G06Q30/0185

Segment-based recommendation engine

Transaction items for a transaction are received during a transaction. Any non-barcoded items are identified and processed within a retailer-specific vector space to identify a most-similar barcoded item offered by a corresponding retailer to the non-barcoded item. The transaction items are revised to include the most-similar barcoded item as a replacement for the non-barcoded item. The revised transaction item list is used to identify a recommended item based on a segment-specific vector space associated with a segment assigned to the transaction. The recommended item is provided in real time to a transaction service that processes the transaction for delivery to a customer associated with the transaction.

Automated dispute resolution system
20230237505 · 2023-07-27 ·

Disclosed herein provides an automated dispute resolution system in data communication with a user device comprising: a memory and a processor, the processor configured to receive identification information, scale a risk of misidentification; record a communication in the memory, together with a timestamp; receive input to components of a matter; collect information on the matter; establish a prediction based on a type of dispute resolution and one or more attributes; create an action item; identify a solution; and present the solution to the matter parties. Further disclosed herein provides a method, comprising: receiving identification information, scaling a risk of misidentification; recording a communication in the memory, together with a timestamp; receiving input to components of a matter; collecting information on the matter; establishing a prediction based on a type of dispute resolution and one or more attributes; creating an action item; identifying a solution; and presenting the solution to the matter parties.

ANTI-FRAUD TECHNIQUES FOR WIRELESS POWER TRANSFER
20230237506 · 2023-07-27 ·

Described herein are techniques for providing authorization of vehicle charging requests in a manner that limits losses to unauthorized parties. Such techniques may comprise receiving, from a charging station, a request to access power resources, the request indicating a vehicle identifier, determining, based on the vehicle identifier, vehicle usage data for a vehicle associated with the vehicle identifier, determining expected usage data relevant to the request to access power resources, comparing the vehicle usage data to the expected usage data to identify a variance, and determining whether to authorize or decline the request to access power resources based on the identified variance.

Method and system for identifying electronic devices of genuine customers of organizations

A computer-implemented method for identifying, among user electronic devices, customer electronic devices associated with genuine customers of organizations, the method being executed by a server, the method comprising: receiving, from a first user electronic device by the server, a first uniform resource locator (URL) of a first user browsing history; generating a first embedding corresponding to the first URL; comparing the first embedding with a template embedding of a plurality of template embeddings, the plurality of template embeddings having been retrieved from a genuity database; and in response to a difference between the first embedding and the template embedding being lower than an embedding difference threshold, adding the first embedding to the genuity database.

Automatic hotspot identification in network graphs

A computer-implemented method to automatically identify hotspots in a network graph. The method includes receiving, by a processor, input data, wherein the input data includes a plurality of messages, each message containing a set of message data. The method further includes generating, by a pattern detector, and based on the input data, a network graph, wherein the network graph includes a plurality of nodes. The method also includes determining a first risk indicator for each of the plurality of nodes. The method includes assigning a first weight to the first risk indicator for each of the plurality of nodes. The method further includes identifying a first hotspot in the plurality of nodes, wherein the first hotspot is based on the first weight of the first risk indicator of a first node. The method also includes outputting, by a network interface, the first hotspot and the network graph.

CLUSTERING METHOD AND SYSTEM FOR DETECTING ABNORMAL TRANSACTION IN E-COMMERCE
20230027870 · 2023-01-26 · ·

The present invention relates to a method and system for tracking abnormal transactions in e-commerce, and an object of the present invention is to track abnormal transactions by analyzing complex characteristic data of product information uploaded to an e-commerce platform. In order to achieve this object, a method for detecting an abnormal transaction in an electronic device according to the present invention includes: step a of generating an identity map based on first transaction information previously stored in an e-commerce server; step b of collecting second transaction information newly uploaded to the e-commerce server; step c of extracting a first identifier and second identifiers included in the second transaction information and generating a third identifier by combining the plurality of second identifiers; and step d of determining whether the second transaction information is an abnormal transaction by searching the identity map for the first identifier and the third identifier.

Security Devices of Various Form factors with Chaosmetric Artifacts
20230023503 · 2023-01-26 ·

Security devices of various form factors with chaosmetric artifacts are disclosed. In one aspect, embodiments of the present disclosure include a security device, having a physical surface having formed thereon a composite pattern. The composite pattern can created from joining or overlap of imprinting of a first base pattern and a second base pattern. The first base pattern is created from a first basic building block and the basic building block can forms chaosmetric artifacts in the physical surface upon printing.

NOTARIZATION MOBILE APPLICATION SYSTEM AND METHOD
20230230184 · 2023-07-20 ·

A notarization system for use in notarizing a document, the system comprising: a handheld notarization device having a printer; and a notarization application configured to be accessible only by a primary user and to operate on a mobile device having a camera, the notarization application being programmed to digitally read identification information from an identification card of a secondary user received via the camera, such that to verify the identity of the secondary user and authenticate the identification card, digitally scan and generate a digital line drawing of a fingerprint of the secondary user received via the camera, digitally generate a notarization endorsement and cause a printing of the notarization endorsement onto a tamper-resistant sticker via the printer, wherein, when the notarization application is being accessed by the primary user, and upon signing of the document by the secondary user, the notarization application causes a printing of the notarization endorsement.

Object type identifying apparatus, object type identifying method, and recording medium
11562559 · 2023-01-24 · ·

Provided is an object type identifying apparatus that is capable of correctly identifying the types of objects held in a hand of a person. This object type identifying apparatus is provided with: a memory storing instructions; a storage device storing information indicating a type of an object at a position of each object; and one or more processors configured to execute the instructions to: acquire a position of an object; determine whether an object is picked up or an object is placed, based on sensor information; when determined that an object is picked up, identify a type of the picked-up object, based on the position of the object acquired and information stored in the storage device; and when determined that an object is placed, update information stored in the storage device, using an image captured by a camera that captures arrangement of each object from a front side.

Blockchain-based data verification method, apparatus, and electronic device
11562375 · 2023-01-24 · ·

The present application provides blockchain-based anti-counterfeiting methods, apparatuses, and systems. One method includes: obtaining an anti-counterfeiting verification request submitted by a user for a product; initiating anti-counterfeiting verification of the product in response to the anti-counterfeiting verification request, wherein the anti-counterfeiting verification comprises integrity verification of anti-counterfeiting information generated by a plurality of anti-counterfeiting participants on a blockchain, wherein the anti-counterfeiting information comprises a plurality of types of anti-counterfeiting identification information corresponding to the product; and returning an anti-counterfeiting verification result for the product to the user.