Personal Security, Identity, Or Safety Patents (Class 705/325)
-
Publication number: 20140279642Abstract: Systems and methods for automatic enrollment and identity verification based upon processing a captured image of a document are disclosed herein. Various embodiments enable, for example, a user to enroll in a particular service by taking a photograph of a particular document (e.g., his driver license) with a mobile device. One or more algorithms can then extract relevant data from the captured image. The extracted data (e.g., the person's name, gender, date of birth, height, weight, etc.) can then be used to automatically populate various fields of an enrollment application, thereby reducing the amount of information that the user has to manually input into his mobile device in order to complete the enrollment process. In some embodiments, a set of internal and/or external checks can be run against the data to ensure that the data is valid, has been read correctly, and is consistent with other data.Type: ApplicationFiled: March 17, 2014Publication date: September 18, 2014Applicant: MITEK SYSTEMS, INC.Inventors: Mike Strange, James DeBello, Mike Diamond
-
Publication number: 20140279640Abstract: The present disclosure describes systems, methods, and apparatuses for identifying a person of interest. An exemplary method may comprise storing external data received from a variety external sources into a parameterized table, creating a first set of category views on the parameterized table, creating a second set of category views based at least in part on data to be derived from a traveler's personal information to be received, receiving the traveler's personal information generated by an input device and determining whether the traveler is a person of interest by evaluating the personal information against one or more pre-defined profiles using the first and second sets of category views. Each of the one or more pre-defined profiles may comprise one or more rules and a threshold value for determining a likelihood for the traveler to be matched in each of the one or more pre-defined profiles.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Inventors: Marcelo Martin Motta MORENO, Hsiang-yi YU, Mohandas VENKOBDAS, Seth Stuart HIRSCH
-
Publication number: 20140279532Abstract: The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.Type: ApplicationFiled: March 10, 2014Publication date: September 18, 2014Inventor: Christophe Tremlet
-
Publication number: 20140258162Abstract: Techniques to block records for matching are described. Some embodiments are particularly directed to techniques to block records for matching entities with inconsistent identifying information. In one embodiment, for example, an apparatus may comprise a configuration component, a coding component, a blocking component, and a matching component. The configuration component may be operative to receive a data set comprising a plurality of records and operative to receive a set of blocking variables, the blocking variables present as variables in each of the plurality of records. The coding component operative to generate match codes based on the blocking variables. The blocking component operative on the processor circuit to produce a plurality of blocks of records from the data set based on the match codes.Type: ApplicationFiled: March 10, 2014Publication date: September 11, 2014Applicant: SAS INSTITUTE INC.Inventors: Ned Maran, Jin-Whan Jung, Leslie Sall
-
Publication number: 20140250026Abstract: The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations. The method updates the identity profiles with the gathered identity information, and based on the gathered identity information, generates an identity confidence score associated with each identity profile.Type: ApplicationFiled: May 13, 2014Publication date: September 4, 2014Applicant: The Western Union CompanyInventor: Matthew Leland Dill
-
Publication number: 20140244510Abstract: Disclosed herein are privacy protection systems and related methods for providing subscribers of the system or method, such as credit card issuers, banks, etc., independent verification of the identity of individuals attempting to do business with the subscriber. The independent verification disclosed herein does not rely solely on the information accessible or maintained by an entity that issued a piece of identification data to the individual. Instead, disclosed systems and methods may not only check with the entity that issued the piece(s) of identification data presented by a user to identify himself, but also may review the records of that issuing entity such that older records can be actively compared to current records in an effort to determine if the currently issued identification data is correct.Type: ApplicationFiled: May 7, 2014Publication date: August 28, 2014Inventor: Raymond de Beasley
-
Patent number: 8818882Abstract: Methods and system for determining reputation information are provided. The method includes analyzing transactional and non-transactional information for an alias associated with an entity and determining reputation information for that alias. The reputation information is transferable across multiple domains. A user can request the reputation information about an entity prior to doing business with that entity. The reputation information is generated for merchants as well as users. The system can generate transaction risk score for every transaction to be conducted between two or more aliases. The system includes an alias identity and reputation validation server computer that receives inputs from various external systems and generated reputation information based on the inputs. Additionally, every individual user/merchant can manage his profile within the reputation database and enter some information manually.Type: GrantFiled: July 29, 2010Date of Patent: August 26, 2014Assignee: Visa International Service AssociationInventors: Mark Carlson, Patrick Stan, Patrick Faith, Benjamin Rewis
-
Patent number: 8819020Abstract: A computer implemented method, apparatus, and computer usable program product for ranking and categorizing criminal offenders in a jurisdiction. In one embodiment, external data associated with the offenders is processed in a set of data models to generate a ranking index of criminal offenders. The external data comprises offender data elements related to prior arrests. The computer software and web application enables officers, detectives, and supervisors to research the offenders in their jurisdiction. They can intentionally track and monitor the status of the offenders that are not currently incarcerated. They can deliberately increase lawful contacts with these high-rate and treacherous offenders.Type: GrantFiled: April 27, 2012Date of Patent: August 26, 2014Inventors: Daniel Scott Jenkins, Brandon Matthew Rana
-
Publication number: 20140236853Abstract: Methods, devices, and systems for processing contact information are provided. A request for generating virtual contact information can be received from a terminal. According to the request for generating virtual contact information, real contact information that is preset can be obtained. According to the real contact information, the virtual contact information can be generated. The virtual contact information can be sent to the terminal for a user to use.Type: ApplicationFiled: March 31, 2014Publication date: August 21, 2014Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: ZHENZHEN JIANG
-
Publication number: 20140222707Abstract: A networked system for managing commercial interactions is providing. In some embodiments, the system includes: a bundle-passing interface between a plurality of networked users including distribution logic including a distribution control input responsive to machine-readable information in the bundles; and a statistics collection engine including a control input responsive to machine-readable information in the bundles.Type: ApplicationFiled: April 11, 2014Publication date: August 7, 2014Applicant: THOMSON FINANCIAL LLCInventors: BOB LAMOUREUX, PAUL JAMINET, EDWARD SHEA, ALEXIS KOPIKIS, JOHN CONSTANTINE, MATTHEW KUNTZ, TODD BREMNER, ZENOBIA MOOCHHALA
-
Publication number: 20140222706Abstract: A system architecture is disclosed that includes a privacy management system. In particular, the privacy management system provides a policy hub for maintaining and managing customer privacy information. The privacy management system maintains a master data database for customer information and customer privacy preferences, and a rules database for privacy rules. The privacy management system captures, synchronizes, and stores customer privacy data. Privacy rules may be authored using a privacy management vocabulary, and can be customized for an enterprise's privacy policies.Type: ApplicationFiled: December 9, 2013Publication date: August 7, 2014Applicant: Oracle International CorporationInventors: Hwee Har Yeap, Catherine You, Qin Lu, Jane Li, Weiwei Hsieh, Lindy H. Chan
-
Patent number: 8775328Abstract: A method and system an online neighborhood social network designed to create private websites to facilitate communication among neighbors and build stronger neighborhoods. The private websites are embodied in a website having a domain name of nextdoor.com. In one embodiment, a method verifies that a user lives at a residence associated with a residential address claimed by the user of an online neighborhood social network. The method restricts access to a particular neighborhood to the user and to neighboring users living within the neighborhood boundary of the residence. A social network page of the user is created once verified and access privileges are determined. A message is distributed to neighboring users that are verified to live within a neighborhood boundary of the residence. The method may designate the user as a lead user with an additional privilege based on a participation level of the user in the online community.Type: GrantFiled: March 10, 2014Date of Patent: July 8, 2014Inventor: Raj Abhyanker
-
Publication number: 20140188745Abstract: A dynamic identity matching facility that enables an operator to determine the status of an individual based on identification information contained on an identification record provided by the individual. The operator scans the individual's identification information from the identification record using a scanning device. The facility decodes the scanned identification information and identifies a number of candidates based on the decoded identification information. For each identified candidate, the facility generates a candidate score. Based on the candidate score of each identified candidate, the facility selects a number of the identified candidates for display. The facility displays the selected candidates to the operator along with the candidate's criminal or other acts.Type: ApplicationFiled: December 31, 2013Publication date: July 3, 2014Applicant: Intellicheck Mobilisa, Inc.Inventors: Nelson Ludlow, Steve Zehm
-
Publication number: 20140188744Abstract: Systems and methods for electronically managing the process of requesting, giving, and receiving personal references are provided. Personal information, particularly contact information, is received by a computer system from a candidate seeking a personal reference. Some of this information is forwarded to a personal reference giver to request that a personal reference regarding the candidate be given. The personal reference information is received by the computer system. The candidate and reference giver may access the personal received personal reference information. The personal reference information can then be sent to a recipient. The candidate and reference giver can be contacted when the recipient has accessed, reviewed, or modified the personal reference information. Access to the personal information of the candidate and the personal reference information from the personal reference giver can be based on a comparison with a set of rules and permissions.Type: ApplicationFiled: December 23, 2013Publication date: July 3, 2014Applicant: MyInput.com, Inc.Inventor: Alan Nazarelli
-
Patent number: 8768856Abstract: A system and method for distributing information regarding a child abduction. More particularly, a system and method for distributing AMBER alert information via a computer system network to consumers at retail stores. AMBER alert distribution criteria is used to determine what retail stores to transmit the AMBER alert information to, and CID criteria is used to determine what consumers within those retail stores to transmit the information to. As time progresses the AMBER alert information is distributed to retail stores in a larger geographic scope.Type: GrantFiled: June 16, 2005Date of Patent: July 1, 2014Assignee: Catalina Marketing CorporationInventor: Roy Simrell
-
Publication number: 20140180950Abstract: The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private personal data preferably held on behalf of persons or entities. The system provides the applications, processes, controls and data management services to collect, transfer, store and selectively retrieve data necessary to perform specified planning and decision support activities, that have been integrated with the secure data store. The invention provides for the data owner and authorized persons to gain access to accessible data to undertake permitted tasks. These tasks may include receiving data, or undertaking planning, or such other tasks as prescribed. In an embodiment, the system limits access to applications to authorized persons and requires permissions from the owner in order to manage data privacy standards. The system allows the owner to provide and revoke access to applications and tracks and records all access events.Type: ApplicationFiled: July 17, 2013Publication date: June 26, 2014Inventors: Trevor Sinclair, Paul J. David, Andrew Sherman, Paul Quirk
-
Patent number: 8762876Abstract: A communication device, which is capable of presenting one or more of a plurality of virtual keyboards, may be operable to receive application content. The application content may require a user to enter particular data via one of the plurality of virtual keyboards. The plurality of virtual keyboards may comprise a system keyboard and one or more third-party keyboards. The communication device may be operable to determine whether the particular data to be entered by the user may comprise sensitive personal information associated with the user. Based on the determination of the personal information and/or based on a configuration option communicated from the user, the communication device may be operable to determine whether to cause presentation of the system keyboard for the user to enter the particular data. The communication device may cause presentation of the system keyboard by disabling the one or more third-party keyboards.Type: GrantFiled: June 21, 2012Date of Patent: June 24, 2014Assignee: Google Inc.Inventor: Diego Puppin
-
Patent number: 8762288Abstract: The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations. The method updates the identity profiles with the gathered identity information, and based on the gathered identity information, generates an identity confidence score associated with each identity profile.Type: GrantFiled: April 22, 2009Date of Patent: June 24, 2014Assignee: The Western Union CompanyInventor: Matthew Leland Dill
-
Patent number: 8756703Abstract: A method for protecting a user's privacy, wherein the user operates a communication device capable of processing context and wherein the user provides context information—real context—related to one or more reference context variables to a third party, is characterized in the steps of faking at least one of the one or more reference context variables, on the basis of the faked reference context variable, gathering real context information—decoy context—related to reference context variables other than the faked reference context variable, publishing the thus generated decoy context instead of the user's real context. In addition, a corresponding communication device is disclosed.Type: GrantFiled: March 5, 2008Date of Patent: June 17, 2014Assignee: NEC Europe Ltd.Inventors: Ernoe Kovacs, Miguel Martin Lopez, Martin Bauer
-
Patent number: 8751265Abstract: An apparatus for management of information for use in mitigating an emergency includes a data storage element configured to store registrant information obtained from members of a population residing in a particular geographic area and a set of survey questions, and a data storage system, the data storage system being programmed to implement a survey editor for enabling an emergency management official to create a survey for soliciting information from the members for inclusion in the registrant information, the survey editor providing, to the emergency management official, an interface for selecting a subset of questions from the set of questions, the subset of questions being selected from the set of questions based at least in part on the particular geographic area, and a survey portal for receiving, from the member, a response to the survey for integration into the reference data.Type: GrantFiled: February 6, 2013Date of Patent: June 10, 2014Assignee: Rave Wireless, Inc.Inventors: William T. Piett, Matthew A. Serra, Noah J. Reiter
-
Patent number: 8751394Abstract: As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (SMS, MMS, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.Type: GrantFiled: November 24, 2008Date of Patent: June 10, 2014Assignee: Sybase 365, Inc.Inventors: William H. Dudley, Marc R. Landrum, Robert C. Lovell, Jr.
-
Publication number: 20140156412Abstract: Techniques for scanning products and providing information about those products are provided. In one technique, ingredient names in a digital image are recognized, the ingredients are analyzed for their respective toxicity ratings, and one or more ingredient names in the digital image are highlighted to show which ingredients are considered safe or unsafe. In another technique, an overall rating for a product is calculating solely based on information about ingredients found in the product and that overall rating is displayed on a computing device. In another technique, a user provides input that indicates one or more products that the user has scanned or allegedly purchased or used. Other users are allowed to view those products if, for example, the user gives his/her permission. In another technique, geographic information of a mobile device is used to identify a product that may be relevant to a user of the mobile device.Type: ApplicationFiled: December 4, 2013Publication date: June 5, 2014Applicant: Good Clean Collective, Inc.Inventor: Lily Tse
-
Patent number: 8745728Abstract: Methods, apparatus, systems and computer program products are described and claimed that provide for automatically and positively determining that an associate accessing a business domain/application using an application-specific associate identifier is the same associate that is accessing another business domain/application using another application-specific associate identifier. Once the positive determination of same associate is made, a federated identifier key is generated and applied to all of the platforms in which the associate can be positively identified, so as to globally identify the associates across multiple enterprise-wide domains/applications. As such, the present invention eliminates the need to manually analyze associate data to determine if an associate interfacing with one domain/application is the same associate interfacing with another domain/application.Type: GrantFiled: May 10, 2012Date of Patent: June 3, 2014Assignee: Bank of America CorporationInventors: Rangarajan Umamaheswaran, Bruce Wyatt Englar, Brett A. Nielson, Miroslav Halas
-
Publication number: 20140149304Abstract: Certain embodiments of the disclosed technology may include systems and methods for detecting fraud. According to an implementation of the disclosed technology, a method is provided that includes: receiving entity-supplied information including at least a name, a social security number, and a mailing address associated with a request for a payment or a benefit from a government agency; querying one or more public or private databases with the entity-supplied information; receiving a plurality of independent information in response to the querying; determining, based at least in part on a comparison of the entity-supplied information with at least a portion of the plurality of independent information, indicators of fraud; and outputting, for display, zero or more indicators of fraud.Type: ApplicationFiled: February 3, 2014Publication date: May 29, 2014Applicant: LexisNexis Risk Solutions FL Inc.Inventors: Andrew John Bucholz, Scott M. Straub, Monty Faidley, Johannes Philippus de Villiers Prichard, Jesse CBD Shaw, Dermot O'Mahony, David Yeschek, Jennifer Paganacci, Marlene Thorogood, Mark Loizzo
-
Patent number: 8738488Abstract: A method for a business customer interfacing with a financial institution through a computer network is presented. The method includes an early warning evaluation of the customer and/or entities associated with the customer to identify fraudster/abusers and prevent them from opening online accounts at the financial institution.Type: GrantFiled: October 21, 2009Date of Patent: May 27, 2014Assignee: Branch Banking & Trust CompanyInventors: Lori Hall, Alicia Silla, Teresa Rose
-
Patent number: 8738545Abstract: A method, apparatus and system of map based neighborhood search and community contribution are disclosed. In one embodiment, a neighborhood communication system is described. This embodiment includes a privacy server to apply an address verification algorithm associated with each user of the online community to verify that each user lives at a residence associated with a claimable residential address of an online community formed through a social community module of the privacy server using a processor and a memory. The privacy server automatically determines a set of access privileges in the online community associated with each user of the online community by constraining access in the online community based on a neighborhood boundary determined using an algorithm of the privacy server. The privacy server may constrain the particular user to communicate through the online community only with a set of neighbors having verified addresses using the privacy server.Type: GrantFiled: December 31, 2013Date of Patent: May 27, 2014Inventor: Raj Abhyanker
-
Publication number: 20140129473Abstract: A method for utilizing firearm discharge data in a crime reporting and tracking database, includes: recording one or more discharges of a firearm; transmitting information from the discharging firearm to a crime reporting and tracking database; utilizing the transmitted information to establish relationships between the discharged firearm, committed crimes, and missing persons within the crime reporting and tracking database; and wherein the recording and transmitting is carried out by devices within the firearm.Type: ApplicationFiled: January 10, 2014Publication date: May 8, 2014Applicant: International Business Machines CorporationInventors: Wayne M. Delia, Edward E. Kelley
-
Patent number: 8713450Abstract: Embodiments of the invention provide techniques for detecting patterns of abuse in users of a virtual world. The patterns of abuse may be detected by examining records of inappropriate interactions between users. Subsequently, preventative actions may be taken to prevent further abuse. The preventative actions may include blocking access to all or part of the virtual world, blocking interactions with other users, warning other users, or notifying authorities of the behavior of the other user.Type: GrantFiled: January 8, 2008Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Zachary Adam Garbow, Linda Irene Larson, Candace Trielle Pederson
-
Publication number: 20140108284Abstract: A computer system for securely managing personal information. The computer system comprising a computer configured to receive and store personal information of a monitored individual to monitor the use of the computer by the monitored individual to obtain an activity or inactivity status, and to automatically and electronically transmit an inactivity notification to the monitored individual based on the occurrence of an inactivity status to obtain a response to the inactivity notification.Type: ApplicationFiled: December 18, 2013Publication date: April 17, 2014Applicant: Personal Estate Manager, Inc.Inventor: Stephen E. Wood
-
Patent number: 8700523Abstract: Systems, methods and computer program products for enabling a holder of a transaction account linked to a financial transaction instrument to delegate management of the transaction account to an assistant. Information relating to the transaction account, including at least identification information relating to the holder of the transaction account, is stored in a database. The database stores financial transaction data relating to financial transactions performed using the financial transaction instrument. A designation of at least one assistant to manage the transaction account on behalf of the holder is accepted and stored. Assistant management authentication data associated with the transaction account is established, to be used by the assistant to execute management instructions at a designated level of management access. An instruction from the assistant is accepted to access transaction data associated with the transaction account.Type: GrantFiled: October 11, 2005Date of Patent: April 15, 2014Assignee: American Express Travel Related Services Company, Inc.Inventors: Brent M. Edwards, Marc C. Rosenfeld, Robert J. Sondermeyer, Jane H. C. Thompson, Andre R. Wright
-
Publication number: 20140095403Abstract: Methods and apparatus for managing safety information are disclosed. In an embodiment, a computing device, or any other suitable device or system, receives employee identification information and associated job site location information (e.g., employee ID and job site location ID). The computing device then receives job site evaluation information including a selection from a user of a job site safety attribute that is associated with the job site (e.g., flammable materials present). The computing device also receives safety inspection information associated with the job site safety attribute (e.g., fire extinguishers in place). The computing device displays job site safety briefing information associated with the employee identification information and the job site safety attribute (e.g., employee warned about fire hazard). The computing device receives incident information associated with the employee identification information and the job site safety attribute (e.g., employee burned).Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Applicant: SIMS IP HOLDINGS, LLCInventor: Angelia Hopson
-
Patent number: 8688710Abstract: A content management system manages data about entities and provides content including data about the entities. The content management system receives data about entities from originators associated with the entities. The content management system classifies the data and stores the classified data. The content management system may authenticate the data by determining an authenticator of the classified data. The authenticator may be the most appropriate person to authenticate the data. The content management system may determine an authenticator by determining the entity most related to the classified data and determining an originator representing or designated to authenticate the information. As such, the content management system may determine the originator in the best position to authenticate the data. The content management system may also receive a request from subscribers for content and create the content in response to the request.Type: GrantFiled: February 1, 2007Date of Patent: April 1, 2014Inventor: Jonathan Brian Vanasco
-
Patent number: 8683586Abstract: A fraud detection and protection method and system are disclosed. The method and system utilize a fraud detection and protection server to monitor online commercial transactions between a webserver and a client computer, and generate a risk assessment of a user associated with the client computer. The system and method further utilize a number of beacon servers geographically dispersed in an area. Each beacon server is configured to receive packet header information associated with the online commercial transactions, analyze the packet header information for authenticating information, and send the authenticating information to the fraud detection and protection server for the risk assessment.Type: GrantFiled: August 16, 2011Date of Patent: March 25, 2014Assignee: Fair Isaac CorporationInventor: Theodore J. Crooks
-
Patent number: 8673107Abstract: A method for labeling an object such as a biological sample, including printing at least two different light-emitting species onto a substrate which are capable of displaying a unique optical signature when excited; and externally attaching the object to the printed at least two different light-emitting species.Type: GrantFiled: October 30, 2006Date of Patent: March 18, 2014Assignee: Parallel Synthesis TechnologiesInventor: Robert C. Haushalter
-
Patent number: 8666841Abstract: A fraud detection system and method uses unique indicators for detecting fraud that extend beyond traditional transaction-based indicators. These unique indicators may include environmental information about a customer or a transaction. Such indicators may be used to identify fraud events based on computer-executable instructions that evaluate fraud risk. Further, an improved fraud detection system may include a learning component with a feedback loop. Also, authenticating and other information may be directed to the system for updating indicating data, fraud models, and risk assessments.Type: GrantFiled: February 26, 2009Date of Patent: March 4, 2014Assignee: Convergys Information Management Group, Inc.Inventors: Philip Geoffrey Claridge, Alastair David Hanlon, Marian Hatfield
-
Publication number: 20140058967Abstract: The present invention discloses a method for assisting a traveller in the preparation of visa applications. The method includes a step of collecting data for visa applications for one or more countries. In addition, user data of a traveller is stored in a database. Moreover, a visa application selected by the traveller is displayed on a computer. Further the selected application is automatically populated with stored user data.Type: ApplicationFiled: August 22, 2013Publication date: February 27, 2014Applicant: LHA R&D LLCInventor: Anh Hoang LUONG
-
Publication number: 20140046863Abstract: In a risk analysis system, a risk analysis engine and a related method, incident information or activity information, which may be of a spatiotemporal nature, is analyzed. Behavioral patterns are identified in or derived from the incident information or the activity information. Observations are produced from matches of the behavioral patterns to behavior specifications. Based upon the observations, and asset vulnerability data, per-asset risks are derived.Type: ApplicationFiled: February 22, 2013Publication date: February 13, 2014Applicant: THE JOHNS HOPKINS UNIVERSITYInventors: Christopher M. Gifford, Jeffrey S. Brush, Mark B. Gabriele
-
Publication number: 20140040155Abstract: An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed.Type: ApplicationFiled: October 15, 2013Publication date: February 6, 2014Inventors: Michael F. Buhrmann, Randall A. Snyder, Charles L. Dennis, Robert C. Boxberger, William M. Ferguson
-
Publication number: 20140040154Abstract: A system and process performed by the system for identifying and tracking perpetrators of any of various types of crimes, including bullying, child pornography, sexual assault and rape, in reports which are anonymously reported to the system. The perpetrators can be of various categories, such as formally convicted, and/or formally charged and not convicted, and/or never been charged or not yet been caught, and therefore are without prior convictions or criminal records and are thereby not on law enforcement's radar. The system and process relies upon the reporting by a victim or a witness of information pertinent to an alleged criminal event. The identity of each reporting victim is never known to the system, unless the victim or witness goes to the police. The system uses a “double blind” method to protect the victim and certain details of the reported incident.Type: ApplicationFiled: August 5, 2013Publication date: February 6, 2014Inventor: Steven C. Webb
-
Patent number: 8639635Abstract: A computer-implemented method for mortality tracking. The method includes electronically receiving contact information of a beneficiary of a life insurance policy. The method also includes electronically receiving a unique identifier of the policyholder of the life insurance policy. The method further includes periodically electronically searching mortality database records to obtain a periodic mortality search result. Upon occurrence of an aperiodic triggering event, the method may further aperiodically electronically search the mortality database records for the unique identifier of the policyholder to obtain an aperiodic mortality search result. The method may include verifying the deceased status of the policyholder upon occurrence of an indication that the policyholder being deceased according to the periodic mortality search result.Type: GrantFiled: October 11, 2012Date of Patent: January 28, 2014Assignee: Personal Estate Manager, Inc.Inventor: Stephen E. Wood
-
Patent number: 8639649Abstract: Given that a differentially private mechanism has a known conditional distribution, probabilistic inference techniques may be used along with the known conditional distribution, and generated results from previously computed queries on private data, to generate a posterior distribution for the differentially private mechanism used by the system. The generated posterior distribution may be used to describe the probability of every possible result being the correct result. The probability may then be used to qualify conclusions or calculations that may depend on the returned result.Type: GrantFiled: March 23, 2010Date of Patent: January 28, 2014Assignee: Microsoft CorporationInventors: Frank D. McSherry, Oliver M. C. Williams
-
Publication number: 20140019374Abstract: In accord with the present invention, a method is defined for an intelligent system to analyze potentially damaging information, and send special signals to users in real time, so as to alert potential victims and discourage predators. The present invention defines a method to intelligently process messages that are being sent through online chat sessions, so as to alert potential victims and discourage predators or pedophiles. The method uses intelligent systems that are loaded with a set of rules. By analyzing the messages against these rules, potentially damaging messages can be captured. Then, instructions can be triggered by the intelligent systems. As a result, graphic outputs will be displayed to alert potential victims and discourage predators. The services can be offered in real time.Type: ApplicationFiled: September 17, 2013Publication date: January 16, 2014Inventors: Ding Huang, Eckhard Kemmerer
-
Publication number: 20140012770Abstract: An improved checkpoint identification correlation system and method is described herein. In one embodiment, the method for performing background check can comprise storing military identification card information and civilian identification card information in a member profile, collecting data from a military identification card at a checkpoint, querying the database to locate the member profile comprising the military card information, and performing a background check query from one or more public information databases. In this method, the member profile can be in a database on a pass control application server. The background check can be performed using the civilian identification card information.Type: ApplicationFiled: July 9, 2012Publication date: January 9, 2014Inventor: Jeremy Keith Mattern
-
Publication number: 20130346333Abstract: The various implementations of the present invention are provided as a computer system configured to allow for sending requests for aid, responding to requests for aid, and receiving requests to aid in a multi-user environment. Various levels of requests may be requested. In one preferred embodiment of the present invention, a mobile application for integrating the options for requesting aid from a first device to a second is provided, as well as configuration of automated responses. The system allows certain users to post status updates to a website. While useful for many environments, the most preferred embodiments of the present invention are adapted for use in an educational environment to provide school administrators, teachers, parents, and students with enhanced communication capabilities.Type: ApplicationFiled: July 15, 2013Publication date: December 26, 2013Inventors: Bruce Hassler, Dane Dellenbach, John Graff, Jacob Hutchings, Kyle Stenson
-
Publication number: 20130332342Abstract: Various embodiments of this invention are directed towards a system and method for gathering, processing, authenticating and distributing personal information. Various embodiments of the invention disclose a system and method for gathering personal information from a plurality of sources and making the information available for entities that wish to evaluate or screen the individual. Various embodiments of the invention allow the individual to selectively grant permission to the various evaluating entities on specific background information that is stored within the system. Various embodiments allow the individual to submit information and finance the collection of information, whereby the individual can check the information for accuracy and collect commissions based on the access of the information by requesting entities.Type: ApplicationFiled: May 28, 2013Publication date: December 12, 2013Inventor: Sheldon Kasower
-
Publication number: 20130332383Abstract: A Plant safety design assistance device (100) is configured by a communication device (140), a diagnostics and monitoring device (110), a fault inspection management device (120), and a design and manufacturing device (130) being interconnected via network (150). The diagnostics and monitoring device (110) receives plant status information (dc) from a plant control system (1) and carries out monitoring and diagnostics an the plant. The fault inspection management device (120) maintains fault inspection information (D2) of an apparatus which is used in the plant. The design and manufacturing device (130) maintains design and manufacturing information of the apparatus which is used in the plant. The design and manufacturing devise (130) receives the fault inspection information (D2) from the fault inspection management device (120), and carries out a plant safety design which takes the fault inspection information into account.Type: ApplicationFiled: August 25, 2011Publication date: December 12, 2013Inventors: Fumikado Anzai, Kenichi Morimoto, Yoshikane Yamanaka
-
Publication number: 20130325704Abstract: Event management includes enrolling prospective participants by associating each participant with a profile. The profile includes the participant's attributes which are vetted automatically or by social networking means. A token is assigned to each profile which enables access to the profiles. An event is created and associated with event access control rules which correspond to various attributes. Access to the event involves scanning the token, accessing a participant's profile and testing attributes in the profile relative to the access control rules. The token can be re-used at different events having different access control rules.Type: ApplicationFiled: May 17, 2013Publication date: December 5, 2013Applicant: UT-Battelle, LLCInventors: Bryan L. Gorman, David R. Resseguie
-
Publication number: 20130304661Abstract: Methods, apparatus, systems and computer program products described and claimed that provide for automatically and positively determining that a customer interfacing with one business platform application using a platform-specific customer identifier is the same customer that is interfacing with another business platform application using another platform-specific customer identifier. Once the positive determination of same customer is made, a federated identifier key is generated and applied to all of the platforms, so as to globally identify the customer across multiple enterprise-wide platforms. As such, the present invention eliminates the labor-intensive need to manually analyze customer data to determine if a customer interfacing with one platform is the same customer interfacing with another platform.Type: ApplicationFiled: May 10, 2012Publication date: November 14, 2013Applicant: Bank of America CorporationInventors: Rangarajan Umamaheswaran, Bruce Wyatt Englar, Brett A. Nielson, Miroslav Halas
-
Publication number: 20130297364Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium are presented, for providing incident notifications. The systems and processes disclosed here automatically generate and send notifications relating to an incident in accordance with an enterprise's business rules and provide real time reporting of all communications relating to the incident.Type: ApplicationFiled: April 5, 2013Publication date: November 7, 2013Inventors: Cintawati W. Putra, Gaylene Sue Kelly, Geoffrey Paul Schemel, Michael James Doyle
-
Patent number: 8571902Abstract: An apparatus for and method of providing remote, self-service airport passenger check-in using a passenger verification provided by one or more personal identifiers, preferably a Personal Identification Number (PIN) and at least one biometric identifier. In the preferred mode, a remote check-in monitor is located in a passenger's hotel room or other convenient location. The passenger verification process requires between the personal identifier(s) and biometric identifier(s). Following passenger verification, the passenger is permitted to request a remotely printed boarding pass, remotely printed baggage claim tickets, etc. Details of the flight, such as seat selection, can also be defined or redefined from the remote site after successful passenger verification.Type: GrantFiled: April 18, 2003Date of Patent: October 29, 2013Assignee: Unisys CorporationInventors: Michael J. Glavan, Girish Gvalani, John A. Olson