G06Q50/265

METHODS AND SYSTEMS FOR TRACKING AND RECOVERING ASSETS STOLEN ON DISTRIBUTED LEDGER-BASED NETWORKS
20230047830 · 2023-02-16 ·

The instant disclosure illustrates how the privacy and security of activities occurring on distributed ledger-based networks (DLNs) can be enhanced with the use of zero-knowledge proofs (ZKPs) that can be used to verify the validity of at least some aspects of the activities without private information related to the activities necessarily being revealed publicly. Methods and systems that are directed at facilitating the tracking and recovery of assets stolen on ZKP-enabled DLNs while preserving the confidentiality of the tokens are presented herein.

DATA COLLECTION APPARATUS, DATA COLLECTION SYSTEM, DATA COLLECTION METHOD, AND COMPUTER READABLE RECORDING MEDIUM
20230050080 · 2023-02-16 · ·

A data collection apparatus (1) according to the present disclosure includes: instruction data collection means (31a) for collecting instruction data representing an instruction that a leader has given to a subordinate, and first time information indicating a time at which the instruction was given, the subordinate being a person who works at a site, the leader being a person who leads the subordinate, and the instruction data and the first time information being data and information transmitted from a leader terminal (20) operated by the leader; site work data collection means (31b) for collecting site work data representing work performed by the subordinate at the site, and second time information indicating a time at which the site work data was detected, the site work data and the second time information being data and information transmitted from a subordinate terminal (11) carried by the subordinate.

Mobile Legal Counsel System and Method
20230047028 · 2023-02-16 ·

An on-demand mobile lawyer method includes receiving a live consultation request from a user, automatically receiving a live-stream of video images of the user and surroundings and storing the video images, automatically searching a plurality of records associated with a plurality of lawyers stored in a remote database, automatically identifying at least one lawyer licensed in a jurisdiction that corresponds to a current location of the user, automatically transmitting at least one notification to the identified at least one lawyer, live-streaming captured video images of the user for viewing by the identified at least one lawyer, automatically receiving and storing live-streaming video images of the identified at least one lawyer in the remote database, and automatically transmitting the live-streaming video images of the identified at least one lawyer to be displayed on a display screen viewable by the user.

SOURCE LOCALIZATION METHOD FOR RUMOR BASED ON FULL-ORDER NEIGHBOR COVERAGE STRATEGY
20230046801 · 2023-02-16 ·

Source localization method for rumor source based on full-order neighbor coverage strategy includes: constructing a network graph according to the user relationship in the actual target area; mapping an actual relationship into the network graph; determining sensors in the network graph, and deploying users corresponding to the sensors as observation users in an actual target area; executing a source inferring strategy when the number of the observation users in the actual target area who have received the rumor reaches an expected scale; calculating source likelihood score of non-sensor nodes in the network graph corresponding to the non-observation users in the actual target area; processing differentially the source likelihood scores; and outputting the non-observation user corresponding to the minimum source likelihood score as the source.

Automatically deployable drone for vehicle accidents

Methods and systems for automatically deploying an autonomous drone from a vehicle in response to a triggering event or accident so that data associated with the triggering event or accident may be automatically obtained are described. In one embodiment, a method for deploying an autonomous drone in response to a triggering event is described. The method includes providing an autonomous drone in a vehicle. The method also includes detecting a triggering event associated with the vehicle. Upon detection of the triggering event, the method includes automatically deploying the autonomous drone from the vehicle. The method further includes implementing, by the autonomous drone, a plurality of automatic actions, including recording data associated with the vehicle in which the autonomous drone is provided.

Detecting security breaches with watchdog transaction accounts

Disclosed are various embodiments for detecting security breaches using watchdog transaction accounts. A security agent can initiate a purchase with a first electronic commerce system and provide a watchdog transaction account as payment for the purchase. The security agent can then store a record of the purchase which includes a merchant identifier for the merchant and the watchdog transaction account. Subsequently, a transaction authorization system can determine that authorization for a transaction with second electronic commerce system failed. If the transaction authorization system determines that the account used in the transaction with the second electronic commerce system, then the transaction authorization system can determine that the first electronic commerce system has suffered a security breach.

Method for vehicle identification and communication between transportation network company (TNC) service users
11577691 · 2023-02-14 ·

A method for effective vehicle identification and communication between riders of transportation network companies (TNC), and the vehicles that are being designated to the riders. Accordingly, a system used to execute the method of the present invention conveys the information of the rider on a display device on the designated vehicle of the rider, so as to notify the rider before getting into the designated vehicle. Additionally, the present invention also helps assist blind people by conveying audio messages, such as pipe messages or announcing their names. Further, the present invention provides riders the ability to send an emergency alert, thereby ensuring a safer ride. Furthermore, the present invention enables TNCs to utilize the display device as a trade dress and as an optional platform for other media advertisements.

Driving mode assessment

An example operation includes one or more of receiving, by a server, data related to an environment associated with a target transport, analyzing, by the server, the data to determine if at least one adverse condition related to the environment exists, and responsive to existence of the at least one adverse condition, sending, by the server, a recommendation related to operation of the target transport in a safe mode to overcome the at least one adverse condition to the target transport.

SYSTEM FOR RECOMMENDING DATA BASED ON SIMILARITY AND METHOD THEREOF

Provided are a system for recommending related data based on similarity, and a method thereof, the system including: a data collection device; an event extraction device; a data cleansing device; an event vector generation device; an artificial intelligence learning device; and a similar data recommendation device. The present disclosure is directed to providing a system for recommending related data based on similarity and a method thereof, wherein unstructured open data on a webpage is collected to automatically generate an event label for determining a similarity relation, and an artificial intelligence (AI)-based model is trained to group and recommend semantically similar related data, thereby effectively helping users including data scientists who want to see meaningful results through open data.

SYSTEMS AND METHODS FOR AUTONOMOUS FIRST RESPONSE ROUTING

A device may receive emergency data, traffic data, network performance data, crime data, and gunshot data associated with a geographical area and may identify a location within the geographical area based on the emergency data, the traffic data, the network performance data, the crime data, and the gunshot data. The device may determine, based on the emergency data, the traffic data, the network performance data, the crime data, and the gunshot data for the location, a risk level for the location and may identify an autonomous vehicle based on the risk level, the traffic data, and the network performance data for the location. The device may determine a route for the autonomous vehicle to the location based on the traffic data and the network performance data for the location, and may perform actions based on the autonomous vehicle and the route.