Class / Patent application number | Description | Number of patent applications / Date published |
705140470 | Avoiding fraud | 62 |
20090313116 | DISTRIBUTED CONTENT EXCHANGE AND PRESENTATION SYSTEM - An Internet-oriented advertising exchange controller presents website content in a plurality of frames as well as support search criteria and other flexible forms of inventory formatting and delivery. Applications include Internet protocol request coordination or relay, cooperative frame based or interstitial advertising, and support for a local search or dataless metasearch system. The controller operates in a cookieless environment, has logic to protect advertiser's investment from AutoSurf equivalent systems, and protects against other inappropriate stimuli including denial of service or IP blast attacks. As such, an advertiser's credits are affected only by human stimuli. Communication with and among exchange controllers for sharing or delivering information about inventory occurs by a number of protocols with optional encryption. The controller provides a foundation for a robust, advertiser protective, web based advertising and network search system with economic support by use of unstoppable framesets, and ultimately frame-based advertising and presentation methods. | 12-17-2009 |
20100131359 | SYSTEM AND METHOD FOR SECURING INVOCATIONS FOR SERVING ADVERTISEMENTS AND INSTRUMENTATION IN ONLINE ADVERTISING - An improved system and method for securing invocations for serving advertisements and instrumentation in online advertising is provided. An advertisement exchange server may provide services for publisher servers to add executable instructions to securely display online advertisements on a client device within allocated space of a web page of content published by the publisher servers. A client device may retrieve a document with added executable instructions and execute the executable instructions that may calculate a checksum, extract the internet protocol address of the publisher server, and send a request with the checksum and internet protocol address of the publisher server to retrieve an advertisement to display with content of the document. The advertisement exchange server may verify that the checksum is valid for the internet protocol address of the publisher server and may send the request to an advertiser server to serve an advertisement to the client device. | 05-27-2010 |
20100228624 | SYSTEMS AND METHODS FOR USING VERIFIED INFORMATION CARDS IN A COMMUNICATIONS NETWORK - Digital information cards associated with verified information about users are described. The cards can be used to optimize a network communications experience or interaction for a user and a commercial entity, such as a website provider. The cards can be user-centric in that the user can control access to information associated with the card. A website can access the information claim using a link of the information card and can customize a user's website experience based on the verified information claim. | 09-09-2010 |
20100250364 | Privacy Protected Anti Identity Theft and Payment Network - A computerized and networked system protects individuals against identity theft without the need to disclose the detailed personal information of the individuals. Furthermore, the system helps prevent loss and damage to consumers, financial institutions and merchants caused by financial crimes related to identity theft. In addition, users can conduct payments in a secure manner without the need to use any traditional financial instrument. A pass code can be generated for each transaction and sent to a user's personal communications device. When the correct pass code is received from the user, the transaction is then authorized. | 09-30-2010 |
20110231249 | METHOD AND SYSTEM TO DETECT INVALID AND FRAUDULENT IMPRESSIONS AND CLICKS IN WEB-BASED ADVERTISEMENT SYSTEMS - This invention improves upon existing pay-per-click arrangements periodically generating a code associated with the search-engine users. This code, preferably in the form of a serial number, is compared to the user of the website, such that by observing a metric like the number of clicks for a given period of time, be it a short time or a longer period, such as a day or a week, the system can automatically determine if certain clicks are illegitimate. This allows the pay-per-click company to more fairly invoice the merchants, thereby preventing fraudulent over use. | 09-22-2011 |
20110313854 | ONLINE ADVERTISING VALUATION APPARATUS AND METHOD - A method comprising for determining the value provided to an advertiser through the advertiser's online advertisements. The method may begin with providing an online advertisement linked to content. A macro-context may be obtained that quantifies the affinity of the content for a plurality of domains corresponding to a semantic space. A personalization vector may be obtained that quantifies the affinity of at least one aspect of a user for the plurality of domains. The user may then select the online advertisement. A match value may be calculated that quantifies the similarity between the personalization vector and the macro-context. The advertiser may then be charged a monetary amount for the user's “click.” The monetary amount may be based, at least in part, on the match value. | 12-22-2011 |
20120059712 | WEB ENHANCING SYSTEMS AND METHODS - A web based system with (a) a data server, (b) a web server, and (c) a client server with web browser capability is disclosed that utilizes, manipulates, and creates web content. The system uses additional web servers and other devices such as cameras, camcorders, microphones, trucks, storage units, etc. to result in innovative system capabilities. Eight specific innovative systems resulting from this invention are disclosed in this patent application: (i) web content authentication system, (ii) linguistic vocal sounds registration system, (iii) web ad authentication system, (iv) web-based functionality/interactivity system, (v) web-based expert consulting system, (vi) web-based logo branding system, (vii) web-based grocery shopping system, and (viii) a Point-N-Learn system. | 03-08-2012 |
20120084146 | CLICK FRAUD DETECTION - Systems and methods for detecting instances of click fraud are disclosed. Click fraud occurs when, for example, a user, malware, bot, or the like, clicks on a pay per click advertisement (e.g., hyperlink), a paid search listing, or the like without a good faith interest in the underlying subject of the hyperlink. Such fraudulent clicks can be expensive for an advertising sponsor. Statistical information, such as ratios of unpaid clicks to pay per clicks, are extracted from an event database. The statistical information of global data is used as a reference data set to compare to similar statistical information for a local data set under analysis. In one embodiment, when the statistical data sets match relatively well, no click fraud is determined to have occurred, and when the statistical data sets do not match relatively well, click fraud is determined to have occurred. | 04-05-2012 |
20120136717 | TRANSACTION TRACKING, MANAGING, ASSESSMENT, AND AUDITING DATA PROCESSING SYSTEM AND NETWORK - An improved processing system for tracking commerce on the Internet provides for subvariable processing and includes web page scanning to discern fraud or improper content to insure proper promotion of select products within the network environment. | 05-31-2012 |
20120143680 | SYSTEM AND METHOD FOR DELIVERING AN AUTHORIZED IN-STORE PROMOTION TO A CONSUMER - A system and method for delivering an authorized in-store promotion to a consumer includes storing in an offer database a plurality of offer data items for use in creating an in-store promotion. The method further includes storing in an authorization database an authorization parameter. In response to receiving a request from a consumer device to present the in-store promotion, the server uses the authorization parameter to verify that the request is authorized without requesting additional information from a consumer operating the consumer device. When the request is authorized, the server dynamically generates the in-store promotion using at least one of the plurality of data items stored in the offer database. Once generated, the server transmits the in-store promotion to the consumer device without any system-specific client software to be stored by the consumer device. | 06-07-2012 |
20120173328 | DIGITAL ADVERTISING DATA INTERCHANGE AND METHOD - An interchange enables advertising data to be interchanged among providers for serving the advertising data on different provider technology platforms and consumers for using the advertising data on different consumer technology platforms. The interchange includes provider connectors for connecting all the providers to a network, and consumer connectors for connecting all the consumers to the network. A host controller executes a standardized provider application programming interface (API) on the network to enable each provider to serve the advertising data via a respective provider connector over the network to at least one of the consumers, and for executing a standardized consumer API on the network to enable each consumer to use the advertising data via a respective consumer connector over the network from at least one of the providers. | 07-05-2012 |
20120310734 | TRANSACTION TRACKING, MANAGING, ASSESSMENT, AND AUDITING DATA PROCESSING SYSTEM AND NETWORK - An improved processing system for tracking commerce on the Internet provides for subvariable processing and includes web page scanning to discern fraud or improper content to insure proper promotion of select products within the network environment. | 12-06-2012 |
20130080248 | METHOD FOR PERFORMING REAL-TIME CLICK FRAUD DETECTION, PREVENTION AND REPORTING FOR ONLINE ADVERTISING - The present invention provides a method of detecting fraudulent clicks in an online environment to reduce fraudulent paid clicks for online advertisers. The method includes server side and client side code which combined enables a click verification web site to identify valid and invalid clicks and in real-time prevents advertisers from getting billed for fraudulent activity. | 03-28-2013 |
20130117104 | METHOD AND SYSTEM TO DETECT INVALID AND FRAUDULENT IMPRESSIONS AND CLICKS IN WEB-BASED ADVERTISEMENT SYSTEMS - This invention improves upon existing pay-per-click arrangements periodically generating a code associated end users. This code, preferably in the form of a serial number, is compared to the end user of the website, such that by observing a metric like the number of clicks for a given period of time, be it a short time or a longer period, such as a day or a week, the system can automatically determine if certain clicks are illegitimate. This allows the pay-per-click company to more fairly invoice the merchants, thereby preventing fraudulent over use. | 05-09-2013 |
20130124306 | VOUCHER CODE REDEMPTION VIA SMS - A voucher verification system is based on SMS message-based processing of voucher verifications by a central verification authority. Merchants may establish an account with the system and then register mobile communication devices and those of employees by sending an SMS-based registration request to the system. Once registered, the merchant and employees may verify the status of vouchers by sending SMS-base verification requests to the system. Verifications of voucher status are returned to the merchant mobile device via SMS messaging. | 05-16-2013 |
20130124307 | DEVICE AND METHOD FOR AUTOMATICALLY DISTRIBUTING PROMOTIONAL ITEMS - A device for automatically distributing promotional items stores a plurality of promotional items and distributes the selected promotional items according to a demand by a user. The device includes: display and input units for the display and the manipulation by a user; an access code recognition unit for recognizing an access code provided by the user; a memory for storing reference data to be compared with the recognized access code; a promotional item storing unit and a promotional item output unit for storing and distributing the promotional items to the user; and a controller that compares the reference data and the access code with each other, which determines whether to distribute the promotion item selected by the user or not, and controlling the respective sections according to the determination. | 05-16-2013 |
20130144714 | Method, Apparatus and System for Supporting Advertisement Contents in HTTP Streaming Play Mode - A method, apparatus and system for supporting advertisement contents in an HTTP streaming play mode. The method comprises: receiving media presentation description information from a server, wherein advertisement content support information is included in the media presentation description information; acquiring and playing advertisement contents according to media presentation information; requesting for media contents from the server according to the advertisement content support information and playing conditions of the advertisement contents. By means of verification, the embodiments of the present invention enable the media contents transmitted by adopting the HTTP Streaming mode to support advertisement contents without only depending on the rule files performed by the client, enables the result of watching the advertisement effectively impact on the subsequent request, acquisition and play for the content slices and improve the difficulty and level for avoiding the advertisements. | 06-06-2013 |
20130173383 | Method Of, And System For, Authenticating And Custom Marketing Products In Response To Their Authentication - Authentication information and product identification information associated with a product are captured by a portable interrogation device held and operated by a user. An authentication server determines from the captured authentication information whether the product is genuine or counterfeit. In response to the authentication, a marketing server identifies the product from the captured product identification information, and sends customized transactional information about the product to the device. | 07-04-2013 |
20130185147 | Inferred Dynamic Offers Subject To Mobile Device Holder Location - Systems, apparatus and methods that give selling actors the abilities and means to sell products and services by providing inferred dynamic offers to buying actors subject to buying actors locations. | 07-18-2013 |
20130218670 | SYSTEMS AND METHODS TO PROCESS AN OFFER CAMPAIGN BASED ON INELIGIBILITY - In one aspect, a computing apparatus is configured to represent offer rules based on requirements for the detection of predefined types of events and actions scheduled to be performed in response to the detection of each occurrence of the events. The events are independent from each other in processing and are linked via prerequisite conditions and/or ineligibility conditions to formulate the requirements of an offer campaign. In one embodiment, the ineligibility of a user, participating in the offer campaign, to meet the requirements of a first event leads to the monitoring of a second event that has a prerequisite condition formulated based on the ineligibility of the user to meet the requirements of the first event; and the second event provides an alternative path within the offer campaign when the user cannot meet the requirements of the first event. | 08-22-2013 |
20130262221 | SYSTEM AND METHOD FOR PROVIDING ENDORSED ELECTRONIC OFFERS BETWEEN COMMUNICATION DEVICES - A system and method are disclosed for distribution of advertisements and electronic offers between communication devices. The system and method provides for accounting and distribution of incentives related to distribution of the advertisements and offers. A bi-directional selection between subscribers and advertisers using the system is created whereby both advertisers and subscribers agree to participate in the distribution of advertisements and offers. The system further provides for a means of redeeming offers utilizing points of sale and analytics associated to the redemption of electronic offers. | 10-03-2013 |
20130317904 | SYSTEMS AND METHODS FOR DETERMINING ADVERTISING COMPLIANCE - Systems and methods for determining advertising compliance are provided. More specifically, various embodiments of the present invention relate to systems and methods for tracking, ranking, and enforcing the placement of advertisements in websites in accordance with one or more advertising policies. Some embodiments provide for a system where a user can enter text advertising campaigns for evaluation. The results can be ranked and the user can determine if any disputes need to be submitted for the violation of advertising policies. | 11-28-2013 |
20130332268 | SELECTIVE CUSTOMER INTERACTIONS OVER A COMPUTER NETWORK - Methods for selling items over a computer network can include: after a first set of customers has purchased, during a first time period, at least a threshold value or number of items of a first set of items: (a) during a second time period after the first period, offering for sale to the first set of customers an index set of items; (b) throughout the second period, preventing substantially all persons other than the first set of customers from purchasing the index set of items; and (c) during a third time period, offering for sale to a second set of customers, different from the first set of customers, any of the index set of items not sold to the first set of customers during the second period. | 12-12-2013 |
20130346191 | PROMOTION VERIFICATION METHOD - A promotion verification method which is based upon locally stored information. The promotion verification method includes recording entry of a promotion code by a computer, determining a key from the promotion code by the computer, and applying the key to obtain promotion information associated with the promotion code by the computer. | 12-26-2013 |
20140006145 | EVALUATING PERFORMANCE OF BINARY CLASSIFICATION SYSTEMS | 01-02-2014 |
20140032312 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING OFFERS TO MOBILE WALLETS - Systems, methods, and computer program products are provided for providing offers to mobile wallets. A request including offer data and authentication data is received from a client portal system. The authentication data is validated. A validation result based on the validation of the authentication data is generated. A response including the validation result is transmitted to the client portal system. An offer including the offer data is transmitted to a mobile device. The offer data includes an offer identifier (ID), and the mobile device includes a mobile wallet associated with the authentication data. | 01-30-2014 |
20140095302 | Enhanced Commercial Offer Presentation System - The present application discloses devices, methods and systems that target a user with commercial offers having geographic and/or time-based qualities. The invention can include an aggregation system that presents the user with a map showing aggregated data for a plurality of commercial offers within a predetermined geographic area. The commercial offers can be presented to users in a staggered time-based manner to negate or minimize overwhelming a vendor with a large but temporary increase in business due to a plurality of users utilizing commercial offers. The commercial offer can also diminish over time to better determine the ability of the commercial offer system to acquire repeat business for the vendor. | 04-03-2014 |
20140114752 | METHOD AND SYSTEM FOR DYNAMICALLY SCREENING ADVERTISEMENT - Method and system for dynamically screening advertisement on a media are adapted to be used in the field of e-commerce. Information of at least one advertised object and/or at least one advertisement rule of the media are monitored with a monitoring unit to determine if any change occurs. If the occurrence of a change is determined, for example by the monitoring unit, information of the advertised object(s) is examined by a screening unit. | 04-24-2014 |
20140156390 | Methods, Systems, and Computer Program Products that us Measured Location Data to Identify Sources that Fraudulently Activate Internet Advertisements - Potential click fraud is determined. When a client device activates an Internet advertisement, the location of the client device is determined. Multiple activations of the same advertisement, by the client device, may indicate fraud. | 06-05-2014 |
20140172551 | Using Transaction Data and Platform for Mobile Devices - Systems and methods for using historical and current financial transaction data in implementing a marketing strategy are provided. A system and method can include updating stored signature data using current data associated with an entity. The signature data includes historic data including credit card transactions or debit card transactions associated with the entity. One or more model variables are generated using the updated signature data associated with the entity. A marketing score for the entity is determined by applying one or more model variables to a marketing model. The marketing score indicates a likelihood that the entity will respond to an offer. Whether the marketing score exceeds a predetermined marketing threshold is determined. Based upon determining that the marketing score exceeds the predetermined marketing threshold and determining that the entity is within the geographic area, an indication for triggering transmission of the offer to the entity is generated. | 06-19-2014 |
20140172552 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. | 06-19-2014 |
20140188599 | Click Quality Classification and Delivery - In one embodiment, a method includes receiving a packet flow associated with a click-through from an end user node destined for an advertiser server; extracting information from the packet flow; analyzing the extracted information to determine one or more characteristics of the packet flow; and classifying the packet flow based on the determined one or more characteristics; modifying the packet flow to include classification information to provide classification information indicating a quality level of the click-through. The packet flow may include a hypertext transfer protocol GET request. Modifying the packet flow may include adding a tag with classification information that indicates a likelihood of fraudulent click behavior associated with the packet flow. | 07-03-2014 |
20140244382 | FRAUD PREVENTION AND DETECTION FOR ONLINE ADVERTISING - A system and a method are disclosed for detecting and preventing fraud in online advertising environments. In one embodiment, the system and process include a publisher with a web page with which an advertisement set and a unique request identifier are sent to a user browser when the user requests the web page. The unique request identifier is unique, publisher specific, advertisement specific, for a single instance. A database keeps track of the unique request identifier so that when a user “clicks” on a link to access an advertiser's web site, the unique request identifier associated with the advertisement can be checked against the unique request identifier in the database to determine whether the “click” was one that may be non-fraudulent or valid. | 08-28-2014 |
20140278946 | ADVERTISEMENT AND ACTUAL BENEFIT DISTRIBUTION IN A GEOCACHING/TREASURE HUNTING ENVIRONMENT - An example embodiment includes a method including receiving a seeker inquiry. The method includes communicating coordinates of a geocache in response to the seeker inquiry. The geocache includes a geoseed that is sponsored by an advertiser. The method also includes identifying an actual benefit provided for locating the geoseed. The actual benefit is associated with the advertiser. The method includes receiving a confirmation signal indicating a seeker has located the geocache. The confirmation signal includes verification information specific to the geoseed. The method also includes authenticating the verification information. The method also includes awarding the seeker the actual benefit. | 09-18-2014 |
20140278947 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. Other embodiments use target URL defined conditions of interstitial interaction to determine click validity and monetary value and in the event of a valid click continuing to the target URL and optionally measuring on-site behavior. Further embodiments measure data from an original click, observe interstitial behavior and optionally merge target URL website measured behavior into a database providing user data for each individual click. Other embodiments generate reports specific to seeking credits for payments on invalid clicks and other website intelligence. Exemplary embodiments provide for varying implementations, including e.g. implementations through search engines and standalone services. | 09-18-2014 |
20140304067 | DETECTING PROHIBITED DATA USE IN AUCTION-BASED ONLINE ADVERTISING - Techniques are provided that relate to online advertising, such as in connection with an auction-based online advertising market, including techniques for determining evidence of prohibited use of user segment information by an advertiser. Segment information may be utilized in allowing a targeted advertising opportunity for an advertiser. The advertiser may, for example, have agreed not to use such segment information outside of the allowed opportunity. Particular users in a segment may be identified and utilized as indicator users for use in determining evidence of prohibited use of segment information by an advertiser in bidding occurring after the targeted advertising opportunity. For example, later advertiser bidding relating to near-threshold in-segment or out-of-segment indicator users may be analyzed. Alternatively or additionally, for example, bidding relating to false positive or false negative indicator users may be analyzed, where such indicator users may be falsely identified by an advertiser as being in-segment or out-of-segment. | 10-09-2014 |
20140304068 | SYSTEM AND METHOD FOR PROVIDING INAUDIBLE CODES AND CORRESPONDING INFORMATION TO USERS VIA THEIR COMPUTING DEVICES - In accordance with embodiments of the invention, systems and methods are provided to facilitate the processing of inaudible codes in audio and audio/visual streams broadcast over television, radio, computer, or in piped music/muzak, for example, by computing devices, such as mobile devices and computers. The inaudible codes are associated with items of information provided by third parties, such as coupons, offers, advertising, explanatory information, etc. The mobile devices may be a smart phone, tablet, laptop computer, digital reader, etc. Codes and corresponding items may be provided to a computing device by a code/offer management system via a network, and stored by the computing device, upon the request of the respective device. When an inaudible code is received and identified by a respective device, it is compared to the stored codes and if there is a match, the corresponding offer may be identified and displayed or offered for display. | 10-09-2014 |
20140310095 | MOBILE CLICK FRAUD PREVENTION - A system is disclosed for detecting and handling click fraud in a mobile environment. The system may identify a source of a request. The request may be handled differently based on whether the source of the request originated from mobile traffic or web traffic. The source of the request may be used to determine whether a request is valid or invalid. The request may be flagged if the request is invalid. | 10-16-2014 |
20140324573 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. Other embodiments use target URL defined conditions of interstitial interaction to determine click validity and monetary value and in the event of a valid click continuing to the target URL and optionally measuring on-site behavior. Further embodiments measure data from an original click, observe interstitial behavior and optionally merge target URL website measured behavior into a database providing user data for each individual click. Other embodiments generate reports specific to seeking credits for payments on invalid clicks and other website intelligence. Exemplary embodiments provide for varying implementations, including e.g. implementations through search engines and standalone services. | 10-30-2014 |
20140330641 | System and Method for Verifying Completion of an Activity - A system and method for verifying completion of an activity are provided. The system comprises a scanner operable to obtain token data obtainable based on completion of an activity; and a server operable to obtain the token data from the scanner to verify completion of the activity. The method comprises obtaining token data from completion of an activity and providing the token data to a server to verify completion of the activity. | 11-06-2014 |
20140358678 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. | 12-04-2014 |
20150032533 | SYSTEM AND METHOD FOR CLICK FRAUD PROTECTION - A system and method for preventing click fraud and/or determining invalid clicks are provided to measure click related data, decide according to target URL defined conditions whether to present an Intelligent interstitial, decide according to target URL defined conditions how to populate the interstitial and then measure Search user interaction with the interstitial. | 01-29-2015 |
20150046254 | SYSTEM AND METHOD FOR DISPLAY RELEVANCE WATCH - A system and method for relevancy of display placement, comprising a processor on non-transitory memory that compiles transactional information from advertisers, publishers and users and provides an interface that allows the advertiser to determine relevancy of the placement based on the activity of the user and publisher information. | 02-12-2015 |
20150051970 | METHODS AND SYSTEMS FOR DETECTING FRAUDULENT ADVERTISEMENTS IN PAY-PER-CALL ADVERTISING - A method includes monitoring electronic network advertisements for policed advertising content via a fraud monitor, retrieving a pay-per-call advertisement of an advertiser via the fraud monitor based on the monitoring, analyzing the pay-per-call advertisement via the fraud monitor to confirm it as a suspect pay-per-call advertisement, establishing a fraud-detection telephone call via an advertisement telephone number of the suspect pay-per-call advertisement from a control telephone number of the fraud monitor and in response thereto connecting the fraud-detection telephone call to a target telephone number of the advertiser via a connection provider, and tracking and storing fraud-detection telephone call information, including the advertisement telephone number, the control telephone number, a publisher reference associated with the suspect pay-per-call advertisement, and the target telephone number, via the fraud monitor, of a telephone connection between the control telephone number and the target telephone number. | 02-19-2015 |
20150051971 | CLICK QUALITY CLASSIFICATION AND DELIVERY - In one embodiment, a method includes receiving a packet flow associated with a click-through from an end user node destined for an advertiser server; extracting information from the packet flow; analyzing the extracted information to determine one or more characteristics of the packet flow; and classifying the packet flow based on the determined one or more characteristics; modifying the packet flow to include classification information to provide classification information indicating a quality level of the click-through. The packet flow may include a hypertext transfer protocol GET request. Modifying the packet flow may include adding a tag with classification information that indicates a likelihood of fraudulent click behavior associated with the packet flow. | 02-19-2015 |
20150066638 | Collecting Information Regarding Consumer Click-Through Traffic - A method and system for providing the centralized collection of click-through traffic information. The method includes receiving a DNS query for a domain name at a third party auditing service from a requesting computing resource. The domain name is configured to include click-through information as a subdomain, and wherein a URL associated with the domain name provides content. The click-through information is parsed from the domain name without establishing a connection between said third party auditing server and any web server providing the content. An IP address for the web server associated with the domain name is sent to the requesting computing resource. | 03-05-2015 |
20150073894 | Suspect Anomaly Detection and Presentation within Context - Events and metrics from time series data are analyzed to detect unexpected spikes and dips or other unpredictable occurrences. In time series measurement of a metric it is not uncommon for a particular metric to have predictable deviations from a median value. For example, activity on a particular “weekday” web site may be more intense during weekdays and have very little activity on weekends. A different web site might have the opposite “normal” activity profile. If the “weekday” web site were to have a large amount of activity on a Saturday and/or Sunday then that large amount of activity may be considered unpredictable and be classified as a “suspect anomaly.” Techniques to identify and novel presentation of suspect anomalies are presented in this disclosure. | 03-12-2015 |
20150127450 | METHOD AND SYSTEM FOR AUTOMATED DETECTION OF CAN-SPAM VIOLATIONS BY MERCHANTS AND ACQUIRERS - A method for associating a merchant account with violating activity includes: storing a plurality of merchant profiles, each profile including at least a merchant identifier; receiving a uniform resource locator or hyperlink captured from distributed electronic content that is identified as being in violation of a rule or regulation; navigating, via a browsing application program, to a webpage via the received uniform resource locator or hyperlink; initiating a payment transaction for the purchase of goods or services via the webpage; receiving an authorization request for the payment transaction, wherein the authorization request includes at least a merchant identification; transmit an authorization response in response to the received authorization request; identifying, in the database, a specific merchant profile where the included merchant identifier corresponds to the merchant identification; and indicating, in the database, the specific merchant profile as being in violation of the rule or regulation. | 05-07-2015 |
20150127451 | SYSTEM AND METHOD FOR CONTROLLING AD IMPRESSION VIOLATIONS - A method of controlling ads includes receiving a beacon over a network identifying an ad, an end user and a content source; querying a database of unauthorized content sources based on the beacon; determining whether the ad is an unauthorized impression; and storing information from the beacon in a database, including whether the impression was authorized or unauthorized. The database may include a list of unauthorized sites and the querying may include checking whether the content source is one of the unauthorized sites. Querying also may be used by advertising exchanges and networks to determine whether to place an ad on a particular publisher's site. | 05-07-2015 |
20150332318 | SYSTEM AND METHOD FOR OBTAINING A RELEASE AUTHORIZATION - A computerized method, computing device, and storage medium obtaining a release authorization for social media content. The computerized method comprises selecting a promotional content on a social platform; capturing contact information of an individual associated with the promotional content; presenting a release form for authorizing the use of the promotional content to the individual associated with the promotional content; capturing authorization data associated with the release form; and storing the authorization data associated with the release form. | 11-19-2015 |
20150339705 | DETECTING FRAUD IN CONNECTION WITH ADVERSTISEMENTS - Embodiments are disclosed for identifying a suspect application based on multiple operating factors from use of multiple applications. The embodiments can generate a representative distribution of a selected factor based on collected information corresponding to multiple operating factors from use of multiple applications. The embodiments can compare a representative distribution of a target factor with the representative distribution of the selected factor and identify a suspect application when these distributions are different. | 11-26-2015 |
20150379578 | System and Method for License Plate Frame Advertising Verification and Validation - Advertisement is a multi-billion dollar business in US (per year). Here, we use license plate frames for the advertisement. One example of the application describes a license-plate-frame-based advertisement verification system. In order to validate and verify the correct placement/mounting of a license plate frame advertisement at a given location over time, it is necessary to validate that both (a) the ad is correctly placed on the vehicle, and (b) to verify that the ad is at a given location at that time. The method required to verify these includes some control systems and components. Different variations and examples are also presented here. | 12-31-2015 |
20160027042 | ELECTRONIC BRAND AUTHENTICATION METHOD USING SCANNABLE CODES - A “scannable logo” image contains encoded identity data for the logo brand owner, encoded visual identification characteristics for the logo brand, an encoded GPS data corresponding to manufacturing location for a manufactured item or assembled item, plus additional embodiment dependent data. The image is scanned with the image scanning function of a mobile communication device and the encoded logo brand owner identity data, the encoded visually identifying characteristics for the logo brand, and the encoded GPS location information are decoded with a decoding function. The GPS location information is captured for the mobile communication device with the GPS function of the mobile communication device, and compared to the decoded GPS location information. If the decoded information is a geo-proximal match, an authentication application is launched in the computer function of the mobile communication device. | 01-28-2016 |
20160027043 | Collecting Information Regarding Consumer Click-Through Traffic - A method and system for providing the centralized collection of click-through traffic information. The method includes receiving a DNS query for a domain name at a third party auditing service from a requesting computing resource. The domain name is configured to include click-through information as a subdomain, and wherein a URL associated with the domain name provides content. The click-through information is parsed from the domain name without establishing a connection between said third party auditing server and any web server providing the content. An IP address for the web server associated with the domain name is sent to the requesting computing resource. | 01-28-2016 |
20160034949 | Determining Suspicious Advertisements By Comparing Advertisement Content And Content Associated With An Advertisement Landing Page - A online system receives advertisement (“ad”) requests for presentation to online system users, with each ad request including advertisement content and identifying a landing page. The online system determines whether the advertisement content differs from content associated with a landing page identified by an ad request. One or more topics associated with the advertisement content are identified, as well as one or more topics associated with content on the landing page. By comparing topics associated with the advertisement content to topics associated with the landing page content, the online system determines if the advertisement content and landing page content differ. If the advertisement content differs from the landing page content, the online system may prevent the ad request from being presented or may identify the ad request for manual review. | 02-04-2016 |
20160034950 | Identifying Malicious Text In Advertisement Content - An online system receives advertisement requests from one or more advertisers and determines whether an advertisement request includes malicious content before presenting content from the advertisement request to a user. To determine whether the advertisement request includes malicious content, the online system identifies text in the advertisement request, identifies words in the text, and identifies characters in each word. The online system identifies a most common type of character in each word and generates a score for each word based on its constituent characters. For example, a word's score is based on the combination of characters in the word, such as a conditional probability of a word including a type of character given that the word includes a given number of the most common type of character. The scores are analyzed to determine if text in the advertisement request includes malicious content. | 02-04-2016 |
20160055490 | DEVICE, SYSTEM, AND METHOD OF PROTECTING BRAND NAMES AND DOMAIN NAMES - A computerized method of protecting a brand name of a brand owner, includes: (a) crawling a global communication network to identify and collect data about web-sites that possibly abuse the brand name; (b) for each web-site that possibly abuses the brand name, analyzing whether or not the web-site abuses the brand name by analyzing at least one of: (i) content of the web-site; and (ii) data about an owner of the web-site. The method further includes: for each web-site that possibly abuses the brand name, (A) generating an investment score indicating an estimated level of investment that was invested in development of the web-site; and (B) generating a damage score indicating a level of damage that the web-site is estimated to produce to the brand name. | 02-25-2016 |
20160063541 | METHOD FOR DETECTING BRAND COUNTERFEIT WEBSITES BASED ON WEBPAGE ICON MATCHING - The invention relates to a website icon matching-based detection method for brand counterfeit websites. The website icon matching-based detection method for the brand counterfeit websites comprises the following steps: (1) collecting icons of websites which have been counterfeited by greater than a set threshold value, and acquiring webpage icons of the websites to establish a brand icon image set BrandSet; (2) extracting webpage icons of the websites based on a plurality of webpage uniform resource locators (URL) of to-be-detected websites to establish a to-be-detected image set DetectSet; (3) matching images in the BrandSet with those in the DetectSet, and determining whether the two sets include matched images; (4) finding the webpage URLs associated with the matched images, and determining whether the webpage URLs associated with the matched images have right of use for the associated brand icons; and (5) identifying the webpage URLs without right of use for the brand icon in step (4) as brand counterfeit websites. The disclosed method of detecting counterfeit websites by right of webpage icon has not previously been utilized. The disclosed method is easy to implement, has high detection rate, and is easy to popularize. | 03-03-2016 |
20160071146 | SYSTEM AND METHOD FOR DIGITAL ADVERTISING - This invention relates generally to a method of contextual, digital, and interactive advertisement where a consumer or user is incentivized to participate in order to earn monetary awards. This invention allows the consumer to more thoroughly engage with the subject matter of the primary advertisement, with the effect of supplementing and enhancing the advertising message of the primary advertisement. | 03-10-2016 |
20160092916 | PIXEL CLUSTER TRANSIT MONITORING FOR DETECTING CLICK FRAUD - Detecting click fraud that includes a client device capable of accessing a server hosting a web page containing an advertisement. The client device includes a network interface allowing access to the server and code on the client device. The code accesses and displays a web page containing an advertisement, provides mechanisms (e.g., an applet, an ActiveX control, a plugin, a JavaScript, a browser scripting language, browser extensions, or code native to the browser) associated with each pixel cluster where each mechanism captures information regarding the transit of the pixel cluster by a cursor on the web page, and collects information based on the capturing by each associated mechanism regarding the transit of the pixel cluster by a cursor on the web page. | 03-31-2016 |
20160104192 | ANTI-COUNTERFEIT METHOD FOR A SELF-SERVING RETAIL WEBSITE - Anti-counterfeit method for a self-serving retail website is by using software to check each new submission of seller's advertisement against a list of blocked brands and a list of approved sellers on the website, before it gets posted on the website. | 04-14-2016 |
20160171529 | PROMOTION COMPLIANCE SYSTEMS AND METHODS | 06-16-2016 |