Patent classifications
G06Q30/0185
COUPON VALIDATION AND FRAUD MITIGATION
A method for preventing fraud in incentive transactions is provided that includes receiving metadata from a brand manufacturer for an incentive associated with a selected product, the metadata including a product identifier and a redemption rule. The method includes requesting a host to create a record in a distributed ledger for the incentive using the metadata, providing the incentive to a consumer via a mobile device, assigning a public address to the incentive, receiving from the host a first private key associated with the public address in the record, providing the first private key to the consumer, and receiving a second private key indicative of a redemption of the incentive at a retailer. The method includes validating redemption of the incentive and recording the redemption of the incentive at a retailer in the distributed ledger record when the redemption of the incentive is validated. A system to perform the above method is also provided.
CONTINUOUS AND ANONYMOUS RISK EVALUATION
Techniques for risk evaluation include receiving, from a requesting entity, a request for monitoring target entities specifying a first identifier associated with each target entity and target entity information. The system generates a second identifier and a third identifier for each target entity and stores a mapping of the second identifiers to the first identifiers and the third identifiers, preventing the second identifiers from being provided to the requesting entity. The system monitors a periodically updated data set and determines risk metrics for the target entities, comparing each risk metric to a threshold value to identify target entities whose risk data indicates an insider threat. The system generates a third identifier for the identified target entities and provides the third identifiers to the requesting entity. Responsive to a request for a corresponding first identifier, the system identifies and provides the first and third identifiers to the requesting entity.
PROVIDING GLOBAL ACCESSIBILITY TO PRESCRIBED MEDICATIONS
Systems and methods for providing user-controlled access to prescribed medications are provided. A cloud-based prescription database includes prescriptions, each associated with a unique patient identifier, locations of pharmacies, and available stock for the pharmacies. A unique patient identifier is received from a user device and the related prescriptions are retrieved from the database and displayed for user selection. Pharmacies which are geographically proximate to a location of the given user device which report availability of the medication associated with the user selected prescription are displayed at a map at the given user device.
Apparatus for Fraud Detection Rule Optimization
An improved method and apparatus for determining if a financial transaction is fraudulent is described. The apparatus in one embodiment collects transactions off of a rail using promiscuous listening techniques. The method uses linear programming algorithms to tune the rules used for making the determination. The tuning first simulates using historical data and then creates a matrix of the rules that are processed through the linear programming algorithm to solve for the variables in the rules. With the updated rules, a second simulation is performed to view the improvement in the performance. The updated rules are then used to evaluate the transactions for fraud.
SYSTEM AND METHOD FOR GENERATING A DIGITAL VEHICLE IDENTIFICATION NUMBER
A system and method for generating a digital identity of a vehicle. A first plurality of measurements may be generated from a plurality of electronic control units located within the vehicle. The measurements may be received by a backend service or a secured controller residing within the vehicle. The measurements may be generated using physics-based metrics unique to each of the plurality of electronic control units. A data pool may be created from the measurements. Also, a unique key operable to verify the digital identity of the vehicle may be generated by combining the data pool with error-correcting data.
Method and system for product authentication
Methods and systems for product authentication include the storage of product authenticity data in integrated circuit (IC) chips of verification objects for physical association with authentic products. The IC chips are operable to determine verification data using the stored product authenticity data, and may include private key encryption, private algorithm and/or count processing functionality for verification data determination. A verification server(s) is utilized to receive an inbound message(s) from an electronic device(s) that includes test data obtained by the electronic device(s) from an integrated circuit chip at a product of interest, and in response thereto, to send an outbound message to the electronic device(s) indicative of verification or non-verification of authenticity of the product of interest, based upon identification or non-identification of an association between the test data and product authenticity data. Each outbound message is dependent upon determining the presence of an association utilizing stored data and optional algorithmic and count processing functionality. The electronic device(s) may be a smart phone(s) having a mobile product authentication application downloaded thereto for use in obtaining the test data that may or may not correspond to verification data determinable by a verification object.
Native-feature silent coercion alarm
Apparatus and methods for providing protection from economic exploitation. The apparatus and methods may include a platform for tagging a social security number and/or other suitable identification number. The system may allow a person associated with a social security number to automatically flag and deny any product or service request associated with the social security number. The alarms are “silent,” because the alarm may initiate an institution internal process in which the customer interaction with the institution follows a normal diligence process until an intervention can be effectively executed on behalf of the customer. This reduces the likelihood of a reaction from the customer's associate prior to completing the diligence process. A system may provide the customer with an opportunity to electronically activate an alarm by typing keystrokes on a card reader keypad or interacting with a physical sensor on the reader, on the card, or the like.
Filtering cross reads among radio frequency identification (RFID) enabled readers and systems and methods for use thereof
Radio frequency identification (RFID) enabled readers and systems and methods for filtering cross reads of RFID tags and use thereof. The systems and methods may be configured to operate with mobile and/or fixed RFID readers. The systems and methods may provide for claim based filtering of cross reads based upon adjusting operating powers of RFID readers and/or antenna. The systems and methods may also be configured to apply weights to claims thereby providing efficient and/or accurate filtering of cross reads. The systems and methods may also provide for a database that may also be presented to a user to illustrate locations of inventory at any point in time or over a period of time, or to facilitate the ability of a user to physically locate inventory to be acted upon.
Computer-based systems configured to detect fraudulent activities related to card-transacting devices and methods of use thereof
Systems and methods of detecting fraudulent activity including skimmers adapted to compromise transacting devices such as automated teller machines (ATMs) are disclosed. In one embodiment, an exemplary computer-implemented method may comprise determining that a subject device has a risk level higher than a risk threshold, providing a push notification to a mobile device proximal to the subject device, executing a software application executed by the mobile device for gathering information and transmitting feedback regarding the subject device, and providing an incentive, upon receipt of the feedback, to, for example, an account or device associated with an individual involved with the feedback or interaction with the device.
Computerized systems and methods for detecting product title inaccuracies
Systems and methods are provided for detecting inaccuracy in a product title, comprising identifying, by running a string algorithm on a title associated with a product, at least one product type associated with the product, predicting, using a machine learning algorithm, at least one product type associated with the product based on the title, detecting an inaccuracy in the title, based on at least one of the identification or the prediction, and outputting, to a remote device, a message indicating that the title comprises the inaccuracy. Running the string algorithm may comprise receiving a set of strings, generating a trie based on the received set of strings, receiving the title, and traversing the generated trie using the title to find a match. Using the machine learning algorithm may comprise identifying words in the title, learning a vector representation for each character n-gram of each word, and summing each character n-gram.