Patent classifications
G06Q30/018
Snapshot capture of computing device user interfaces
Various aspects of the subject technology relate to systems, methods, and machine-readable media for automating the recording of an evidentiary history (e.g., versions audit trail) of a graphical user interface with an embedded clickwrap agreement. The snapshot server captures and outputs snapshot records of a graphical user interface displaying the clickwrap agreement on an end user computing platform. The snapshot records are created using a virtual machine that emulates an end user computing platform for navigation of an application rendered on the platform. Aspects may also include generating a snapshot record of metadata associated with the captured snapshot image.
Integrating fraud telemetry vendor
A firm computer system is configured to add a new third party telemetry vendor. An incumbent third party telemetry vendor communicates with the firm computer system using HTTP requests that include HTTP headers, including a first telemetry-related HTTP header. The new third party telemetry vendor communicates with the firm computer system using HTTP requests that include the first telemetry-related HTTP header. The new third party telemetry vendor appends its telemetry data to the first telemetry-related HTTP, separating it in the first telemetry-related HTTP from telemetry data from the incumbent third party telemetry vendor according to a predefined syntax.
Registered applications for electronic devices
The subject technology provides a portion of the functionality of an application on an electronic device on which the application is not installed. The portion of the functionality of the application is provided by a clip of the application that can be obtained, installed, and launched on the user device, at the time the functionality is desired by a user, and without authenticating information for the user. The clip of the application can provide the user with access to a purchase function, an ordering function, or any other sub-function of the application. When the application itself is installed on the device, the clip of the application can be deleted while preserving access, by the application, to data generated on the device by the clip.
Method, medium, and system for reducing counterfeits online
Systems and methods change a user interface for the purpose of guiding a user in supplementing a product listing with an image to evidence the product's authenticity. Example embodiments include a machine-implemented method for accessing at least one database to retrieve an authenticity criterion mapped to a product and at least one reference image that depicts adequate detail of a product specimen to fulfill the authenticity criterion. The machine can further cause a user device to display the reference image to the user along with a suggestion that the user submit a candidate image depicting similar detail of the product. In some example embodiments, the method further includes retrieving the candidate image, confirming receipt of the candidate image, and displaying the candidate image, as well as adjusting a rank for a candidate specimen based on various factors.
Method, medium, and system for reducing counterfeits online
Systems and methods change a user interface for the purpose of guiding a user in supplementing a product listing with an image to evidence the product's authenticity. Example embodiments include a machine-implemented method for accessing at least one database to retrieve an authenticity criterion mapped to a product and at least one reference image that depicts adequate detail of a product specimen to fulfill the authenticity criterion. The machine can further cause a user device to display the reference image to the user along with a suggestion that the user submit a candidate image depicting similar detail of the product. In some example embodiments, the method further includes retrieving the candidate image, confirming receipt of the candidate image, and displaying the candidate image, as well as adjusting a rank for a candidate specimen based on various factors.
System and method for using unique device identifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.
Systems and methods for identity graph based fraud detection
A method and apparatus for fraud detection during transactions using identity graphs are described. The method may include receiving, at a commerce platform system, a transaction from a user having initial transaction attributes and transaction data. The method may also include determining, by the commerce platform system, an identity associated with the user, wherein the identity is associated with additional transaction attributes not received with the transaction. Furthermore, the method may include accessing, by the commerce platform system, a feature set associated with the initial transaction attributes and the additional transaction attributes, wherein the feature set comprises machine learning (ML) model features for detecting transaction fraud. The method may also include performing, by the commerce platform system, a machine learning model analysis using the feature set and the transaction data to determine a likelihood that the transaction is fraudulent, and performing, by the commerce platforms system, the transaction when the likelihood that the transaction is fraudulent does not satisfy a transaction fraud threshold.
MANAGEMENT SYSTEM FOR POINT OF CARE TESTING
The present invention relates to a method and system for quality compliance, system and operator verification, and process management for point of care biological sample testing systems used in hospitals and other medical delivery environments. Specifically, the present invention may be directed to a computing device configured to generate a plurality of attributes configured to assess a competency level of an operator to operate at least one sample testing instrument, obtain operator derived data pertaining to the operator's ability to operate the at least one sample testing instrument, and determine a competency level of the operator for the at least one sample testing instrument based the plurality of attributes and the operator derived data.
DATABASE SHARING SYSTEM
Systems and techniques for sharing healthcare fraud data are described herein. Healthcare fraud detection schemes and/or fraud data may be automatically shared, investigated, enabled, and/or used by entities. A healthcare fraud detection scheme may be enabled on different entities comprising different computing systems to combat similar healthcare fraud threats, instances, and/or attacks. Healthcare fraud detection schemes and/or fraud data may be modified to redact sensitive information and/or configured through access controls for sharing.
METHOD FOR AUTHENTICATION AND ASSURING COMPLIANCE OF DEVICES ACCESSING EXTERNAL SERVICES
Systems and methods are described for determining whether an electronic computing device complies with the security policy for a network. The invention includes receiving an electronic request signal including an electronically encoded request to allow an electronically encoded process operating on an electronic processor of the electronic computer device to establish electronic communication with a specific target electronic device or service operating on the electronic communications and data network; receiving electronically encoded information about the identity of the electronically encoded process, the electronic computing device, or the use of the electronic computing device; receiving electronically encoded policy elements for the security policy; receiving electronically encoded information about the compliance of the electronic computing device; receiving electronically encoded information related to the identity of the principal of the electronic computing device; and determining whether the electronic computing device complies with the security policy.