Entries |
Document | Title | Date |
20100049661 | TRACEABILITY PROCESS AND SECURITY ELEMENTS USED IN SAID PROCESS - Bi-directional cattle traceability process comprising five basic stages: a first document traceability and sanitary certification chain stage, wherein the animals are identified by birth certificates, animal identification attached to the animal's ear and registered in a data centre. A second stage for transfer of animals to another establishment, wherein genetic material is extracted from the offspring not yet weaned, filed and registered and registered in the data centre. A third stage for slaughtering of animals, wherein the slaughtered animal's ear is cut off where the animal identification is attached and the animal identification is read on line, the half carcases have sealed strips applied to them, DNA samples are extracted from the animal, then deposited in the official genetic bank and on each cut a locket sampler is attached encrypting a genetic and biochemical sample. A fourth stage for transfer or exporting of cuts, wherein the barcode that originated the cut is identified and applied to each portion of this cut or piece into which it is divided and then the locket sampler is removed from each sliced or minced cut, to deposit it in the cold storage chamber. A fifth and last stage of traceability auditing, wherein three samples of the identified portion of a cut to de audited are taken and adulteration of the cut or non-adulteration is determined by comparing the genetic sample taken in the third stage with the encrypted genetic sample in the locket sampler that held the original cutting extracted in the fourth stage. | 02-25-2010 |
20100057631 | VALIDATING E-COMMERCE TRANSACTIONS - Methods of the present invention allow for validating eCommerce transactions. An exemplary method for validating an eCommerce transaction may comprise the steps of validating a Hosting Provider, validating a Merchant using the Hosting Provider to host an eCommerce website, and validating a Customer who may purchase goods or services from the Merchant via the eCommerce website. If the Hosting Provider, Merchant, and Customer are validated, an eCommerce transaction may be approved. | 03-04-2010 |
20100070424 | SYSTEM, APPARATUS AND METHODS FOR COMPARING FRAUD PARAMETERS FOR APPLICATION DURING PREPAID CARD ENROLLMENT AND TRANSACTIONS - An apparatus is disclosed. The apparatus is for comparing a set of production fraud parameters with one or more sets of test or proposed fraud parameters run against prepaid card production data in a prepaid card analysis. The apparatus may include a system for uploading a set of production fraud parameters and one or more sets of test fraud parameters, a processing engine for receiving the uploaded parameters for running production data against the set of production fraud parameters in tandem with the one or more sets of test fraud parameters to produce a set of suspected fraud cases triggered by each set of fraud parameters, and one or more databases integrated with or in communications with the processing engine for card validation | 03-18-2010 |
20100106660 | METHODS AND SYSTEMS FOR READILY ACCESSING COMMODITY INFORMATION - A commodity inspection method, including gathering inspection information from a commodity lot; collecting grower, field, and packing information associated with the commodity lot; recording purchase orders associated with the commodity lot; assigning a trace code to each of the purchase orders; entering the inspection information, the grower, field, and packing information, the purchase orders, and the trace codes into a central database; updating a content of a web-based application with the inspection information, the grower, field, and packing information, the purchase orders, and the trace codes within the central database; and allowing the customer to access the inspection information, and the grower, field, and packing information, by entering one of the trace codes into the web-based application. According to one embodiment, each of the purchase orders associated with the commodity lot is linked within the web-based application and incorporates Global Standards One (GS1) standards. | 04-29-2010 |
20100121769 | Method and System for Facilitating Verification of Ownership Status of a Jewelry-Related Item - A method and system for facilitating verification of ownership of a first jewelry-related item are disclosed. In at least some embodiments, the method includes receiving at a central terminal, from a mobile device via an internet-type communications medium, a certificate number associated with a first certificate corresponding to the first jewelry-related item, where the central terminal is at least one of operated and controlled by an entity that provides guarantees or warranties in relation to a plurality of certificates that respectively pertain to respective jewelry items, the plurality of certificates including the first certificate. The method additionally includes searching a database associated with the central terminal for ownership data pertaining to the first jewelry-related item, and sending the ownership data from the central terminal for receipt by the mobile device. | 05-13-2010 |
20100145867 | VERIFICATION METHOD - A computer-implemented method of verifying the authenticity of a product. The method comprises receiving an identification code associated with said product, and receiving at least one data item, the or each data item relating to a respective characteristic of said product. Said identification code is processed to determine at least one characteristic associated with said identification code; and output data indicating the authenticity of said product is generated by processing said at least one data item relating to a characteristic of said product and said at least one characteristic associated with said identification code. | 06-10-2010 |
20100145868 | LOCATION BASED FRAUD REDUCTION SYSTEM AND METHOD - Embodiments of the present invention provide for reduction of the likelihood of fraud by having at least one of an identifier of a location from where a request is submitted or information that can lead to identification of the location, submitted with or in addition to a request. Then, determination is made whether to service the request, based at least in part on the location from where the request is submitted or processed. In various embodiments, the location may be compared against predetermined permissible location(s) or a current user location. The request may be a request to conduct a transaction, access data, access a physical or informational resource, or access a secured area. | 06-10-2010 |
20100174660 | METHODS AND COMPUTER-READABLE MEDIA FOR FACILITATING FORENSIC INVESTIGATIONS OF ONLINE TRANSACTIONS - A method, comprising: receiving a first identifier associated with an online transaction and a second identifier used by end user equipment involved in the online transaction; obtaining evidentiary information pertaining to the end user equipment based on the second identifier; storing in a database a record that associates the first identifier with the evidentiary information; and retrieving one of (i) the evidentiary information in said record and (ii) the first identifier in response to a request identifying the other of (i) the evidentiary information in said record and (ii) the first identifier. Where the online transaction is effected over a network after the end user equipment has gained access thereto, the evidentiary information may include information pertaining to a subscriber whose credentials were used by the end user equipment to gain access to the network. The information pertaining to the subscriber may include personal information about the subscriber. Alternatively, the evidentiary information may include location information. | 07-08-2010 |
20100174661 | Wireless Branding - A device wirelessly broadcasts branding information associated with a consumer product attached to the device. The branding information is sent to a receiver located remotely from the product. | 07-08-2010 |
20100179914 | MARKING OF PRODUCTS - A method of marking an individual product with a unique code. The method can include associating the product with an indicia comprising photoactive, reflective or electromagnetic particles or combinations thereof or one or more photoactive, reflective or electromagnetic films or substrates that includes a random physical property, measuring the random physical property, and marking the product with the measured value that is specific to the product, optionally in combination with a barcode, RFID tag, lot number or the like for the product. | 07-15-2010 |
20100191661 | METHODS AND SYSTEMS TO DETECT AND REPORT FRAUD IN REAL TIME - Methods and Systems of detecting and reporting fraud in real-time are described. The system receives an event, over a network, from a first on-line transaction processing platform. The event includes a first identity identifier that identifies a first identity and information that identifies a first activity performed by the first identity. The system generates reporting information based on the event. The reporting information includes a first score that is associated with the first identity. The first score is a measure of a likelihood that the first identity has performed a fraudulent activity. Finally, the system communicates the first score, over the network, to the first on-line transaction processing platform. The system communicates the first score in response to receiving the event. | 07-29-2010 |
20100198740 | Providing History And Transaction Volume Information Of A Content Source To Users - A computer-implemented system and method for providing a legitimacy rating of a content source are provided. A request for a document is received. An electronic document associated with a content source is passed by a document provider in response to the request. A legitimacy rating of the content source is passed. Examples of legitimacy rating information include, for example, a history rating of the content source based on the length of time the document provider has published documents associated with the content source and a transaction volume rating of the content source based on the number of electronic documents associated with the content source that are passed by the document provider. | 08-05-2010 |
20100217719 | Controller Device - A method of validating a cartridge for use with a controller device. The method includes reading a cartridge identifier from at least one of memory of the cartridge and memory of the controller device, obtaining known content associated with the cartridge based on the cartridge identifier, reading actual content from memory of the cartridge, comparing the known content with the actual content, and permitting communication between the controller device and the cartridge when the known content matches the actual content. | 08-26-2010 |
20100250457 | AUTHENTICATION ITEM AND SYSTEM FOR PACKAGED ARTICLES AND METHOD FOR THE MANUFACTURING OF THE AUTHENTICATION ITEM - The present invention discloses, inter alia, an authentication item manufactured on product units for encoding the product units as being authentic. The authentication item is an intensity-modulating surface comprising a plurality of adjacent protrusions such that the intensity-modulating surface has alternating height. Each of the protrusions has at least two slopes of respective different orientation. When being in an authenticating position with respect to incident electromagnetic radiation employed for authentication, the authentication item modulates the intensity of the electromagnetic radiation in a manner that generates an intensity profile which is characteristic of the authentication item. In the authentication position, the propagation direction of the incident electromagnetic radiation is at least approximately parallel to one of the at least two slopes of the plurality of protrusions. | 09-30-2010 |
20100268654 | Authentication and Tracking System - A subset of unique codes are generated from a set of codes. The subset of codes are stored in a database on a secure server and each of the codes is marked on a corresponding instantiation of the product. The marked instantiations are distributed. During their distribution, the marked instantiations are verified for authenticity and for routing. This verification is performed by reading or scanning the codes on the instantiations, and transmitting that information to the secure server for comparison against the codes and other information located in the database contained therein. | 10-21-2010 |
20110066564 | NEGOTIABLE INSTRUMENT ELECTRONIC CLEARANCE SYSTEMS AND METHODS - Methods, devices, and systems for analyzing negotiated negotiable instruments for unlawful activity are described. A computer system, including a computer readable storage device and a processor may be provided. A plurality of electronic files may be received. Each of these electronic files of the plurality of electronic files may include an electronic image of at least a portion of a negotiable instrument and include a plurality of data fields. The plurality of electronic files may be divided into subsets based on whether data is available in particular data fields of the electronic files. Based upon the subset an electronic file is made a member of, various selection criteria may be applied to determine if the electronic file is a candidate for suspicious and/or illegal activity. Also, a listing of candidates for suspicious and/or illegal activity may be presented to a user. | 03-17-2011 |
20110087610 | GLOBAL SECURE SERVICE PROVIDER DIRECTORY - Systems and methods enable members of a secure transaction network to readily identify the appropriate trusted service manager (TSM) to support a particular transaction. A global directory of TSM providers is provided that a secure service provider can use for determining which TSM provider is the authorized manager of a security domain for the particular transaction. In aspect the directory of TSM providers may be stored within a mobile device secure element. In another aspect, the directory of TSM providers may be stored in a central TSM repository. In a further aspect, the directory of TSM providers may be distributed among a number of secondary TSM repositories. The appropriate TSM may be identified based upon a secure element identifier and an application identifier provided by a secure element as part of the transaction. Communication of the identifiers from mobile devices may be via cellular or near field communication links. | 04-14-2011 |
20110093403 | Document Validation System and Method - The present invention relates generally to the field of self-validating documents in supply chain management, documentation services and method for creating the same. | 04-21-2011 |
20110099117 | DEVICE, SYSTEM AND METHOD FOR VERIFYING THE AUTHENTICITY INTEGRITY AND/OR PHYSICAL CONDITION OF AN ITEM - A physical uncloneable function (PUF) pattern is used for verifying a physical condition of an item. The PUF pattern is arranged to be damaged in the event that said item is exposed to a predetermined environmental condition. Verification of the physical condition of the item, is carried out by obtaining a measured response from the PUF pattern, and comparing the measured response with a stored response in respect of the PUF. | 04-28-2011 |
20110125658 | Method and System for Performing Fraud Detection for Users with Infrequent Activity - A method of categorizing a recent transaction as anomalous includes a) receiving information about a recent transaction and b) accessing information about one or more historical transactions. The one or more historical transactions have at least one party in common with the recent transaction. The method also includes c) determining a similarity value between the recent transaction and a transaction i of the one or more historical transactions and d) determining if the similarity value is greater than or equal to a predetermined threshold value. The method further includes e) if the similarity is greater than or equal to the predetermined threshold value, categorizing the recent transaction as not anomalous or f) if the similarity is less than the predetermined threshold value, determining if there are additional transactions. If there are additional transactions, incrementing counter i and repeating steps c) through f). | 05-26-2011 |
20110153512 | Apparatus for Customer Authentication of an Item - An apparatus is provided for authentication of an item or a label by storing unique random serial numbers or codes in a remote secure storage that can be used to authenticate the item or the label, generating a pointer to each stored unique random serial number/code and storing the generated pointer(s) in a client data storage. During or prior to a production run of the item(s) or label(s): the generated point(s) are sent from the client data storage to one or more media devices, the generated pointer(s) are obtained from the media device using a post-content manager, the unique random serial number(s)/code(s) are obtained from the server via the post-content manager using the generated pointer(s), the obtained unique random serial number(s)/code(s) are sent to the media device, and the received unique random serial number(s)/code(s) are imprinted on the item(s) or the label(s) using the media device. | 06-23-2011 |
20110167010 | CONTROL OF SUPPLY NETWORKS AND VERIFICATION OF ITEMS - Methods and systems for use in enabling verification by entities on a path across a supply network of an item identification means traversing said path, the network comprising: at least one supplier entity able to introduce into the network an item identification means having stored therein an item identifier and a digital signature associated with said supplier entity, and to forward said item identification means along a path across said network; at least one intermediate entity able to receive said item identification means from said at least one supplier entity or from another intermediate entity in said network and forward said item identification means along said path; and at least one receiver entity able to receive said item identification means from an intermediate entity in said network. | 07-07-2011 |
20110184877 | INSIDER THREAT CORRELATION TOOL - Systems and methods for calculating threat scores for individuals within an organization or domain are provided. Aspects of the invention relate to computer-implemented methods that form a predictive threat rating for user accounts. In one implementation, a first threat score representing a first time period may be calculated. The first threat score may be compared with aspects of the same user accounts for a second time period. Weighting schemes may be applied to certain activities, controls, and/or user accounts. Further aspects relate to apparatuses configured to execute methods for ranking individual user accounts. Certain embodiments may not block transmissions that violate predefine rules, however, indications of such improper transmission may be considered when constructing a threat rating. Blocked transmissions enforced upon a user account may also be received. Certain activity, such as accessing the internet, may be monitored for the presence of a security threat and/or an ethics threat. | 07-28-2011 |
20110184878 | MANAGED SERVICE FOR DETECTION OF ANOMALOUS TRANSACTIONS - A managed service for the detection of fraud and/or anomalous transactions is disclosed. In one implementation, the managed service receives data from customers over a wide area network, the data for each customer relating to information that the customer would like monitored for anomalous transactions. The service may analyze data from the customers based on Benford's law to detect potential anomalous transactions in the data from the customers. The managed service may further report occurrences of detected potential anomalous transactions to the customer. | 07-28-2011 |
20110213723 | AUDIO AGREEMENT - A method for providing a product use agreement. The method includes sending, to a user in response to a request for a product, a message that includes an address for accessing the product use agreement. The method further includes receiving, from the user, a call at the address and audibly playing, to the user, a pre-recorded product use agreement recording. The pre-recorded product use agreement recording includes a legal agreement for using the product between the user and a business entity providing the product. The method further includes receiving, from the user, acceptance of the product use agreement based on the pre-recorded product use agreement recording, and providing access to the product based on acceptance of the product use agreement. | 09-01-2011 |
20110218930 | SYSTEMS AND METHODS FOR PROVIDING AND OBTAINING VALIDATED CUSTOMER FEEDBACK INFORMATION - Systems and methods for providing validated customer feedback information about a service provider. Generally, the method includes providing a customer with a digital ratings device, such as digital pen, that is capable of receiving feedback information from the customer and uploading the information to a third-party provider. As the customer uses the digital ratings device to provide the information, the device may associate the information with temporal data, such as the time, date, and location at which the customer provided the information. In some cases, the temporal data is checked to ensure that the customer is actually one of the provider's customers. Because the information is validated as coming from a verified customer, the information is often more reliable than it would be if it were submitted anonymously. Thus, the validated information may present a substantially fair representation of the provider and be useful to potential customers. | 09-08-2011 |
20110225100 | SYSTEM, METHOD AND INTERFACE DISPLAY FOR VERIFYING AND MANAGING DISTRIBUTION AND SALES OF MEDICINE - A system, method and graphical user interface display for validating, monitoring and otherwise reviewing the sales and distribution of medicines, to reduce the instances of counterfeit medicines. A pharmaceutical company provides medicines to users, either directly or through representatives for the pharmaceutical company. The products have associated identifying codes that are used to track the sales of the products. The system provides verifications of the medicines, as well as statistical analysis of the sales and distribution. The verifications and comparisons of the distribution and sales of the medicines can be reviewed by the user or on a dashboard user interface. The system further allows pharmaceutical companies provided the medicines to provide response messages to users. | 09-15-2011 |
20110225101 | Authentication and Tracking System - A subset of unique codes are generated from a set of codes. The subset of codes are stored in a database on a secure server and each of the codes is marked on a corresponding instantiation of the product. The marked instantiations are distributed. During their distribution, the marked instantiations are verified for authenticity and for routing. This verification is performed by reading or scanning the codes on the instantiations, and transmitting that information to the secure server for comparison against the codes and other information located in the database contained therein. | 09-15-2011 |
20110238589 | COMMODITY IDENTIFICATION, VERIFICATION AND AUTHENTICATION SYSTEM AND METHODS OF USE - An efficient and scalable system for identifying a commodity having a specific, unique topocompositional profile has been developed that includes: enrolling at least one commodity in order to capture its topocompositional profile; matching the at least one commodity with a plurality of commodities in a commodity database; and integrating the topocompositional profile into a commodity grading system. A method of identifying a commodity having a specific, unique topocompositional profile, includes enrolling at least one commodity in order to capture its topocompositional profile; matching the at least one commodity with a plurality of commodities in a commodity database; and integrating the topocompositional profile into a commodity grading system. | 09-29-2011 |
20110238590 | REGISTRATION OF PRODUCT INFORMATION AND AUTHENTICITY CERTIFICATION - A method providing a social network of products and certificates of authenticity for products. The method includes providing a product provider interface for uploading product information; generating unique product identifiers and certificates of authenticity for the products; and distributing the unique product identifiers and the and certificates of authenticity to product providers. Additionally the method includes providing an end user interface that enables end users to register ownerships of products, keeping record of products registered to end users, providing to product providers end user information comprising information about products registered to end users, and making information about registered product ownerships available to other end users through the end user interface. | 09-29-2011 |
20110251969 | SYSTEMS AND METHODS FOR VERIFYING AUTHENTICITY OF A PRODUCT - Various aspects of the invention provide systems and methods for verifying the authenticity of a product. One aspect of the invention provides a method of verifying the authenticity of a product through a plurality of stages of a supply chain. The method includes: providing a product having a plurality of distinct hidden unique identifiers incorporated with the product; and at each of at least one of the plurality of stages of the supply chain, verifying the authenticity of a revealed unique identifier, thereby verifying the authenticity of the product. Another aspect of the invention provides a product including a plurality of distinct hidden unique identifiers. The plurality of distinct unique identifiers can be selectively revealed. Another aspect of the invention provides a tamper-evident package including a plurality of distinct hidden unique identifiers. The plurality of distinct unique identifiers can be selectively revealed. | 10-13-2011 |
20110302093 | MITIGATING DISTRIBUTION AND CONSUMPTION OF COUNTERFEIT PRODUCTS - A method, system, and computer usable program product for mitigating distribution or consumption of counterfeit products in a supply chain are provided in the illustrative embodiments. A first set of identifiers is generated to associate with a product to be manufactured. The first set of identifiers includes identifiers corresponding to a customer reference number (CRN), a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). The first set of identifiers is associated with the product and a status indicator. The status indicator is set to a first value representative of the product being an original product and the product being available for sale. The first set of identifiers is transmitted to another second application. | 12-08-2011 |
20110302094 | MANUFACTURING AND DISTRIBUTION TO AVOID COUNTERFEIT PRODUCTS - A method, system, and computer usable program product for improved manufacturing and distribution to avoid counterfeit products in a supply chain are provided in the illustrative embodiments. For manufacturing to avoid a counterfeit product, a product to be manufactured is selected. Production volume information is determined, the production volume information including a number of units of the product to be produced. An identifier of a manufacturer of the product, an identifier of the product, and the production volume information are sent and several sets of identifiers are received. Each set of identifiers include identifiers corresponding to a customer reference number (CRN), a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). One set of identifiers is uniquely associated with one unit of the product being produced. A unit of the product is manufactured such that the unit includes a corresponding set of identifiers. | 12-08-2011 |
20110302095 | PRE AND POST PURCHASE IDENTIFICATION OF COUNTERFEIT PRODUCTS - A method, system, and computer usable program product for pre and post purchase identification of counterfeit products in a supply chain are provided in the illustrative embodiments. A customer reference number (CRN) associated with a unit of product is identified. The unit of product has associated therewith a unique set of identifiers including the CRN, a customer acknowledgment number (CAN), and a merchant acknowledgment number (MAN). The CRN is sent to a second application and a message is received from the second application in response to sending the CRN. If the message includes a second CAN that is not the same as the CAN associated with the unit, the unit is determined to be a counterfeit product. | 12-08-2011 |
20110302096 | AUTHENTICATION SERVICE FOR SALES OF GOODS AND SERVICES - An authentication service provides authentication information to help potential buyers determine the legitimacy of an offer to sell a good or service. For example, an authentication service stores registration information that indicates (a) that a particular item was purchased by a particular party, and (b) contact information that indicates a particular address for communicating with the party. When the registered owner of an item wants to sell the item, the owner sends an intent-to-sell message to the authentication service. In response to receiving the intent-to-sell message, the authentication service sends access information to the particular address. The access information specifies a manner of receiving authentication information about the item from the authentication service. The registered owner includes the access information in his or her advertisements for the item. When a potential buyer sees the access information in an advertisement, the potential buyer can obtain the authentication information, directly from the authentication service, using the manner specified in the access information. | 12-08-2011 |
20120036078 | System and Method for Coordinating the Collection, Analysis and Storage of Payroll Information Provided to Government Agencies by Government Contractors - A method for systematically coordinating the collection, analysis and storage of payroll information provided to government agencies by government contractors pursuant to applicable regulations is disclosed. The method includes collecting payroll information from contractors, performing an automated compliance check on the payroll information collected from contractors, storing verified payroll information in at least one database, and performing an automated fraud check on payroll information. The method also includes notifying auditors of instances of possible fraud, notifying auditors of instances of non-compliance, sorting payroll information in the at least one database according to geographic and skill categories, and providing reports to agencies. | 02-09-2012 |
20120041887 | METHOD AND ARRANGEMENT FOR RETRIEVING INFORMATION RELATED TO A PRODUCT - An arrangement for enabling an acting party, e.g. a natural person or an automatic inspection line, to retrieve information from a product ( | 02-16-2012 |
20120084220 | PRODUCT CERTIFICATION SYSTEM AND METHOD - Systems and methods are provided for generating a certificate of compliance for a product. A product control system (PCS) retrieves specification and/or regulatory data for a particular product and compares the retrieved data to test result data obtained for that particular product. The PCS generates a product certification if the test result data indicates that the product is in compliance with the specification data and/or the regulatory data. A product test plan generation system (PTPGS) enables a user to interact with a user interface to retrieve a test plan for a particular product. The test plan can be used to obtain test results for the particular product. | 04-05-2012 |
20120179614 | SYSTEMS AND METHODS FOR PRODUCT AUTHENTICATION - A method for use in a process to authenticate a consumer product includes receiving a serial number from a device through a network, wherein the device is configured to detachably couple to the consumer product, determining a validity of the serial number, transmitting a number to the device through the network, using the number to generate a reference verification number in accordance with a predetermined algorithm, receiving a calculated verification number from the device through the network, and comparing the calculated verification number with the reference verification number to determine whether the consumer product is authentic. | 07-12-2012 |
20120179615 | RECYCLING OF PRODUCT AUTHENTICATION DEVICES - A method that involves product authentication includes associating a serial number of a device with a first consumer product, thereby allowing an authenticity of the first consumer product to be verified using the device, determining whether the first consumer product is authentic using the serial number, and associating the serial number of the device with a second consumer product after the first consumer product is sold and after the device has been returned for recycling, thereby allowing an authenticity of the second consumer product to be verified using the device. | 07-12-2012 |
20120197813 | METHOD AND APPARATUS FOR EXPERT VERIFICATION - In exemplary embodiments, an apparatus and method for verifying experts on a consultation system is provided. Identity and credential information is received at a web server from a potential expert. A selection of a category that the potential expert wants to be admitted is also received. The identity information and at least a portion of the credential information may be verified. The potential expert is accepted as an expert based in part on a result of the verifying of the identity and credential information. Once accepted, an account associated with the potential expert is activated to allow the potential expert to become an expert and to allow the expert to provide answers on the consultation system when the potential expert is accepted. | 08-02-2012 |
20120215704 | IDENTIFICATION OF REGIONS INCLUDING UNAUTHORIZED PRODUCTS - Example embodiments relate to identification of regions in which unauthorized products are available. For example, in some embodiments, requests for verification of authenticity of a product may be received. Each request may be associated with a verification code and location data identifying a physical location of the product. Based on the requests, example embodiments may then determine whether a particular region including the physical location identified by the location data is likely to be a region in which unauthorized products are available. | 08-23-2012 |
20120254050 | SYSTEM AND METHOD TO VALIDATE CONSUMABLES INSTALLED IN A PRINTING SYSTEM - The disclosure relates to a computerized method and system for tracking consumer replaceable units (CRU) used in products such as printing systems. In the method the CRUM ID and destination of the consumable is retrieved on shipment from a supplier. When the consumer replaceable unit is installed in a device such as printing system, the device reports the installation back to a management application. The management application then proceeds to authorize the consumable for the reporting printing system, offer to transfer ownership, or when the printing system is not a managed device then offers a customer the option of being billed for the consumable. The management application has the option of disabling printing with customer replaceable unit when reassignment or intent to purchase is not available. When the consumable is returned the management application can ascertain if the customer replaceable unit was used by its assigned printing device. | 10-04-2012 |
20120254051 | ANTI-COUNTERFEITING MARKING WITH ASYMMETRICAL CONCEALMENT - An anti-counterfeiting method assigns a product code to a product, and reproduces the product code on the product. The reproduced product code has at least an overt code and a covert code. At normal conditions, the overt code is visible but the covert code is concealed from viewing by a concealment means such as a scratch-off material. A consumer is allowed to conditionally remove the concealment means to reveal the covert code, and send the overt code and the revealed covert code to a verification center to verify the authenticity of the product. At least the complete product code is large enough to identify the product, while the covert code is just large enough to discourage counterfeiting yet at the same time small enough to make it easy for the consumer to uncover. | 10-04-2012 |
20120254052 | ANTI-COUNTERFEITING MARKING WITH DUAL-CODE AND PARTIAL CONCEALMENT - An anti-counterfeiting method associates the first code with an article to be authenticated to identify the article, and associates a second code with the first code as a confirmation code to verify the first code. Both the first code and the second code are reproduced on the article. The reproduced first code is overt code while the reproduced second code is covert and concealed from normal viewing by a concealment means such as a scratch-off material. An authorized person (e.g., a consumer) is allowed to conditionally remove the concealment to reveal the covert code. The first code and the revealed second code are used to verify the authenticity of the product with a verification center. During the verification, the first code identifies the article, while the second code verifies the first code to test the authenticity of the associated article. | 10-04-2012 |
20120259789 | Methods and Systems for Accessing Information Related to An Order of a Commodity - Methods of allowing a customer to access information related to an order of a commodity include entering the information into a central database, updating a content of a web-based application with the information within the central database, and allowing the customer to access the information via the web-based application. Systems for allowing a customer to access information related to an order of a commodity include a server configured to store the information in a central database, one or more terminals having one or more applications configured to enter the information into the central database, and a web-based application configured to allow the customer to access the information within the central database. | 10-11-2012 |
20120271773 | Counterfeit Products Detection Methods and System - A counterfeit product detection method and system for detecting whether a product is genuine or counterfeit. The method allows a consumer to check whether a product is authentic or counterfeit by way of using a sequential serial number assigned to the particular product by the manufacturer of the product. Alternatively, the authenticity of the product can be verified at the point of purchase at the retailer or over the telephone by way of the sequential serial number. The method provides a way for a manufacturer's recall to reach the consumers who purchase the product. | 10-25-2012 |
20120317043 | Method and System for Facilitating Verification of Ownership Status of a Jewelry-Related Item - A method and system for facilitating verification of ownership of a first jewelry-related item are disclosed. In at least some embodiments, the method includes receiving at a central terminal, from a mobile device via an internet-type communications medium, a certificate number associated with a first certificate corresponding to the first jewelry-related item, where the central terminal is at least one of operated and controlled by an entity that provides guarantees or warranties in relation to a plurality of certificates that respectively pertain to respective jewelry items, the plurality of certificates including the first certificate. The method additionally includes searching a database associated with the central terminal for ownership data pertaining to the first jewelry-related item, and sending the ownership data from the central terminal for receipt by the mobile device. | 12-13-2012 |
20120323809 | FOOD MANAGEMENT SYSTEM AND FOOD MANAGEMENT METHOD - A food product management system comprises a database configured to store data describing a plurality of relationships, each of the plurality of relationships defining a relationship between a producer, a food product, and a combination of stable isotopes, the food products being associated with the combinations of the stable isotopes that are different from producer to producer; a terminal device configured to receive results of an analysis of the combination of stable isotopes contained in one of the food products; and a management computer operatively connected to the database and the terminal device, and configured to receive the results of the analysis from the terminal device and to identify the producer of the one of the food products with reference to the database based on the results of the analysis. | 12-20-2012 |
20130006877 | NANOSTRUCTURE TRACKING OF PRODUCTS - Some embodiments of the inventive subject matter are directed to incorporating a plurality of nanoparticles with a physical structure of an object. The object is transportable via locations associated with a chain of supply. Some embodiments are further directed to writing charges to modifiable portions of the plurality of nanoparticles incorporated with the physical structure of the object. Some embodiments are further directed to configuring the charges on the modifiable portions of the plurality of nanoparticles as data. The data describes one or more characteristics of the object and components of the object. The data is accessible via the locations associated with the chain of supply. | 01-03-2013 |
20130006878 | NANOSTRUCTURE TRACKING OF PRODUCT DATA SIGNATURES - Some embodiments of the inventive subject matter are directed to incorporating one or more nanoprocessors to one or more physical structures of one or more components of a product. The product is transportable via a chain of supply. Some embodiments are further directed to configuring the one or more nanoprocessors to store data that describes characteristics of the one or more components, the product, and/or the chain of supply. Some embodiments are further directed configuring the one or more nanoprocessors to transmit one or more signals that contain the data. | 01-03-2013 |
20130013525 | PORTABLE COMPUTING DEVICE TO RETRIEVE AGRICULTURAL CERTIFICATION INFORMATION - Various embodiments of the present disclosure relate to a portable computing device to retrieve agricultural certification information. In an example embodiment, an apparatus comprises a hand-held device including a display and one or more input devices to sense product identification indicia associated with or affixed to a food product that is grown or raised in an agricultural operation, the product identification indicia comprising at least a universal product code for the food product. The hand-held device includes at least one processor to determine a machine-readable identification code from the product identification indicia; send the identification code to at least one remote server; receive, from the at least one remote server, agricultural certification information that is associated with the product, the certification information being associated with the product using the machine-readable identification code; and display the certification information on the display in human readable form. | 01-10-2013 |
20130132292 | METHOD AND APPARATUS FOR PROVIDING ENHANCED CONSUMER PRODUCT INFORMATION - A method and apparatus for providing enhanced product information is disclosed. In one embodiment, the method comprises receiving consumer product identification information relating to the consumer product from an electronic tag co-located with the consumer product, sending an information request to a remote server, the information request comprising the consumer product identification information, receiving the enhanced product information from the remote server, the enhanced product information comprising information relating to the consumer product, and displaying the enhanced product information on an electronic display. | 05-23-2013 |
20130151428 | REAL-TIME INSPECTION OF COMMODITIES IN AN INTEGRATED INFORMATION MANAGEMENT SYSTEM - Various embodiments of systems and methods for inspecting commodities and providing an evaluation proposal in real-time in an integrated information management system are disclosed herein. The method includes configuring ( | 06-13-2013 |
20130166464 | METHODS AND SYSTEMS TO AUTHENTICATE A PRINTED MEDIUM - Examples to prevent the return of a printed medium and to authorize access to supplemental material to a printed medium upon resale of the printed medium are described. An example method of preventing the return of a printed medium including a product identification code and a unique identification code includes verifying the authenticity of the unique identification code against a database of genuine unique identification codes. The product identification code identifies a type of printed medium, and the unique identification code is associated with the printed medium and not associated with other printed media having the same product identification code. The example method also includes providing a clearance status based on the verification, which authorizes the return of the printed medium when the unique identification code is valid and denies the return of the printed medium when the unique identification code is invalid. | 06-27-2013 |
20130173483 | NANOSTRUCTURE TRACKING OF PRODUCTS - Some embodiments of the inventive subject matter are directed to incorporating a plurality of nanoparticles with a physical structure of an object. The object is transportable via locations associated with a chain of supply. Some embodiments are further directed to writing charges to modifiable portions of the plurality of nanoparticles incorporated with the physical structure of the object. Some embodiments are further directed to configuring the charges on the modifiable portions of the plurality of nanoparticles as data. The data describes one or more characteristics of the object and components of the object. The data is accessible via the locations associated with the chain of supply. | 07-04-2013 |
20130173484 | System and Method for Encoding and Controlled Authentication - A system and method for encoding and controlled authentication of security documents, ID cards, tickets and products and the like is described which can provide a secure means to determine them to be authentic. The method involves encoding the surface of the said security documents or ID cards or tickets and the like with of a pair of identity components comprising a pair of unique numbers, or a combination of a uniquely encoded image and a unique number, or a combination of a unique barcode and a unique number, or a combination of encoded images. The pair of identity components together comprise a challenge response pair and are related such that one component of the pair, the response, is a mathematical derivative of the other component, the challenge. A processing module determines the response by processing the challenge using complex mathematical functions such as one-way mathematical functions. If the processed response matches the encoded response, the challenge response pair is determined to be authentic. The use of one-way mathematical functions renders any attempt to compute the challenge response relation between the identity components outside polynomial time. The invention provides the means to modify the challenge response computation with a password or PIN number such that any document or ticket or product can be locked or unlocked accordingly. When locked, the password or PIN number corrupts the challenge response computation such that the challenge response pair is deemed non-authentic. The invention has direct application to Internet sales transactions. | 07-04-2013 |
20130218791 | DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM - A device management apparatus for managing a device includes a contract information acquiring unit configured to acquire contract information on the device; a status information acquiring unit configured to acquire status information indicating a status of the device; a checking unit configured to check whether the status of the device complies with a content of a contract based on the contract information and the status information; a generating unit configured to generate status history information in which a check result obtained by the checking unit is associated with the status information; and an output unit configured to output the status history information. | 08-22-2013 |
20130262330 | MANAGING OBJECTS IN A SUPPLY CHAIN USING A SECURE IDENTIFIER - A system and method for authenticating an identity of an object being tracked while traversing a supply chain, which includes an interface communicating with object custodians in the supply chain using a standard protocol in which event tracking information for the object is stored when any one of the object custodians reports a predefined event for the object. The system and method also include a repository storing authentication data to authenticate the event tracking information for the object, the event tracking information including a first object identifier and a second object identifier, the second object identifier being independently authenticated from the first object identifier. | 10-03-2013 |
20130262331 | SUPERVISED SUPPLY NETWORK WITH COMPUTED INTEGRITY RATINGS AND CERTIFICATIONS - Embodiments of the present disclosure relate to constructing an Object Analytic Record (OAR) that may be used to store data from one or more sequential chains. Analytics may be performed on data in the OAR to generate ratings for one or more components of a supply chain or the supply chain itself. Analytics may also be performed on the OAR to provide a certification for a supply chain or for a supply chain components and products. | 10-03-2013 |
20130275319 | COMPUTER-IMPLEMENTED METHOD AND SYSTEM FOR EMBEDDING AND AUTHENTICATING ANCILLARY INFORMATION IN DIGITALLY SIGNED CONTENT - A computer-implemented system and method for embedding and authenticating ancillary information in digitally signed content are disclosed. The method and system include: loading digital content containing a digitally signed portion into memory for processing; identifying an existing digital signature block and an existing digital signature size block in a digitally signed file header of the digitally signed portion; obtaining a digital signature size value from the digital signature size block, the digital signature size value corresponding to the size of the digital signature block plus the length of an ancillary data block plus a pre-determined pad; authenticating the integrity of the digitally signed portion using the digital signature while processing the digital content; unwrapping a purchase mechanism built into as wrapper associated with the digital content; and extracting from the ancillary data block data referenced by instructions of the purchase mechanism, the extracting being performed without invalidating the digital signature. | 10-17-2013 |
20130282601 | COUNTERFEIT PRODUCTS DETECTION METHODS AND SYSTEM - A counterfeit product detection method and system for detecting whether a product is genuine or counterfeit. The method allows a consumer to check whether a product is authentic or counterfeit by way of using a sequential serial number assigned to the particular product by the manufacturer of the product. Alternatively, the authenticity of the product can be verified at the point of purchase at the retailer or over the telephone by way of the sequential serial number. The method provides a way for a manufacturer's recall to reach the consumers who purchase the product. There is also a RFID tag product verification method and system provided that allows consumers to verify the authenticity of a product based on the RFID tag that is adhered to the product and/or part of the product packaging. A two dimensional barcode verification product verification method and system is also provided. | 10-24-2013 |
20130290201 | SYSTEMS AND METHODS FOR ASSESSING THE LEGITIMACY OF A TRANSPORTATION PROVIDER - Systems and methods are provided to enable users to assess the legitimacy of an alleged transportation provider. In an embodiment, a method for assessing the legitimacy of a transportation provider comprises retrieving from a user information relating to an alleged transportation provider. The system then accesses information relating to the alleged transportation provider. The system then assesses whether the alleged transportation provider is a legitimate transportation provider. Next, the system flags the alleged trasportation provider as legitimate or illegitimate. The system then transmits to the user information relating to the legitimacy of the alleged transportation provider. The system can provide crime insurance and other services to users based on the assessment of the legitimacy of the transport of choice and user stated preferences. | 10-31-2013 |
20130339260 | System And Method For Providing Digital Content - A method of delivering digital content for use on an electronic cutting machine. The method includes displaying at least one themed project in a rich internet application, where the themed project has at least one glyph of a glyph collection. The method further includes providing access to the rich internet application over a network and offering purchased access to the glyph collection. Any glyphs of the glyph collection can be added to the themed project. The themed project is cuttable on an electronic cutting machine in communication with the rich internet application. | 12-19-2013 |
20140019373 | METHOD AND SYSTEM FOR AUTOMATICALLY PUBLISHING CONTENT - The publishing system and method automates at least some portion of a publishing process. The system publishes content using metadata, rights templates and/or specifications, publishing profiles and business rules. | 01-16-2014 |
20140025594 | PRODUCT AUTHENTICATION METHOD - The present invention provides a commodity carrying out device that can reliably carry out a vertically-long shaped commodity in an upright state from a commodity storage column to a bucket. More specifically, since a commodity positioned at the front end side of a commodity storage column is tilted forward to be moved into a bucket, when moving a vertically-long shaped commodity in an upright state into a bucket, it is possible to move the commodity without the commodity toppling backwards. Thus, the commodity can be reliably moved into the bucket. | 01-23-2014 |
20140052654 | METHOD FOR VERIFYING THE VALIDITY AND DELIVERING A PROOF OF PURCHASE FROM A MOBILE DEVICE AND ASSOCIATED COMPUTER PROGRAM - The invention is directed to a method for generating a record (R | 02-20-2014 |
20140089215 | CONFINING USE OF CONTENT TO A DEVICE - Disclosed herein are a system, non-transitory computer-readable medium, and method for confining content. A digital receipt is generated in response to a request for content. An identifier associated with the remote device sending the request is included in the digital receipt such that use of the content is confined to the remote device. | 03-27-2014 |
20140095398 | Double ID Anti-Counterfeit Method and System - An anti-counterfeit method and system using the identity codes and marks of both products and merchants for authenticating goods are disclosed, where a client apparatus acquires identity codes via their marks of both a merchant and its plurality of products and sends codes to an authentication server. The server compares the codes in the client request with the codes in its database. The match result together with the detail merchant description and status is sent back to the client apparatus as the indication of authenticity of the products and the merchant at the point of sale. | 04-03-2014 |
20140101063 | COUNTERFEIT DETECTION - A counterfeit detection system may include a memory storing a module comprising machine readable instructions to determine a X-identification (XID) associated with a product. The XID may include an unencrypted component and/or an encrypted component associated with a parameter associated with the product. The machine readable instructions may further include selecting one or more validation rules, from a plurality of validation rules, to select one or more validation techniques from a plurality of validation techniques used to determine an authenticity of the product. The machine readable instructions may further include using the one or more selected validation techniques to determine the authenticity of the product based on the XID associated with the product. The counterfeit detection system may include a processor to implement the module. | 04-10-2014 |
20140122353 | METHODS AND SYSTEMS FOR MAKING, TRACKING AND AUTHENTICATION OF PRODUCTS - Manufactured goods are marked or labelled with a secure unique identifier. A central checking centre allows users to verify the authenticity of a particular good such as a cigarette pack or carton via any convenient interface such as the internet or a cell phone. A system of secret sharing allows secure authentication of each item and prevents code breaking or misuse. | 05-01-2014 |
20140136431 | DIGITALLY SECURED ELECTRONIC TITLES FOR PRODUCTS IN SUPPLY CHAINS - Computer-implemented methods and systems are provided for inhibiting entry of unauthorized products in a supply chain. The methods and systems feature unique identifiers placed on products in the supply chain and Digitally Secured Electronic Titles (DSETs) for products. The DSETs are exchanged upon transfer of the products in the supply chain and tracked in an electronic registry. | 05-15-2014 |
20140164269 | USING SUCCESSIVE LEVELS OF AUTHENTICATION IN ONLINE COMMERCE - A method comprising performing following acts on a network server: receiving a communication from a client terminal operated by a client; performing a first authentication of the client terminal or client; in response to the first authentication, delivering a first service to the client; after delivering the first service, sending an offer for a second service to the client terminal; receiving an acceptance message for the second service from the client terminal; performing a second authentication of the client terminal and/or the client; in response to receiving the acceptance message for the second service from the client terminal and to the second authentication being successful, delivering a second service to the client; wherein the first authentication and the second authentication use different authentication techniques. Other aspects include a programmed data processing apparatus for carrying out the method and a tangible program carrier instructing the apparatus to perform the acts. | 06-12-2014 |
20140180940 | Real time product verification by use of NFC technology - The present invention provides a method and system for real time product verification by use of NFC technology. To start product verification, consumers use their NFC-reader-enabled mobile devices to tap the NFC-enabled tags of products or tap products they are interested in. After tapping, the product verification client applications in consumers' NFC-reader-enabled mobile devices will be automatically started, capture, save and process data in the NFC-enabled tags of products, create product verification requests with data in the NFC-enabled tags of products, send product verification requests to product verification servers, receive, save and process responses from product verification servers, and display verification results from responses on the screens of consumers' NFC-reader-enabled mobile devices. | 06-26-2014 |
20140244528 | METHOD AND APPARATUS FOR COMBINING MULTI-DIMENSIONAL FRAUD MEASUREMENTS FOR ANOMALY DETECTION - A fraud-detection system facilitates detecting fraudulent entities by computing weighted fraud-detecting scores for the individual entities. During operation, the system can obtain fraud warnings for a plurality of entities, and for a plurality of fraud types. The system computes, for a respective entity, a fraud-detection score which indicates a normalized cost of fraudulent transactions from the respective entity. The system then determines, from the plurality of entities, one or more anomalous entities whose fraud-detection score indicates anomalous behavior. The system can determine an entity that is likely to be fraudulent by comparing the entity's fraud-detection score to fraud-detection scores for other entities. | 08-28-2014 |
20140244529 | Banknote Processing Apparatus for Detecting, Reporting, and Integrally Managing Counterfeit Banknotes and Method of Controlling the Same - A method of controlling a banknote processing apparatus for detecting, reporting, and integrally managing counterfeit banknotes includes detecting an injected banknote through an injection detecting unit; determining whether the injected banknote is a counterfeit banknote; obtaining counterfeit banknote information including a serial number of a banknote firmly determined as a counterfeit banknote; and transmitting the counterfeit banknote information including the serial number to a counterfeit banknote management system of a central bank through a communication unit when a counterfeit banknote report command previously set by a user is input. Since the blacklist of counterfeit banknotes established by the counterfeit banknote management system of the central bank is received and it is determined whether the injected banknote is a counterfeit banknote based on the received blacklist, accuracy of discriminating counterfeit banknotes of financial facilities including banks is improved. | 08-28-2014 |
20140250022 | FOLLOWING-UP CONTROLLING METHOD OF INDUSTRIAL PRODUCTS USING PORTABLE COMMUNICATION DEVICE - The present invention relates to a follow-up control method of a product online, and more particularly, to a method of registering a product to a management server after capturing the barcode of the product by using a portable device and performing a follow-up control of the product online by using the registered barcode. A follow-up control method of a product by using a portable device includes: identifying a product by capturing the barcode of the product with a portable device through a program built in the portable device or identifying a product by directly inputting product information into the portable device; registering the product by transmitting data regarding the identified product information to a management server; and performing a follow-up control on the product online by a user after the product registration is completed. | 09-04-2014 |
20140258155 | APPLICATION MARKETPLACE FOR VIRTUAL DESKTOPS - Systems and methods are presented for accessing an application available from a data center of a program execution service. The metadata associated with a user computing device may be used to determine whether the user computing device is authorized to access the application through a virtual desktop instance. At least a portion of the application may be executed by the virtual desktop instance and provided to the user. Applications may be purchased, licensed, or rented by a user. | 09-11-2014 |
20140258156 | SYSTEM AND METHOD TO AUTHENTICATE INTEGRATED CIRCUITS - A method to create a reference library of known authentic die images includes die images which are known to be a correct representation of the manufacturer's original die mask set. Where actual literal copies of the original die mask set are unavailable, reasonable facsimile images are derived from images of known authentic ICs. The library of images, while mainly including a set of die images, can be further supplemented by package images, images of manufacturer's logos, text listings of known text markings, including, for example, known serial numbers and date codes, and graphical images from any suitable manufacturer publications. A system and method to determine the authenticity of ICs which includes a multi-faceted approach is also described. | 09-11-2014 |
20140279613 | DETECTING COUNTERFEIT ITEMS - A device may receive a request, from a user, to determine whether an item is a counterfeit item. The device may perform, based on receiving the request, a comparison of at least one of: one or more images of one or more first portions of the item to one or more images of corresponding one or more first portions of the authentic item that corresponds to the item, or one or more sounds of one or more second portions of the item to one or more sounds of corresponding one or more second portions of the authentic item. The device may determine whether the item is a counterfeit item based on performing the comparison. The device may provide, to the user and based on determining whether the item is a counterfeit item, information indicating whether the item is a counterfeit item. | 09-18-2014 |
20140279614 | METHODS AND SYSTEMS FOR DETECTING, PREVENTING AND MONIETIZING ATTEMPTED UNAUTHORIZED USE AND UNAUTHORIZED USE OF MEDIA CONTENT - A method of detecting, preventing and monetizing unauthorized use and attempted unauthorized use of media content. In one embodiment, the method comprises providing a website containing what appears to be unlicensed or otherwise illegal media content; providing a user with the ability to view, hear or access at least a portion of the unlicensed or otherwise illegal media content; informing the user that the media content might be unlicensed or otherwise illegal or that, viewing, access, use or distribution of the media content might be illegal; and receiving contact or location information for the user that attempts to view, access, use or distribute the media content provided on the website. | 09-18-2014 |
20140279615 | CENTRALIZED AND DEVICE-AWARE TICKET-TRANSFER SYSTEM AND METHODS - User accounts can allow respective users to access any their respectively owned ticket. Each ticket in a group of tickets provides its owner the right to redeem the ticket to attend a particular event. A first user initially owns a ticket in the group. Ownership of the ticket is transferred from the first user to a second user, such that, subsequent to the transfer, the second user has the right to redeem the ticket but the first user does not. A code is generated for the ticket, the code being based on a characteristic of a device associated with the second user. The code is unique across codes in the group of tickets. Redeeming the ticket to attend the particular event includes analyzing the code. A history for the ticket can be stored, the history including an indication of the transfer occurrence | 09-18-2014 |
20140297545 | System and Method for Verifying and Communicating about OEM Products - The present invention is directed to a mobile software application developed for a smart phone or mobile device, such as an iPhone, iPad, Android, or Blackberry personal digital assistant, equipped with a camera, image sensor, RFID detector, or NFC sensor, that enables a user to synchronize information to verify the present status of whether an OEM product is genuine, subject to recall or stolen, and further allows the user to communicate and share information about his or her experience with the product using social media and networking sites on the Internet. | 10-02-2014 |
20140297546 | METHOD AND APPARATUS FOR PREDICTING OBJECT PROPERTIES AND EVENTS USING SIMILARITY-BASED INFORMATION RETRIEVAL AND MODELING - Method and apparatus for predicting properties of a target object comprise application of a search manager for analyzing parameters of a plurality of databases for a plurality of objects, the databases comprising an electrical, electromagnetic, acoustic spectral database (ESD), a micro-body assemblage database (MAD) and a database of image data whereby the databases store data objects containing identifying features, source information and information on site properties and context including time and frequency varying data. The method comprises application of multivariate statistical analysis and principal component analysis in combination with content-based image retrieval for providing two-dimensional attributes of three dimensional objects, for example, via preferential image segmentation using a tree of shapes and to predict further properties of objects by means of k-means clustering and related methods. By way of example, one of a criminal activity and a fraudulent activity event, an intrusion event and a fire event and residual objects may be predicted and located and qualified such that, for example, properties of the residual objects may be qualified, for example, via black body radiation and micro-body databases including charcoal assemblages. | 10-02-2014 |
20140324716 | Method and system for deterring product counterfeiting - The claimed subject matter relates to an architecture to produce disincentives to wearing counterfeit or stolen merchandise in public. In particular, the architecture utilizes a unique identifier associated with each unit of the product, and provides both a registration channel for receiving ownership registration and a verification channel to receive requests for verification. By way of illustration, the architecture can include associating a brand logotype that includes unique markings with each unit of a product, a private web service where the retailer may upload customer information at the time of sale, and a publicly available web service, where a third party may inquire about the ownership of a product containing a certain unique identifier. | 10-30-2014 |
20140337241 | METHOD AND APPARATUS FOR MAINTAINING HIGH DATA INTEGRITY AND FOR PROVIDING A SECURE AUDIT FOR FRAUD PREVENTION AND DETECTION - Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or documents with modification dates that have changed when there would otherwise have been no need to change them and thus allows discovery of missing documents to discover fraud or to search for evidence after a fraud is suspected. In another embodiment, deltas in accounting system vendor invoice accounts are compared at different points in time, potentially exposing the practice of moving fraudulent vendor transactions into a large group of legitimate transactions for a legitimate vendor. Per period transaction totals for specific periods for legitimate vendors are compared over historical time for suspicious activity. A comparison of reports from the two different periods, using exact data and software from those separate periods (instead of reporting from “current” data), may raise a red flag otherwise missed. | 11-13-2014 |
20140379593 | MANAGING TRUSTED RELATIONSHIPS AMONG PARTIES ASSOCIATED WITH A LICENSE FOR USING A COMPUTER PRODUCT - Techniques are provided for managing multiple trusted relationships within a computer product licensing environment. In one example, a partner affiliated with a vendor and a customer of the vendor's products associate with each other. A vendor license manager monitors the license consumption of a customer using the vendor's products and periodically sends a consumption report to a license manager of the associated partner. If a customer's license consumption exceeds the bounds of a given license, the vendor license manager notifies the customer and the partner, and the partner assists the customer in maintaining compliance with the license. | 12-25-2014 |
20140379594 | RECORDING AND MAINTAINING ACCEPTANCES OF LICENSES FOR USING COMPUTER PRODUCTS - Techniques are provided for generating license agreements specific to a computer product (e.g., software or hardware). In one example, vendor license manager receives an order from a customer for a computer product having a product identifier. Upon identifying an agreement corresponding to the product identifier, the license manager further embeds terms and conditions based on specifications of the customer order. After the customer reviews the agreement and accepts, the license manager associates the product-specific agreement, the acceptance, and the order to a logical customer account. | 12-25-2014 |
20140379595 | ASSOCIATING LICENSES OF A COMPUTER PRODUCT WITH A PURCHASER OF THE COMPUTER PRODUCT VIA AN N-TIER CHANNEL - Techniques are provided for associating license entitlements to a customer of computer software or hardware in a multi-tiered distribution channel. A partner of a vendor places an order for computer products on behalf of the end user customer. The order may go through several distribution channels before the vendor receives the order. Upon receiving the order, a vendor license manager generates entitlements based on the order and prompts the partner to provide a customer identifier corresponding to a customer account maintained on the vendor cloud. Once the license manager receives the customer identifier, the license manager provisions the license entitlements to the customer account. | 12-25-2014 |
20140379596 | CLOUD-BASED AUDITING AND MANAGEMENT OF LICENSES TO USE COMPUTER PRODUCTS - Techniques are provided for auditing and managing licenses for use of computer products. A license manager of a vendor receives an identifier of a computer product and a report of a set of licensed features enabled on the computer product. The license manager identifies a customer account associated with the identifier. The customer account includes a pool of entitlements acquired by the customer. The license manager compares the report with the entitlements in the pool, and with the customer's use of other computer products which draw entitlements from that pool, to generate a comparison result. An authorization decision of “in compliance” or “out of compliance” may be returned to the requesting computer product. | 12-25-2014 |
20140379597 | AUTHENTICITY VERIFYING SYSTEM FOR VERIFYING PRODUCT AUTHENTICITY - The present disclosure provides an authenticity verifying system capable of generating renewed database and updating unlock number upon occurrence of information leak, and comprises product ( | 12-25-2014 |
20150032650 | METHOD OF VERIFYING REVIEW - The Invention involves using GPS technology to determine where a person has been and then permitting posting of reviews of subjects only if the reviewer has visited that subject within a specified period of time. | 01-29-2015 |
20150046351 | IMPLIED LINK-BASED MISUSE DETECTION - An exemplary system that includes a computing device receiving data that identifies a set of providers including a target provider. The computing device performs a link-based attribute pre-process on the data to identify, based on the set of providers, a node network structured around the target provider and to generate a set of link-based attributes for the target provider. The computing device classifies the target provider based on the set of link-based attributes. | 02-12-2015 |
20150046352 | Apparatus for Detecting Stolen Automotive Components - In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a decryption/encryption module, and a network address. Upon assembly of a vehicle, the components form addressable nodes of that vehicle. Relevant digital information of all components is recorded in a proprietary, highly secure data base at the time of manufacture, and updated for vehicular repairs. Only registered agents may access the data base or submit updates to the federal network. During refueling or re-charging of a vehicle, a digital handshake compares public keys of the vehicular components to the proprietary data base, and confirms the integrity of at least some components by a public-key/private-key challenge and response. If components have been reported stolen, or other irregularities are detected in the vehicle's network of components during the hand shake process, the vehicle is disabled, and a message is automatically transmitted to one or more law enforcement agencies, identifying the vehicle and its location. | 02-12-2015 |
20150052069 | System And Method For Detecting Fraudulent Purchases And Returns - A system and method for detecting fraudulent purchases and returns by significantly reducing the amount of loss any store front merchant endures from unforeseen criminal activity. To attain this, the present method generally comprises of opening concealed packages, checking items in packages, re-sealing packages and entering inventory on a computer software system. The re-sealing of packages is preferred to use a custom store logo seal. By opening and checking all incoming items from the beginning of the delivery, upon entering the store, the employees performing this method, begins with the simplest and least obvious means of accounting for inventory. If this step is sufficiently carried thorough, the employees have satisfied the merchant as to the correct quantity and quality of all inventories, when it first comes into the store. Then simply entering items in the computer's inventory software system can be done by an employee, who has only minimal experience of basic word processing, Once opening, checking and entering all incoming items are sufficient the other, more involved, steps must be followed to completion. All steps undertaken must be seen through to completion, for maximum efficacy to reduce the loss of items/money a merchant can endure. | 02-19-2015 |
20150088770 | SYSTEMS AND METHODS FOR REDUCING THE UNAUTHORIZED RESALE OF EVENT TICKETS - The present invention relates to (a) a ticket management system for purchasing and allocating event tickets; (b) a ticket authentication system for authenticating tickets presented at an event; and (c) a secondary market system for the authorized resale of event tickets. These systems, individually and collectively, facilitate the reduction of ticket scalping by requiring the production of valid registered valued identification for the purchase, allocation, and resale of event tickets and the admittance to an event. | 03-26-2015 |
20150095247 | Classifying Fraud on Event Management Systems - In one embodiment, a method includes accessing a plurality of classified event profiles including a classification that identifies whether the corresponding classified event profile is associated with fraud or legitimate. The method also includes accessing a first cluster of classified event profiles each identified as being associated with fraud, and a second cluster of classified event profiles each identified as being legitimate. The method further includes determining a plurality of first sub-clusters of classified event profiles from the first cluster of classified event profiles, and a plurality of second sub-clusters of classified event profiles from the second cluster of classified event profiles. The method still further includes conditioning a plurality of fraud-detection algorithms, each fraud-detection algorithm corresponding to a particular specified parameter, and each fraud-detection algorithm being conditioned using a first sub-cluster of classified event profiles and a second sub-cluster of classified event profiles. | 04-02-2015 |
20150106282 | DEVICE FOR DETERMINING COUNTERFEIT AND METHOD THEREOF - There are provided a device for determining a counterfeit and a method thereof. The device for determining a counterfeit includes a certification information receiving unit configured to receive certification identification information including at least one piece of certification chip identification information, product identification information, and certification verification information of a verification target product and state information of a device for performing genuine product certification from the device for performing genuine product certification, and a counterfeit determining unit configured to determine a counterfeit based on the received certification identification information or the state information of the device for performing genuine product certification. Therefore, genuine product certification of the verification target product is verified. As a result, it is possible to effectively protect intellectual property rights of producers and easily and accurately determine a counterfeit. | 04-16-2015 |
20150106283 | APPARATUS AND METHOD FOR PROVIDING GENUINE CERTIFICATION SERVICE - Provided are an apparatus and method for providing a genuine certification service. The apparatus includes a certification information issuing unit configured to issue genuine certification information including at least one piece of certification chip identification (ID) information, product ID information, certification secret information, and certification verification information to a verification target product in response to an issuance request by a terminal operated by a producer of the verification target product, and a genuine certification executing unit configured to verify validity of the genuine certification information issued to the verification target product and execute genuine certification for the verification target product using the genuine certification information of which the validity is verified in response to a certification request by the terminal operated by the producer of the verification target product. Intellectual property rights of producers may be efficiently protected and a reliable genuine certification service may be provided to consumers. | 04-16-2015 |
20150134552 | Authenticating and Managing Item Ownership and Authenticity - A system for authenticating and managing the ownership of an item comprises a tagging device affixed to the item, wherein the tagging device comprises tagging device data, an item information system receiving the tagging device data and associated item data and storing the tagging device data and the item data, an owner registration and transfer system receiving owner registration data and ownership change requests and storing the ownership history, and an authentication system receiving authentication requests and generating a response based upon the information stored in the system or a connected system. | 05-14-2015 |
20150142683 | METHOD OF ANTI-COUNTERFEIT IDENTIFICATION - The method of anti-counterfeit identification includes establishing a tracking platform to render and store enterprises' registration information (including registered names and telephone numbers) and security codes. A client connected to the tracking platform for inquiry is established, and manufacturers print on their products corresponding anti-counterfeit phone numbers, corporate security codes and commodity security codes obtained from the anti-counterfeit tracking platform. Commodity security systems are established by manufacturers for storage of commodity security codes and inquiry records. In each procedure of a commodity sales process, commodity security directly feeds back to corresponding manufacturer. Inquiry can be made via telephone or mobile, having reduced complexity of anti-counterfeit inquiries. Information inquired will be rendered based on corporate names registered on the anti-counterfeit tracking platform, which radically eliminates the possibility of falsification by counterfeit and shoddy product manufacturers. | 05-21-2015 |
20150294320 | Method for Determining if a Used Electronic Device Belongs to a User - A method for determining whether a used electronic device has theft-detection software turned on. Such a method may be used at a repurchase facility or an automated kiosk to reject devices that may be stolen. | 10-15-2015 |
20150363791 | BUSINESS ACTION BASED FRAUD DETECTION SYSTEM AND METHOD - A business action fraud detection system for a website includes a business action classifier to classify a series of operations from a single web session as a business action. The system also includes a fraud detection processor to determine a score for each operation from the statistical comparison of the data of each request forming part of the operation against statistical models generated from data received in a training phase and the score combining probabilities that the transmission and navigation activity of a session are those expected of a normal user. | 12-17-2015 |
20150379524 | METHOD AND SYSTEM FOR AUTHENTICATING PHYSICAL ITEMS - A method and system for authenticating physical items includes: creating a group of safe codes, wherein each safe code includes a system code and a random key, said system code includes first and second level references wherein said second level reference is unique within said first level reference, storing said random key in said track and trace system in a storage location of a data store identified by said first and second level references, creating a group of marking codes by obfuscating each of said safe codes using an obfuscation key to obtain an obfuscated code and combining said obfuscated code with an obfuscation key id corresponding to said obfuscation key, and marking at least some of said marking codes on said physical items. | 12-31-2015 |
20160005051 | MOBILE ELECTRONIC VERIFICATION OF DIGITAL SIGNATURES - Embodiments of the invention are directed to systems, methods, and computer program products for facilitating a business transaction via a mobile device using verified information of a party to the business transaction. The methods, systems, and computer program products allow for conducting a business transaction using a mobile device and a central repository of verified party information. In this way, party information provided to an electronic document involved in the business transaction may be verified by selecting a party signature information having embedded therein verified party information from the central repository. | 01-07-2016 |
20160048846 | SYSTEM AND METHOD FOR DIGITAL AUTHENTICATION - A system and method a method for digital authorization including a customer authentication system with at least one customer authentication device, where the customer authentication system is, for example, a customer authentication system that receives customer data from via a network associated with a customer authentication request, receives customer input associated with the authentication request, generates authentication data based on, for example, the customer data and the customer input, where the authentication data is randomly generated, generates a second authentication request comprising the authentication data, transmits the authentication request via a notification based on a customer preference, receives an authentication response based on the second authentication request, and provides access to the customer data based on the authentication response. | 02-18-2016 |
20160078452 | Memorabilia Authenticator Process utilizing geolocation assets from satellite or terrestrial sources on mobile devices such as: handsets, watches, tablets, laptops or desktop computers... - A process by which memorabilia is authenticated using geolocation assets to verify time and place of signing or marking. The assets of smartphones, computers, watches, tablets are used along with a mobile application to certify when and where the interaction occurs. This data is stored along with unique identifying indicators in a data base. This data base signifies ownership of the item along with authentic corresponding geolocation data. The process allows for transfer of ownership with authenticating information transferred and catalogued. All geolocation information is stored and synchronized with subject of memorabilia's location. | 03-17-2016 |
20160086194 | METHOD, APPARATUS AND SYSTEM FOR PROVIDING A SECURE AND USER IDENTIFIABLE SERVICE SIGNATURE - An approach is provide for creating a secure and user-identifiable service signature. The approach involves creating a signature associated with a service, wherein the service is provided by a service provider to a user in conjunction with another party, and wherein the signature is personalized to the user. The approach also involves presenting the signature to the user via a device receiving a delivery, a link for initiating the delivery, or a combination thereof of the service to the user. | 03-24-2016 |
20160104170 | SYSTEMS AND METHODS FOR PROCESSING POTENTIALLY MISIDENTIFIED ILLEGITIMATE INCIDENTS - Systems, methods, and non-transitory computer-readable media can access a set of identified illegitimate incidents intended to be automatically disabled. One or more rules for determining misidentified illegitimate incidents can be acquired. It can be determined, based on the one or more rules, that at least a subset, out of the set of identified illegitimate incidents, has at least a threshold likelihood of being misidentified. Further processing can be performed with respect to at least the subset to prevent at least the subset from being automatically disabled. | 04-14-2016 |
20160110724 | METHOD AND SYSTEM FOR MARKING AN ITEM, AN ITEM SO MARKED AND A METHOD AND SYSTEM FOR AUTHENTICATING A MARKED ITEM - A method of marking and authenticating a manufactured item, comprising providing the manufactured item with a visible anti-counterfeiting indicium, marking with marking means the manufactured item with a visible alphanumeric string, marking with marking means the manufactured item with visible marking time data, and transmitting with data transmission and control means marking time data marked on the manufactured item and the alphanumeric string marked on the manufactured item. The method further comprises with computer database control means, receiving the transmitted marking time data and the transmitted alphanumeric string and storing in association in a database marking time information corresponding with the received marking time data marked on the manufactured item and alphanumeric information corresponding with the received alphanumeric string marked on the manufactured item. The method further comprises checking authenticity of the anti-counterfeiting indicium provided on the manufactured item, interrogating the database with the alphanumeric string read from the manufactured item to obtain marking time information for the manufactured item, and comparing the marking time information with marking time data read from the manufactured item to determine if they match. The method comprises determining the manufactured item as authentic if criteria are met, the criteria including that the checking step reveals an authentic anti-counterfeiting indicium and the comparing step determines a match. | 04-21-2016 |
20160110725 | NFC/RF Mechanism with Multiple Valid States for Detecting an Open Container, and Methods of Making and Using the Same - A wireless (e.g., near field or RF) communication device, and methods of manufacturing and using the same are disclosed. The wireless communication device includes a receiver and/or transmitter, a substrate with an antenna thereon, an integrated circuit, and one or more protection lines. The antenna receives and/or transmits or broadcasts a wireless signal. The integrated circuit processes the wireless signal and/or information therefrom, and/or generates the wireless signal and/or information therefor. The integrated circuit has a first set of terminals electrically connected to the antenna. The protection line(s) are on a common or different substrate as the antenna. The protection line(s) sense or determine a continuity state of a package or container on which the communication device is placed or to which the communication device is fixed or adhered, and are electrically connected to a second set of terminals of the integrated circuit different from the first set of terminals. | 04-21-2016 |
20160117685 | A COUNTERFEITING CONTROL SYSTEM - The invention discloses a counterfeiting control system for products intended for sale, comprising a product intended for sale ( | 04-28-2016 |
20160117686 | SYSTEM AND METHOD FOR GENERATING A RANDOM NUMBER AND/OR MARKER SENTENCE USING SPOKEN SENTENCE - A system and method for generating a random number and/or marker sentence using spoken sentence is provided. The system includes a master table which stores a unique value for each characters/word of the spoken sentence, a master rule and a configuration database. The configuration database stores a list of manufacturer and a list of products associated to the each manufacturer and the list of rules for each of the manufacturers and/or each of the products. The configuration database also includes a book set which stores a list of cue-words. The system generates the random number based on the spoken sentence using mater table and master rule. The system generates a marker by identifying and appending the cue-word to the spoken sentence based on set of rules stored in the configuration database. | 04-28-2016 |
20160125425 | AUTOMATIC CONNECTED VEHICLE ENROLLMENT - The present invention is directed toward an automated automotive enrollment system and method for automatically enrolling a vehicle whereafter the vehicle may be registered with one or more subscription-based events based on customer and vehicle data associations. In one more embodiments, a computer implemented method provides for identifying customer and vehicle information in conjunction with registration and subscription event opportunities, and provides for activating an associated subscription set in response to the specific customer and vehicle information so that the vehicle is suitably enrolled. | 05-05-2016 |
20160132897 | COPYRIGHT INFRINGEMENT PREVENTION - In an approach for determining printability of an electronic file, a computer electronically receives a file for printing. The computer parses the file for one or more of text, images, and formatting indicative of potential copyrighted material. The computer, in response to identifying any text, images, or formatting indicative of potential copyrighted material, identifies potential copyrighted material within the file. The computer determines whether the file may be printed based, at least in part, on the identified potential copyrighted material. In another approach for determining printability of an electronic document, a computer electronically receives a document for printing. The computer locates attributes associated with the document and stored in a separate database, which includes one or more of the following: ownership, licensing information, printability, and number of prints allowed. The computer determines the document is printable based on the attributes and prints the document. | 05-12-2016 |
20160132898 | METHODS AND PRODUCTS FOR PRODUCT TRACING AND AUTHENTICATION USING CONDUCTIVE INKS - Example embodiments of a product authentication method may include triggering a first authentication process in response to sensing a conductive ink in proximity to a computing device having a set of sensors and performing a second authentication process. The first authentication process may include initiating an application on the computing device when the set of sensors senses the conductive ink. And the second authentication process may be performed by the application on the computing device and may include sending a code to a remote server and receiving a validity determination from the remote server. | 05-12-2016 |
20160140573 | ANTI-COUNTERIT SIGNATURE - A method for applying an anti-counterfeit signature on a product, and an anti-counterfeit signature. The method includes selecting a substrate and a type of signature and forming a signature of the selected type on the substrate with atomic layer deposition, ALD, wherein forming the signature includes applying at least one layer having a predetermined property configured to be detected with an analysis method on the substrate by atomic layer deposition, ALD. | 05-19-2016 |
20160140574 | SYSTEM FOR GUARANTEEING AUTHENTICITY OF BRANDED GOODS - Ownership of physical article are electronically registered in a database upon purchase of the physical articles from merchants. A merchant gives a uniquely numbered card to a customer with each purchased physical article. The numbered cards are not initially associated with a particular physical article. Each physical article has a label with a unique identifier code attached to the article or to the packaging of the article. The registration process involves associating the numbered card with the article's label. Registration is only permitted if the numbered card and the label's identifier code are not associated with a previously sold article. This process thwarts the potential sale of counterfeit articles to purchasers. | 05-19-2016 |
20160148217 | APPLICATION SHARING SERVICE METHOD AND APPARATUS APPLIED THERETO - The present invention discloses an application sharing service method and a device applied to the service method. That is, a company service device can be enabled to provide service content by sharing an application by selecting, among the applications which are installed on a terminal device, a target application to be shared which can be shared with the company service device, and enabling the terminal device to access the service content which is provided by the company service device through the selected target application to be shared. | 05-26-2016 |
20160155133 | AUTHENTICATION METHOD FOR CONSUMER PRODUCTS VIA SOCIAL NETWORKS | 06-02-2016 |
20160155134 | METHOD FOR DETECTING A DISCONNECTION OF THE MAIN CONNECTOR OF AN ELECTRONIC PAYMENT TERMINAL, CORRESPONDING COMPUTER PROGRAM PRODUCT, STORAGE MEANS AND PAYMENT TERMINAL | 06-02-2016 |
20160180351 | PRINTED CHECK WITH MULTI-ELEMENT SECURITY FEATURE | 06-23-2016 |
20160189169 | System and Method for Detecting Counterfeit Products - Systems and methods are provided for determining counterfeit products. The systems may comprise a bar code scanner and a product database server, wherein the bar code scanner is adapted to communicate with the product database server, the product database server containing bar code data. The bar code data scanner may be included in a mobile application on a mobile device. Methods may comprise: assigning bar code data to a first product; storing the bar code data of the first product to a product database server; scanning with a mobile application bar code data of a second product in a marketplace; sending the data associated with the scanned bar code data of the second product to the product database; and determining if the bar code data of the first product in the product database server matches the scanned bar code data of the second product in the marketplace. | 06-30-2016 |
20160196559 | MOBILE DEVICE DETECTION OF MERCHANT FRAUD | 07-07-2016 |
20160379223 | GENUINE PRODUCT CERTIFICATION MEANS AND SYSTEM - Disclosed is a genuine product certification system, including: a genuine product certification means, including: an optical material; additional information; and patterns for genuine product certification; a user terminal adapted to perform genuine product certification using the genuine product certification means; a service server including information about the patterns, the spectrum of the optical material, and the additional information as existing data, and adapted to perform genuine product certification using a result of performing genuine product certification using the user terminal and to generate statistical data concerning the occurrence of imitation products; and a manager terminal adapted to receive and output information about performance of the genuine product certification by the service server and the statistical data concerning the occurrence of imitation products transmitted from the service server. | 12-29-2016 |
20190147458 | WORKFLOW-AUTHORIZING COMPUTING DEVICE AUTHENTICATION | 05-16-2019 |