Personal Security, Identity, Or Safety Patents (Class 705/325)
-
Publication number: 20150074009Abstract: A computer based system for monitoring compliance of climber/tower safety procedures and personnel at communication towers. The system includes an updatable database of the wireless transmission towers and their unique safety information. The system can monitor and automatically generate reports of tower climber safety training and certification. Workers may be sorted by their employers, training status or other safety information including regulatory compliance. Communication towers may be sorted by structure type, safety status, type of work performed and who performed the work. The custom signs with the machine readable indicia can be used to enhance access to an automated climber/tower safety system.Type: ApplicationFiled: November 14, 2014Publication date: March 12, 2015Inventor: Douglas M. Williams
-
Publication number: 20150066793Abstract: A correlation engine apparatus includes a network interface and a processor, wherein the correlation engine is configured to receive publication-restricted data and non-publication-restricted data and generate correlations useable for predictive models, wherein no trace of any personal identifying information (PII) in the publication-restricted data exists in the correlations.Type: ApplicationFiled: November 6, 2014Publication date: March 5, 2015Applicant: ADROIT DS, LLCInventor: Robert G. Brown
-
Publication number: 20150058242Abstract: A method for monitoring mobile communication and generating alerts associated with targeted content. A link is established between a monitored user's mobile communication device and a monitoring user's mobile communication device to receive communications for monitoring purposes. The monitored user's mobile communication device forwards an incoming or outgoing communication to the monitoring user's mobile communication device. The monitored user's or monitoring user's mobile communication device generates an alert if it is determined that the incoming or outgoing communication contains targeted content, and an alert is provided on the monitoring user's mobile communication device.Type: ApplicationFiled: August 22, 2014Publication date: February 26, 2015Inventor: Todd Bucciarelli
-
Patent number: 8966650Abstract: Portable on-line identity verification technology includes, for example, portable widgets with an identity rating, and other on-line identification verification icons and identity rating scores.Type: GrantFiled: April 2, 2013Date of Patent: February 24, 2015Inventor: Lewis Farsedakis
-
Publication number: 20150052073Abstract: Systems and methods for applying Electric Network Frequency (ENF) forensic techniques to determine characteristics associated with an audio and/or video recording such as when and where the recording was made. In one embodiment, a system that determines at least one of a time and a location associated with a recording includes an ENF forensic database, an ENF extraction processing module and a comparison processing module. The ENF forensic database stores powerline data collected from at least one electrical power grid. The ENF extraction processing module extracts ENF content coupled into the recording. The comparison processing module compares the extracted ENF content with powerline data retrieved from the ENF forensic database and outputs information including one or more of a time during which the recording was made and a location where the recording was made based on the comparison with the powerline data.Type: ApplicationFiled: August 14, 2014Publication date: February 19, 2015Inventors: Michael Panczenko, Alexander Gregory Hrybyk, Kwok Lee Tang
-
Publication number: 20150052074Abstract: A method for monitoring and countering source content that encourages an individual to engage in extremist or terrorist activities. The method comprises: intercepting the source content from a communications stream, the source content initiated by or intended for the individual, determining a threat indicator indicative of the likelihood the individual, after exposure to the source content, will engage in extremist or terrorist activities, and sending counter-narrative content to the individual, the counter-narrative content contrary to the source content in an attempt to discourage the individual from engaging in extremist or terrorist activities.Type: ApplicationFiled: September 9, 2014Publication date: February 19, 2015Inventor: Ted W. Reynolds
-
Publication number: 20150046359Abstract: A method for the determination of the reputational rating of natural or legal persons, including the following steps: populating a database with certain pieces of information relating to the natural or legal persons, the certain pieces of information being pertinent to prove evidence or facts object of the evaluation of the reputational rating, assigning a positive or negative weighted value to each of the certain pieces of information, proportional to a suitability factor of the evidence or facts to contribute to the determination; determining the reputational rating of any of the natural or legal persons by summing up all the contributions derived from the weighted values relating to the natural or legal persons.Type: ApplicationFiled: August 6, 2013Publication date: February 12, 2015Inventors: Eduardo Marotti, Jacopo Marotti, Maria Vittoria Marotti, Bruno Frattasi
-
Publication number: 20150039527Abstract: A method for confirming the identity of an individual while shielding that individual's personal data. At least one biometric such as the image of the iris of an individual is captured and stored in a database. A unique identification code is assigned to the biometric without reference to the first individual's personal information. A subsequent biometric data collect is compared with the contents of the database. If a match between the subsequent biometric is found with the original biometric, the system transmits the identification code corresponding to the matched biometric. In a second aspect of the invention, in order to protect the privacy of individuals, the unique identification code is encrypted such that only the individual to whom the biometric belongs holds the de-encryption key. In a third aspect of the invention also intended to protect the privacy of individuals, a non-unique group identification code is assigned to the biometric.Type: ApplicationFiled: January 26, 2011Publication date: February 5, 2015Applicant: EYELOCK Inc.Inventor: Keith J. Hanna
-
Publication number: 20150032534Abstract: A system, method and computer program product are provided. In use, at least one preference associated with at least one first entity is identified. In addition, at least one preference associated with a second entity is determined. Further, the at least one preference associated with the second entity is determined based on the at least one preference of the at least one first entity.Type: ApplicationFiled: October 6, 2014Publication date: January 29, 2015Inventor: Rajiv Motwani
-
Publication number: 20150026088Abstract: Embodiments of the disclosure are directed towards a crime assessment tool and method for comparing and visualizing crime statistics in a manner such that an accurate assessment of safety in one area may be compared to the safety in another area. The crime statistics may be normalized based on a population basis and/or on crime severity. The areas for comparison may be specified at various levels, such as cities, neighborhoods, specific addresses, or the like. Trending information may be visually provided to aid in assessing the safety of different areas.Type: ApplicationFiled: July 14, 2014Publication date: January 22, 2015Inventors: David M. Alber, Matthew R. Lerner, Joshua R. Herst, Mahalie M. Stackpole
-
Publication number: 20140379599Abstract: A system and method for generating and transmitting data without personally identifiable information. The method may include receiving a set of one or more unique identifiers (IDs) and a first set of data associated with a subscriber. The method may send the IDs to a third party provider of datasets. The method may receive a second set of data associated with the subscriber identified using the unique IDs. The method may generate aggregated viewing data based on the first and second sets of data. The set of unique IDs may be based on a one-way hash of personally identifiable information associated with the subscriber. In this way, the unique IDs may be appended with the data from third party providers so additional information regarding the household is available to clients, but the personally identifiable information is unavailable to any of the parties.Type: ApplicationFiled: June 20, 2014Publication date: December 25, 2014Inventors: William FEININGER, Eric H. DAVIS
-
Publication number: 20140379600Abstract: In one embodiment, a method includes receiving, from a requestor, a request for an on-demand identity product in relation to an identity of a consumer, the request comprising personally identifying information (PII) of the consumer. The method also includes executing, using the PII, a partial registration of the consumer for the on-demand identity product, the partial registration omitting satisfaction of at least one security requirement. The method additionally includes determining whether delayed authentication is enabled for the on-demand identity product. Moreover, the method includes, responsive to a determination that delayed authentication is enabled for the on-demand identity product: conditionally suspending the at least one security requirement; initiating provision of the on-demand identity product to the requestor; and restricting the requestor's access to determined sensitive data resulting from the initiated provision at least until the at least one security requirement is satisfied.Type: ApplicationFiled: September 9, 2014Publication date: December 25, 2014Inventors: Isaac CHAPA, Steven HATLEY, Joe ROSS
-
Patent number: 8918872Abstract: A system, method, and computer program product are provided for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device. In use, a first device removably coupled to a second device is identified. Additionally, an attempt to store on the first device a configuration file for the first device and an executable file is detected. Further, a reaction is performed in response to the detection of the attempt.Type: GrantFiled: June 27, 2008Date of Patent: December 23, 2014Assignee: McAfee, Inc.Inventors: Lokesh Kumar, Harinath V. Ramachetty
-
Publication number: 20140365390Abstract: Embodiments of the invention leverage mobile proliferation to enable laypersons to initiate a timely and effective emergency response in case of an emergency, such as a medical emergency, e.g. cardiac event. Mobile apps are made available as part of an organization's overall response plan and program, allowing bystanders of emergency events to easily initiate notification of trained responders, for example in their facility, in a timely manner commensurate with the type of emergency specific to their facility. More particularly, embodiments of the invention use mobile applications to alert certified first trainees to respond to the scene of the emergency.Type: ApplicationFiled: May 2, 2014Publication date: December 11, 2014Inventor: Odelia BRAUN
-
Publication number: 20140358811Abstract: The detection of illegal activity through interpersonal relationship resolution. A method in accordance with an embodiment includes: assigning a risk assessment score to a person of interest; identifying and mapping at least one first line connection of the person of interest; assigning a risk assessment score to each first line connection; updating the risk assessment score assigned to the person of interest based on the risk assessment score assigned to each first line connection; comparing the risk assessment score of the person of interest to at least one threshold value; and detecting an illegal activity based on the comparing.Type: ApplicationFiled: June 4, 2013Publication date: December 4, 2014Inventors: Karl J. Cama, Norbert Herman, Daniel T. Lambert
-
Publication number: 20140358812Abstract: A computer network implemented system for disaster and crisis management which includes at least one server computer, an information collection utility that enables an entity to collect and store information to a database; a communications device for establishing a network corresponding to the communications device; a plurality of communication nodes, each communication node being connected to the network; a user application comprising software for execution by a processor; a message management and routing system configured to facilitate communications; a fixed mode capable of functioning as a crisis center; a user device configured to display information from the user application; where each node of the plurality of nodes is associated with an emergency services source, and is configured to communicate information to the user application; and where the user device is configured to display information regarding the emergency services sector resource from the user application.Type: ApplicationFiled: May 30, 2014Publication date: December 4, 2014Applicant: Hitec Luxembourg S.A.Inventors: Benjamin Hourte, Simon Massart
-
Patent number: 8903739Abstract: Systems and methods for optimizing wealth are provided herein. Exemplary methods for analyzing financial well being of a client may include generating a financial profile for an client via a web server, selecting one or more grids for displaying at least a portion of the financial profile, the grid including one or more sectors, each of the sectors corresponding to one of the plurality of strengths, filling a sector with an indicator, filling a sector with an indicator, the indicator including a calculation of a strength level for the strength associated with the sector; and providing at least one of the one or more grids to a display device associated with a computing system that is communicatively coupled to the web server.Type: GrantFiled: April 22, 2011Date of Patent: December 2, 2014Assignee: Wealth With Ease, LLCInventor: Joseph J. Janiczek
-
Patent number: 8892272Abstract: A vehicle thumbprint door-lock and ignition access system is a fingerprint recognition system used in conjunction with automobile locks and automatic door openers. A thumbprint scanner compares a thumbprint with a stored database of thumbprints for a match. When a match is found, the vehicle door unlocks and is automatically opened to the fully opened position where it returns to manual operation. A second scanner, the ignition thumb-pad, then searches for an image match of the entered thumbprint on the ignition thumb-pad for a match and starts the engine if found. The ignition thumb-pad has a master-door-opener-interface with a five button keypad for automatically opening any combination of doors on the car, or all may be opened simultaneously. A key fob with five buttons is able to remotely access the master-door-opener-interface for door opening operation.Type: GrantFiled: August 8, 2013Date of Patent: November 18, 2014Inventor: David Wooding
-
Publication number: 20140337066Abstract: A method for reducing violence within crowded venues is provided. The method includes reading license plates of vehicles passing into entry ports of a parking area, and capturing facial images of persons seeking admission to the venue. A computer compares such license plates to a database of vehicle license plates associated with persons with past histories of violence. A computer also compares captured facial images to a database of facial data for persons with past violent histories. Upon detecting a match, the computer creates an alert presented to law enforcement officers to facilitate detention of such persons for investigation. Information recorded on entry tickets is scanned and saved together with the facial image of the ticket holder. If a violent act occurs, cameras within the venue capture facial images of participants. The computer matches such participants to stored identifying data to assist in the identification and apprehension of such persons.Type: ApplicationFiled: July 29, 2014Publication date: November 13, 2014Inventor: Stanley Loel KEPHART
-
Publication number: 20140337243Abstract: A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.Type: ApplicationFiled: July 22, 2014Publication date: November 13, 2014Inventors: Deepak Chandra Dutt, Anil Buntwal Somayaji
-
Publication number: 20140324722Abstract: A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account recovery code. The account recovery system sends a communication to the trustee for information to verify the trustee as one of the previously identified trustees. The account recovery system then may transmit a link and code with instructions for the trustee to return the link. The account recovery system then transmits a situational query to the trustee to provide additional security. Finally, if all the communications have been completed for the required level of security, the account recovery code is transmitted to the trustee. The trustee sends the account recovery code to the account holder for access to an account.Type: ApplicationFiled: July 8, 2014Publication date: October 30, 2014Inventors: Stuart Schechter, Robert Wilson Reeder
-
Publication number: 20140324705Abstract: A system and method are provided for the exchange of physical media (e.g., legacy DVDs) for a secured digital copy that may be usable by a, consumer on one or more personal consumer devices, such as a laptop computer, handheld media player, etc., comprising receipt at a physical location of consumer-owned physical digital media, preparation of at least one secured digital media file corresponding to the received physical digital media, and delivery of the at least one secured digital media file to the consumer, the at least one secured digital media file configured to operate on one or more media playing devices of the consumer but to not be freely distributable.Type: ApplicationFiled: January 5, 2012Publication date: October 30, 2014Applicant: Fox Digital Enterprises, Inc.Inventor: Andrew G. Setos
-
Publication number: 20140317010Abstract: A consumer electronic device hosts a media application that obtains media content use data for a user. The media application interfaces with a server that analyzes the media content use-related data based on a budget-constrained DCLEF and/or a distortion-constrained DCLEF mechanism. The user is then compensated for their disclosed use data based on the severity of the privacy incursion.Type: ApplicationFiled: October 9, 2012Publication date: October 23, 2014Inventors: Efstratios Ioannidis, Nada Fawaz, Pranav Dandekar
-
Publication number: 20140310191Abstract: A method of rapid response to a cyber-bullying incident is provided by means of a “smartphone,” such as an iPhone™ or Android™, running anti-bullying application software. The application software, which is constantly running or available for launch on the smartphone of the minor user, enables the user to instantly initiate response and reporting of a cyber-bullying incident from a touchscreen menu. The application provides a user interface, which provides a menu of multiple alternate response and reporting actions and one or more input modules for associating a contact list with each of the menu actions. A version of the application for schools enables documentation of responsive actions to cyber-bullying incidents involving their students.Type: ApplicationFiled: September 13, 2013Publication date: October 16, 2014Inventor: Todd Schobel
-
Publication number: 20140310192Abstract: An approach for managing driving patterns is presented. A first distance measured at a first time between a first vehicle and a second vehicle in front of the first vehicle is received and stored in driving behavior data over a time period. The driving behavior data includes a second distance between the first vehicle and a third vehicle in front of the first vehicle measured at a second time. Based on the first and second distances, the number of times the first vehicle tailgated other vehicles within the period of time is determined. Based on the number of times the first vehicle tailgated within the period of time, an incentive is provided to a driver of the first vehicle to encourage the driver to drive without tailgating, or a disincentive is provided to the driver to deter the driver from tailgating.Type: ApplicationFiled: June 27, 2014Publication date: October 16, 2014Inventors: Gregory J. Boss, Rick A. Hamilton, II, Jacquelyn A. Martino, Clifford A. Pickover, Anne R. Sand
-
Patent number: 8863307Abstract: Disclosed are various embodiments of generating a user signature associated with a user and authenticating a user. At least one behavior associated with at least one sensor in a computing device is identified. A timestamp is generated and associated with the behavior. A user signature corresponding to a user based at least in part upon the behavior and the timestamp is generated and stored.Type: GrantFiled: June 29, 2012Date of Patent: October 14, 2014Assignee: Broadcom CorporationInventor: Noam Sorek
-
Publication number: 20140304184Abstract: A system for registering a birth includes a processor and storage device. A location of a user is determined, using a first location detection method. The location of the user is verified, using a second location detection method. A security key is established with a registration authority according to the location. A birth registration report is generated in compliance with the birth registration requirements according to the location. The birth registration report comprises identification of the location, a picture of the newborn child, and a time stamp that identifies a time and date of the birth. The birth registration report is encrypted according to the security key, which prevents altering the birth registration report. The birth registration report is transmitted in encrypted format to a registrar of birth records for the location. The birth registration report is stored in encrypted format on a computerized device.Type: ApplicationFiled: April 4, 2013Publication date: October 9, 2014Applicant: XEROX BUSINESS SERVICES, LLCInventor: Denise L. Fletcher
-
Publication number: 20140304183Abstract: In described embodiments, a verification system allows for registration of credential providing entities and storage of credential data from, and verified by, the credential providing entities. The verification system further allows for users, through a credential and verification device associated with the credential providing entities, to approve the use of corresponding credential data by those accessing the verification system. In some embodiments, on-going tracking of current requirements for maintaining certain credentials is performed. Employers or other interested parties might access the verification system to verify information of certain credentials, and lapses in maintenance of certain credentials.Type: ApplicationFiled: April 1, 2014Publication date: October 9, 2014Applicant: VERIF-Y, INC.Inventor: Ed Adi Zabar
-
Publication number: 20140279640Abstract: The present disclosure describes systems, methods, and apparatuses for identifying a person of interest. An exemplary method may comprise storing external data received from a variety external sources into a parameterized table, creating a first set of category views on the parameterized table, creating a second set of category views based at least in part on data to be derived from a traveler's personal information to be received, receiving the traveler's personal information generated by an input device and determining whether the traveler is a person of interest by evaluating the personal information against one or more pre-defined profiles using the first and second sets of category views. Each of the one or more pre-defined profiles may comprise one or more rules and a threshold value for determining a likelihood for the traveler to be matched in each of the one or more pre-defined profiles.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Inventors: Marcelo Martin Motta MORENO, Hsiang-yi YU, Mohandas VENKOBDAS, Seth Stuart HIRSCH
-
Publication number: 20140279532Abstract: The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.Type: ApplicationFiled: March 10, 2014Publication date: September 18, 2014Inventor: Christophe Tremlet
-
Publication number: 20140279641Abstract: Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual.Type: ApplicationFiled: March 13, 2014Publication date: September 18, 2014Inventors: Subrat Narenda SINGH, Srinivasa KAKKERA, Kiu LI, Prathap SAKALA
-
Publication number: 20140279642Abstract: Systems and methods for automatic enrollment and identity verification based upon processing a captured image of a document are disclosed herein. Various embodiments enable, for example, a user to enroll in a particular service by taking a photograph of a particular document (e.g., his driver license) with a mobile device. One or more algorithms can then extract relevant data from the captured image. The extracted data (e.g., the person's name, gender, date of birth, height, weight, etc.) can then be used to automatically populate various fields of an enrollment application, thereby reducing the amount of information that the user has to manually input into his mobile device in order to complete the enrollment process. In some embodiments, a set of internal and/or external checks can be run against the data to ensure that the data is valid, has been read correctly, and is consistent with other data.Type: ApplicationFiled: March 17, 2014Publication date: September 18, 2014Applicant: MITEK SYSTEMS, INC.Inventors: Mike Strange, James DeBello, Mike Diamond
-
Publication number: 20140258162Abstract: Techniques to block records for matching are described. Some embodiments are particularly directed to techniques to block records for matching entities with inconsistent identifying information. In one embodiment, for example, an apparatus may comprise a configuration component, a coding component, a blocking component, and a matching component. The configuration component may be operative to receive a data set comprising a plurality of records and operative to receive a set of blocking variables, the blocking variables present as variables in each of the plurality of records. The coding component operative to generate match codes based on the blocking variables. The blocking component operative on the processor circuit to produce a plurality of blocks of records from the data set based on the match codes.Type: ApplicationFiled: March 10, 2014Publication date: September 11, 2014Applicant: SAS INSTITUTE INC.Inventors: Ned Maran, Jin-Whan Jung, Leslie Sall
-
Publication number: 20140250026Abstract: The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations. The method updates the identity profiles with the gathered identity information, and based on the gathered identity information, generates an identity confidence score associated with each identity profile.Type: ApplicationFiled: May 13, 2014Publication date: September 4, 2014Applicant: The Western Union CompanyInventor: Matthew Leland Dill
-
Publication number: 20140244510Abstract: Disclosed herein are privacy protection systems and related methods for providing subscribers of the system or method, such as credit card issuers, banks, etc., independent verification of the identity of individuals attempting to do business with the subscriber. The independent verification disclosed herein does not rely solely on the information accessible or maintained by an entity that issued a piece of identification data to the individual. Instead, disclosed systems and methods may not only check with the entity that issued the piece(s) of identification data presented by a user to identify himself, but also may review the records of that issuing entity such that older records can be actively compared to current records in an effort to determine if the currently issued identification data is correct.Type: ApplicationFiled: May 7, 2014Publication date: August 28, 2014Inventor: Raymond de Beasley
-
Patent number: 8818882Abstract: Methods and system for determining reputation information are provided. The method includes analyzing transactional and non-transactional information for an alias associated with an entity and determining reputation information for that alias. The reputation information is transferable across multiple domains. A user can request the reputation information about an entity prior to doing business with that entity. The reputation information is generated for merchants as well as users. The system can generate transaction risk score for every transaction to be conducted between two or more aliases. The system includes an alias identity and reputation validation server computer that receives inputs from various external systems and generated reputation information based on the inputs. Additionally, every individual user/merchant can manage his profile within the reputation database and enter some information manually.Type: GrantFiled: July 29, 2010Date of Patent: August 26, 2014Assignee: Visa International Service AssociationInventors: Mark Carlson, Patrick Stan, Patrick Faith, Benjamin Rewis
-
Patent number: 8819020Abstract: A computer implemented method, apparatus, and computer usable program product for ranking and categorizing criminal offenders in a jurisdiction. In one embodiment, external data associated with the offenders is processed in a set of data models to generate a ranking index of criminal offenders. The external data comprises offender data elements related to prior arrests. The computer software and web application enables officers, detectives, and supervisors to research the offenders in their jurisdiction. They can intentionally track and monitor the status of the offenders that are not currently incarcerated. They can deliberately increase lawful contacts with these high-rate and treacherous offenders.Type: GrantFiled: April 27, 2012Date of Patent: August 26, 2014Inventors: Daniel Scott Jenkins, Brandon Matthew Rana
-
Publication number: 20140236853Abstract: Methods, devices, and systems for processing contact information are provided. A request for generating virtual contact information can be received from a terminal. According to the request for generating virtual contact information, real contact information that is preset can be obtained. According to the real contact information, the virtual contact information can be generated. The virtual contact information can be sent to the terminal for a user to use.Type: ApplicationFiled: March 31, 2014Publication date: August 21, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: ZHENZHEN JIANG
-
Publication number: 20140222707Abstract: A networked system for managing commercial interactions is providing. In some embodiments, the system includes: a bundle-passing interface between a plurality of networked users including distribution logic including a distribution control input responsive to machine-readable information in the bundles; and a statistics collection engine including a control input responsive to machine-readable information in the bundles.Type: ApplicationFiled: April 11, 2014Publication date: August 7, 2014Applicant: THOMSON FINANCIAL LLCInventors: BOB LAMOUREUX, PAUL JAMINET, EDWARD SHEA, ALEXIS KOPIKIS, JOHN CONSTANTINE, MATTHEW KUNTZ, TODD BREMNER, ZENOBIA MOOCHHALA
-
Publication number: 20140222706Abstract: A system architecture is disclosed that includes a privacy management system. In particular, the privacy management system provides a policy hub for maintaining and managing customer privacy information. The privacy management system maintains a master data database for customer information and customer privacy preferences, and a rules database for privacy rules. The privacy management system captures, synchronizes, and stores customer privacy data. Privacy rules may be authored using a privacy management vocabulary, and can be customized for an enterprise's privacy policies.Type: ApplicationFiled: December 9, 2013Publication date: August 7, 2014Applicant: Oracle International CorporationInventors: Hwee Har Yeap, Catherine You, Qin Lu, Jane Li, Weiwei Hsieh, Lindy H. Chan
-
Patent number: 8775328Abstract: A method and system an online neighborhood social network designed to create private websites to facilitate communication among neighbors and build stronger neighborhoods. The private websites are embodied in a website having a domain name of nextdoor.com. In one embodiment, a method verifies that a user lives at a residence associated with a residential address claimed by the user of an online neighborhood social network. The method restricts access to a particular neighborhood to the user and to neighboring users living within the neighborhood boundary of the residence. A social network page of the user is created once verified and access privileges are determined. A message is distributed to neighboring users that are verified to live within a neighborhood boundary of the residence. The method may designate the user as a lead user with an additional privilege based on a participation level of the user in the online community.Type: GrantFiled: March 10, 2014Date of Patent: July 8, 2014Inventor: Raj Abhyanker
-
Publication number: 20140188744Abstract: Systems and methods for electronically managing the process of requesting, giving, and receiving personal references are provided. Personal information, particularly contact information, is received by a computer system from a candidate seeking a personal reference. Some of this information is forwarded to a personal reference giver to request that a personal reference regarding the candidate be given. The personal reference information is received by the computer system. The candidate and reference giver may access the personal received personal reference information. The personal reference information can then be sent to a recipient. The candidate and reference giver can be contacted when the recipient has accessed, reviewed, or modified the personal reference information. Access to the personal information of the candidate and the personal reference information from the personal reference giver can be based on a comparison with a set of rules and permissions.Type: ApplicationFiled: December 23, 2013Publication date: July 3, 2014Applicant: MyInput.com, Inc.Inventor: Alan Nazarelli
-
Publication number: 20140188745Abstract: A dynamic identity matching facility that enables an operator to determine the status of an individual based on identification information contained on an identification record provided by the individual. The operator scans the individual's identification information from the identification record using a scanning device. The facility decodes the scanned identification information and identifies a number of candidates based on the decoded identification information. For each identified candidate, the facility generates a candidate score. Based on the candidate score of each identified candidate, the facility selects a number of the identified candidates for display. The facility displays the selected candidates to the operator along with the candidate's criminal or other acts.Type: ApplicationFiled: December 31, 2013Publication date: July 3, 2014Applicant: Intellicheck Mobilisa, Inc.Inventors: Nelson Ludlow, Steve Zehm
-
Patent number: 8768856Abstract: A system and method for distributing information regarding a child abduction. More particularly, a system and method for distributing AMBER alert information via a computer system network to consumers at retail stores. AMBER alert distribution criteria is used to determine what retail stores to transmit the AMBER alert information to, and CID criteria is used to determine what consumers within those retail stores to transmit the information to. As time progresses the AMBER alert information is distributed to retail stores in a larger geographic scope.Type: GrantFiled: June 16, 2005Date of Patent: July 1, 2014Assignee: Catalina Marketing CorporationInventor: Roy Simrell
-
Publication number: 20140180950Abstract: The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private personal data preferably held on behalf of persons or entities. The system provides the applications, processes, controls and data management services to collect, transfer, store and selectively retrieve data necessary to perform specified planning and decision support activities, that have been integrated with the secure data store. The invention provides for the data owner and authorized persons to gain access to accessible data to undertake permitted tasks. These tasks may include receiving data, or undertaking planning, or such other tasks as prescribed. In an embodiment, the system limits access to applications to authorized persons and requires permissions from the owner in order to manage data privacy standards. The system allows the owner to provide and revoke access to applications and tracks and records all access events.Type: ApplicationFiled: July 17, 2013Publication date: June 26, 2014Inventors: Trevor Sinclair, Paul J. David, Andrew Sherman, Paul Quirk
-
Patent number: 8762288Abstract: The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations. The method updates the identity profiles with the gathered identity information, and based on the gathered identity information, generates an identity confidence score associated with each identity profile.Type: GrantFiled: April 22, 2009Date of Patent: June 24, 2014Assignee: The Western Union CompanyInventor: Matthew Leland Dill
-
Patent number: 8762876Abstract: A communication device, which is capable of presenting one or more of a plurality of virtual keyboards, may be operable to receive application content. The application content may require a user to enter particular data via one of the plurality of virtual keyboards. The plurality of virtual keyboards may comprise a system keyboard and one or more third-party keyboards. The communication device may be operable to determine whether the particular data to be entered by the user may comprise sensitive personal information associated with the user. Based on the determination of the personal information and/or based on a configuration option communicated from the user, the communication device may be operable to determine whether to cause presentation of the system keyboard for the user to enter the particular data. The communication device may cause presentation of the system keyboard by disabling the one or more third-party keyboards.Type: GrantFiled: June 21, 2012Date of Patent: June 24, 2014Assignee: Google Inc.Inventor: Diego Puppin
-
Patent number: 8756703Abstract: A method for protecting a user's privacy, wherein the user operates a communication device capable of processing context and wherein the user provides context information—real context—related to one or more reference context variables to a third party, is characterized in the steps of faking at least one of the one or more reference context variables, on the basis of the faked reference context variable, gathering real context information—decoy context—related to reference context variables other than the faked reference context variable, publishing the thus generated decoy context instead of the user's real context. In addition, a corresponding communication device is disclosed.Type: GrantFiled: March 5, 2008Date of Patent: June 17, 2014Assignee: NEC Europe Ltd.Inventors: Ernoe Kovacs, Miguel Martin Lopez, Martin Bauer
-
Patent number: 8751265Abstract: An apparatus for management of information for use in mitigating an emergency includes a data storage element configured to store registrant information obtained from members of a population residing in a particular geographic area and a set of survey questions, and a data storage system, the data storage system being programmed to implement a survey editor for enabling an emergency management official to create a survey for soliciting information from the members for inclusion in the registrant information, the survey editor providing, to the emergency management official, an interface for selecting a subset of questions from the set of questions, the subset of questions being selected from the set of questions based at least in part on the particular geographic area, and a survey portal for receiving, from the member, a response to the survey for integration into the reference data.Type: GrantFiled: February 6, 2013Date of Patent: June 10, 2014Assignee: Rave Wireless, Inc.Inventors: William T. Piett, Matthew A. Serra, Noah J. Reiter
-
Patent number: 8751394Abstract: As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (SMS, MMS, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.Type: GrantFiled: November 24, 2008Date of Patent: June 10, 2014Assignee: Sybase 365, Inc.Inventors: William H. Dudley, Marc R. Landrum, Robert C. Lovell, Jr.