Personal Security, Identity, Or Safety Patents (Class 705/325)
  • Publication number: 20150074009
    Abstract: A computer based system for monitoring compliance of climber/tower safety procedures and personnel at communication towers. The system includes an updatable database of the wireless transmission towers and their unique safety information. The system can monitor and automatically generate reports of tower climber safety training and certification. Workers may be sorted by their employers, training status or other safety information including regulatory compliance. Communication towers may be sorted by structure type, safety status, type of work performed and who performed the work. The custom signs with the machine readable indicia can be used to enhance access to an automated climber/tower safety system.
    Type: Application
    Filed: November 14, 2014
    Publication date: March 12, 2015
    Inventor: Douglas M. Williams
  • Publication number: 20150066793
    Abstract: A correlation engine apparatus includes a network interface and a processor, wherein the correlation engine is configured to receive publication-restricted data and non-publication-restricted data and generate correlations useable for predictive models, wherein no trace of any personal identifying information (PII) in the publication-restricted data exists in the correlations.
    Type: Application
    Filed: November 6, 2014
    Publication date: March 5, 2015
    Applicant: ADROIT DS, LLC
    Inventor: Robert G. Brown
  • Publication number: 20150058242
    Abstract: A method for monitoring mobile communication and generating alerts associated with targeted content. A link is established between a monitored user's mobile communication device and a monitoring user's mobile communication device to receive communications for monitoring purposes. The monitored user's mobile communication device forwards an incoming or outgoing communication to the monitoring user's mobile communication device. The monitored user's or monitoring user's mobile communication device generates an alert if it is determined that the incoming or outgoing communication contains targeted content, and an alert is provided on the monitoring user's mobile communication device.
    Type: Application
    Filed: August 22, 2014
    Publication date: February 26, 2015
    Inventor: Todd Bucciarelli
  • Patent number: 8966650
    Abstract: Portable on-line identity verification technology includes, for example, portable widgets with an identity rating, and other on-line identification verification icons and identity rating scores.
    Type: Grant
    Filed: April 2, 2013
    Date of Patent: February 24, 2015
    Inventor: Lewis Farsedakis
  • Publication number: 20150052073
    Abstract: Systems and methods for applying Electric Network Frequency (ENF) forensic techniques to determine characteristics associated with an audio and/or video recording such as when and where the recording was made. In one embodiment, a system that determines at least one of a time and a location associated with a recording includes an ENF forensic database, an ENF extraction processing module and a comparison processing module. The ENF forensic database stores powerline data collected from at least one electrical power grid. The ENF extraction processing module extracts ENF content coupled into the recording. The comparison processing module compares the extracted ENF content with powerline data retrieved from the ENF forensic database and outputs information including one or more of a time during which the recording was made and a location where the recording was made based on the comparison with the powerline data.
    Type: Application
    Filed: August 14, 2014
    Publication date: February 19, 2015
    Inventors: Michael Panczenko, Alexander Gregory Hrybyk, Kwok Lee Tang
  • Publication number: 20150052074
    Abstract: A method for monitoring and countering source content that encourages an individual to engage in extremist or terrorist activities. The method comprises: intercepting the source content from a communications stream, the source content initiated by or intended for the individual, determining a threat indicator indicative of the likelihood the individual, after exposure to the source content, will engage in extremist or terrorist activities, and sending counter-narrative content to the individual, the counter-narrative content contrary to the source content in an attempt to discourage the individual from engaging in extremist or terrorist activities.
    Type: Application
    Filed: September 9, 2014
    Publication date: February 19, 2015
    Inventor: Ted W. Reynolds
  • Publication number: 20150046359
    Abstract: A method for the determination of the reputational rating of natural or legal persons, including the following steps: populating a database with certain pieces of information relating to the natural or legal persons, the certain pieces of information being pertinent to prove evidence or facts object of the evaluation of the reputational rating, assigning a positive or negative weighted value to each of the certain pieces of information, proportional to a suitability factor of the evidence or facts to contribute to the determination; determining the reputational rating of any of the natural or legal persons by summing up all the contributions derived from the weighted values relating to the natural or legal persons.
    Type: Application
    Filed: August 6, 2013
    Publication date: February 12, 2015
    Inventors: Eduardo Marotti, Jacopo Marotti, Maria Vittoria Marotti, Bruno Frattasi
  • Publication number: 20150039527
    Abstract: A method for confirming the identity of an individual while shielding that individual's personal data. At least one biometric such as the image of the iris of an individual is captured and stored in a database. A unique identification code is assigned to the biometric without reference to the first individual's personal information. A subsequent biometric data collect is compared with the contents of the database. If a match between the subsequent biometric is found with the original biometric, the system transmits the identification code corresponding to the matched biometric. In a second aspect of the invention, in order to protect the privacy of individuals, the unique identification code is encrypted such that only the individual to whom the biometric belongs holds the de-encryption key. In a third aspect of the invention also intended to protect the privacy of individuals, a non-unique group identification code is assigned to the biometric.
    Type: Application
    Filed: January 26, 2011
    Publication date: February 5, 2015
    Applicant: EYELOCK Inc.
    Inventor: Keith J. Hanna
  • Publication number: 20150032534
    Abstract: A system, method and computer program product are provided. In use, at least one preference associated with at least one first entity is identified. In addition, at least one preference associated with a second entity is determined. Further, the at least one preference associated with the second entity is determined based on the at least one preference of the at least one first entity.
    Type: Application
    Filed: October 6, 2014
    Publication date: January 29, 2015
    Inventor: Rajiv Motwani
  • Publication number: 20150026088
    Abstract: Embodiments of the disclosure are directed towards a crime assessment tool and method for comparing and visualizing crime statistics in a manner such that an accurate assessment of safety in one area may be compared to the safety in another area. The crime statistics may be normalized based on a population basis and/or on crime severity. The areas for comparison may be specified at various levels, such as cities, neighborhoods, specific addresses, or the like. Trending information may be visually provided to aid in assessing the safety of different areas.
    Type: Application
    Filed: July 14, 2014
    Publication date: January 22, 2015
    Inventors: David M. Alber, Matthew R. Lerner, Joshua R. Herst, Mahalie M. Stackpole
  • Publication number: 20140379599
    Abstract: A system and method for generating and transmitting data without personally identifiable information. The method may include receiving a set of one or more unique identifiers (IDs) and a first set of data associated with a subscriber. The method may send the IDs to a third party provider of datasets. The method may receive a second set of data associated with the subscriber identified using the unique IDs. The method may generate aggregated viewing data based on the first and second sets of data. The set of unique IDs may be based on a one-way hash of personally identifiable information associated with the subscriber. In this way, the unique IDs may be appended with the data from third party providers so additional information regarding the household is available to clients, but the personally identifiable information is unavailable to any of the parties.
    Type: Application
    Filed: June 20, 2014
    Publication date: December 25, 2014
    Inventors: William FEININGER, Eric H. DAVIS
  • Publication number: 20140379600
    Abstract: In one embodiment, a method includes receiving, from a requestor, a request for an on-demand identity product in relation to an identity of a consumer, the request comprising personally identifying information (PII) of the consumer. The method also includes executing, using the PII, a partial registration of the consumer for the on-demand identity product, the partial registration omitting satisfaction of at least one security requirement. The method additionally includes determining whether delayed authentication is enabled for the on-demand identity product. Moreover, the method includes, responsive to a determination that delayed authentication is enabled for the on-demand identity product: conditionally suspending the at least one security requirement; initiating provision of the on-demand identity product to the requestor; and restricting the requestor's access to determined sensitive data resulting from the initiated provision at least until the at least one security requirement is satisfied.
    Type: Application
    Filed: September 9, 2014
    Publication date: December 25, 2014
    Inventors: Isaac CHAPA, Steven HATLEY, Joe ROSS
  • Patent number: 8918872
    Abstract: A system, method, and computer program product are provided for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device. In use, a first device removably coupled to a second device is identified. Additionally, an attempt to store on the first device a configuration file for the first device and an executable file is detected. Further, a reaction is performed in response to the detection of the attempt.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: December 23, 2014
    Assignee: McAfee, Inc.
    Inventors: Lokesh Kumar, Harinath V. Ramachetty
  • Publication number: 20140365390
    Abstract: Embodiments of the invention leverage mobile proliferation to enable laypersons to initiate a timely and effective emergency response in case of an emergency, such as a medical emergency, e.g. cardiac event. Mobile apps are made available as part of an organization's overall response plan and program, allowing bystanders of emergency events to easily initiate notification of trained responders, for example in their facility, in a timely manner commensurate with the type of emergency specific to their facility. More particularly, embodiments of the invention use mobile applications to alert certified first trainees to respond to the scene of the emergency.
    Type: Application
    Filed: May 2, 2014
    Publication date: December 11, 2014
    Inventor: Odelia BRAUN
  • Publication number: 20140358811
    Abstract: The detection of illegal activity through interpersonal relationship resolution. A method in accordance with an embodiment includes: assigning a risk assessment score to a person of interest; identifying and mapping at least one first line connection of the person of interest; assigning a risk assessment score to each first line connection; updating the risk assessment score assigned to the person of interest based on the risk assessment score assigned to each first line connection; comparing the risk assessment score of the person of interest to at least one threshold value; and detecting an illegal activity based on the comparing.
    Type: Application
    Filed: June 4, 2013
    Publication date: December 4, 2014
    Inventors: Karl J. Cama, Norbert Herman, Daniel T. Lambert
  • Publication number: 20140358812
    Abstract: A computer network implemented system for disaster and crisis management which includes at least one server computer, an information collection utility that enables an entity to collect and store information to a database; a communications device for establishing a network corresponding to the communications device; a plurality of communication nodes, each communication node being connected to the network; a user application comprising software for execution by a processor; a message management and routing system configured to facilitate communications; a fixed mode capable of functioning as a crisis center; a user device configured to display information from the user application; where each node of the plurality of nodes is associated with an emergency services source, and is configured to communicate information to the user application; and where the user device is configured to display information regarding the emergency services sector resource from the user application.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 4, 2014
    Applicant: Hitec Luxembourg S.A.
    Inventors: Benjamin Hourte, Simon Massart
  • Patent number: 8903739
    Abstract: Systems and methods for optimizing wealth are provided herein. Exemplary methods for analyzing financial well being of a client may include generating a financial profile for an client via a web server, selecting one or more grids for displaying at least a portion of the financial profile, the grid including one or more sectors, each of the sectors corresponding to one of the plurality of strengths, filling a sector with an indicator, filling a sector with an indicator, the indicator including a calculation of a strength level for the strength associated with the sector; and providing at least one of the one or more grids to a display device associated with a computing system that is communicatively coupled to the web server.
    Type: Grant
    Filed: April 22, 2011
    Date of Patent: December 2, 2014
    Assignee: Wealth With Ease, LLC
    Inventor: Joseph J. Janiczek
  • Patent number: 8892272
    Abstract: A vehicle thumbprint door-lock and ignition access system is a fingerprint recognition system used in conjunction with automobile locks and automatic door openers. A thumbprint scanner compares a thumbprint with a stored database of thumbprints for a match. When a match is found, the vehicle door unlocks and is automatically opened to the fully opened position where it returns to manual operation. A second scanner, the ignition thumb-pad, then searches for an image match of the entered thumbprint on the ignition thumb-pad for a match and starts the engine if found. The ignition thumb-pad has a master-door-opener-interface with a five button keypad for automatically opening any combination of doors on the car, or all may be opened simultaneously. A key fob with five buttons is able to remotely access the master-door-opener-interface for door opening operation.
    Type: Grant
    Filed: August 8, 2013
    Date of Patent: November 18, 2014
    Inventor: David Wooding
  • Publication number: 20140337066
    Abstract: A method for reducing violence within crowded venues is provided. The method includes reading license plates of vehicles passing into entry ports of a parking area, and capturing facial images of persons seeking admission to the venue. A computer compares such license plates to a database of vehicle license plates associated with persons with past histories of violence. A computer also compares captured facial images to a database of facial data for persons with past violent histories. Upon detecting a match, the computer creates an alert presented to law enforcement officers to facilitate detention of such persons for investigation. Information recorded on entry tickets is scanned and saved together with the facial image of the ticket holder. If a violent act occurs, cameras within the venue capture facial images of participants. The computer matches such participants to stored identifying data to assist in the identification and apprehension of such persons.
    Type: Application
    Filed: July 29, 2014
    Publication date: November 13, 2014
    Inventor: Stanley Loel KEPHART
  • Publication number: 20140337243
    Abstract: A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.
    Type: Application
    Filed: July 22, 2014
    Publication date: November 13, 2014
    Inventors: Deepak Chandra Dutt, Anil Buntwal Somayaji
  • Publication number: 20140324722
    Abstract: A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account recovery code. The account recovery system sends a communication to the trustee for information to verify the trustee as one of the previously identified trustees. The account recovery system then may transmit a link and code with instructions for the trustee to return the link. The account recovery system then transmits a situational query to the trustee to provide additional security. Finally, if all the communications have been completed for the required level of security, the account recovery code is transmitted to the trustee. The trustee sends the account recovery code to the account holder for access to an account.
    Type: Application
    Filed: July 8, 2014
    Publication date: October 30, 2014
    Inventors: Stuart Schechter, Robert Wilson Reeder
  • Publication number: 20140324705
    Abstract: A system and method are provided for the exchange of physical media (e.g., legacy DVDs) for a secured digital copy that may be usable by a, consumer on one or more personal consumer devices, such as a laptop computer, handheld media player, etc., comprising receipt at a physical location of consumer-owned physical digital media, preparation of at least one secured digital media file corresponding to the received physical digital media, and delivery of the at least one secured digital media file to the consumer, the at least one secured digital media file configured to operate on one or more media playing devices of the consumer but to not be freely distributable.
    Type: Application
    Filed: January 5, 2012
    Publication date: October 30, 2014
    Applicant: Fox Digital Enterprises, Inc.
    Inventor: Andrew G. Setos
  • Publication number: 20140317010
    Abstract: A consumer electronic device hosts a media application that obtains media content use data for a user. The media application interfaces with a server that analyzes the media content use-related data based on a budget-constrained DCLEF and/or a distortion-constrained DCLEF mechanism. The user is then compensated for their disclosed use data based on the severity of the privacy incursion.
    Type: Application
    Filed: October 9, 2012
    Publication date: October 23, 2014
    Inventors: Efstratios Ioannidis, Nada Fawaz, Pranav Dandekar
  • Publication number: 20140310191
    Abstract: A method of rapid response to a cyber-bullying incident is provided by means of a “smartphone,” such as an iPhone™ or Android™, running anti-bullying application software. The application software, which is constantly running or available for launch on the smartphone of the minor user, enables the user to instantly initiate response and reporting of a cyber-bullying incident from a touchscreen menu. The application provides a user interface, which provides a menu of multiple alternate response and reporting actions and one or more input modules for associating a contact list with each of the menu actions. A version of the application for schools enables documentation of responsive actions to cyber-bullying incidents involving their students.
    Type: Application
    Filed: September 13, 2013
    Publication date: October 16, 2014
    Inventor: Todd Schobel
  • Publication number: 20140310192
    Abstract: An approach for managing driving patterns is presented. A first distance measured at a first time between a first vehicle and a second vehicle in front of the first vehicle is received and stored in driving behavior data over a time period. The driving behavior data includes a second distance between the first vehicle and a third vehicle in front of the first vehicle measured at a second time. Based on the first and second distances, the number of times the first vehicle tailgated other vehicles within the period of time is determined. Based on the number of times the first vehicle tailgated within the period of time, an incentive is provided to a driver of the first vehicle to encourage the driver to drive without tailgating, or a disincentive is provided to the driver to deter the driver from tailgating.
    Type: Application
    Filed: June 27, 2014
    Publication date: October 16, 2014
    Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jacquelyn A. Martino, Clifford A. Pickover, Anne R. Sand
  • Patent number: 8863307
    Abstract: Disclosed are various embodiments of generating a user signature associated with a user and authenticating a user. At least one behavior associated with at least one sensor in a computing device is identified. A timestamp is generated and associated with the behavior. A user signature corresponding to a user based at least in part upon the behavior and the timestamp is generated and stored.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: October 14, 2014
    Assignee: Broadcom Corporation
    Inventor: Noam Sorek
  • Publication number: 20140304184
    Abstract: A system for registering a birth includes a processor and storage device. A location of a user is determined, using a first location detection method. The location of the user is verified, using a second location detection method. A security key is established with a registration authority according to the location. A birth registration report is generated in compliance with the birth registration requirements according to the location. The birth registration report comprises identification of the location, a picture of the newborn child, and a time stamp that identifies a time and date of the birth. The birth registration report is encrypted according to the security key, which prevents altering the birth registration report. The birth registration report is transmitted in encrypted format to a registrar of birth records for the location. The birth registration report is stored in encrypted format on a computerized device.
    Type: Application
    Filed: April 4, 2013
    Publication date: October 9, 2014
    Applicant: XEROX BUSINESS SERVICES, LLC
    Inventor: Denise L. Fletcher
  • Publication number: 20140304183
    Abstract: In described embodiments, a verification system allows for registration of credential providing entities and storage of credential data from, and verified by, the credential providing entities. The verification system further allows for users, through a credential and verification device associated with the credential providing entities, to approve the use of corresponding credential data by those accessing the verification system. In some embodiments, on-going tracking of current requirements for maintaining certain credentials is performed. Employers or other interested parties might access the verification system to verify information of certain credentials, and lapses in maintenance of certain credentials.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 9, 2014
    Applicant: VERIF-Y, INC.
    Inventor: Ed Adi Zabar
  • Publication number: 20140279640
    Abstract: The present disclosure describes systems, methods, and apparatuses for identifying a person of interest. An exemplary method may comprise storing external data received from a variety external sources into a parameterized table, creating a first set of category views on the parameterized table, creating a second set of category views based at least in part on data to be derived from a traveler's personal information to be received, receiving the traveler's personal information generated by an input device and determining whether the traveler is a person of interest by evaluating the personal information against one or more pre-defined profiles using the first and second sets of category views. Each of the one or more pre-defined profiles may comprise one or more rules and a threshold value for determining a likelihood for the traveler to be matched in each of the one or more pre-defined profiles.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Marcelo Martin Motta MORENO, Hsiang-yi YU, Mohandas VENKOBDAS, Seth Stuart HIRSCH
  • Publication number: 20140279532
    Abstract: The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.
    Type: Application
    Filed: March 10, 2014
    Publication date: September 18, 2014
    Inventor: Christophe Tremlet
  • Publication number: 20140279641
    Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual.
    Type: Application
    Filed: March 13, 2014
    Publication date: September 18, 2014
    Inventors: Subrat Narenda SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
  • Publication number: 20140279642
    Abstract: Systems and methods for automatic enrollment and identity verification based upon processing a captured image of a document are disclosed herein. Various embodiments enable, for example, a user to enroll in a particular service by taking a photograph of a particular document (e.g., his driver license) with a mobile device. One or more algorithms can then extract relevant data from the captured image. The extracted data (e.g., the person's name, gender, date of birth, height, weight, etc.) can then be used to automatically populate various fields of an enrollment application, thereby reducing the amount of information that the user has to manually input into his mobile device in order to complete the enrollment process. In some embodiments, a set of internal and/or external checks can be run against the data to ensure that the data is valid, has been read correctly, and is consistent with other data.
    Type: Application
    Filed: March 17, 2014
    Publication date: September 18, 2014
    Applicant: MITEK SYSTEMS, INC.
    Inventors: Mike Strange, James DeBello, Mike Diamond
  • Publication number: 20140258162
    Abstract: Techniques to block records for matching are described. Some embodiments are particularly directed to techniques to block records for matching entities with inconsistent identifying information. In one embodiment, for example, an apparatus may comprise a configuration component, a coding component, a blocking component, and a matching component. The configuration component may be operative to receive a data set comprising a plurality of records and operative to receive a set of blocking variables, the blocking variables present as variables in each of the plurality of records. The coding component operative to generate match codes based on the blocking variables. The blocking component operative on the processor circuit to produce a plurality of blocks of records from the data set based on the match codes.
    Type: Application
    Filed: March 10, 2014
    Publication date: September 11, 2014
    Applicant: SAS INSTITUTE INC.
    Inventors: Ned Maran, Jin-Whan Jung, Leslie Sall
  • Publication number: 20140250026
    Abstract: The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations. The method updates the identity profiles with the gathered identity information, and based on the gathered identity information, generates an identity confidence score associated with each identity profile.
    Type: Application
    Filed: May 13, 2014
    Publication date: September 4, 2014
    Applicant: The Western Union Company
    Inventor: Matthew Leland Dill
  • Publication number: 20140244510
    Abstract: Disclosed herein are privacy protection systems and related methods for providing subscribers of the system or method, such as credit card issuers, banks, etc., independent verification of the identity of individuals attempting to do business with the subscriber. The independent verification disclosed herein does not rely solely on the information accessible or maintained by an entity that issued a piece of identification data to the individual. Instead, disclosed systems and methods may not only check with the entity that issued the piece(s) of identification data presented by a user to identify himself, but also may review the records of that issuing entity such that older records can be actively compared to current records in an effort to determine if the currently issued identification data is correct.
    Type: Application
    Filed: May 7, 2014
    Publication date: August 28, 2014
    Inventor: Raymond de Beasley
  • Patent number: 8818882
    Abstract: Methods and system for determining reputation information are provided. The method includes analyzing transactional and non-transactional information for an alias associated with an entity and determining reputation information for that alias. The reputation information is transferable across multiple domains. A user can request the reputation information about an entity prior to doing business with that entity. The reputation information is generated for merchants as well as users. The system can generate transaction risk score for every transaction to be conducted between two or more aliases. The system includes an alias identity and reputation validation server computer that receives inputs from various external systems and generated reputation information based on the inputs. Additionally, every individual user/merchant can manage his profile within the reputation database and enter some information manually.
    Type: Grant
    Filed: July 29, 2010
    Date of Patent: August 26, 2014
    Assignee: Visa International Service Association
    Inventors: Mark Carlson, Patrick Stan, Patrick Faith, Benjamin Rewis
  • Patent number: 8819020
    Abstract: A computer implemented method, apparatus, and computer usable program product for ranking and categorizing criminal offenders in a jurisdiction. In one embodiment, external data associated with the offenders is processed in a set of data models to generate a ranking index of criminal offenders. The external data comprises offender data elements related to prior arrests. The computer software and web application enables officers, detectives, and supervisors to research the offenders in their jurisdiction. They can intentionally track and monitor the status of the offenders that are not currently incarcerated. They can deliberately increase lawful contacts with these high-rate and treacherous offenders.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: August 26, 2014
    Inventors: Daniel Scott Jenkins, Brandon Matthew Rana
  • Publication number: 20140236853
    Abstract: Methods, devices, and systems for processing contact information are provided. A request for generating virtual contact information can be received from a terminal. According to the request for generating virtual contact information, real contact information that is preset can be obtained. According to the real contact information, the virtual contact information can be generated. The virtual contact information can be sent to the terminal for a user to use.
    Type: Application
    Filed: March 31, 2014
    Publication date: August 21, 2014
    Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED
    Inventor: ZHENZHEN JIANG
  • Publication number: 20140222707
    Abstract: A networked system for managing commercial interactions is providing. In some embodiments, the system includes: a bundle-passing interface between a plurality of networked users including distribution logic including a distribution control input responsive to machine-readable information in the bundles; and a statistics collection engine including a control input responsive to machine-readable information in the bundles.
    Type: Application
    Filed: April 11, 2014
    Publication date: August 7, 2014
    Applicant: THOMSON FINANCIAL LLC
    Inventors: BOB LAMOUREUX, PAUL JAMINET, EDWARD SHEA, ALEXIS KOPIKIS, JOHN CONSTANTINE, MATTHEW KUNTZ, TODD BREMNER, ZENOBIA MOOCHHALA
  • Publication number: 20140222706
    Abstract: A system architecture is disclosed that includes a privacy management system. In particular, the privacy management system provides a policy hub for maintaining and managing customer privacy information. The privacy management system maintains a master data database for customer information and customer privacy preferences, and a rules database for privacy rules. The privacy management system captures, synchronizes, and stores customer privacy data. Privacy rules may be authored using a privacy management vocabulary, and can be customized for an enterprise's privacy policies.
    Type: Application
    Filed: December 9, 2013
    Publication date: August 7, 2014
    Applicant: Oracle International Corporation
    Inventors: Hwee Har Yeap, Catherine You, Qin Lu, Jane Li, Weiwei Hsieh, Lindy H. Chan
  • Patent number: 8775328
    Abstract: A method and system an online neighborhood social network designed to create private websites to facilitate communication among neighbors and build stronger neighborhoods. The private websites are embodied in a website having a domain name of nextdoor.com. In one embodiment, a method verifies that a user lives at a residence associated with a residential address claimed by the user of an online neighborhood social network. The method restricts access to a particular neighborhood to the user and to neighboring users living within the neighborhood boundary of the residence. A social network page of the user is created once verified and access privileges are determined. A message is distributed to neighboring users that are verified to live within a neighborhood boundary of the residence. The method may designate the user as a lead user with an additional privilege based on a participation level of the user in the online community.
    Type: Grant
    Filed: March 10, 2014
    Date of Patent: July 8, 2014
    Inventor: Raj Abhyanker
  • Publication number: 20140188744
    Abstract: Systems and methods for electronically managing the process of requesting, giving, and receiving personal references are provided. Personal information, particularly contact information, is received by a computer system from a candidate seeking a personal reference. Some of this information is forwarded to a personal reference giver to request that a personal reference regarding the candidate be given. The personal reference information is received by the computer system. The candidate and reference giver may access the personal received personal reference information. The personal reference information can then be sent to a recipient. The candidate and reference giver can be contacted when the recipient has accessed, reviewed, or modified the personal reference information. Access to the personal information of the candidate and the personal reference information from the personal reference giver can be based on a comparison with a set of rules and permissions.
    Type: Application
    Filed: December 23, 2013
    Publication date: July 3, 2014
    Applicant: MyInput.com, Inc.
    Inventor: Alan Nazarelli
  • Publication number: 20140188745
    Abstract: A dynamic identity matching facility that enables an operator to determine the status of an individual based on identification information contained on an identification record provided by the individual. The operator scans the individual's identification information from the identification record using a scanning device. The facility decodes the scanned identification information and identifies a number of candidates based on the decoded identification information. For each identified candidate, the facility generates a candidate score. Based on the candidate score of each identified candidate, the facility selects a number of the identified candidates for display. The facility displays the selected candidates to the operator along with the candidate's criminal or other acts.
    Type: Application
    Filed: December 31, 2013
    Publication date: July 3, 2014
    Applicant: Intellicheck Mobilisa, Inc.
    Inventors: Nelson Ludlow, Steve Zehm
  • Patent number: 8768856
    Abstract: A system and method for distributing information regarding a child abduction. More particularly, a system and method for distributing AMBER alert information via a computer system network to consumers at retail stores. AMBER alert distribution criteria is used to determine what retail stores to transmit the AMBER alert information to, and CID criteria is used to determine what consumers within those retail stores to transmit the information to. As time progresses the AMBER alert information is distributed to retail stores in a larger geographic scope.
    Type: Grant
    Filed: June 16, 2005
    Date of Patent: July 1, 2014
    Assignee: Catalina Marketing Corporation
    Inventor: Roy Simrell
  • Publication number: 20140180950
    Abstract: The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private personal data preferably held on behalf of persons or entities. The system provides the applications, processes, controls and data management services to collect, transfer, store and selectively retrieve data necessary to perform specified planning and decision support activities, that have been integrated with the secure data store. The invention provides for the data owner and authorized persons to gain access to accessible data to undertake permitted tasks. These tasks may include receiving data, or undertaking planning, or such other tasks as prescribed. In an embodiment, the system limits access to applications to authorized persons and requires permissions from the owner in order to manage data privacy standards. The system allows the owner to provide and revoke access to applications and tracks and records all access events.
    Type: Application
    Filed: July 17, 2013
    Publication date: June 26, 2014
    Inventors: Trevor Sinclair, Paul J. David, Andrew Sherman, Paul Quirk
  • Patent number: 8762288
    Abstract: The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations. The method updates the identity profiles with the gathered identity information, and based on the gathered identity information, generates an identity confidence score associated with each identity profile.
    Type: Grant
    Filed: April 22, 2009
    Date of Patent: June 24, 2014
    Assignee: The Western Union Company
    Inventor: Matthew Leland Dill
  • Patent number: 8762876
    Abstract: A communication device, which is capable of presenting one or more of a plurality of virtual keyboards, may be operable to receive application content. The application content may require a user to enter particular data via one of the plurality of virtual keyboards. The plurality of virtual keyboards may comprise a system keyboard and one or more third-party keyboards. The communication device may be operable to determine whether the particular data to be entered by the user may comprise sensitive personal information associated with the user. Based on the determination of the personal information and/or based on a configuration option communicated from the user, the communication device may be operable to determine whether to cause presentation of the system keyboard for the user to enter the particular data. The communication device may cause presentation of the system keyboard by disabling the one or more third-party keyboards.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: June 24, 2014
    Assignee: Google Inc.
    Inventor: Diego Puppin
  • Patent number: 8756703
    Abstract: A method for protecting a user's privacy, wherein the user operates a communication device capable of processing context and wherein the user provides context information—real context—related to one or more reference context variables to a third party, is characterized in the steps of faking at least one of the one or more reference context variables, on the basis of the faked reference context variable, gathering real context information—decoy context—related to reference context variables other than the faked reference context variable, publishing the thus generated decoy context instead of the user's real context. In addition, a corresponding communication device is disclosed.
    Type: Grant
    Filed: March 5, 2008
    Date of Patent: June 17, 2014
    Assignee: NEC Europe Ltd.
    Inventors: Ernoe Kovacs, Miguel Martin Lopez, Martin Bauer
  • Patent number: 8751265
    Abstract: An apparatus for management of information for use in mitigating an emergency includes a data storage element configured to store registrant information obtained from members of a population residing in a particular geographic area and a set of survey questions, and a data storage system, the data storage system being programmed to implement a survey editor for enabling an emergency management official to create a survey for soliciting information from the members for inclusion in the registrant information, the survey editor providing, to the emergency management official, an interface for selecting a subset of questions from the set of questions, the subset of questions being selected from the set of questions based at least in part on the particular geographic area, and a survey portal for receiving, from the member, a response to the survey for integration into the reference data.
    Type: Grant
    Filed: February 6, 2013
    Date of Patent: June 10, 2014
    Assignee: Rave Wireless, Inc.
    Inventors: William T. Piett, Matthew A. Serra, Noah J. Reiter
  • Patent number: 8751394
    Abstract: As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (SMS, MMS, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.
    Type: Grant
    Filed: November 24, 2008
    Date of Patent: June 10, 2014
    Assignee: Sybase 365, Inc.
    Inventors: William H. Dudley, Marc R. Landrum, Robert C. Lovell, Jr.