records including data about a particular transaction engaged in by a member of a social networking service and including a geographic location and a timestamp of the particular transaction; scoring each of the plurality of transaction records based upon the recency of the transaction; clustering the plurality of transaction records into a plurality of clusters, each cluster including transaction records which contain similar geographic locations; creating an aggregate score for each particular one of the plurality of clusters based upon a sum total of the scores calculated for each transaction record clustered into the particular cluster; and creating a probability distribution based upon the scores for the plurality of clusters, the probability distribution indicating a probability that the member was in each of the plurality of locations represented by the clusters.
    Type: Grant
    Filed: April 26, 2013
    Date of Patent: April 25, 2017
    Assignee: LinkedIn Corporation
    Inventors: Sathyanarayan Anand, Ganesh Ramesh, Alexis Blevins Baird
  • Patent number: 9591029
    Abstract: Master privacy policies for different users are stored to a cloud-based central server. When a user interacts with a third-party service (such as FACEBOOK® or AMAZON®), the third party service may require acceptance of privacy policies before services are rendered. Here the cloud-based central server may automatically configure a privacy policy of the third-party service to the user's master privacy policy. The cloud-based central server thus relives the user of managing many different privacy policies required by many different third party service providers.
    Type: Grant
    Filed: August 23, 2015
    Date of Patent: March 7, 2017
    Assignee: AT&T INTELLECTUAL PROPERTY I, L.P.
    Inventors: Qingmin Hu, Farooq Bari
  • Patent number: 9585026
    Abstract: A method, apparatus and system for a secondary system registering in a database, the method includes: a database receiving a registration request sent by a secondary system; and the database processing the registration of the secondary system. A database device includes: a receiving module, a registration processing module and a sending module; the secondary system includes: a network element device, a reconfiguration management node and a registration requesting module.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: February 28, 2017
    Assignee: ZTE Corporation
    Inventors: Xing Liu, Yan Li, Bin Wang, Ting Miao
  • Patent number: 9495586
    Abstract: A method for identity verification using biometric data is disclosed herein. The method comprises receiving, by a processor, an image of an identification document and receiving a video associated with a face of a user. A predefined number of frames are selected in the video. Based on the selection, it is determined whether the video depicts a live person. Additionally, the face of the user in the video is compared with the image of the identification document and, based on the comparing, results of the identity verification are provided.
    Type: Grant
    Filed: August 29, 2014
    Date of Patent: November 15, 2016
    Assignee: IDchecker, Inc.
    Inventors: Michael Hagen, Pierre de Boer, Istvan Mandak
  • Patent number: 9262914
    Abstract: The present subject matter relates to a method for rogue vehicle detection. The method includes receiving at least one violation report for a vehicle from at least one mobile communication device. The at least one violation report is indicative of a traffic violation made by the one or more vehicles. The method further includes categorizing the vehicle as a rogue vehicle, based on at least one rogue vehicle detection metric, the at least one rogue vehicle detection metric being determined from the violation report. The method also includes compiling a traffic observation record based on at least one of the violation report and the rogue vehicle detection metric.
    Type: Grant
    Filed: September 7, 2012
    Date of Patent: February 16, 2016
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Balamuralidhar Purushothaman, Rajan Mindigal Alasingara Bhattachar
  • Patent number: 9166970
    Abstract: A script hosting server receives a script from an authenticated source, associates the script with a certificate profile for digital certificates based on input from the authenticated source, receives user enrollment information for the certificate profile from the authenticated source, receives a script request of a client device, the script request identifying the certificate profile and a user of the client device, determines whether the user is enrolled in the certificate profile based on the user enrollment information, and, upon determining that the user is enrolled, providing the scripts to the client device.
    Type: Grant
    Filed: May 17, 2013
    Date of Patent: October 20, 2015
    Assignee: Symantec Corporation
    Inventors: Alan Dundas, Eirik Herskedal, Thomas Harning, Aaron Diers
  • Publication number: 20150149377
    Abstract: Implementations include methods for monitoring and reporting on actual hazardous conditions at a facility including actions of receiving data associated with a site, the site being susceptible to potentially hazardous conditions, processing the data, one or more models, and one or more prediction rules, determining that a hazardous condition is predicted to occur at the site, providing output data reflecting the hazardous condition, processing the output data to provide indicator data for providing a graphical representation of the site, the graphical representation providing a graphical depiction of the hazardous condition, and providing the indicator data to one or more user devices, the indicator data being processed by each of the one or more user devices to display the graphical representation.
    Type: Application
    Filed: November 18, 2014
    Publication date: May 28, 2015
    Inventors: David Allen Sisk, Roel Almendarez, Cody James Lee
  • Publication number: 20150142686
    Abstract: Transparent collection and profiling of personal data builds trust. A central database aggregates personal data reported by source devices. Users may view their individual personal data. Users may approve the personal data for sharing with approved entities, such as trusted retailers.
    Type: Application
    Filed: November 16, 2013
    Publication date: May 21, 2015
    Applicant: AT&T Intellectual Property I, L.P.
    Inventors: Christopher F. Baldwin, Bruce Barnes, Dolores J. Mallian, Charles M. Stahulak
  • Patent number: 9037499
    Abstract: An online subscription service system for subscription merchants that facilitates efficient payment from a subscription customer for a subscription described on a merchant web page, without providing personal sensitive data to employees of the merchant. The online subscription system includes a central system, a portable wireless device, a card processor and a merchant system and a web page with a service code that identifies the merchant and the particular service.
    Type: Grant
    Filed: March 18, 2002
    Date of Patent: May 19, 2015
    Inventor: Tara Chand Singhal
  • Publication number: 20150127570
    Abstract: A device is configured to receive vehicle information associated with a vehicle, and determine that the vehicle has been in an accident based on the vehicle information. The device is configured to generate an accident report based on determining that the vehicle has been in the accident and based on the vehicle information. The device is configured to provide the accident report for display, and to receive a confirmation that the accident report is accurate based on providing the accident report for display. The device is configured to output the accident report based on receiving the confirmation.
    Type: Application
    Filed: November 5, 2013
    Publication date: May 7, 2015
    Applicant: HTI IP, LLC
    Inventors: John Doughty, Eric Berkobin
  • Publication number: 20150112883
    Abstract: A system for interacting with a portable device is provided. The system is configured to process both personal and premises events, and includes at least one processor configured to generate device data for determining the location of the portable device and process sensor data in response to an event. The processor is further configured to generate situational data for the processed event. The situational data is based on the sensor data and the device data. The situational data includes information indicative of whether the event is an alarm event and if the event is the alarm event, whether the alarm event is one of a personal event and premises event. The processor is further configured to provide at least a portion of the situational data to the remote service site if the event is the alarm event and determine that confirmation has been received.
    Type: Application
    Filed: October 17, 2014
    Publication date: April 23, 2015
    Inventors: Arthur ORDUNA, Dmitry VAYNRIBER, Andrew DRONEY, Shy WARD, Cynthia HAEGLEY, Clinton MASTERSON, Bergen DAVELL, Robert BEAVER, Thomas NAKATANI
  • Publication number: 20150112884
    Abstract: Aspects of the invention include determining relatedness between genomes without compromising privacy. In one aspect, secure genome sketches of genomes can be made publicly available without compromising privacy. These are compared to privately held (unsecured) genome sketches to determine relatedness.
    Type: Application
    Filed: October 21, 2014
    Publication date: April 23, 2015
    Inventors: Rafail Ostrovsky, Amit Sahai, Eleazar Eskin
  • Publication number: 20150106265
    Abstract: A communication number processing system and methods for processing communication numbers or identifiers of various types to prevent fraud in transactions associated with the communication numbers are disclosed. The communication number processing system, in an example embodiment, verifies a communication number by retrieving characteristics data including network-derived characteristics data and/or other attributes relating to the communication number and processing the characteristics data and/or the attributes based on one or more rules. The communication number processing system further generates a fraud score for the communication number. A client system can then use the fraud score to assess a risk associated with engaging in a transaction with a user associated with the communication number.
    Type: Application
    Filed: November 26, 2013
    Publication date: April 16, 2015
    Applicant: TeleSign Corporation
    Inventors: Stacy Lyn Stubblefield, James Monaghan, Marko Dukanac
  • Publication number: 20150106288
    Abstract: Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
    Type: Application
    Filed: January 6, 2014
    Publication date: April 16, 2015
    Inventors: Pablos Holman, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud
  • Publication number: 20150106287
    Abstract: Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
    Type: Application
    Filed: January 6, 2014
    Publication date: April 16, 2015
    Inventors: Pablos Holman, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud
  • Publication number: 20150106289
    Abstract: The behavior-based driving record management program is designed to assist drivers that have received driving penalties or “demerit points” to improve their behavior and “rehabilitate” to recover their driving privileges. Telematics are used to monitor the driving behavior over time and provide feedback to the driver. The system can also be used to implement graduated licensing programs to ensure that only qualified young drivers are graduating from one level to another demonstrating actual driver behavior and driving experience while reducing fraud.
    Type: Application
    Filed: October 14, 2014
    Publication date: April 16, 2015
    Inventors: Otman A. Basir, William Ben Miners, Shunkar Manoharan
  • Publication number: 20150095251
    Abstract: A communication system (200) comprises a radio communication device (100) comprising a controller (102) having law enforcement information (110) stored therein and a data acquisition device (108) for capturing area conditions surrounding a law enforcement vehicle or law enforcement personnel. The controller (102) detects violations of the law enforcement information based on variety of detection devices, such as video analytics. In response to a detection of a law violation by an offending vehicle, a transmitter (104) within communication device 100 generates an alert to similarly formed secondary devices (220) mounted and/or worn within the network. The system (200) provides an automated response through devices (220) by gathering additional data pertaining to the offending vehicle to detect for additional violations of the law, even across state lines. The system (200) may further facilitate apprehension of an offending vehicle through automated roadblocks.
    Type: Application
    Filed: September 30, 2013
    Publication date: April 2, 2015
    Applicant: MOTOROLA SOLUTIONS, INC
    Inventors: SCOTT M. ALAZRAKI, ALEJANDRO G. BLANCO, PATRICK D. KOSKAN
  • Publication number: 20150095252
    Abstract: A tokenization system tokenizes sensitive data to prevent unauthorized entities from accessing the sensitive data. The tokenization system accesses sensitive data, and retrieves an initialization vector (IV) from an IV table using a first portion of the sensitive data. A second portion of the sensitive data is modified using the accessed initialization vector. A token table is selected from a set of token tables using a third portion of the sensitive data. The modified second portion of data is used to query the selected token table, and a token associated with the value of the modified second portion of data is accessed. The second portion of the sensitive data is replaced with the accessed token to form tokenized data.
    Type: Application
    Filed: September 30, 2013
    Publication date: April 2, 2015
    Applicant: Protegrity USA, Inc.
    Inventors: Ulf Mattsson, Yigal Rozenberg, Vichai Levy
  • Publication number: 20150088775
    Abstract: The systems and methods described herein attempt to increase traveler throughput, increase officer safety, and increase bystander safety at a security checkpoint. The systems and methods described herein attempt to optimize traveler processing via segregation and pre-information selective targeting in order to allow more effective enforcement activities while facilitating the flow of legitimate trade and travel. The systems and methods implement electronic document readers, gates, and biometrics in an attempt to provide the improved functionality.
    Type: Application
    Filed: September 23, 2013
    Publication date: March 26, 2015
    Inventors: Craig McIntire, Jeff Stephens, Robert Sterling
  • Publication number: 20150088777
    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.
    Type: Application
    Filed: September 22, 2014
    Publication date: March 26, 2015
    Inventors: Nitin Singh Chauhan, Ashutosh Saxena, Krishna Chaitanya T
  • Publication number: 20150088776
    Abstract: A system includes a kiosk configured to collect information associated with a traveler. The information includes information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler. The system also includes a camera configured to obtain an image of the traveler approaching or within a specified portion of a customs/border enforcement area. The system further includes at least one computing device configured to receive the information from the kiosk, provide at least a portion of the information to an external system, and receive a disposition code from the external system. The disposition code identifies whether the traveler is allowed to pass the customs/border enforcement area. The at least one computing device is also configured to receive the image, perform facial recognition to identify the traveler, and provide at least some of the information to an agent associated with the customs/border enforcement area.
    Type: Application
    Filed: September 19, 2014
    Publication date: March 26, 2015
    Inventors: John M. Parrish, Kelly C. Tuggle, Jason Stauty
  • Publication number: 20150088778
    Abstract: The present disclosure relates generally to a system and method, which allows travelers to process themselves using a software application installed on a personal electronic device to receive authorization to enter into a jurisdiction.
    Type: Application
    Filed: September 24, 2014
    Publication date: March 26, 2015
    Inventors: Adam Y. Tsao, Hans C. Miller
  • Publication number: 20150081579
    Abstract: Techniques are described herein to converge and conditionally filter data and to present such data in a manner that is beneficial to situational data analysis, in association with emergency management, law enforcement, or other such situations. Data may be combined to create enhanced situational awareness for responders and improve their decision making ability.
    Type: Application
    Filed: August 26, 2014
    Publication date: March 19, 2015
    Inventors: Michael G. Brown, James W. Finnell