G06Q50/26

Detecting security breaches with watchdog transaction accounts

Disclosed are various embodiments for detecting security breaches using watchdog transaction accounts. A security agent can initiate a purchase with a first electronic commerce system and provide a watchdog transaction account as payment for the purchase. The security agent can then store a record of the purchase which includes a merchant identifier for the merchant and the watchdog transaction account. Subsequently, a transaction authorization system can determine that authorization for a transaction with second electronic commerce system failed. If the transaction authorization system determines that the account used in the transaction with the second electronic commerce system, then the transaction authorization system can determine that the first electronic commerce system has suffered a security breach.

Systems and methods for device communication
11582065 · 2023-02-14 · ·

Embodiments include a device comprising an interface module for interfacing with proprietary legacy systems. The interface module comprises a data interface for interfacing with a processing component of the legacy system, where the processing component uses a proprietary protocol for processing data of the legacy system. The interface module includes a protocol module that comprises a protocol corresponding to the proprietary protocol of the legacy system, and the interface module uses the protocol to exchange data with the processing component. The interface module includes a communication device that communicates with a remote system via a wireless channel. The interface module controls communications that include passing commands from the remote system to the legacy system, and passing event data of the legacy system to the remote system.

Systems and methods for device communication
11582065 · 2023-02-14 · ·

Embodiments include a device comprising an interface module for interfacing with proprietary legacy systems. The interface module comprises a data interface for interfacing with a processing component of the legacy system, where the processing component uses a proprietary protocol for processing data of the legacy system. The interface module includes a protocol module that comprises a protocol corresponding to the proprietary protocol of the legacy system, and the interface module uses the protocol to exchange data with the processing component. The interface module includes a communication device that communicates with a remote system via a wireless channel. The interface module controls communications that include passing commands from the remote system to the legacy system, and passing event data of the legacy system to the remote system.

System, device and method for secure message thread communication

A system, device and method for secure message thread communication is provided. The device comprises a communication interface; a display device; and, a controller configured to: generate, at the display device, a plurality of message threads, the plurality of message threads associated with different incident reports; receive multimedia data for transmission in a first message thread of the plurality of message threads; compare the multimedia data with data from the different incident reports; and when an association is determined between the multimedia data and respective data from an incident report associated with a second message thread, of the plurality of message threads: transmit, using the communication interface, the multimedia data in the second message thread, and not the first message thread.

System, device and method for secure message thread communication

A system, device and method for secure message thread communication is provided. The device comprises a communication interface; a display device; and, a controller configured to: generate, at the display device, a plurality of message threads, the plurality of message threads associated with different incident reports; receive multimedia data for transmission in a first message thread of the plurality of message threads; compare the multimedia data with data from the different incident reports; and when an association is determined between the multimedia data and respective data from an incident report associated with a second message thread, of the plurality of message threads: transmit, using the communication interface, the multimedia data in the second message thread, and not the first message thread.

Dynamic form with machine learning
11580440 · 2023-02-14 · ·

Methods, computer-readable media and systems are disclosed for building, deploying, operating, and maintaining an intelligent dynamic form in which a trained machine learning (ML) model is embedded. A universe of questions is associated with a plurality of output classifiers, which could represent eligibilities for respective benefits. The questions are partitioned into blocks. Each block can be associated with one or more of the classifiers, and each classifier can have a dependency on one or more blocks. An ML model is trained to make inferences from varied combinations of responses to questions and pre-existing data, and determine probabilities or predictions of values of the output classifiers. Based on outputs of the trained model, blocks of questions can be selectively rendered. The trained model is packaged with the question blocks and other components suitably for offline deployment. Uploading collected responses and maintenance of the dynamic form are also disclosed.

Dynamic form with machine learning
11580440 · 2023-02-14 · ·

Methods, computer-readable media and systems are disclosed for building, deploying, operating, and maintaining an intelligent dynamic form in which a trained machine learning (ML) model is embedded. A universe of questions is associated with a plurality of output classifiers, which could represent eligibilities for respective benefits. The questions are partitioned into blocks. Each block can be associated with one or more of the classifiers, and each classifier can have a dependency on one or more blocks. An ML model is trained to make inferences from varied combinations of responses to questions and pre-existing data, and determine probabilities or predictions of values of the output classifiers. Based on outputs of the trained model, blocks of questions can be selectively rendered. The trained model is packaged with the question blocks and other components suitably for offline deployment. Uploading collected responses and maintenance of the dynamic form are also disclosed.

Driving mode assessment

An example operation includes one or more of receiving, by a server, data related to an environment associated with a target transport, analyzing, by the server, the data to determine if at least one adverse condition related to the environment exists, and responsive to existence of the at least one adverse condition, sending, by the server, a recommendation related to operation of the target transport in a safe mode to overcome the at least one adverse condition to the target transport.

Process and method for cost and time optimization of background investigation of employment applicants
11580500 · 2023-02-14 · ·

This invention relates to the field of labor and employment, and more specifically the process and method of conducting background investigations, clearance searches, and other employee-related qualification of individuals or job applicants, and the creation of different tools and indexes linked with such process and optimization scheme. The system utilizes biometric feedback from an applicant, a downloadable App to be used at the applicant's device and the integration of tokens and statistical scores and ratings to help improve and lower the cost of the process.

Process and method for cost and time optimization of background investigation of employment applicants
11580500 · 2023-02-14 · ·

This invention relates to the field of labor and employment, and more specifically the process and method of conducting background investigations, clearance searches, and other employee-related qualification of individuals or job applicants, and the creation of different tools and indexes linked with such process and optimization scheme. The system utilizes biometric feedback from an applicant, a downloadable App to be used at the applicant's device and the integration of tokens and statistical scores and ratings to help improve and lower the cost of the process.