Personal Security, Identity, Or Safety Patents (Class 705/325)
-
Patent number: 8751394Abstract: As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (SMS, MMS, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.Type: GrantFiled: November 24, 2008Date of Patent: June 10, 2014Assignee: Sybase 365, Inc.Inventors: William H. Dudley, Marc R. Landrum, Robert C. Lovell, Jr.
-
Publication number: 20140156412Abstract: Techniques for scanning products and providing information about those products are provided. In one technique, ingredient names in a digital image are recognized, the ingredients are analyzed for their respective toxicity ratings, and one or more ingredient names in the digital image are highlighted to show which ingredients are considered safe or unsafe. In another technique, an overall rating for a product is calculating solely based on information about ingredients found in the product and that overall rating is displayed on a computing device. In another technique, a user provides input that indicates one or more products that the user has scanned or allegedly purchased or used. Other users are allowed to view those products if, for example, the user gives his/her permission. In another technique, geographic information of a mobile device is used to identify a product that may be relevant to a user of the mobile device.Type: ApplicationFiled: December 4, 2013Publication date: June 5, 2014Applicant: Good Clean Collective, Inc.Inventor: Lily Tse
-
Patent number: 8745728Abstract: Methods, apparatus, systems and computer program products are described and claimed that provide for automatically and positively determining that an associate accessing a business domain/application using an application-specific associate identifier is the same associate that is accessing another business domain/application using another application-specific associate identifier. Once the positive determination of same associate is made, a federated identifier key is generated and applied to all of the platforms in which the associate can be positively identified, so as to globally identify the associates across multiple enterprise-wide domains/applications. As such, the present invention eliminates the need to manually analyze associate data to determine if an associate interfacing with one domain/application is the same associate interfacing with another domain/application.Type: GrantFiled: May 10, 2012Date of Patent: June 3, 2014Assignee: Bank of America CorporationInventors: Rangarajan Umamaheswaran, Bruce Wyatt Englar, Brett A. Nielson, Miroslav Halas
-
Publication number: 20140149304Abstract: Certain embodiments of the disclosed technology may include systems and methods for detecting fraud. According to an implementation of the disclosed technology, a method is provided that includes: receiving entity-supplied information including at least a name, a social security number, and a mailing address associated with a request for a payment or a benefit from a government agency; querying one or more public or private databases with the entity-supplied information; receiving a plurality of independent information in response to the querying; determining, based at least in part on a comparison of the entity-supplied information with at least a portion of the plurality of independent information, indicators of fraud; and outputting, for display, zero or more indicators of fraud.Type: ApplicationFiled: February 3, 2014Publication date: May 29, 2014Applicant: LexisNexis Risk Solutions FL Inc.Inventors: Andrew John Bucholz, Scott M. Straub, Monty Faidley, Johannes Philippus de Villiers Prichard, Jesse CBD Shaw, Dermot O'Mahony, David Yeschek, Jennifer Paganacci, Marlene Thorogood, Mark Loizzo
-
Patent number: 8738545Abstract: A method, apparatus and system of map based neighborhood search and community contribution are disclosed. In one embodiment, a neighborhood communication system is described. This embodiment includes a privacy server to apply an address verification algorithm associated with each user of the online community to verify that each user lives at a residence associated with a claimable residential address of an online community formed through a social community module of the privacy server using a processor and a memory. The privacy server automatically determines a set of access privileges in the online community associated with each user of the online community by constraining access in the online community based on a neighborhood boundary determined using an algorithm of the privacy server. The privacy server may constrain the particular user to communicate through the online community only with a set of neighbors having verified addresses using the privacy server.Type: GrantFiled: December 31, 2013Date of Patent: May 27, 2014Inventor: Raj Abhyanker
-
Patent number: 8738488Abstract: A method for a business customer interfacing with a financial institution through a computer network is presented. The method includes an early warning evaluation of the customer and/or entities associated with the customer to identify fraudster/abusers and prevent them from opening online accounts at the financial institution.Type: GrantFiled: October 21, 2009Date of Patent: May 27, 2014Assignee: Branch Banking & Trust CompanyInventors: Lori Hall, Alicia Silla, Teresa Rose
-
Publication number: 20140129473Abstract: A method for utilizing firearm discharge data in a crime reporting and tracking database, includes: recording one or more discharges of a firearm; transmitting information from the discharging firearm to a crime reporting and tracking database; utilizing the transmitted information to establish relationships between the discharged firearm, committed crimes, and missing persons within the crime reporting and tracking database; and wherein the recording and transmitting is carried out by devices within the firearm.Type: ApplicationFiled: January 10, 2014Publication date: May 8, 2014Applicant: International Business Machines CorporationInventors: Wayne M. Delia, Edward E. Kelley
-
Patent number: 8713450Abstract: Embodiments of the invention provide techniques for detecting patterns of abuse in users of a virtual world. The patterns of abuse may be detected by examining records of inappropriate interactions between users. Subsequently, preventative actions may be taken to prevent further abuse. The preventative actions may include blocking access to all or part of the virtual world, blocking interactions with other users, warning other users, or notifying authorities of the behavior of the other user.Type: GrantFiled: January 8, 2008Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Zachary Adam Garbow, Linda Irene Larson, Candace Trielle Pederson
-
Publication number: 20140108284Abstract: A computer system for securely managing personal information. The computer system comprising a computer configured to receive and store personal information of a monitored individual to monitor the use of the computer by the monitored individual to obtain an activity or inactivity status, and to automatically and electronically transmit an inactivity notification to the monitored individual based on the occurrence of an inactivity status to obtain a response to the inactivity notification.Type: ApplicationFiled: December 18, 2013Publication date: April 17, 2014Applicant: Personal Estate Manager, Inc.Inventor: Stephen E. Wood
-
Patent number: 8700523Abstract: Systems, methods and computer program products for enabling a holder of a transaction account linked to a financial transaction instrument to delegate management of the transaction account to an assistant. Information relating to the transaction account, including at least identification information relating to the holder of the transaction account, is stored in a database. The database stores financial transaction data relating to financial transactions performed using the financial transaction instrument. A designation of at least one assistant to manage the transaction account on behalf of the holder is accepted and stored. Assistant management authentication data associated with the transaction account is established, to be used by the assistant to execute management instructions at a designated level of management access. An instruction from the assistant is accepted to access transaction data associated with the transaction account.Type: GrantFiled: October 11, 2005Date of Patent: April 15, 2014Assignee: American Express Travel Related Services Company, Inc.Inventors: Brent M. Edwards, Marc C. Rosenfeld, Robert J. Sondermeyer, Jane H. C. Thompson, Andre R. Wright
-
Publication number: 20140095403Abstract: Methods and apparatus for managing safety information are disclosed. In an embodiment, a computing device, or any other suitable device or system, receives employee identification information and associated job site location information (e.g., employee ID and job site location ID). The computing device then receives job site evaluation information including a selection from a user of a job site safety attribute that is associated with the job site (e.g., flammable materials present). The computing device also receives safety inspection information associated with the job site safety attribute (e.g., fire extinguishers in place). The computing device displays job site safety briefing information associated with the employee identification information and the job site safety attribute (e.g., employee warned about fire hazard). The computing device receives incident information associated with the employee identification information and the job site safety attribute (e.g., employee burned).Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Applicant: SIMS IP HOLDINGS, LLCInventor: Angelia Hopson
-
Patent number: 8688710Abstract: A content management system manages data about entities and provides content including data about the entities. The content management system receives data about entities from originators associated with the entities. The content management system classifies the data and stores the classified data. The content management system may authenticate the data by determining an authenticator of the classified data. The authenticator may be the most appropriate person to authenticate the data. The content management system may determine an authenticator by determining the entity most related to the classified data and determining an originator representing or designated to authenticate the information. As such, the content management system may determine the originator in the best position to authenticate the data. The content management system may also receive a request from subscribers for content and create the content in response to the request.Type: GrantFiled: February 1, 2007Date of Patent: April 1, 2014Inventor: Jonathan Brian Vanasco
-
Patent number: 8683586Abstract: A fraud detection and protection method and system are disclosed. The method and system utilize a fraud detection and protection server to monitor online commercial transactions between a webserver and a client computer, and generate a risk assessment of a user associated with the client computer. The system and method further utilize a number of beacon servers geographically dispersed in an area. Each beacon server is configured to receive packet header information associated with the online commercial transactions, analyze the packet header information for authenticating information, and send the authenticating information to the fraud detection and protection server for the risk assessment.Type: GrantFiled: August 16, 2011Date of Patent: March 25, 2014Assignee: Fair Isaac CorporationInventor: Theodore J. Crooks
-
Patent number: 8673107Abstract: A method for labeling an object such as a biological sample, including printing at least two different light-emitting species onto a substrate which are capable of displaying a unique optical signature when excited; and externally attaching the object to the printed at least two different light-emitting species.Type: GrantFiled: October 30, 2006Date of Patent: March 18, 2014Assignee: Parallel Synthesis TechnologiesInventor: Robert C. Haushalter
-
Patent number: 8666841Abstract: A fraud detection system and method uses unique indicators for detecting fraud that extend beyond traditional transaction-based indicators. These unique indicators may include environmental information about a customer or a transaction. Such indicators may be used to identify fraud events based on computer-executable instructions that evaluate fraud risk. Further, an improved fraud detection system may include a learning component with a feedback loop. Also, authenticating and other information may be directed to the system for updating indicating data, fraud models, and risk assessments.Type: GrantFiled: February 26, 2009Date of Patent: March 4, 2014Assignee: Convergys Information Management Group, Inc.Inventors: Philip Geoffrey Claridge, Alastair David Hanlon, Marian Hatfield
-
Publication number: 20140058967Abstract: The present invention discloses a method for assisting a traveller in the preparation of visa applications. The method includes a step of collecting data for visa applications for one or more countries. In addition, user data of a traveller is stored in a database. Moreover, a visa application selected by the traveller is displayed on a computer. Further the selected application is automatically populated with stored user data.Type: ApplicationFiled: August 22, 2013Publication date: February 27, 2014Applicant: LHA R&D LLCInventor: Anh Hoang LUONG
-
Publication number: 20140046863Abstract: In a risk analysis system, a risk analysis engine and a related method, incident information or activity information, which may be of a spatiotemporal nature, is analyzed. Behavioral patterns are identified in or derived from the incident information or the activity information. Observations are produced from matches of the behavioral patterns to behavior specifications. Based upon the observations, and asset vulnerability data, per-asset risks are derived.Type: ApplicationFiled: February 22, 2013Publication date: February 13, 2014Applicant: THE JOHNS HOPKINS UNIVERSITYInventors: Christopher M. Gifford, Jeffrey S. Brush, Mark B. Gabriele
-
Publication number: 20140040154Abstract: A system and process performed by the system for identifying and tracking perpetrators of any of various types of crimes, including bullying, child pornography, sexual assault and rape, in reports which are anonymously reported to the system. The perpetrators can be of various categories, such as formally convicted, and/or formally charged and not convicted, and/or never been charged or not yet been caught, and therefore are without prior convictions or criminal records and are thereby not on law enforcement's radar. The system and process relies upon the reporting by a victim or a witness of information pertinent to an alleged criminal event. The identity of each reporting victim is never known to the system, unless the victim or witness goes to the police. The system uses a “double blind” method to protect the victim and certain details of the reported incident.Type: ApplicationFiled: August 5, 2013Publication date: February 6, 2014Inventor: Steven C. Webb
-
Publication number: 20140040155Abstract: An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed.Type: ApplicationFiled: October 15, 2013Publication date: February 6, 2014Inventors: Michael F. Buhrmann, Randall A. Snyder, Charles L. Dennis, Robert C. Boxberger, William M. Ferguson
-
Patent number: 8639635Abstract: A computer-implemented method for mortality tracking. The method includes electronically receiving contact information of a beneficiary of a life insurance policy. The method also includes electronically receiving a unique identifier of the policyholder of the life insurance policy. The method further includes periodically electronically searching mortality database records to obtain a periodic mortality search result. Upon occurrence of an aperiodic triggering event, the method may further aperiodically electronically search the mortality database records for the unique identifier of the policyholder to obtain an aperiodic mortality search result. The method may include verifying the deceased status of the policyholder upon occurrence of an indication that the policyholder being deceased according to the periodic mortality search result.Type: GrantFiled: October 11, 2012Date of Patent: January 28, 2014Assignee: Personal Estate Manager, Inc.Inventor: Stephen E. Wood
-
Patent number: 8639649Abstract: Given that a differentially private mechanism has a known conditional distribution, probabilistic inference techniques may be used along with the known conditional distribution, and generated results from previously computed queries on private data, to generate a posterior distribution for the differentially private mechanism used by the system. The generated posterior distribution may be used to describe the probability of every possible result being the correct result. The probability may then be used to qualify conclusions or calculations that may depend on the returned result.Type: GrantFiled: March 23, 2010Date of Patent: January 28, 2014Assignee: Microsoft CorporationInventors: Frank D. McSherry, Oliver M. C. Williams
-
Publication number: 20140019374Abstract: In accord with the present invention, a method is defined for an intelligent system to analyze potentially damaging information, and send special signals to users in real time, so as to alert potential victims and discourage predators. The present invention defines a method to intelligently process messages that are being sent through online chat sessions, so as to alert potential victims and discourage predators or pedophiles. The method uses intelligent systems that are loaded with a set of rules. By analyzing the messages against these rules, potentially damaging messages can be captured. Then, instructions can be triggered by the intelligent systems. As a result, graphic outputs will be displayed to alert potential victims and discourage predators. The services can be offered in real time.Type: ApplicationFiled: September 17, 2013Publication date: January 16, 2014Inventors: Ding Huang, Eckhard Kemmerer
-
Publication number: 20140012770Abstract: An improved checkpoint identification correlation system and method is described herein. In one embodiment, the method for performing background check can comprise storing military identification card information and civilian identification card information in a member profile, collecting data from a military identification card at a checkpoint, querying the database to locate the member profile comprising the military card information, and performing a background check query from one or more public information databases. In this method, the member profile can be in a database on a pass control application server. The background check can be performed using the civilian identification card information.Type: ApplicationFiled: July 9, 2012Publication date: January 9, 2014Inventor: Jeremy Keith Mattern
-
Publication number: 20130346333Abstract: The various implementations of the present invention are provided as a computer system configured to allow for sending requests for aid, responding to requests for aid, and receiving requests to aid in a multi-user environment. Various levels of requests may be requested. In one preferred embodiment of the present invention, a mobile application for integrating the options for requesting aid from a first device to a second is provided, as well as configuration of automated responses. The system allows certain users to post status updates to a website. While useful for many environments, the most preferred embodiments of the present invention are adapted for use in an educational environment to provide school administrators, teachers, parents, and students with enhanced communication capabilities.Type: ApplicationFiled: July 15, 2013Publication date: December 26, 2013Inventors: Bruce Hassler, Dane Dellenbach, John Graff, Jacob Hutchings, Kyle Stenson
-
Publication number: 20130332383Abstract: A Plant safety design assistance device (100) is configured by a communication device (140), a diagnostics and monitoring device (110), a fault inspection management device (120), and a design and manufacturing device (130) being interconnected via network (150). The diagnostics and monitoring device (110) receives plant status information (dc) from a plant control system (1) and carries out monitoring and diagnostics an the plant. The fault inspection management device (120) maintains fault inspection information (D2) of an apparatus which is used in the plant. The design and manufacturing device (130) maintains design and manufacturing information of the apparatus which is used in the plant. The design and manufacturing devise (130) receives the fault inspection information (D2) from the fault inspection management device (120), and carries out a plant safety design which takes the fault inspection information into account.Type: ApplicationFiled: August 25, 2011Publication date: December 12, 2013Inventors: Fumikado Anzai, Kenichi Morimoto, Yoshikane Yamanaka
-
Publication number: 20130332342Abstract: Various embodiments of this invention are directed towards a system and method for gathering, processing, authenticating and distributing personal information. Various embodiments of the invention disclose a system and method for gathering personal information from a plurality of sources and making the information available for entities that wish to evaluate or screen the individual. Various embodiments of the invention allow the individual to selectively grant permission to the various evaluating entities on specific background information that is stored within the system. Various embodiments allow the individual to submit information and finance the collection of information, whereby the individual can check the information for accuracy and collect commissions based on the access of the information by requesting entities.Type: ApplicationFiled: May 28, 2013Publication date: December 12, 2013Inventor: Sheldon Kasower
-
Publication number: 20130325704Abstract: Event management includes enrolling prospective participants by associating each participant with a profile. The profile includes the participant's attributes which are vetted automatically or by social networking means. A token is assigned to each profile which enables access to the profiles. An event is created and associated with event access control rules which correspond to various attributes. Access to the event involves scanning the token, accessing a participant's profile and testing attributes in the profile relative to the access control rules. The token can be re-used at different events having different access control rules.Type: ApplicationFiled: May 17, 2013Publication date: December 5, 2013Applicant: UT-Battelle, LLCInventors: Bryan L. Gorman, David R. Resseguie
-
Publication number: 20130304661Abstract: Methods, apparatus, systems and computer program products described and claimed that provide for automatically and positively determining that a customer interfacing with one business platform application using a platform-specific customer identifier is the same customer that is interfacing with another business platform application using another platform-specific customer identifier. Once the positive determination of same customer is made, a federated identifier key is generated and applied to all of the platforms, so as to globally identify the customer across multiple enterprise-wide platforms. As such, the present invention eliminates the labor-intensive need to manually analyze customer data to determine if a customer interfacing with one platform is the same customer interfacing with another platform.Type: ApplicationFiled: May 10, 2012Publication date: November 14, 2013Applicant: Bank of America CorporationInventors: Rangarajan Umamaheswaran, Bruce Wyatt Englar, Brett A. Nielson, Miroslav Halas
-
Publication number: 20130297364Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium are presented, for providing incident notifications. The systems and processes disclosed here automatically generate and send notifications relating to an incident in accordance with an enterprise's business rules and provide real time reporting of all communications relating to the incident.Type: ApplicationFiled: April 5, 2013Publication date: November 7, 2013Inventors: Cintawati W. Putra, Gaylene Sue Kelly, Geoffrey Paul Schemel, Michael James Doyle
-
Patent number: 8571902Abstract: An apparatus for and method of providing remote, self-service airport passenger check-in using a passenger verification provided by one or more personal identifiers, preferably a Personal Identification Number (PIN) and at least one biometric identifier. In the preferred mode, a remote check-in monitor is located in a passenger's hotel room or other convenient location. The passenger verification process requires between the personal identifier(s) and biometric identifier(s). Following passenger verification, the passenger is permitted to request a remotely printed boarding pass, remotely printed baggage claim tickets, etc. Details of the flight, such as seat selection, can also be defined or redefined from the remote site after successful passenger verification.Type: GrantFiled: April 18, 2003Date of Patent: October 29, 2013Assignee: Unisys CorporationInventors: Michael J. Glavan, Girish Gvalani, John A. Olson
-
Publication number: 20130282609Abstract: A method comprises receiving one or more images of a person from one or more image capture devices in response to an input, identifying one or more items of personal protective equipment in the one or more images, determining the positioning of the one or more items of personal protective equipment relative to the person in the one or more images, and verifying compliance with personal protective equipment standards based on the one or more identified items of personal protective equipment and the positioning of the one or more items of personal protective equipment.Type: ApplicationFiled: April 20, 2012Publication date: October 24, 2013Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Kwong Wing Au, Pedro Davalos, Sharath Venkatesha, Himanshu Khurana, Saad J. Bedros, Mohammed Ibrahim Mohideen, Mahesh Kumar Gellaboina, Adishesha CS, Cleopatra Cabuz
-
Publication number: 20130282607Abstract: A system and automated method for verification of employment history regarding a job applicant, the method including receiving information identifying an applicant, receiving employment history information for the job applicant, receiving information identifying an identified verification contact for verification of the employment history information, automatically providing the identified verification contact with a question pertaining to employment history information, receiving an answer from the identified verification contact, storing the answer.Type: ApplicationFiled: June 14, 2013Publication date: October 24, 2013Inventors: Michael B. Levine, Christopher Cirak
-
Patent number: 8566248Abstract: An initiator service executed by a host server manages communications with wireless client devices concerning information accounts centrally stored in a data repository. In response to authenticating a user of a wireless client device, the initiator service may prompt the user to specify information to be retrieved from his information account and to specify a recipient of the retrieved information. The initiator service may then manage the retrieval and distribution of the specified information. The initiator service may also interact with a wireless client device to establish and distribute temporary authorizations to access information accounts. The initiator service may further receive promotion codes from wireless client devices and may query databases for data associated with each promotion code. Data received from the database may be transferred by the initiator service into an information account owned by the user of the wireless client device.Type: GrantFiled: November 20, 2001Date of Patent: October 22, 2013Assignee: Grdn. Net Solutions, LLCInventors: Nick Steele, Stan Hawkins, Joe Maranville, Andrew Bradnan
-
Publication number: 20130275324Abstract: A system for managing incidents for a transit agency is disclosed, comprising an incident manager, configured to enable establishment and storage of one or more user profiles for one or more users, each profile indicating characteristics of transit incidents the user wishes to be notified of, create a transit incident having one or more incident characteristics, determine which users are to be notified of the transit incident based on their user profiles, and provide one or more notifications to the users that are to be notified.Type: ApplicationFiled: April 12, 2013Publication date: October 17, 2013Applicant: Trapeze Software ULCInventors: Matthew Carl GODDARD, Bruce PAYNE, David GAVIN, Damian BOWN
-
Publication number: 20130262333Abstract: A method for authenticating an identity of a test taker is provided. An online registration portal allows test takers to enter registration information including an uploaded picture. The registration information is sent to a trusted verifier, such as a school administrator or teacher, who verifies the picture matches the registration information. A secured registration ticket is then generated that includes the picture and one or more embedded security features. The registration ticket is mailed to the student in a tamper-evident enclosure with instructions to present the sealed mailer at the testing site for admission. The test proctors then unseal the registration document and confirm the authenticity of the registration ticket and that the person seeking entry matches the verified photo on the ticket before allowing entry.Type: ApplicationFiled: March 15, 2013Publication date: October 3, 2013Applicant: DOCUMENT SECURITY SYSTEMS, INC.Inventors: David Wicker, Michael Caton, Michael Roy, Timothy Trueblood, David Reitano, Nicole Acton
-
Patent number: 8548930Abstract: Embodiments of the invention are directed to a system, method, or computer program product for an institution provided data share platform. The institution provided data share platform allows customers and commercial partners to access data the institution may have. Specific platform data access may be limited and/or monitored by the institution to ensure customer safety and privacy compliance. Allowing access to the institution data provides a customer the means to create customized applications utilizing the data in combination with data provided by the customer. In return for access to the platform, the institution may recover assessments based on the application the customer creates.Type: GrantFiled: November 30, 2012Date of Patent: October 1, 2013Assignee: Bank of America CorporationInventor: Erik Stephen Ross
-
Publication number: 20130254130Abstract: The present invention provides Business methods to improve the internet based online business deal-matching and deal-making services, ecommerce websites information listing services, and other similar information services for Buyers, Sellers, Agents and Brokers in conducting business buys and sales by adding the process of screening, authentication, and verification as well as conducting the aforesaid process person in-person to maximize the value and protection of the services provided.Type: ApplicationFiled: March 21, 2012Publication date: September 26, 2013Inventors: Jay J. Lin, Jeffrey H. Lin
-
Publication number: 20130238518Abstract: A computer implemented method for an identity alert management system for interaction between a customer and a resolution specialist, having: on a computer device having one or more processors and a memory storing one or more programs for execution by the one or more processors, the one or more programs including instructions for: identifying personally identifiable information against elements of a customer's identity; automatically sending a communication to the customer within a specified time period; authenticating the customer through a secure identity management dashboard; permitting the customer to review a source of an identity alert and details associated with the alert; prompting the customer to mark the alert as a threat or not a threat; sending a record of the threat to an approved records system if the customer marks the alert as not a threat; and creating a case if the customer marks the alert as a threat.Type: ApplicationFiled: December 28, 2012Publication date: September 12, 2013Applicant: EZShield, Inc.Inventors: John E. Miller, Jeremy Waraska, Darrell Lee Laffoon
-
Publication number: 20130218795Abstract: A computer-implemented method for creating a network conglomerate system is provided. In exemplary embodiments, the method may comprise, at a computing device having one or more processors and memory storing one or more programs for execution by the one or more processors, receiving a request to create a user account from an entity; performing a security check to verify the identity of the entity; allowing the entity to enter general information about the entity if the identity of the entity is verified; receiving and storing the general information in a database and requesting specific information from the entity based on the general information entered by the entity; receiving and storing the specific information in the database enabling the network conglomerate system by generating and displaying a virtual tree based on the general information and the specific information, the tree comprising a virtual branch associated with at least one of a department and a skill.Type: ApplicationFiled: February 20, 2013Publication date: August 22, 2013Inventor: MICHEL RIENZO
-
Publication number: 20130218796Abstract: The present disclosure provides for securing user information involved in e-commerce transactions without encrypting that information. The e-commerce platform system generates the order ID of the seller and the buyer and stores a relationship between the order ID and a buyer ID. The e-commerce platform system receives, from a logistics information system, information about where the buyer resides and an area code of that location. This can be accomplished over open communication between the e-commerce platform and the logistics information systems without using encryption. The e-commerce platform system then identifies a distribution center located in the area where the buyer resides. The user information is identifies through a connection between the e-commerce platform and the logistics information system. With this technique, the seller cannot obtain the user information of the buyer and the user information of the buyer cannot be leaked, thereby increasing security.Type: ApplicationFiled: October 25, 2011Publication date: August 22, 2013Applicant: ALIBABA GROUP HOLDING LIMITEDInventor: Liang Feng
-
Publication number: 20130218797Abstract: Embodiment of the disclosed technology include systems and methods for identifying one or more entities associated with activities. In an example implementation, a method includes determining one or more geographical regions proximate to the plurality of locations associated with the one or more activities; determining connections between one or more identities of a population and a plurality of related entities associated with the one or more identities; determining geographical information associated with related entities; weighting one or more metrics for each of the identities based on the geographical information associated with the related entities and the or more geographical regions proximate to the plurality of locations associated with the one or more activities; scoring the one or more weighted metrics; and providing, based on the scoring, an indication of a likelihood that the one or more identities of the population are associated with the one or more activities.Type: ApplicationFiled: March 22, 2013Publication date: August 22, 2013Applicant: LexisNexis Risk Solutions FL Inc.Inventor: LexisNexis Risk Solutions FL Inc.
-
Publication number: 20130191300Abstract: The present invention relates to a safety management system including a JSA draw-up module configured to display a screen for drawing up a job safety analysis worksheet for job safety analysis (JSA) and to draw up the job safety analysis worksheet on the basis of the information inputted by a user; a storage module configured to store the job safety analysis worksheet drawn up by the JSA draw-up module into a database (DB) and to store task hazard information drawn up for each unit task that can be referred for the job safety analysis worksheet into a database; and a inventory module configured to manage the job safety analysis worksheet and the task hazard information stored in the storage module and to create a new job safety analysis worksheet and new task hazard information in accordance with a request from the JSA draw-up module, and a method thereof.Type: ApplicationFiled: December 7, 2011Publication date: July 25, 2013Applicant: KOREA GAS CORPORATIONInventors: Ik Keun Yoon, Shin-Kyu Oh, Sang Man Choi, Jae-Jin Lee, Bong-Young Lee, Wha-Seung Son
-
Patent number: 8494979Abstract: The present invention provides methods, systems and apparatus for detecting unknown scenarios in a data processing system. An example method includes the steps of: providing known scenario data describing one or more known scenarios in a database; generating element data depending on the known scenario data to form a set of elements, wherein each element is related to at least an actor and the behavior of the actor; computing subsets of elements by combining at least some of the elements of the set in dependence on their corresponding behavior; generating new scenario data related to new scenarios depending on the subsets of elements; and comparing the known scenario data with the new scenario data in order to identify the unknown scenarios.Type: GrantFiled: July 16, 2009Date of Patent: July 23, 2013Assignee: International Business Machines CorporationInventor: Birgit Baum-Waidner
-
Patent number: 8494974Abstract: A method of selecting security actions is provided. The method comprises estimating a maximum forecast loss, identifying general, sector specific, and targeted threats. The method further comprises forecasting a security loss based on the estimated maximum forecast loss and the threats, estimating a reduction in the security loss based on a first investment on a general threat countermeasure, on a second investment on a sector specific countermeasure, and on a third investment on a targeted threat countermeasure. The method further comprises allocating at least a portion of a security investment budget among the first, the second, and the third investments to maximize the estimated reduction in security loss. An aspect disclosed comprises a method that determines rates of return on security investment and selects security investments based on the rates of return. An aspect disclosed comprises a system for forecasting a security loss based on a security investment.Type: GrantFiled: January 18, 2010Date of Patent: July 23, 2013Assignee: iSIGHT Partners Inc.Inventors: John P. Watters, Frederick Doyle
-
Publication number: 20130179360Abstract: A computer implemented method for a provisional subscriber system for an identity management system, can comprise: on a computer device having one or more processors and a memory storing one or more programs for execution by the one or more processors, the one or more programs including instructions for: receiving information about a provisional subscriber from a partner; receiving information about the provisional subscriber from a customer; and authenticating the provisional subscriber as a valid customer based on a comparison of the information from the partner and the customer utilizing a core gateway system and a data processing engine system. Also, a computer system and a non-transitory computer-readable storage medium for the same.Type: ApplicationFiled: September 21, 2012Publication date: July 11, 2013Applicant: EZShield, Inc.Inventor: EZShield, Inc.
-
Publication number: 20130179244Abstract: A computer implemented method for a core gateway for an identity management system can comprise: on a computer device having one or more processors and a memory storing one or more programs for execution by the one or more processors, the one or more programs including instructions for: utilizing a content management system comprising a Framework and a Module; adding a Dimension at the Framework level of the content management system, wherein the Dimension is pervasive across all Modules of the content management system; and displaying content based on the Dimension of each Module. Also, a computer system and a non-transitory computer-readable storage medium for the same.Type: ApplicationFiled: September 21, 2012Publication date: July 11, 2013Applicant: EZShiesk, Inc.Inventor: EZShiesk, Inc.
-
Publication number: 20130179359Abstract: The invention generally relates to job safety analysis and systems for implementing job safety analyses. In certain aspects, the invention provides systems and methods for job safety analysis which includes one or more portable electronic devices configured to identify all participating workers and guide them through a thorough a job safety analysis review (JSA review) while also supplying captured information to a database in support of a JSA program.Type: ApplicationFiled: February 22, 2012Publication date: July 11, 2013Applicant: PSC INDUSTRIAL OUTSOURCING, LPInventors: James K. Burns, Randall D. Decker
-
Patent number: 8483448Abstract: Methods are presented for facilitating sales transactions by electronic media. A temporary barcode or other design is affixed to the person or personal object during the period of time for which a financial transaction might occur. Before the sales transaction can be consummated, the barcode information is scanned and characteristics about the scanned code are compared to characteristics about other codes stored in a database for the specific time period in question in order to verify the identity of the buyer for a given time period. Once the information is verified, the seller may be authorized to debit the buyer's electronic bank account or charge their charge card account to consummate the transaction or transactions during a period of time. The seller may transmit the buyer's barcode and the buyer transmit the seller's barcode to a clearance center, where the buyer has a smartphone capable of scanning the seller's code.Type: GrantFiled: November 17, 2009Date of Patent: July 9, 2013Assignee: Scanable, Inc.Inventor: Thomas W. Heeter
-
Patent number: 8464358Abstract: Portable on-line identity verification technology includes, for example, portable widgets with an identity rating, and other on-line identification verification icons and identity rating scores.Type: GrantFiled: December 8, 2010Date of Patent: June 11, 2013Inventor: Lewis Farsedakis
-
Patent number: 8458090Abstract: A method, an apparatus and an article of manufacture for detecting a fraudulent mobile money transaction. The method includes determining a reputation score for at least one customer based on historical data, determining multiple patterns related to fraudulent mobile money transaction activities by using the reputation score and the historical data, automatically detecting at least one of the patterns in mobile money transactions incoming from at least one other customer, and classifying the at least one detected pattern as a fraudulent mobile money transaction or a genuine mobile money transaction.Type: GrantFiled: April 18, 2012Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Vishal S. Batra, Dinesh Garg, Ravi Kothari, Raghuram Krishnapuram, Sumit Negi, Gyana R. Parija