G06Q30/0248

Self-guided verification of an item
09842142 · 2017-12-12 · ·

A method of providing a level of certification of an attribute of an item is disclosed. A requirement is determined for a level of certification for an attribute of an item. A notification is provided of an evidence item that is to be submitted to evaluate the level of certification of the attribute of the item. The evidence item is received. The level of certification of the attribute of the item is determined based on the received evidence item.

Methods and systems for serving advertisements
11682038 · 2023-06-20 · ·

Methods and systems for serving advertisement objects on an advertising platform are disclosed. The advertising platform detects invalid activity related to advertisement objects served in response to a request, and identifies a source associated with the invalid activity. In response to detection of the invalid activity, at least one decoy advertisement object is served in response to further requests originating from the identified source. The decoy advertisement object is an advertisement object that is processed by the advertising platform differently from regular advertisement objects that are served by the advertising platform in response to requests from other sources.

ELECTRONIC BRAND AUTHENTICATION METHOD USING SCANNABLE CODES
20170352053 · 2017-12-07 ·

A “scannable logo” image contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, an encoded GPS data corresponding to manufacturing location for a manufactured item or assembled item, plus additional embodiment dependent data. The image is scanned with the image scanning function of a mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, and the encoded GPS location information are decoded with a decoding function. The GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information. If the decoded information is a geo-proximal match, an authentication application is launched in the computer function of the mobile communication device.

SYSTEMS, METHODS, AND MEDIA FOR DETECTING SUSPICIOUS ACTIVITY
20220374938 · 2022-11-24 ·

Systems, methods, and media for detecting suspicious activity in connection with advertisement impressions are provided. In some embodiments, the method includes: collecting advertisement impression information associated with a plurality of pages; determining, from the collected advertisement impression information, an indication of whether a browser application detected that an advertisement displayed on a webpage was viewable in a browser window; determining, from the collected advertisement impression information, a plurality of viewability statistics for each of the plurality of pages, wherein each viewability statistic indicates a likelihood of whether an advertisement displayed on a webpage was viewable in a browser window; comparing the plurality of viewability statistics with the indication from the browser application; determining a viewability score for the advertisement impression based on the comparison; and identifying the advertisement impression as likely to be suspicious based on the determined viewability score.

METHOD AND SYSTEM FOR IDENTIFYING ANOMALOUS CONTENT REQUESTS
20170345052 · 2017-11-30 ·

Systems and methods for identifying anomalous content requests are disclosed. Initially, a first data set containing a first plurality of attributes for each of a first plurality of content requests is received. A second data set containing a second plurality of attributes for each of the first plurality of content requests is also received, where the second plurality of attributes is different from the first plurality of attributes. A first attribute of the first plurality of attributes is determined that is indicative of a first type of anomalous content request. It is then determined that the first attribute of the first plurality of attributes is common to the second plurality of attributes. A first subset of the second data set having the first attribute is then identified. Finally, content requests of the first subset of the second data set having the first attribute are indicated.

AFFILIATE-DRIVEN BENEFITS MATCHING SYSTEM AND METHODS WITH LOCATION-TRIGGERED BENEFIT ALERT AND SEARCH SCORE DETERMINATION
20170345057 · 2017-11-30 · ·

Methods and systems for matching a consumer to benefits offered by enabling organizations provide flexibility and utility to consumers in the marketplace for various products. Information about benefits and enabling organizations are provided and stored in a memory of a computer system. A search query including consumer interest data of a consumer, or results of such a search query, are received. The enabling organization information, benefit information, and search query or information related to the search query results are analyzed automatically in the computer system to provide analysis results, to determine whether any enabling organization to which the consumer is affiliated is offering a benefit for the consumer that is applicable to the said consumer interest data. A message is sent to the consumer including a list of venues ordered according to a search score.

ELECTRONIC APPARATUS AND CONTROLLING METHOD THEREOF

An electronic apparatus is provided. The electronic apparatus includes a memory, a communication interface, and a processor configured to: control the communication interface to transmit a content and a first track log request to an external device, obtain a first ratio value between a first track log response time corresponding to receipt of a first track log response and a predetermined first track log request time corresponding to the first track log request, control the communication interface to transmit a second track log request to the external device at a random time, identify whether a second track log response corresponding to the second track log request is received from the external device, and identify whether the content is reproduced normally based on any one or any combination of the first ratio value and whether the second track log response was received.

Methods and apparatus for secondary content management and fraud prevention

Methods and apparatus for secondary content management, including preventing viewing fraud, are disclosed. In one embodiment, apparatus of the present disclosure includes an Advertisement Decisioning Service (ADS) and Manifest Manipulator (MM) configured cooperate to receive client requests for secondary content, select one or more secondary content elements (e.g., advertisements), and generate and transmit one or more identifiers that uniquely identify the client's request for a session. The selected advertisements in one implementation include embedded beacons or tags used to ensure accurate accounting with regards to the amount or quality of consumption of the advertisement by a user.

Methods, systems, and media for automated compliance determination of content items

Methods, systems, and media for automated compliance determination of content items are provided. In some embodiments, the method comprises: receiving, at a server from a user device associated with a user, a request to provide a branded content item on a media content platform; in response to receiving the request, generating a transcript of a speech portion of the branded content item; generating a plurality of candidate word sequences based on the transcript; selecting a candidate word sequence from the plurality of candidate word sequences based on a similarity that is determined by comparing each of the plurality of candidate word sequences with each of a plurality of target word sequences; in response to selecting the candidate word sequence, applying a model to the selected candidate word sequence to determine whether the selected candidate word sequence contains a first disclosure statement in accordance with one or more disclosure requirements and applying the model to a content description associated with the branded content item to determine whether the content description contains a second disclosure statement in accordance with the one or more disclosure requirements; and associating the branded content item with a compliance indicator that indicates the branded content item is compliant with the one or more disclosure requirements in response to the model indicating that the selected candidate word sequence contains the first disclosure statement and in response to the model indicating that the content description contains the second disclosure statement.

Intercepting inadvertent conversational disclosure of personal information

By intercepting a natural language communication of a protected party, the communication is monitored, wherein the protected party is a human being. Within the monitored communication using a natural language processing engine, a natural language interaction between the protected party and a second party is detected. To determine an interaction pattern, the natural language interaction is analyzed. The interaction pattern includes data derived from the monitored communication, metadata of the protected party, and metadata of the second party. Using the interaction pattern and an interaction behavior model, an adverse result of the natural language interaction is predicted, wherein the adverse result comprises an economic loss to the protected party. By notifying the protected party, the predicted adverse result is intercepted.