G06Q30/0185

Tokenizing scarce goods with provenance history bound to biological fingerprints

Techniques for enabling the creation of a digital asset representation of physical goods (e.g., luxury items) produced in limited quantities or heirloom-goods associated with restricted ownership rules. Anti-counterfeiting mechanisms are proposed for both classes of goods. The provenance of both classes of goods is traced using cryptography and decentralized ledger technology. For example, mechanisms to restrict ownership of heirloom-goods are proposed based on the combination of the DNA biological fingerprint of the patron who originated the goods and smart contract technology. The goods can be represented as digital tokens on the blockchain, binding manufacturing evidence to the token. For heirloom-goods that have restricted ownership rules, persons seeking to acquire the good via the digital token and smart contract are required to prove that they satisfy the entitlement rules based on a biological relationship to the patron.

Concatenated shipping documentation processing spawning intelligent generation subprocesses
11574280 · 2023-02-07 · ·

Systems and methods which provide shipping management system shipping documentation generation operation which spawns intelligent generation subprocesses are described. The intelligent generation subprocesses of embodiments facilitate autonomous shipping documentation generation functionality of a concatenated shipping documentation generation process. A user may initiate a shipping documentation generation process, whereby an intelligent generation subprocess is spawned, and thereafter the user may be freed to perform one or more independent operation and/or interaction with the shipping management system. One or more verifications, checks, warnings, and/or the like are suspended and one or more parameter, input, selection, and/or the like are defaulted for operation of an intelligent generation subprocess of embodiments. Embodiments implement a documentation queue to provide historical information with respect to intelligent generation subprocess operation.

Method, system, and computer program product for identifying a malicious user

A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.

Integrating fraud telemetry vendor

A firm computer system is configured to add a new third party telemetry vendor. An incumbent third party telemetry vendor communicates with the firm computer system using HTTP requests that include HTTP headers, including a first telemetry-related HTTP header. The new third party telemetry vendor communicates with the firm computer system using HTTP requests that include the first telemetry-related HTTP header. The new third party telemetry vendor appends its telemetry data to the first telemetry-related HTTP, separating it in the first telemetry-related HTTP from telemetry data from the incumbent third party telemetry vendor according to a predefined syntax.

Registered applications for electronic devices

The subject technology provides a portion of the functionality of an application on an electronic device on which the application is not installed. The portion of the functionality of the application is provided by a clip of the application that can be obtained, installed, and launched on the user device, at the time the functionality is desired by a user, and without authenticating information for the user. The clip of the application can provide the user with access to a purchase function, an ordering function, or any other sub-function of the application. When the application itself is installed on the device, the clip of the application can be deleted while preserving access, by the application, to data generated on the device by the clip.

System and method for using unique device identifiers to enhance security

A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.

Systems and methods for identity graph based fraud detection

A method and apparatus for fraud detection during transactions using identity graphs are described. The method may include receiving, at a commerce platform system, a transaction from a user having initial transaction attributes and transaction data. The method may also include determining, by the commerce platform system, an identity associated with the user, wherein the identity is associated with additional transaction attributes not received with the transaction. Furthermore, the method may include accessing, by the commerce platform system, a feature set associated with the initial transaction attributes and the additional transaction attributes, wherein the feature set comprises machine learning (ML) model features for detecting transaction fraud. The method may also include performing, by the commerce platform system, a machine learning model analysis using the feature set and the transaction data to determine a likelihood that the transaction is fraudulent, and performing, by the commerce platforms system, the transaction when the likelihood that the transaction is fraudulent does not satisfy a transaction fraud threshold.

MONITORING GOODS OFFERED FOR SALE ONLINE

A method of detecting attempts by online sellers to sell counterfeit goods on the internet, or to sell goods which they are not authorised to sell, is described. The user of a browser-enabled device when viewing a target website can determine whether the target website content is authorised or not. The browser may have a plug-in which allows the user to capture data from a target website, and send the data to a secure server which has access to or which stores data from the legitimate content owner or user. The data is then analysed to determine whether its use on the target website is authorised or legitimate, or not, and a warning or clearance message can then be sent from the secure server to the browser-enabled device to display that message to the user.

EXCLUSIVE SOCIAL NETWORK BASED ON CONSUMPTION OF LUXURY GOODS
20180006990 · 2018-01-04 ·

Network node devices that may be embedded into luxury goods are described. These devices may allow luxury goods to offer access to a social networking system that is based upon ownership of luxury goods, and may also be used to verify the authenticity of the luxury goods. The devices may include an interface so that the device may communicate with other network node devices, including other products or a smartphone or other device, and a memory that stores a unique identifier of the brand or of the luxury good itself.

METHOD FOR AUTHENTICATING FINANCIAL INSTRUMENTS AND FINANCIAL TRANSACTION REQUESTS

A method for authenticating a check of a plurality of checks where the check was previously issued from a first party to a second party, including receiving first information from the first party, storing the first information in a file of a third party and receiving the check. The check has first party identifying information, a unique pseudorandom number of a pseudorandom sequence, and an amount. A status of activating the plurality of checks is determined. At least a portion of the first party identifying information included with the check, the unique pseudorandom number included with the check and the check amount included with the check are authenticated. The received check is authenticated if the first party, the unique pseudorandom number included with the check and the amount included with the check are authenticated and if the plurality of checks have been activated.