Patent classifications
G06Q30/0185
Isolating And Reinstating Nodes In A Distributed Ledger Using Proof Of Innocence
Aspects of the disclosure relate to isolating and reinstating nodes in a distributed ledger using proof of innocence. In some embodiments, a first plug-in embedded with the blockchain network may monitor consumer-initiated transactions submitted to an enterprise organization node to determine the legitimacy of each consumer-initiated transaction. The first plug-in may identify consumer-initiated transactions associated with malicious activity and may flag the consumer node for further analysis. A second plug-in may identify and analyze the consumer-initiated transactions associated with the consumer node to determine a proof of innocence value associated with the consumer node. The first plug-in may isolate the consumer node from the distributed ledger if the proof of innocence value exceeds a proof of innocence threshold. Alternatively, the first plug-in may permit the consumer node to remain within the distributed ledger if the proof of innocence value falls below the proof of innocence threshold.
Mobile Legal Counsel System and Method
An on-demand mobile lawyer method includes receiving a live consultation request from a user, automatically receiving a live-stream of video images of the user and surroundings and storing the video images, automatically searching a plurality of records associated with a plurality of lawyers stored in a remote database, automatically identifying at least one lawyer licensed in a jurisdiction that corresponds to a current location of the user, automatically transmitting at least one notification to the identified at least one lawyer, live-streaming captured video images of the user for viewing by the identified at least one lawyer, automatically receiving and storing live-streaming video images of the identified at least one lawyer in the remote database, and automatically transmitting the live-streaming video images of the identified at least one lawyer to be displayed on a display screen viewable by the user.
Detecting security breaches with watchdog transaction accounts
Disclosed are various embodiments for detecting security breaches using watchdog transaction accounts. A security agent can initiate a purchase with a first electronic commerce system and provide a watchdog transaction account as payment for the purchase. The security agent can then store a record of the purchase which includes a merchant identifier for the merchant and the watchdog transaction account. Subsequently, a transaction authorization system can determine that authorization for a transaction with second electronic commerce system failed. If the transaction authorization system determines that the account used in the transaction with the second electronic commerce system, then the transaction authorization system can determine that the first electronic commerce system has suffered a security breach.
Deploying physical diamond tokens on a blockchain
A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.
Identity resolution for fraud ring detection
This disclosure provides systems, methods and apparatuses for identifying fraudulent accounts associated with an electronic payment service. In some implementations, a computing device may retrieve a data set including a number of attributes for each of a multitude of accounts, and may construct a plurality of different graphs each based on a unique set of the attributes. Each graph may include a plurality of nodes linked together by a multitude of edges, where each node identifies a corresponding account and each edge indicates one or more of the corresponding attributes that are common to a pair of accounts. The computing device may determine a likelihood of each graph correctly identifying fraudulent accounts by analyzing groups of nodes connected to each other by corresponding groups of edges using historical account data, and may select the graph having the greatest determined likelihood to predict whether any of the accounts is fraudulent.
Systems and methods for interactive electronic transactions based on GPS=based device proximity data
Methods and apparatus consistent with the present disclosure allow a customer or payor to select from a plurality of nearby vendors or payees when a computing device of the payor is physically close to electronic devices of the payees. Payee devices and locations of those payee devices may be identified and displayed on a display of a payor device. Once displayed, a specific payee device may be selected by the customer and an order for a product or service may be sent to the selected payee device from the payor device. After the product or service has been provided to the customer, information that confirms that purchase may be sent to any of the selected payee device, the payor device, or a payment processing computer and funds to pay for the product or service may be deposited into an account of the payee based on the confirmation.
METHOD, ELECTRONIC DEVICE AND STORAGE MEDIUM FOR REMOTE DAMAGE ASSESSMENT OF VEHICLE
A method for remote damage assessment of a vehicle is provided. The present disclosure relates to the technical field of artificial intelligence, in particular to the technical field of image and text recognition. An implementation solution is: performing data collection on a target vehicle to determine damage information of the target vehicle; obtaining call content of an insurance claiming call for the target vehicle, and extracting accident-related information from the call content, wherein the accident-related information includes named entities in the call content and a relationship between the named entities; and determining a first fraud probability corresponding to the target vehicle at least based on the damage information and the accident-related information.
Method for provisioning a container with food
Method for providing a container with food, the method comprising: providing a container for infant formula food, adding the food, sealing the container with a gas-tight membrane seal, adding an inner scannable code on the gas-tight membrane seal, closing the container with a tamper-proof closure means, so that the inner scannable code is not scannable without breaking a part of the tamper-proof closure means, and storing the inner scannable code in a database.
SYSTEMS, METHODS AND PROGRAMS FOR GENERATING DAMAGE PRINT IN A VEHICLE
The disclosure relates to systems, methods and computer readable media for providing network-based identification, generation and management of a unique damage (finger) print of vehicle(s) by geodetic mapping of stable key points onto a ground truth 3D model of the vehicle, and vehicle parts—identified from the raw images using supervised and unsupervised machine learning. Specifically, the disclosure relates to System and methods for the generation of unique damage print on a vehicle that is obtained from captured images of the damaged vehicle, photogrammetrically localized to a specific vehicle part, and the computer programs enabling the method, the damage print configured to be used, for example, in fraud detection in insurance claims.
System Providing Self-Service Access to Locked Merchandise
A system providing self-service access to locked merchandise comprising: (a) providing a fixture that restricts access to the locked merchandise, wherein the fixture can automatically lock or unlock, allowing or restricting access to the locked merchandise; (b) providing a means of uniquely identifying an individual attempting to access the merchandise; (c) measuring a set of behaviors of the individual during any time the fixture is an open mode; (d) assessing whether the set of behaviors of the individual are suspicious or not relative to a set of suspicious event thresholds; (e) storing the individual and their set of behaviors as accessible records in at least one database; and (f) providing an algorithm which determines future access privileges of the individual to the enclosure based on a set of variables.