G06Q30/00

CONTINUOUS AND ANONYMOUS RISK EVALUATION

Techniques for risk evaluation include receiving, from a requesting entity, a request for monitoring target entities specifying a first identifier associated with each target entity and target entity information. The system generates a second identifier and a third identifier for each target entity and stores a mapping of the second identifiers to the first identifiers and the third identifiers, preventing the second identifiers from being provided to the requesting entity. The system monitors a periodically updated data set and determines risk metrics for the target entities, comparing each risk metric to a threshold value to identify target entities whose risk data indicates an insider threat. The system generates a third identifier for the identified target entities and provides the third identifiers to the requesting entity. Responsive to a request for a corresponding first identifier, the system identifies and provides the first and third identifiers to the requesting entity.

PROVIDING GLOBAL ACCESSIBILITY TO PRESCRIBED MEDICATIONS
20230005609 · 2023-01-05 ·

Systems and methods for providing user-controlled access to prescribed medications are provided. A cloud-based prescription database includes prescriptions, each associated with a unique patient identifier, locations of pharmacies, and available stock for the pharmacies. A unique patient identifier is received from a user device and the related prescriptions are retrieved from the database and displayed for user selection. Pharmacies which are geographically proximate to a location of the given user device which report availability of the medication associated with the user selected prescription are displayed at a map at the given user device.

Apparatus for Fraud Detection Rule Optimization

An improved method and apparatus for determining if a financial transaction is fraudulent is described. The apparatus in one embodiment collects transactions off of a rail using promiscuous listening techniques. The method uses linear programming algorithms to tune the rules used for making the determination. The tuning first simulates using historical data and then creates a matrix of the rules that are processed through the linear programming algorithm to solve for the variables in the rules. With the updated rules, a second simulation is performed to view the improvement in the performance. The updated rules are then used to evaluate the transactions for fraud.

CUSTOMER RECOGNITION SYSTEM

A method implements a customer recognition system. A request with an identifier of an unidentified user is received. Sparse data is generated from string information corresponding to the identifier. Preexisting identifiers are filtered to generate a list of candidate identifiers using the sparse data. The plurality of preexisting identifiers correspond to a plurality of preexisting users. A core identifier is selected by determining a match between the identifier and a preexisting identifier from the preexisting identifiers using distance information generated using the list of candidate identifiers. The core identifier is matched to the identifier using the match to identify the unidentified user as a preexisting user from the plurality of preexisting users.

Apparatus to provide liquid funds in the online auction environment

A method, apparatus, and computer readable storage to implement a lending system for use with electronic commerce web sites such as auction sites. A seller may receive a cash loan for items placed for sale but not yet purchased by a buyer. The seller can be required to pay back the loan after a predetermined amount of time or as soon as the item for sale is sold and payment is received from the buyer. The lender would charge interest or commission for the loan. In this manner, sellers can receive cash for items listed on auction sites before those items are actually sold, generating additional cash flow for the seller.

Generation online E commerce and networking system for transforming scattered business operations into centralized business operations
11521217 · 2022-12-06 ·

A new generation online e-commerce and networking system is disclosed. According to the embodiments of the present invention, by utilizing single-sign-on and interface technologies, the system enables: 1) transforming scattered business application processing capabilities of organizations into centralized processing capabilities for Internet users; and 2) integrating entity processes to meet various entities' operational needs. These are revolutionary technologies to disrupt the traditional isolated business operations and to effectively solve the thorny issue of scattered user data on the Internet, so as to create a favorable digital infrastructure environment or user-data-interconnected Internet fabric for the rapid acceleration of the next generation Internet.

Leveraging a social network to search for local inventory
11521260 · 2022-12-06 · ·

In accordance with one or more embodiments of the present disclosure, a method for leveraging a social network to search for local inventory includes communicating with a first mobile communication device over a network, the first mobile communication device associated with a user, and communicating with a second mobile communication device over the network, the second mobile communication device associated with a social network contact. The method further includes obtaining a geo-location of the second mobile communication device, processing a search request from the first mobile communication device, obtaining a radius of coverage for a merchant, determining whether the geo-location of the second mobile communication device is within the radius of coverage of the merchant, and providing a listing to the first mobile communication device of one or more items for sale by the merchant when the second mobile communication device is within the radius of coverage of the merchant.

Information processing device, information processing method, and information processing program
11521244 · 2022-12-06 · ·

An information providing device acquires a keyword specified from a page on which an advertisement display area used for displaying an advertisement is arranged, selects advertisements corresponding to the keyword from a storing means storing information of each of a plurality of advertisements as display target candidates, and specifies a display target advertisement to be displayed in the advertisement display area of the page from among the display target candidates. Then, the information providing device, in a case where the display target candidate that is not specified among the display target candidates of a same advertiser as that of the specified display target advertisement satisfies a predetermined condition, determines the display target candidate and the display target advertisement as display target advertisements to be displayed in the advertisement display area.

Systems and methods for cross domain service component interaction

Disclosed are methods, apparatus, systems, and computer readable storage media for interacting with components across different domains in a single user interface in an online social network. The user interface includes a first component and a second component, where the first component exposes content from a first database system at a first network domain and the second component exposes content from a second database system at a second network domain. A first interaction with the first component is received at a computing device, followed by a reference being provided in the second component, where the reference includes information related to the first interaction. A second interaction with the second component regarding the reference can be received at the computing device. Interactions between the components hosted on different database systems can occur through an application programming interface (API).

Systems and methods for cross domain service component interaction

Disclosed are methods, apparatus, systems, and computer readable storage media for interacting with components across different domains in a single user interface in an online social network. The user interface includes a first component and a second component, where the first component exposes content from a first database system at a first network domain and the second component exposes content from a second database system at a second network domain. A first interaction with the first component is received at a computing device, followed by a reference being provided in the second component, where the reference includes information related to the first interaction. A second interaction with the second component regarding the reference can be received at the computing device. Interactions between the components hosted on different database systems can occur through an application programming interface (API).