G06Q30/0248

SYSTEM AND METHOD FOR AN AUTOMATED SYSTEM FOR CONTINUOUS OBSERVATION, AUDIT AND CONTROL OF USER ACTIVITIES AS THEY OCCUR WITHIN A MOBILE NETWORK
20170265076 · 2017-09-14 ·

A system for providing continuous automated verification of user identity and intent includes a processor within at least one server that implements a first processing node and a second processing node for monitoring a mirrored live-data flow of a live-data flow passing through the first processing node in a non-intrusive manner that does not affect the live-data flow passing through the first processing node to detect relevant network access and activity in the mirrored live data flow. At the second processing node, a first set of verification criteria, comprising a first set of dynamically generated dialogue of questions with associated answers to be provided by the at least one user, are dynamically generated based on live data inputs from the mirrored live-data flow and external data sources to verify an identify and an activity of the at least one user attempting to access the network prior to access and performing an activity on the network. A second set of verification criteria, comprising a second set of dynamically generated dialogue of questions with associated answers to be provided by the at least one user, are dynamically generated at the second processing node based on the responses provided by the at least one user to the first set of dynamically generated dialogue of questions to verify the identity and the activity of the at least one user attempting to access the network. A required threshold level is adjusted at which the first and second verification criteria must be met by the at least one user attempting the network access in order to allow or deny the network access and activity by the at least one user. The relevant network access and activity are denied if the verification criteria are not met at the required threshold level, to preempt unverified and unwanted access to and activity on the network by the at least one user. The relevant network access and activity are allowed if the verification criteria are met at the required threshold level. The system continues to monitor and verify the user identity and the user activity for a dynamic time period after access and activity on the network is granted to ensure continued user identity and activity fidelity.

System And Method For Identifying Hidden Content

The present invention provides improved techniques that can be used to identify hidden content and/or advertisements on a digital display page and to tell the illegitimate pieces of hidden content apart from legitimate ones, which provide reduced levels of false results. For example, a technique involves performing a plurality of analyses on a digital display page to determine whether the digital display page includes content is hidden, wherein each analysis may determine a different result based on whether content in the digital display page is delivered but hidden, comparing the resulting determinations of the analyses, when the analyses all determine that the content is not hidden, classifying the digital display page as not including hidden content, and when at least one analysis determines that the content is not hidden and at least one analysis determines that the content is hidden, classifying the digital display page as including hidden content.

Method and system for spam prevention in blockchain advertising

A method for adjusting a spam index for a blockchain advertiser based on user consensus includes: storing an advertiser profile related to an advertising entity including at least an index value and an identification value; receiving new blocks in a blockchain, each including a block header and blockchain data values, where a plurality of the data values each includes an advertiser identifier, advertisement value, and a recipient identifier; receiving a plurality of spam reports, each associated with one of the data values and including at least one of: the advertisement value included in the respective data value or a reference value generated by hashing the respective data value; determining a ratio of a number of spam reports to number of the data values that includes the advertisement value; and adjusting the index value included in the advertiser profile according to the ratio.

BLOCKCHAIN SOLUTION FOR AN AUTOMATED ADVERTISING MARKETPLACE

Aspects of the subject disclosure may include, for example, a device, that includes a processing system including a processor, and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: creating an initial block in a blockchain, wherein the initial block includes first information describing an advertisement spot generated by a viewer device; adding second information to the initial block that identifies a purchaser of the advertisement spot; calculating a cryptographic hash for the initial block; and sending a copy of the cryptographic hash to a network element of a communications network, wherein the network element records the copy of the cryptographic hash in a hash ledger. Other embodiments are disclosed.

LOCATION BASED CONSUMER INTERFACE FOR RETAIL ENVIRONMENT
20210374798 · 2021-12-02 · ·

A location based consumer interface for retail environments includes a plurality of data packet generators distributed around a retail store. The data packet generators include a wireless communication device and are configured to wirelessly transmit codes to mobile computing devices in the retail store. The codes are received by the mobile computing devices, and can be used to present promotional or other content to the consumer, such as content related to the consumer's current location within the store. The codes can also be used for other purposes, such as for use as part of a store rewards program. In some embodiments a vendor is charged a fee for presentation of the content to the consumer.

FACILITATING FRAUD DISPUTE RESOLUTION USING MACHINE LEARNING

In a computer-implemented method of facilitating a fraud dispute resolution process, types of information historically indicative of fraud (or its absence) may be identified by training a machine learning program using transaction data associated with financial transactions and fraud determinations for those transactions. An indication that fraud is suspected for a first transaction may be received, and transaction data may be retrieved. Based upon at least one of the identified types of information and the transaction data, a first set of one or more queries that are designed to ascertain whether the first transaction was fraudulent may be generated. The first set of queries may be transmitted to a remote computing device for display to the customer, and a first set of one or more customer responses may be received. Based upon the first set of customer responses, it may be determined whether the first transaction was fraudulent.

METHOD FOR TRACKING AND MAINTAINING PROMOTIONAL STATES OF SLOTS IN INVENTORY STRUCTURES WITHIN A STORE

One variation of a method for tracking promotional states of slots in inventory structures within a store includes: accessing an image of an inventory structure within a store; detecting a shelf tag on the inventory structure in the image; extracting a set of features from the shelf tag detected in the image; detecting a promotional tag on the inventory structure in the image; extracting a set of features from the promotional tag detected in the image; detecting a deviation between the shelf tag and the promotional tag based on a difference between the sets of features; and, in response to detecting the deviation between the shelf tag and the promotional tag, identifying the first promotional tag as erroneous, and notifying a store associate to replace the first promotional tag with a second promotional tag at the first slot, the second promotional tag correcting the difference.

Identifying and punishing cheating terminals that generate inflated hit rates

Embodiments of the present disclosure disclose an information processing method, a server, and a non-volatile storage medium. The method includes obtaining first log information in a first time period and then obtaining, based on the first log information, terminal information of a terminal that performs a hit behavior on a media information display place. The method includes determining, based on the terminal information, regional information corresponding to the terminal, where the regional information is used to indicate a region in which the terminal is located. The method also includes determining whether the number of regions in which the terminal is located is greater than a first threshold in a preset time range according to the regional information. The method further includes, when the number is greater than the first threshold, obtaining first terminal information of the terminal and determining that the terminal is an abnormal terminal.

Verifying the rendering of video content at client devices using trusted platform modules
11375292 · 2022-06-28 · ·

Systems and methods for verifying the rendering of video content on information resources are provided herein. A server can transmit a video content element having a first bit stream corresponding to a predesignated frame to a client device. The client device can identify the first bit stream as corresponding to the predesignated frame. The client device can decode the first bit stream corresponding to the predesignated frame of the video content element to generate a second bit stream. The client device can transmit, to the server, a tracking message including the second bit stream. The server can compare the second bit stream included in the tracking message from the client device with a third bit stream maintained at a database. The server can determine that the video content element is rendered at the client device responsive to the second bit stream matching the third bit stream.

System and method for location-based advertisement delivery verification

A system and method for enhanced location verification and content delivery confirmation including building a customized pixel for location verification, appending the customized pixel to an ad tag, collecting a combination of data from the pixel, holding the combination of data collected and grouping the held data, and processing the combination of data collected from a previous day by performing a first enrichment process including enriching the combination of data with additional data corresponding to at least one of connection type and latitude and longitude data, wherein latitude and longitude data is based on IP in a case where latitude and longitude information was not provided. The method further includes performing a second enrichment process including enriching the combination of data with location data fields.