Patent classifications
G06Q30/0248
Methods and Apparatuses for Electronic Verification
A method implemented by an electronic verification system for verifying that an advertisement to engage in an activity is placed by a particular validated user whose identity is validated. The method comprises the electronic verification system receiving information that describes an advertisement to engage in an activity and that indicates when the particular validated user has or will place that advertisement. The method comprises creating referral information configured to be published in conjunction with the advertisement and to direct an advertisee to an electronic log of one or more advertisements placed by the particular validated user. The method comprises generating the electronic log to indicate when the particular validated user has or will place the advertisement described by the received information. The method comprises publishing the electronic log to be accessible in accordance with the referral information.
Methods and apparatus for detection of spam publication
In various example embodiments, a system and method for determining a spam publication using a spam detection system are presented. The spam detection system receives, from a device, an image of an item and an item attribute for the item. Additionally, the spam detection system extracts an image attribute based on the received image, and compares the item attribute and the image attribute. Moreover, the spam detection system calculates a confidence score based on the comparison. Furthermore, the spam detection system determines that the item attribute is incorrect based on the confidence score transgressing a predetermined threshold. In response to the determination that the item attribute is incorrect, the spam detection system causes presentation, on a display of the device, of a notification.
Content distribution channel selection, transcoding, and tracking gateway
An auxiliary content delivery gateway. The gateway comprises a processor, a non-transitory memory, and an application stored in the non-transitory memory. When executed by the processor the application creates auxiliary content request messages comprising a collaborator mediation indication based on requests for auxiliary content received from a plurality of mobile communication devices and transmits the auxiliary content request messages to a plurality of auxiliary content sourcing channels, whereby the auxiliary content sourcing channels discern that the auxiliary content request messages do not constitute click-fraud based on the collaborator mediation indication in the auxiliary content request messages. The application further receives auxiliary content response messages from the plurality of auxiliary content sourcing channels and transmits selected auxiliary content to the mobile communication devices based on the auxiliary content response messages.
DETECTOR, DETECTION METHOD, AND DETECTION PROGRAM
A feature extraction unit extracts, from an advertising request to view an online advertisement, client information on a client as a transmission source of the advertising request and publisher information on a website of a publisher who displays advertising, and calculates a predetermined feature amount using the client information and the publisher information with respect to a plurality of advertising requests including at least a benign advertising request, and a determiner generation unit generates a determiner that determines whether an advertising request is malignant or not by using the calculated feature amount.
Systems and methods for dynamically identifying illegitimate accounts based on rules
Systems, methods, and non-transitory computer-readable media can receive a set of accounts associated with a specified time frame. One or more features and one or more feature combinations can be analyzed for each account in the set. Feature metrics for the one or more features and the one or more feature combinations can be determined for each account in the set. Threshold values for the feature metrics can be acquired. At least one rule can be implemented based on at least some of the feature metrics and at least some of the threshold values.
INTERCEPTING INADVERTENT CONVERSATIONAL DISCLOSURE OF PERSONAL INFORMATION
By intercepting a natural language communication of a protected party, the communication is monitored, wherein the protected party is a human being. Within the monitored communication using a natural language processing engine, a natural language interaction between the protected party and a second party is detected. To determine an interaction pattern, the natural language interaction is analyzed. The interaction pattern includes data derived from the monitored communication, metadata of the protected party, and metadata of the second party. Using the interaction pattern and an interaction behavior model, an adverse result of the natural language interaction is predicted, wherein the adverse result comprises an economic loss to the protected party. By notifying the protected party, the predicted adverse result is intercepted.
Managing electronic messages with a message transfer agent
Provided herein is an electronic message management platform that enables management and execution of electronic message campaigns while appropriately managing challenges presented by spam filters, black lists, and domain blocking technologies, and that includes elements for managing an electronic message campaign based on dynamic conditions, quality measures, engagement factors, and other measures, factors and conditions.
METHOD, APPARATUS AND STORAGE MEDIUM FOR DEFENDING AGAINST MALICIOUS CLICKS
The present invention discloses a method, apparatus and a storage medium for defending against malicious clicks. The method includes: acquiring a shielding policy corresponding to promotional content; determining a user in a shielding policy list as the user to be shielded based on the shielding policy and historical click information of users; and performing shielding processing on the promotional content for the user to be shielded, if the user to be shielded in the shielding policy list conducts a retrieval. According to the technical solution provided by the embodiments of the present invention, malicious clicks are prevented at the stage of displaying promotional content in a front end of a server. On one hand, it is possible to determine malicious clicks based on real-time click information and provide a timely and effective defense, improving the timeliness of the defense; on the other hand, the shielding policy may be set by the businesses, enhancing the independence of the business in preventing malicious clicks.
Systems and methods for using secured representations of user, asset, and location distributed ledger addresses to prove user custody of assets at a location and time
Systems and methods described herein are directed to using a distributed ledger network and devices that transmit secured representations of distributed ledger addresses to prove the custody of an asset by a user at a particular location and time. In some implementations, a method includes: transmitting to a server system operating as a node on a distributed ledger network: a first secured representation of a distributed ledger address associated with a first location; a second secured representation of a distributed ledger address associated with an asset; and a third secured representation of a distributed ledger address associated with a user; and receiving a confirmation message from the server system.
Systems and methods for discovery and tracking of web-based advertisements
Systems and methods are provided for discovering advertisements on publisher web pages and for identifying placement pathways by which discovered advertisements have been placed on the publisher web pages. An advertisement tracking and discovery system may use multiple web crawler applications to explore multiple publisher websites. The web crawler applications may gather advertisement data that includes times associated with each request made by the web crawler application. The system may use the gathered advertisement data and the times associated with each request to determine the placement pathways by which discovered advertisements have been placed. Each placement pathway may include one or more advertising channels or combinations of advertising channels. The system may accumulate and aggregate advertising data associated with the advertisements and the placement pathways and display the aggregated advertising data to a customer.