Patent classifications
G06Q30/0185
Detection and prevention of fraudulent activity on social media accounts
Technology is disclosed for detecting imposters of a brand account. The technology can store a brand profile of the brand account, detect that a message has been publicly communicated to the brand account from a social media account, monitor messages sent publicly to the social media account from other social media accounts by repeatedly comparing the brand profile to metadata of each of the monitored messages, and identify at least one of the other social media accounts as an imposter account based on the comparing. The technology can cease the comparing at predetermined expiration time occurring after the detection of the message that was sent publicly to the brand account.
SECURE AND TRACEABLE MANUFACTURED PARTS
A method for the verification and authentication of additive manufactured product, comprising the steps of receiving, from a customer, at least one customer requirement for a product, deriving at least one manufacturing requirement and generating a product geometry file for the product, recording, by a first computing device, to a distributed transaction register, a first transaction reflecting certification of the product geometry file, obtaining a first output reflecting the first transaction, printing the product with a 3D printer, recording, by a second computing device, to the distributed transaction register, a second transaction reflecting the printing of the product and the first output, obtaining a second output reflecting the second transaction, embedding within the product a unique code reflecting the second output, whereby the product geometry file and the printing of said product may be verified with the unique code such that the product may be authenticated.
AUTHENTICATED PRODUCTION
Apparatuses and methods associated with authenticated production are disclosed herein. In embodiments, a digital fingerprint processor may be configured to: identify an activation of at least one of the one or more machines to attempt to produce or manufacture at least one of physical product or physical manufacture; responsive to completion of one or more operations associated with the activation by the one or more machines, acquire digital image data of a portion of a physical object on or inside the one or more machines; analyze the digital image data to form a digital fingerprint of the physical object, wherein the digital fingerprint is responsive to structure of the physical object; and store the digital fingerprint in a database record of the database system. Other embodiments may be disclosed or claimed.
Token processing with selective de-tokenization for proximity based access device interactions
A method includes providing an initial communication, by an access device to a user device. The access device can receive the user identifier and the access token and receive a secret associated with the user. The access device can determine, using the user identifier and/or the access token, if the transaction is authorized by an authorizing entity computer associated with the access device or by an authorizing entity not associated with the access device. If the transaction is authorized by the authorizing entity computer associated with the access device, the access device can transmit an authorization request message comprising the user identifier, the secret, and the access token to the authorizing entity computer. The authorizing entity computer validates the secret, retrieves a real credential of the user using the user identifier, and authorizes the transaction.
Systems and Methods for Distributed Encoding and Global Exchange Architecture
Various aspects of the disclosure relate to using a verifiable and distributed encoding as a digital currency (e.g., cryptocurrency). According to some embodiments, systems and methods can be executed to transfer cash or “hard” currency responsive to exchange of cryptocurrency supported by blockchain technology. In further example, the systems and methods are tailored to operate within a specified/defined community that ensures the efficient operation of the system by ensuring liquidity of the transfer. According to one embodiment, the system is configured to distribute stable coin, issuing the coin at a discounted value (e.g., relative to a redemption or cash equivalent face value). For example, by issuing coin at a discount the system automatically facilitates peer-to-peer physical cash transfers.
DEPLOYING PHYSICAL DIAMOND TOKENS ON A BLOCKCHAIN
A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.
REUSABLE, SECURE SHIPPING PACKAGE
Disclosed herein is a shipping container that includes numerous multi-factor authentication (MFA) tie ins to provide added security to the container. In some embodiments, the shipping container is associated with a mobile user profiles within a mobile application. A retailer makes a sale, then, using a mobile application, associates the container with the destination address and the MFA details associated with the buyer's mobile application account. Once the container is loaded up, the container will not open again except for the buyer using the buyer's MFA authentication credentials.
Classic Car Restoration Services Systems and Methods
The invention relates to classic car restoration services systems and methods, and, more particularly to classic car restoration services interfacing systems and methods allowing classic car facilities and enthusiasts to document, represent to prospective buyers, acquire classic cars and to facilitate their restorations.
MULTIVARIATE RISK ASSESSMENT VIA POISSON SHELVES
Detecting fraudulent activity can be a complex, manual process. In this paper, we adapt statistical properties of count data in a novel algorithm to uncover records exhibiting high risk for fraud. Our method identifies shelves, partitioning data under the counts using a Student's t-distribution. We apply this methodology on a univariate dataset including cumulative results from phone calls to a customer service center. Additionally, we extend this technique to multivariate data, illustrating that the same method is applicable to both univariate and multivariate data.
SYSTEM AND METHOD FOR DETECTING FRAUDULENT FUELING OPERATIONS
A method for receiving a plurality of captures of a vehicle from a plurality of locations. Calculating a plurality of signatures of the vehicle, each respectfully associated with a corresponding capture from the plurality of captures. Associating the plurality of signatures resulting in a single signature and utilizing the single signature for identifying the vehicle.