Patent classifications
G08B13/22
ELECTRONIC FRAUD PREVENTION SYSTEMS AND METHODS
A method, a non-transitory computer readable medium with computer executable instructions stored thereon, and a fraud prevention processor each prevent electronic fraud. An electronic communication is received from a resource via a network and it is determined whether the electronic communication includes a premium amount. When the electronic communication includes the premium amount, a difference between this premium amount and a captured premium amount received from a consumer is determined, and when the difference is greater than a predefined threshold, an alert is generated and sent to the consumer indicating the difference.
ELECTRONIC FRAUD PREVENTION SYSTEMS AND METHODS
A method, a non-transitory computer readable medium with computer executable instructions stored thereon, and a fraud prevention processor each prevent electronic fraud. An electronic communication is received from a resource via a network and it is determined whether the electronic communication includes a premium amount. When the electronic communication includes the premium amount, a difference between this premium amount and a captured premium amount received from a consumer is determined, and when the difference is greater than a predefined threshold, an alert is generated and sent to the consumer indicating the difference.
Interactive notification system for remote control of a gun safe or the like
An interactive notification system allows the owner of a safe (or any type of vault for protecting personal property) to be contacted when an alarm condition is triggered. The system is configured to respond to a return message signal from the owner to either allow or deny any continued action with the safe. Thus, the owner remains in control of all actions involving the safe, regardless of his physical location. The notification is typically sent electronically to one or more of the owner's communication devices (phone, tablet, computer, etc.), where the owner responds via the same method.
SMART ANTI -THEFT ADAPTER WITH DUAL POWER MODE
The various embodiments herein disclose an anti-theft charging adapter for electronic device to enhance a battery backup capacity of a load electronic device. The charging adapter comprises an adapter circuit and a supplementary power supply unit. The adapter circuit comprises a voltage translator and a current converter. The supplementary power supply unit comprises a processor, a secondary power source, a charger display, a Global Subscriber Module (GSM), an anti-theft module and a GSM activation switch. The secondary power source charges simultaneously during a charging cycle of the load device. The secondary power source act as a primary power source when the main power supply is switched off. The secondary power source supplies the stored power to the load device when a voltage of the load device is lower than the voltage of the secondary power source.
Cross-client sensor user interface in an integrated security network
An integrated system includes a system user interface (SUI) that provides an iconic, at-a-glance representation of integrated security system status. The SUI is for use across all client devices including mobile or cellular telephones, a mobile portal, a web portal, and a touchscreen device. The SUI includes a number of display elements presented across all types of client devices for monitoring status of the integrated security system. The display elements of the SUI include an orb icon, text summary, security button, device warnings, system warnings, interesting sensors, and quiet sensors. The SUI thus provides system status summary information agnostically across all clients. Additionally, the SUI provides consistent iconography, terminology, and display rules across all clients as well as consistent sensor and system detail across clients.
FRAUD DETECTION AND CONTROL IN MULTI-TIERED CENTRALIZED PROCESSING
Detecting and controlling fraud in centralized processing is provided. A system receives data packets carrying electronic transactions, and clusters the electronic transactions based on an intermediary identifier of each of the electronic transactions to identify a first cluster and a second cluster. The system generates a first model for the first cluster and a second model for the second cluster. The system detects a fraudulent electronic transaction having a first source identifier. The system locks a first data structure to prevent transfer of a first resource in electronic transactions associated with the first source identifier. The system identifies source identifiers associated with the first cluster in a first tier. The system locks absent detection of the fraudulent electronic transaction in one or more electronic transaction associated with the source identifiers, the data structure corresponding to each of the source identifiers in the first cluster.
FRAUD DETECTION AND CONTROL IN MULTI-TIERED CENTRALIZED PROCESSING
Detecting and controlling fraud in centralized processing is provided. A system receives data packets carrying electronic transactions, and clusters the electronic transactions based on an intermediary identifier of each of the electronic transactions to identify a first cluster and a second cluster. The system generates a first model for the first cluster and a second model for the second cluster. The system detects a fraudulent electronic transaction having a first source identifier. The system locks a first data structure to prevent transfer of a first resource in electronic transactions associated with the first source identifier. The system identifies source identifiers associated with the first cluster in a first tier. The system locks absent detection of the fraudulent electronic transaction in one or more electronic transaction associated with the source identifiers, the data structure corresponding to each of the source identifiers in the first cluster.
METHOD AND SYSTEM OF SENSOR FEEDBACK FOR A SCENT DIFFUSION DEVICE
The disclosure herein concerns a method including receiving at a computer at least one target value of a scent parameter for an environment that is remote from the computer, receiving at the computer a sensed parameter of the environment, and controlling, via the computer, diffusion of a liquid from a source of the liquid in fluid communication with at least one scent diffusion device to achieve the target value of the scent parameter, wherein controlling includes setting or adjusting an operation parameter of the at least one scent diffusion device in response to the sensed parameter.
Tracking And Alarm System
A tracking and alarm system, including at least one wearable tracking device to be worn around at least a portion of a body of a user, at least one primary receiver connected to the at least one wearable tracking device to receive a location of the at least one wearable tracking device based on a GPS signal, and perform at least one of emit an alarm sound and display an alarm warning thereon, and at least one mobile device connected to the at least one wearable tracking device to receive a location of the at least one wearable tracking device based on a GPS signal, and perform at least one of emit an alarm sound and display an alarm warning thereon.
Tracking And Alarm System
A tracking and alarm system, including at least one wearable tracking device to be worn around at least a portion of a body of a user, at least one primary receiver connected to the at least one wearable tracking device to receive a location of the at least one wearable tracking device based on a GPS signal, and perform at least one of emit an alarm sound and display an alarm warning thereon, and at least one mobile device connected to the at least one wearable tracking device to receive a location of the at least one wearable tracking device based on a GPS signal, and perform at least one of emit an alarm sound and display an alarm warning thereon.