G06F2221/2117

Digital identity

The disclosure relates to a digital identity system for creating a computer stored digital identity. The system includes a network interface configured to send and receive electronic messages, persistent electronic storage, a profile management module executing on a processor configured to receive from an entity an electronic message comprising a data item, extract the data item from the electronic message and store the data item in a digital profile in the persistent electronic storage. The system also includes a credential creation module executing on a processor, a publication module executing on a processor, and a receipt generation module executing on a processor.

Digital, personal and secure electronic access permission
11681792 · 2023-06-20 · ·

The present invention puts forward a personal electronic access permission (Figure B, 31) that can both check on the customer's identity (Figure A, step 2) and right to access an event/venue in one scanning event, and address the unwanted secondary market, still enabling a customer (Figure D, 5) to sell back an electronic access permission to the system (Figure D, I) in case the customer is not able to attend the event.

CASCADE CONVOLUTIONAL NEURAL NETWORK

In one embodiment, an apparatus comprises a communication interface and a processor. The communication interface is to communicate with a plurality of devices. The processor is to: receive compressed data from a first device, wherein the compressed data is associated with visual data captured by sensor(s); perform a current stage of processing on the compressed data using a current CNN, wherein the current stage of processing corresponds to one of a plurality of processing stages associated with the visual data, and wherein the current CNN corresponds to one of a plurality of CNNs associated with the plurality of processing stages; obtain an output associated with the current stage of processing; determine, based on the output, whether processing associated with the visual data is complete; if the processing is complete, output a result associated with the visual data; if the processing is incomplete, transmit the compressed data to a second device.

SYSTEMS FOR MULTI-PARTY DASHBOARDS
20230185942 · 2023-06-15 ·

Systems and methods for supply chain management are provided. The systems and related methods create, share and allow updating of electronic records containing supply chain event data and supply chain documents relevant to the execution of supply chain processes. The system and related methods further allow the storing of supply chain event data, supply chain documents, electronic records of supply chain processes and summary files of electronic records of supply chain processes on one, two or more distributed ledgers.

System and method for identifying abusive account registration

Disclosed is a system and method for processing account registration by identifying account candidates attempting to open an account as abusive. That is, the present disclosure discusses identifying, and challenging and marking abusive account registration. The present disclosure takes into account users' behaviors on a network and the impact to the cost and/or revenue of the network. The present disclosure is proactive as it allows for actions to be taken at the earliest possible time in the registration process before an account is created. This prevents abusive activity from taking place within the network and effecting services and privileges available to legitimate users. Additionally, the effects of the disclosed systems and methods minimize the negative impacts of abusive activity on normal user accounts.

SYSTEMS AND METHODS FOR AUTHENTICATING USER INFORMATION
20220377075 · 2022-11-24 · ·

Disclosed herein are efficient systems and methods for verification of user information in a timely manner. A background computer process for verification of the user information using a third-party authentication service is initiated. The third-party authentication service performs the verification of the information submitted by the user in response to some of the questions within the questionnaire at the same time as the user is replying to remaining questions within the electronic questionnaire. Accordingly, by the time the user is finished replying to all questions within the electronic questionnaire, the previously submitted information by the user is verified and a profile of the user is authenticated.

Account Verification in Deferred Provisioning Systems
20170346829 · 2017-11-30 ·

Provisioning a user account. A method includes, at a local entity contacting an identity system to begin user account provisioning. The method further includes receiving from the identity system a correlating factor related to a verification code sent to the user from the identity system. The method further includes receiving from the user, profile information entered into the local entity, where the profile information is to be stored in the user account. The method further includes receiving from the user the verification code corresponding to the correlating factor. The method further includes sending the correlating factor, user entered verification code and the user entered profile information to the identity system, where the identity system determines that the verification code properly correlates to the correlating factor, and as a result provisions the user account and stores the profile information in the user account.

ENHANCING ELECTRONIC INFORMATION SECURITY BY CONDUCTING RISK PROFILE ANALYSIS TO CONFIRM USER IDENTITY
20170345003 · 2017-11-30 ·

An email address is provided by a user when the user registers an account with a service provider. A unique ID is generated for the user. An email containing the unique ID is sent to the email address. The unique ID is embedded as a part of a URL link or in a loadable image. A user response to the email is detected. The user response includes a request to access the URL link or to load the image. Subsequently, the unique ID is retrieved from the request. The email address is confirmed as a valid email address if the retrieved unique ID is identical to the generated unique ID. A Turing test is conducted to determine whether the user is a computer bot. Access to the user account is granted only if the email address is confirmed as valid and the user is determined to not be a bot.

Digital Safety and Account Discovery
20230179611 · 2023-06-08 ·

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer’s accounts in order to prevent unauthorized access or use of the consumer’s identified accounts. To discover the various accounts, the methods, computer-readable media, software, and apparatuses can monitor at least a consumer’s email accounts, web browser history, and web cache. The discovered accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted accounts to prevent unauthorized access or use.

COMPLEX ANALYSIS DATA MANAGEMENT SYSTEM, COMPLEX ANALYSIS DATA MANAGEMENT METHOD, AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM
20230177195 · 2023-06-08 · ·

The complex analysis database manages the analysis result data in association with each of the plurality of samples. A project-sample registering unit registers, in a project database, a respective one of a plurality of projects in association with one or more selected from the plurality of samples. A project-user registering unit registers, in the project database, a respective one of the plurality of projects in association with one or more selected from a plurality of users. The display control unit displays a project associated with the login user in a selectable manner on an information terminal operated by the login user. The display control unit extracts, from a complex analysis database, the analysis result data of a sample associated with the project selected by the login user and displays the extracted data on the information terminal.