Entries |
Document | Title | Date |
20100057632 | Questionnaire research system - A system in which questionnaire research through the Internet communication using a mobile telephone is made and the consideration for returning the questionnaire is given to the replier, characterized in that the consideration returning method may be the one in which charge of calls by the replier equivalent to the consideration can be paid by a third person or the one in which the portion of the charge of the calls by the replier, the user of the mobile telephone, for one month equivalent to the consideration is paid by a third person and the remainder is paid by the replier. A questionnaire system is characterized by comprising auction means by means of which a questionnaire about things that a questionnaire making person feels daily is made, the answers are auctioned, and the reward obtained by the auction is returned to the questionnaire making person and replier. | 03-04-2010 |
20100063935 | Multi-Factor Authorization System and Method - Method and system for authenticating the identity of a party to a transaction being executing over wired or wireless networks, using a personal device. A transaction system is adapted to receive messages over a network from a connected device, where the messages are intended to initiate a transaction. The system comprises authentication rules and an associated engine for identifying the type of transaction and, for each type of transaction, whether MFA is required. If so, the necessary MFA attributes are requested, thus permitting completion of the transaction in a comparatively secure manner and also permitting management of the accounts associated with the party. | 03-11-2010 |
20100094767 | Modeling Users for Fraud Detection and Analysis - Systems and methods are provided for predicting expected behavior of a user in an account. The systems and methods automatically generate a causal model corresponding to a user. The systems and methods estimate a plurality of components of the causal model using event parameters of a first set of events undertaken by the user in an account of the user. The systems and methods predict expected behavior of the user during a second set of events using the causal model. | 04-15-2010 |
20100094768 | Fraud Detection and Analysis System - A system is provided comprising a risk engine coupled to a financial system that includes an account. The risk engine generates an account model corresponding to a user and events of the account. Generation of the account model uses event parameters of a previous event performed by the user in the account. The risk engine uses the account model to generate a first probability of observing event parameters assuming the user is conducting the next event. The risk engine uses a fraud model to generate a second probability of observing event parameters assuming a fraudster is conducting the next event. The risk engine generates a risk score, using the first and second probabilities, which indicates the relative likelihood the next event is performed by the user. The system includes a risk application comprising an analytical user interface that displays for any event the risk score and/or event parameters. | 04-15-2010 |
20100191662 | SECURITY MAILING SYSTEM - A mailing system providing enhanced security for mailings processed and accepted by the mailing system. The mailing system uses sensed biometric data from the customer and/or sensed mailing type data from a secured mailing for creation of a database correlating trackable mailings to biometric data of the customer posting the mailing, placing biometric data of the customer posting a mailing onto the mailing and/or identifying suspicious mailings deserving special attention during transportation and delivery. | 07-29-2010 |
20100223193 | CARD-NOT-PRESENT FRAUD PREVENTION - A system and method for preventing card not present (CNP) fraud by a customer performing a CNP transaction with a transaction provider. The customer signature and at least one added identification input related to the transaction are provided to and stored on a dedicated server. The customer signature and added ID input are then retrieved by the transaction provider in case the customer denies the transaction, to prove that the transaction was valid. | 09-02-2010 |
20110016056 | INTERACTIVE CREDENTIAL SYSTEM AND METHOD - The interactive credential system and method has a database containing employee-employer-applicant surveyed information, industry specific criteria, such as insurance loss history and account performance, an authorization code for authorizing access to the database and a control device, operatively associated with the database, for presenting weighted scores. The system further includes a surveyed party processor operatively associated with the control device, and wherein the surveyed party processor is capable of transmitting the authorization code to view the surveyed information. The system also has a participant processor that is capable of requesting authorization to download the employee-employer-applicant information, including weighted scores computed from the system's algorithms processed from industry specific parameters. | 01-20-2011 |
20110087611 | BIOMETRIC IDENTIFICATION AND AUTHENTICATION SYSTEM FOR FINANCIAL ACCOUNTS - A method and an apparatus of biometric identification and authentication for financial transaction are disclosed. In one aspect, an automated teller machine is provided to assist a user to make a financial transaction. A linguistic command data is processed to create an account of the user. The user is directed to place a finger on a fingerprint scanner and the fingerprint is imaged. The user is directed to place an iris of in front of an iris scanner, and/or to place a face of the user in front of a camera to collect biometric data of the user. A name and address of the user is correlated to identify the account of the user. The face, fingerprint and/or iris of the user is imaged and compared to the biometric data to verify identify. An access to the account is provided on verifying the identity of the user. | 04-14-2011 |
20110099120 | SYSTEM AND METHOD FOR STORING AND DISTRIBUTING PROFILES - A computer-implemented profile distribution method is provided. The method includes receiving subject-descriptive data associated with a subject and storing the subject-descriptive data. An indication is received of an authorized entity authorized to receive the subject-descriptive data. An access preference indication is received which defines a permission to access to the subject-descriptive data by the authorized entity. A request is received to provide the subject-descriptive data to the authorized entity, and the subject-descriptive data is provided to the authorized entity in response to the request consistent with the access preference indication. A profile distribution system is further provided. | 04-28-2011 |
20110137817 | SYSTEM AND METHOD FOR AGGREGATING AND DISSEMINATING PERSONAL DATA - A computer-implemented method of aggregating and disseminating personal data is provided. The method includes establishing a user account for a user, wherein establishing the user account includes receiving identifying information of the user from the user. A user identifier is associated with the user account. A request for the user identifier is received from a remote application server, and an identifier request authorization is received from the user or the remote application server to provide the user identifier to the remote application server. The user identifier is provided to the remote application server in response to receiving the identifier request authorization. Personal data of a user associated with the user identifier is received from the user. A request for the personal data of the user associated with the user identifier is received from the remote application server. A data request authorization is received from the user to provide the user personal data, and the user personal data is provided to the remote application server in response to receiving the data request authorization. A system for aggregating and disseminating user personal data is further provided. | 06-09-2011 |
20110178942 | Targeted Security Implementation Through Security Loss Forecasting - A method of selecting security actions is provided. The method comprises estimating a maximum forecast loss, identifying general, sector specific, and targeted threats. The method further comprises forecasting a security loss based on the estimated maximum forecast loss and the threats, estimating a reduction in the security loss based on a first investment on a general threat countermeasure, on a second investment on a sector specific countermeasure, and on a third investment on a targeted threat countermeasure. The method further comprises allocating at least a portion of a security investment budget among the first, the second, and the third investments to maximize the estimated reduction in security loss. An aspect disclosed comprises a method that determines rates of return on security investment and selects security investments based on the rates of return. An aspect disclosed comprises a system for forecasting a security loss based on a security investment. | 07-21-2011 |
20110178943 | Systems and Methods For Anonymity Protection - In any situation where an individual's personal attributes are at risk to be revealed or otherwise inferred by a third, there is a chance that such attributes may be linked back to the individual. Examples, of such situations include publishing user profile micro-data or information about social ties, sharing profile information on social networking sites or revealing personal information in computer-mediated communication. Measuring user anonymity is the first step to ensure that a users identity cannot be inferred. The systems and methods of the present disclosure, embrace an information-entropy-based estimation of the user anonymity level which may be used to predict identity inference risk. One important aspect of the present disclosure is complexity reduction with respect to the anonymity calculations. | 07-21-2011 |
20110231331 | Providing An Enhanced Shopping Experience - Methods, apparatus, and products are disclosed for enhancing a shopping experience that include: determining, by a self-checkout terminal, that a shopper invoked a help event; selecting, by the self-checkout terminal in dependence upon the help event, a shopper assistant to assist the shopper; and providing, by the self-checkout terminal to the shopper, distinguishing information identifying the shopper assistant. | 09-22-2011 |
20110231332 | SYSTEMS AND METHODS FOR AUTHENTICATING A USER FOR ACCESSING ACCOUNT INFORMATION USING A WEB-ENABLED DEVICE - Systems, methods, and computer program products are provided for authenticating and efficiently re-authenticating a user with a financial institution in order to gain access to account information using a web-enabled device. The web-enabled device stores user profiles associated with the user including authentication information provided by the user during primary authentication. The device retrieves the authentication information upon secondary authentication, that is, validation of the user's identity, which in some embodiments, includes local validation of a personal identification number (“PIN”) and/or a remote control passcode (“RCP”). As such, the web-enabled device re-authenticates the user without requiring authentication communication with a financial institution server, and thereafter, the user interacts with an application running on the web-enabled device to retrieve desired account information from the financial institution server. | 09-22-2011 |
20110231333 | REGISTRATION METHOD AND REGISTRATION SYSTEM OF NETWORK SERVICE SYSTEM - A registration method includes dividing data items needed for registration into a first batch of data items needing to be verified and a second batch of data items not needing to be verified; receiving, by user side device, a first batch of content items corresponding to the first batch of data items, transmitting the first batch of content items to server side device before receiving a second batch of content items; invoking, by server side device, a verification standard, verifying the first batch of content items, identifying content items in the first batch with “verification-passed” if verification is passed, identifying content items in the first batch with “verification-failed” if verification isn't passed; after receiving the second batch of content items and if all content items in the first batch are identified with “verification-passed”, registering user, taking the first and second batches of content items as data of user, identifying user with “verification-passed”. | 09-22-2011 |
20110264597 | METHODS AND SYSTEMS FOR PROTECTION OF IDENTITY - The present invention relates to a method to the creation and management of a secondary identification to avoid identify theft. Identity theft may occur over the internet, the purchase of goods and services by credit, and many other forms not yet known. The present invention creates'a secondary identification for a person by creating one or more of the following secondary identifications which include a secondary email address, a secondary postal address, a secondary phone number, and any other identifying secondary information. The present invention describes methods and systems to create a secondary identification. Further, the present invention may be used to create a credit card containing the requestor's secondary identification. | 10-27-2011 |
20110307403 | Systems and method for providing monitoring of social networks - A method is provided of monitoring activity relative to a user's account of an on-line social network website (OSN). At least one activity of the user's account on an OSN is monitored, resulting in user's account activity data. Analysis of the user's account activity data is performed. Information is reported that is indicative of the processed user's account activity based on a selected criteria. A system is provided for authenticating a parent or legal guardian of a child on a social network. | 12-15-2011 |
20120030130 | SYSTEM AND METHOD FOR IDENTIFYING, REPORTING, AND EVALUATING PRESENCE OF SUBSTANCE - A system and method for identifying, reporting, and evaluating a presence of a solid, liquid, gas, or other substance of interest, particularly a dangerous, hazardous, or otherwise threatening chemical, biological, or radioactive substance. The system comprises one or more substantially automated, location self-aware remote sensing units; a control unit; and one or more data processing and storage servers. Data is collected by the remote sensing units and transmitted to the control unit; the control unit generates and uploads a report incorporating the data to the servers; and thereafter the report is available for review by a hierarchy of responsive and evaluative authorities via a wide area network. The evaluative authorities include a group of relevant experts who may be widely or even globally distributed. | 02-02-2012 |
20120047083 | Fire Situation Awareness And Evacuation Support - A building fire situation awareness and evacuation support system includes a plurality of fire monitoring devices for monitoring development of a fire; a plurality of occupant monitoring devices for monitoring occupant distribution in different zones of the building; and a computation device in communication with the fire monitoring devices and occupant monitoring devices, the computation device estimating fire source location and a fire development trend in response to the fire monitoring devices and estimating occupant distributions in different zones of the building in response to the plurality of occupant monitoring devices; the computation device generating an evacuation strategy for occupants in response to the fire monitoring devices, occupant monitoring devices, estimated fire source location, estimated fire development trends, estimated occupant distributions and building structure information; wherein the evacuation strategy includes evacuation routes or evacuation directions. | 02-23-2012 |
20120123959 | Methods and Systems to Help Detect Identity Fraud - The disclosed technology generally relates to methods and systems to aid in verifying a person's identity, e.g., in connection with applying for an identity document (such as a passport or driver's license), or in connection with qualifying to enter a secured area (such as at an airport). Many arrangements involve testing the person concerning specific knowledge with which he or she should be familiar, e.g., by reason of living in a particular residence and neighborhood, by reason of their particular employment, or by reason of their particular education. An appendix particularly addresses crowdsourcing technology, including its applicability in redressing some of the shortcomings of fingerprint-based content identification. | 05-17-2012 |
20120150762 | Method of Screening People - A process for managing a screening interaction with a passenger, comprises a procedure for establishing an account from a passenger, and questions to establish the veracity of that account, such that more effective information can be gathered about the user's true intentions and identity. A computer apparatus intended to enable this process to be implemented is also described. | 06-14-2012 |
20120191621 | System and Method for Strong Remote Identity Proofing - A method and system for strong remote identity proofing. | 07-26-2012 |
20120246089 | Method and Apparatus to Enable Safer Meetings and Dates - A method and apparatus for verifying persons' profiles that reside within the databases of online dating, location-based and social networking sites, platforms and applications. The method includes an interface for inputting and modifying settings, including inviting selected contacts, transmitting data about the individual whom the user will be meeting, the scheduled date, time and location for the meeting, and messaging delivered at requested times and intervals. Said user also may auto-transmit pre-set messages at determined times, visually record a meeting for real-time delivery to selected contacts, and utilize a Blue-tooth-enabled device to activate a distress signal and messaging via his or her mobile communication device, as well as transmitting pre-created messages to contacts that reside on directories or support workers. The invention also facilitates utilizing nearby user contacts, as a peer-to-peer buddy network, to render aid and to escalate security measures wherein the user may be in distress. | 09-27-2012 |
20120278249 | Generating an Identity Theft Score - A system for generating an identity theft score is disclosed. The system may identify consumers who have experienced identity theft during a historical time period, generate an identity theft risk model based upon the plurality of consumers who have experienced identity theft, and generate an identity theft score for an individual consumer based upon the identity theft risk model and data associated with the individual consumer. The identity theft risk model may comprise a regression model, and the identity theft score may represent a probability that the individual consumer will experience identity theft during a future time period. | 11-01-2012 |
20130013527 | IMMIGRATION CONTROL SYSTEM - The present invention provides a system and a method for speeding up immigration. In first immigration, first biometric information is stored in a immigration biometric information DB. A normal immigration client terminal displays a first result of comparing an ID information watch list with a biometric information watch list. In subsequent second immigration, the first biometric information in the immigration biometric information DB is compared with second biometric information obtained by a simplified immigration client terminal. Then, the simplified immigration client terminal displays a second result of comparing the first biometric information with the watch list information that is added after the first comparison is done. Thus even if the number of registrations in a watch list database is large, a small amount of similar watch list information is displayed, reducing the time for checking the results by the operator. | 01-10-2013 |
20130018811 | APPLICANT SCREENING - A system of screening servers, screener client computers, and screening kiosks distribute an applicant screening process among multiple sites and multiple participants. To facilitate and secure communications of screening results and applicant actions, a personal identification code is provided that identifies individual sets of screening results. In this manner, the applicant is authenticated and can then enter appropriate applicant profile data into a secure screening account, such as via a screening kiosk. Screening results may be generated for the applicant in association with a unique personal identification code. This code can then be communicated to the screener, who can access the screening results along with a recommendation, if desired, by sending the code to a screening server. | 01-17-2013 |
20130179359 | SYSTEM AND METHOD FOR JOB SAFETY ANALYSIS - The invention generally relates to job safety analysis and systems for implementing job safety analyses. In certain aspects, the invention provides systems and methods for job safety analysis which includes one or more portable electronic devices configured to identify all participating workers and guide them through a thorough a job safety analysis review (JSA review) while also supplying captured information to a database in support of a JSA program. | 07-11-2013 |
20130179360 | Provisional Subscriber System And Method - A computer implemented method for a provisional subscriber system for an identity management system, can comprise: on a computer device having one or more processors and a memory storing one or more programs for execution by the one or more processors, the one or more programs including instructions for: receiving information about a provisional subscriber from a partner; receiving information about the provisional subscriber from a customer; and authenticating the provisional subscriber as a valid customer based on a comparison of the information from the partner and the customer utilizing a core gateway system and a data processing engine system. Also, a computer system and a non-transitory computer-readable storage medium for the same. | 07-11-2013 |
20130191300 | SAFETY MANAGEMENT SYSTEM FOR MANDATORY JOB SAFETY ANALYSIS AND METHOD THEREOF - The present invention relates to a safety management system including a JSA draw-up module configured to display a screen for drawing up a job safety analysis worksheet for job safety analysis (JSA) and to draw up the job safety analysis worksheet on the basis of the information inputted by a user; a storage module configured to store the job safety analysis worksheet drawn up by the JSA draw-up module into a database (DB) and to store task hazard information drawn up for each unit task that can be referred for the job safety analysis worksheet into a database; and a inventory module configured to manage the job safety analysis worksheet and the task hazard information stored in the storage module and to create a new job safety analysis worksheet and new task hazard information in accordance with a request from the JSA draw-up module, and a method thereof. | 07-25-2013 |
20130218796 | Securing User Information - The present disclosure provides for securing user information involved in e-commerce transactions without encrypting that information. The e-commerce platform system generates the order ID of the seller and the buyer and stores a relationship between the order ID and a buyer ID. The e-commerce platform system receives, from a logistics information system, information about where the buyer resides and an area code of that location. This can be accomplished over open communication between the e-commerce platform and the logistics information systems without using encryption. The e-commerce platform system then identifies a distribution center located in the area where the buyer resides. The user information is identifies through a connection between the e-commerce platform and the logistics information system. With this technique, the seller cannot obtain the user information of the buyer and the user information of the buyer cannot be leaked, thereby increasing security. | 08-22-2013 |
20130218797 | Systems and Methods for Identifying Entities Using Geographical and Social Mapping - Embodiment of the disclosed technology include systems and methods for identifying one or more entities associated with activities. In an example implementation, a method includes determining one or more geographical regions proximate to the plurality of locations associated with the one or more activities; determining connections between one or more identities of a population and a plurality of related entities associated with the one or more identities; determining geographical information associated with related entities; weighting one or more metrics for each of the identities based on the geographical information associated with the related entities and the or more geographical regions proximate to the plurality of locations associated with the one or more activities; scoring the one or more weighted metrics; and providing, based on the scoring, an indication of a likelihood that the one or more identities of the population are associated with the one or more activities. | 08-22-2013 |
20130238518 | Identity Alert Management System And Method - A computer implemented method for an identity alert management system for interaction between a customer and a resolution specialist, having: on a computer device having one or more processors and a memory storing one or more programs for execution by the one or more processors, the one or more programs including instructions for: identifying personally identifiable information against elements of a customer's identity; automatically sending a communication to the customer within a specified time period; authenticating the customer through a secure identity management dashboard; permitting the customer to review a source of an identity alert and details associated with the alert; prompting the customer to mark the alert as a threat or not a threat; sending a record of the threat to an approved records system if the customer marks the alert as not a threat; and creating a case if the customer marks the alert as a threat. | 09-12-2013 |
20130254130 | Business method provides screening, authentication, and verification methods for conducting online business buy and sell - The present invention provides Business methods to improve the internet based online business deal-matching and deal-making services, ecommerce websites information listing services, and other similar information services for Buyers, Sellers, Agents and Brokers in conducting business buys and sales by adding the process of screening, authentication, and verification as well as conducting the aforesaid process person in-person to maximize the value and protection of the services provided. | 09-26-2013 |
20130262333 | Systems and Methods for Identity Authentication Via Secured Chain of Custody of Verified Identity - A method for authenticating an identity of a test taker is provided. An online registration portal allows test takers to enter registration information including an uploaded picture. The registration information is sent to a trusted verifier, such as a school administrator or teacher, who verifies the picture matches the registration information. A secured registration ticket is then generated that includes the picture and one or more embedded security features. The registration ticket is mailed to the student in a tamper-evident enclosure with instructions to present the sealed mailer at the testing site for admission. The test proctors then unseal the registration document and confirm the authenticity of the registration ticket and that the person seeking entry matches the verified photo on the ticket before allowing entry. | 10-03-2013 |
20130275324 | SYSTEM AND METHOD FOR CONFIGURABLE DEPLOYMENT OF TRANSIT AGENCY CONTENT - A system for managing incidents for a transit agency is disclosed, comprising an incident manager, configured to enable establishment and storage of one or more user profiles for one or more users, each profile indicating characteristics of transit incidents the user wishes to be notified of, create a transit incident having one or more incident characteristics, determine which users are to be notified of the transit incident based on their user profiles, and provide one or more notifications to the users that are to be notified. | 10-17-2013 |
20130282609 | IMAGE RECOGNITION FOR PERSONAL PROTECTIVE EQUIPMENT COMPLIANCE ENFORCEMENT IN WORK AREAS - A method comprises receiving one or more images of a person from one or more image capture devices in response to an input, identifying one or more items of personal protective equipment in the one or more images, determining the positioning of the one or more items of personal protective equipment relative to the person in the one or more images, and verifying compliance with personal protective equipment standards based on the one or more identified items of personal protective equipment and the positioning of the one or more items of personal protective equipment. | 10-24-2013 |
20130304661 | CREATING FEDERATED CUSTOMER IDENTIFIERS TO POSITIVELY IDENTIFY CUSTOMERS INTERFACING WITH A BUSINESS ACROSS ACCESS PLATFORMS - Methods, apparatus, systems and computer program products described and claimed that provide for automatically and positively determining that a customer interfacing with one business platform application using a platform-specific customer identifier is the same customer that is interfacing with another business platform application using another platform-specific customer identifier. Once the positive determination of same customer is made, a federated identifier key is generated and applied to all of the platforms, so as to globally identify the customer across multiple enterprise-wide platforms. As such, the present invention eliminates the labor-intensive need to manually analyze customer data to determine if a customer interfacing with one platform is the same customer interfacing with another platform. | 11-14-2013 |
20130332383 | PLANT SAFETY DESIGN ASSISTANCE DEVICE AND PLANT MONITORING AND MAINTENANCE ASSISTANCE DEVICE - A Plant safety design assistance device ( | 12-12-2013 |
20130346333 | SYSTEM AND METHOD FOR RECEIVING REQUESTS AND RESPONDING TO EMERGENCIES - The various implementations of the present invention are provided as a computer system configured to allow for sending requests for aid, responding to requests for aid, and receiving requests to aid in a multi-user environment. Various levels of requests may be requested. In one preferred embodiment of the present invention, a mobile application for integrating the options for requesting aid from a first device to a second is provided, as well as configuration of automated responses. The system allows certain users to post status updates to a website. While useful for many environments, the most preferred embodiments of the present invention are adapted for use in an educational environment to provide school administrators, teachers, parents, and students with enhanced communication capabilities. | 12-26-2013 |
20140012770 | Checkpoint Identification Correlation System and Method - An improved checkpoint identification correlation system and method is described herein. In one embodiment, the method for performing background check can comprise storing military identification card information and civilian identification card information in a member profile, collecting data from a military identification card at a checkpoint, querying the database to locate the member profile comprising the military card information, and performing a background check query from one or more public information databases. In this method, the member profile can be in a database on a pass control application server. The background check can be performed using the civilian identification card information. | 01-09-2014 |
20140019374 | METHOD FOR CUSTOMIZING AVATARS AND HEIGHTENING ONLINE SAFETY - In accord with the present invention, a method is defined for an intelligent system to analyze potentially damaging information, and send special signals to users in real time, so as to alert potential victims and discourage predators. The present invention defines a method to intelligently process messages that are being sent through online chat sessions, so as to alert potential victims and discourage predators or pedophiles. The method uses intelligent systems that are loaded with a set of rules. By analyzing the messages against these rules, potentially damaging messages can be captured. Then, instructions can be triggered by the intelligent systems. As a result, graphic outputs will be displayed to alert potential victims and discourage predators. The services can be offered in real time. | 01-16-2014 |
20140040154 | Defamation Avoiding System and Process to Identify Pattern Crimes - A system and process performed by the system for identifying and tracking perpetrators of any of various types of crimes, including bullying, child pornography, sexual assault and rape, in reports which are anonymously reported to the system. The perpetrators can be of various categories, such as formally convicted, and/or formally charged and not convicted, and/or never been charged or not yet been caught, and therefore are without prior convictions or criminal records and are thereby not on law enforcement's radar. The system and process relies upon the reporting by a victim or a witness of information pertinent to an alleged criminal event. The identity of each reporting victim is never known to the system, unless the victim or witness goes to the police. The system uses a “double blind” method to protect the victim and certain details of the reported incident. | 02-06-2014 |
20140040155 | SYSTEM AND METHOD FOR MOBILE IDENTITY PROTECTION OF A USER OF MULTIPLE COMPUTER APPLICATIONS, NETWORKS OR DEVICES USING A WIRELESS DEVICE - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed. | 02-06-2014 |
20140046863 | Risk Analysis Engine - In a risk analysis system, a risk analysis engine and a related method, incident information or activity information, which may be of a spatiotemporal nature, is analyzed. Behavioral patterns are identified in or derived from the incident information or the activity information. Observations are produced from matches of the behavioral patterns to behavior specifications. Based upon the observations, and asset vulnerability data, per-asset risks are derived. | 02-13-2014 |
20140058967 | SYSTEM AND METHOD FOR PROCESSING VISA APPLICATIONS FOR A PLURALITY OF COUNTRIES - The present invention discloses a method for assisting a traveller in the preparation of visa applications. The method includes a step of collecting data for visa applications for one or more countries. In addition, user data of a traveller is stored in a database. Moreover, a visa application selected by the traveller is displayed on a computer. Further the selected application is automatically populated with stored user data. | 02-27-2014 |
20140095403 | METHODS AND APPARATUS FOR MANAGING SAFETY INFORMATION - Methods and apparatus for managing safety information are disclosed. In an embodiment, a computing device, or any other suitable device or system, receives employee identification information and associated job site location information (e.g., employee ID and job site location ID). The computing device then receives job site evaluation information including a selection from a user of a job site safety attribute that is associated with the job site (e.g., flammable materials present). The computing device also receives safety inspection information associated with the job site safety attribute (e.g., fire extinguishers in place). The computing device displays job site safety briefing information associated with the employee identification information and the job site safety attribute (e.g., employee warned about fire hazard). The computing device receives incident information associated with the employee identification information and the job site safety attribute (e.g., employee burned). The computing device then displays first aid information associated with the incident information (e.g., burn treatment). | 04-03-2014 |
20140108284 | Computer-Implemented Personal Information Manager Method and System - A computer system for securely managing personal information. The computer system comprising a computer configured to receive and store personal information of a monitored individual to monitor the use of the computer by the monitored individual to obtain an activity or inactivity status, and to automatically and electronically transmit an inactivity notification to the monitored individual based on the occurrence of an inactivity status to obtain a response to the inactivity notification. | 04-17-2014 |
20140129473 | METHOD FOR REPORTING AND RELATING FIREARM DISCHARGE DATA TO A CRIME REPORTING DATABASE - A method for utilizing firearm discharge data in a crime reporting and tracking database, includes: recording one or more discharges of a firearm; transmitting information from the discharging firearm to a crime reporting and tracking database; utilizing the transmitted information to establish relationships between the discharged firearm, committed crimes, and missing persons within the crime reporting and tracking database; and wherein the recording and transmitting is carried out by devices within the firearm. | 05-08-2014 |
20140149304 | SYSTEMS AND METHODS FOR DETECTING FRAUD - Certain embodiments of the disclosed technology may include systems and methods for detecting fraud. According to an implementation of the disclosed technology, a method is provided that includes: receiving entity-supplied information including at least a name, a social security number, and a mailing address associated with a request for a payment or a benefit from a government agency; querying one or more public or private databases with the entity-supplied information; receiving a plurality of independent information in response to the querying; determining, based at least in part on a comparison of the entity-supplied information with at least a portion of the plurality of independent information, indicators of fraud; and outputting, for display, zero or more indicators of fraud. | 05-29-2014 |
20140180950 | METHOD AND SYSTEM PROVIDING ADVICE AND SERVICES TO CONSUMERS - The present invention provides a method and system for providing advice and/or services to a consumer including the secure electronic storage of rich private personal data preferably held on behalf of persons or entities. The system provides the applications, processes, controls and data management services to collect, transfer, store and selectively retrieve data necessary to perform specified planning and decision support activities, that have been integrated with the secure data store. The invention provides for the data owner and authorized persons to gain access to accessible data to undertake permitted tasks. These tasks may include receiving data, or undertaking planning, or such other tasks as prescribed. In an embodiment, the system limits access to applications to authorized persons and requires permissions from the owner in order to manage data privacy standards. The system allows the owner to provide and revoke access to applications and tracks and records all access events. | 06-26-2014 |
20140188744 | METHOD AND SYSTEM FOR COLLECTING, MANAGING, ANALYZING, VERIFYING AND SHARING AN INDIVIDUAL'S PERSONAL AND/OR PROFESSIONAL REFERENCES - Systems and methods for electronically managing the process of requesting, giving, and receiving personal references are provided. Personal information, particularly contact information, is received by a computer system from a candidate seeking a personal reference. Some of this information is forwarded to a personal reference giver to request that a personal reference regarding the candidate be given. The personal reference information is received by the computer system. The candidate and reference giver may access the personal received personal reference information. The personal reference information can then be sent to a recipient. The candidate and reference giver can be contacted when the recipient has accessed, reviewed, or modified the personal reference information. Access to the personal information of the candidate and the personal reference information from the personal reference giver can be based on a comparison with a set of rules and permissions. | 07-03-2014 |
20140188745 | DYNAMIC IDENTITY MATCHING IN RESPONSE TO THREAT LEVELS - A dynamic identity matching facility that enables an operator to determine the status of an individual based on identification information contained on an identification record provided by the individual. The operator scans the individual's identification information from the identification record using a scanning device. The facility decodes the scanned identification information and identifies a number of candidates based on the decoded identification information. For each identified candidate, the facility generates a candidate score. Based on the candidate score of each identified candidate, the facility selects a number of the identified candidates for display. The facility displays the selected candidates to the operator along with the candidate's criminal or other acts. | 07-03-2014 |
20140222706 | Privacy Management Policy Hub - A system architecture is disclosed that includes a privacy management system. In particular, the privacy management system provides a policy hub for maintaining and managing customer privacy information. The privacy management system maintains a master data database for customer information and customer privacy preferences, and a rules database for privacy rules. The privacy management system captures, synchronizes, and stores customer privacy data. Privacy rules may be authored using a privacy management vocabulary, and can be customized for an enterprise's privacy policies. | 08-07-2014 |
20140222707 | DISTRIBUTED COMMERCE SYSTEM - A networked system for managing commercial interactions is providing. In some embodiments, the system includes: a bundle-passing interface between a plurality of networked users including distribution logic including a distribution control input responsive to machine-readable information in the bundles; and a statistics collection engine including a control input responsive to machine-readable information in the bundles. | 08-07-2014 |
20140236853 | METHOD, DEVICE, AND SYSTEM FOR PROCESSING CONTACT INFORMATION - Methods, devices, and systems for processing contact information are provided. A request for generating virtual contact information can be received from a terminal. According to the request for generating virtual contact information, real contact information that is preset can be obtained. According to the real contact information, the virtual contact information can be generated. The virtual contact information can be sent to the terminal for a user to use. | 08-21-2014 |
20140250026 | METHODS AND SYSTEMS FOR ESTABLISHING IDENTITY CONFIDENCE DATABASE - The invention provides various systems and methods for establishing an identity confidence scoring system. The method includes gathering identity information about the customers from physical locations and from remote locations. The method updates the identity profiles with the gathered identity information, and based on the gathered identity information, generates an identity confidence score associated with each identity profile. | 09-04-2014 |
20140258162 | TECHNIQUES TO BLOCK RECORDS FOR MATCHING - Techniques to block records for matching are described. Some embodiments are particularly directed to techniques to block records for matching entities with inconsistent identifying information. In one embodiment, for example, an apparatus may comprise a configuration component, a coding component, a blocking component, and a matching component. The configuration component may be operative to receive a data set comprising a plurality of records and operative to receive a set of blocking variables, the blocking variables present as variables in each of the plurality of records. The coding component operative to generate match codes based on the blocking variables. The blocking component operative on the processor circuit to produce a plurality of blocks of records from the data set based on the match codes. The matching component operative to match records within each of the plurality of blocks by performing deterministic or probabilistic entity resolution based on similar variables of the records within each of the blocks. Other embodiments are described and claimed. | 09-11-2014 |
20140279640 | SYSTEMS, METHODS AND APPARATUSES FOR IDENTIFYING PERSON OF INTEREST - The present disclosure describes systems, methods, and apparatuses for identifying a person of interest. An exemplary method may comprise storing external data received from a variety external sources into a parameterized table, creating a first set of category views on the parameterized table, creating a second set of category views based at least in part on data to be derived from a traveler's personal information to be received, receiving the traveler's personal information generated by an input device and determining whether the traveler is a person of interest by evaluating the personal information against one or more pre-defined profiles using the first and second sets of category views. Each of the one or more pre-defined profiles may comprise one or more rules and a threshold value for determining a likelihood for the traveler to be matched in each of the one or more pre-defined profiles. | 09-18-2014 |
20140279641 | IDENTITY AND ASSET RISK SCORE INTELLIGENCE AND THREAT MITIGATION - Techniques are provided that produce a risk profile consisting of a risk score and trends of risk scores across entities such as user identities and other objects. For example, an identity is assigned a risk score which is based on baseline factors such as HR attributes, such as training and screening status; access to and conflicts across physical, logical, and operational systems; historical and current usage of these systems, as well as anomalies from normal behavior patterns. Techniques herein encompass the management of a risk profile (“behavior profile”) for each entity, e.g. identity, and maintains a risk score that is correlated with behavior, e.g. an individual's behavior, to track anomalies or irregularities in every day routines of the entity, e.g. individual. | 09-18-2014 |
20140279642 | SYSTEMS AND METHODS FOR ENROLLMENT AND IDENTITY MANAGEMENT USING MOBILE IMAGING - Systems and methods for automatic enrollment and identity verification based upon processing a captured image of a document are disclosed herein. Various embodiments enable, for example, a user to enroll in a particular service by taking a photograph of a particular document (e.g., his driver license) with a mobile device. One or more algorithms can then extract relevant data from the captured image. The extracted data (e.g., the person's name, gender, date of birth, height, weight, etc.) can then be used to automatically populate various fields of an enrollment application, thereby reducing the amount of information that the user has to manually input into his mobile device in order to complete the enrollment process. In some embodiments, a set of internal and/or external checks can be run against the data to ensure that the data is valid, has been read correctly, and is consistent with other data. | 09-18-2014 |
20140304184 | BIRTH REGISTRATION - A system for registering a birth includes a processor and storage device. A location of a user is determined, using a first location detection method. The location of the user is verified, using a second location detection method. A security key is established with a registration authority according to the location. A birth registration report is generated in compliance with the birth registration requirements according to the location. The birth registration report comprises identification of the location, a picture of the newborn child, and a time stamp that identifies a time and date of the birth. The birth registration report is encrypted according to the security key, which prevents altering the birth registration report. The birth registration report is transmitted in encrypted format to a registrar of birth records for the location. The birth registration report is stored in encrypted format on a computerized device. | 10-09-2014 |
20140310191 | Cyber-Bullying Response System and Method - A method of rapid response to a cyber-bullying incident is provided by means of a “smartphone,” such as an iPhone™ or Android™, running anti-bullying application software. The application software, which is constantly running or available for launch on the smartphone of the minor user, enables the user to instantly initiate response and reporting of a cyber-bullying incident from a touchscreen menu. The application provides a user interface, which provides a menu of multiple alternate response and reporting actions and one or more input modules for associating a contact list with each of the menu actions. A version of the application for schools enables documentation of responsive actions to cyber-bullying incidents involving their students. | 10-16-2014 |
20140310192 | ENVIRONMENTAL STEWARDSHIP BASED ON DRIVING BEHAVIOR - An approach for managing driving patterns is presented. A first distance measured at a first time between a first vehicle and a second vehicle in front of the first vehicle is received and stored in driving behavior data over a time period. The driving behavior data includes a second distance between the first vehicle and a third vehicle in front of the first vehicle measured at a second time. Based on the first and second distances, the number of times the first vehicle tailgated other vehicles within the period of time is determined. Based on the number of times the first vehicle tailgated within the period of time, an incentive is provided to a driver of the first vehicle to encourage the driver to drive without tailgating, or a disincentive is provided to the driver to deter the driver from tailgating. | 10-16-2014 |
20140317010 | PRIVACY AUCTION MECHANISM - A consumer electronic device hosts a media application that obtains media content use data for a user. The media application interfaces with a server that analyzes the media content use-related data based on a budget-constrained DCLEF and/or a distortion-constrained DCLEF mechanism. The user is then compensated for their disclosed use data based on the severity of the privacy incursion. | 10-23-2014 |
20140324722 | Social Authentication for Account Recovery - A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account recovery code. The account recovery system sends a communication to the trustee for information to verify the trustee as one of the previously identified trustees. The account recovery system then may transmit a link and code with instructions for the trustee to return the link. The account recovery system then transmits a situational query to the trustee to provide additional security. Finally, if all the communications have been completed for the required level of security, the account recovery code is transmitted to the trustee. The trustee sends the account recovery code to the account holder for access to an account. | 10-30-2014 |
20140337243 | CONTEXT-DEPENDENT AUTHENTICATION SYSTEM, METHOD AND DEVICE - A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing. | 11-13-2014 |
20140358811 | Illegal Activity Detection through Interpersonal Relationship Resolution - The detection of illegal activity through interpersonal relationship resolution. A method in accordance with an embodiment includes: assigning a risk assessment score to a person of interest; identifying and mapping at least one first line connection of the person of interest; assigning a risk assessment score to each first line connection; updating the risk assessment score assigned to the person of interest based on the risk assessment score assigned to each first line connection; comparing the risk assessment score of the person of interest to at least one threshold value; and detecting an illegal activity based on the comparing. | 12-04-2014 |
20140358812 | DYNAMIC INFORMATION SHARING PLATFORM - A computer network implemented system for disaster and crisis management which includes at least one server computer, an information collection utility that enables an entity to collect and store information to a database; a communications device for establishing a network corresponding to the communications device; a plurality of communication nodes, each communication node being connected to the network; a user application comprising software for execution by a processor; a message management and routing system configured to facilitate communications; a fixed mode capable of functioning as a crisis center; a user device configured to display information from the user application; where each node of the plurality of nodes is associated with an emergency services source, and is configured to communicate information to the user application; and where the user device is configured to display information regarding the emergency services sector resource from the user application. | 12-04-2014 |
20140365390 | METHOD AND APPARATUS FOR EMERGENCY RESPONSE NOTIFICATION - Embodiments of the invention leverage mobile proliferation to enable laypersons to initiate a timely and effective emergency response in case of an emergency, such as a medical emergency, e.g. cardiac event. Mobile apps are made available as part of an organization's overall response plan and program, allowing bystanders of emergency events to easily initiate notification of trained responders, for example in their facility, in a timely manner commensurate with the type of emergency specific to their facility. More particularly, embodiments of the invention use mobile applications to alert certified first trainees to respond to the scene of the emergency. | 12-11-2014 |
20140379599 | SYSTEM AND METHOD FOR GENERATING AND TRANSMITTING DATA WITHOUT PERSONALLY IDENTIFIABLE INFORMATION - A system and method for generating and transmitting data without personally identifiable information. The method may include receiving a set of one or more unique identifiers (IDs) and a first set of data associated with a subscriber. The method may send the IDs to a third party provider of datasets. The method may receive a second set of data associated with the subscriber identified using the unique IDs. The method may generate aggregated viewing data based on the first and second sets of data. The set of unique IDs may be based on a one-way hash of personally identifiable information associated with the subscriber. In this way, the unique IDs may be appended with the data from third party providers so additional information regarding the household is available to clients, but the personally identifiable information is unavailable to any of the parties. | 12-25-2014 |
20140379600 | AUTHENTICATION SYSTEMS AND METHODS FOR ON-DEMAND PRODUCTS - In one embodiment, a method includes receiving, from a requestor, a request for an on-demand identity product in relation to an identity of a consumer, the request comprising personally identifying information (PII) of the consumer. The method also includes executing, using the PII, a partial registration of the consumer for the on-demand identity product, the partial registration omitting satisfaction of at least one security requirement. The method additionally includes determining whether delayed authentication is enabled for the on-demand identity product. Moreover, the method includes, responsive to a determination that delayed authentication is enabled for the on-demand identity product: conditionally suspending the at least one security requirement; initiating provision of the on-demand identity product to the requestor; and restricting the requestor's access to determined sensitive data resulting from the initiated provision at least until the at least one security requirement is satisfied. | 12-25-2014 |
20150026088 | CRIME ASSESSMENT TOOL AND METHOD - Embodiments of the disclosure are directed towards a crime assessment tool and method for comparing and visualizing crime statistics in a manner such that an accurate assessment of safety in one area may be compared to the safety in another area. The crime statistics may be normalized based on a population basis and/or on crime severity. The areas for comparison may be specified at various levels, such as cities, neighborhoods, specific addresses, or the like. Trending information may be visually provided to aid in assessing the safety of different areas. | 01-22-2015 |
20150039527 | Method for Confirming the Identity of an Individual While Shielding that Individual's Personal Data - A method for confirming the identity of an individual while shielding that individual's personal data. At least one biometric such as the image of the iris of an individual is captured and stored in a database. A unique identification code is assigned to the biometric without reference to the first individual's personal information. A subsequent biometric data collect is compared with the contents of the database. If a match between the subsequent biometric is found with the original biometric, the system transmits the identification code corresponding to the matched biometric. In a second aspect of the invention, in order to protect the privacy of individuals, the unique identification code is encrypted such that only the individual to whom the biometric belongs holds the de-encryption key. In a third aspect of the invention also intended to protect the privacy of individuals, a non-unique group identification code is assigned to the biometric. Preferably, in the case where the biometric used is the iris, the system replaces enrollment and live iris images with iris templates and bases comparisons on these templates, rather than storing/comparing actual images. The system is adapted to assist in locating missing persons and in verifying transactions. If an individual is missing and a live iris template is matched to that person's stored template, the system automatically contacts another individual. | 02-05-2015 |
20150046359 | SYSTEM AND A METHOD FOR THE DETERMINATION OF THE REPUTATIONAL RATING OF NATURAL AND LEGAL PERSONS - A method for the determination of the reputational rating of natural or legal persons, including the following steps: populating a database with certain pieces of information relating to the natural or legal persons, the certain pieces of information being pertinent to prove evidence or facts object of the evaluation of the reputational rating, assigning a positive or negative weighted value to each of the certain pieces of information, proportional to a suitability factor of the evidence or facts to contribute to the determination; determining the reputational rating of any of the natural or legal persons by summing up all the contributions derived from the weighted values relating to the natural or legal persons. | 02-12-2015 |
20150052073 | INFERENCE OF TIMESTAMP, LOCATION, AND SIGNATURE INFORMATION USING STATISTICAL SIGNAL PROCESSING OF POWERLINE DATA - Systems and methods for applying Electric Network Frequency (ENF) forensic techniques to determine characteristics associated with an audio and/or video recording such as when and where the recording was made. In one embodiment, a system that determines at least one of a time and a location associated with a recording includes an ENF forensic database, an ENF extraction processing module and a comparison processing module. The ENF forensic database stores powerline data collected from at least one electrical power grid. The ENF extraction processing module extracts ENF content coupled into the recording. The comparison processing module compares the extracted ENF content with powerline data retrieved from the ENF forensic database and outputs information including one or more of a time during which the recording was made and a location where the recording was made based on the comparison with the powerline data. | 02-19-2015 |
20150052074 | Threat Identification and Mitigation in Computer-Mediated Communication, Including Online Social Network Environments - A method for monitoring and countering source content that encourages an individual to engage in extremist or terrorist activities. The method comprises: intercepting the source content from a communications stream, the source content initiated by or intended for the individual, determining a threat indicator indicative of the likelihood the individual, after exposure to the source content, will engage in extremist or terrorist activities, and sending counter-narrative content to the individual, the counter-narrative content contrary to the source content in an attempt to discourage the individual from engaging in extremist or terrorist activities. | 02-19-2015 |
20150058242 | SYSTEM AND METHOD FOR MONITORING ELECTRONIC COMMUNICATIONS - A method for monitoring mobile communication and generating alerts associated with targeted content. A link is established between a monitored user's mobile communication device and a monitoring user's mobile communication device to receive communications for monitoring purposes. The monitored user's mobile communication device forwards an incoming or outgoing communication to the monitoring user's mobile communication device. The monitored user's or monitoring user's mobile communication device generates an alert if it is determined that the incoming or outgoing communication contains targeted content, and an alert is provided on the monitoring user's mobile communication device. | 02-26-2015 |
20150066793 | CORRELATION ENGINE FOR GENERATING ANONYMOUS CORRELATIONS BETWEEN PUBLICATION-RESTRICTED DATA AND PERSONAL ATRIBUTE DATA - A correlation engine apparatus includes a network interface and a processor, wherein the correlation engine is configured to receive publication-restricted data and non-publication-restricted data and generate correlations useable for predictive models, wherein no trace of any personal identifying information (PII) in the publication-restricted data exists in the correlations. | 03-05-2015 |
20150074008 | SECURE IDENTIFICATION SYSTEM AND METHOD - A computer based system is provided which utilizes a machine readable code presented by one intelligent (handheld) device and read by another. The existing credit authorization means used by banking, or other authorization means, validated the operator of the handheld, which may further be associated to the owner with an RFID, Bluetooth, biometric, or similar device held on the person of the operator or perhaps embedded on the individual. Transactions between secure servers allow validation of identity and monetary transfers. | 03-12-2015 |
20150074009 | SYSTEM AND METHOD FOR AUTOMATED TRAINING, CERTIFICATION AND RECORDATION FOR CLIMBER/TOWER SAFETY AND REGULATORY COMPLIANCE AT COMMUNICATIONS SITES - A computer based system for monitoring compliance of climber/tower safety procedures and personnel at communication towers. The system includes an updatable database of the wireless transmission towers and their unique safety information. The system can monitor and automatically generate reports of tower climber safety training and certification. Workers may be sorted by their employers, training status or other safety information including regulatory compliance. Communication towers may be sorted by structure type, safety status, type of work performed and who performed the work. The custom signs with the machine readable indicia can be used to enhance access to an automated climber/tower safety system. | 03-12-2015 |
20150081579 | SYSTEM FOR CONVEYING DATA TO RESPONDERS AND ROUTING, REVIEWING AND APPROVING SUPPLEMENTAL PERTINENT DATA - Techniques are described herein to converge and conditionally filter data and to present such data in a manner that is beneficial to situational data analysis, in association with emergency management, law enforcement, or other such situations. Data may be combined to create enhanced situational awareness for responders and improve their decision making ability. | 03-19-2015 |
20150088775 | METHODS AND SYSTEMS FOR INSPECTION OF INDIVIDUALS - The systems and methods described herein attempt to increase traveler throughput, increase officer safety, and increase bystander safety at a security checkpoint. The systems and methods described herein attempt to optimize traveler processing via segregation and pre-information selective targeting in order to allow more effective enforcement activities while facilitating the flow of legitimate trade and travel. The systems and methods implement electronic document readers, gates, and biometrics in an attempt to provide the improved functionality. | 03-26-2015 |
20150088776 | APPARATUS, SYSTEM, AND METHOD SUPPORTING COMPLIANCE WITH CUSTOMS/BORDER REQUIREMENTS - A system includes a kiosk configured to collect information associated with a traveler. The information includes information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler. The system also includes a camera configured to obtain an image of the traveler approaching or within a specified portion of a customs/border enforcement area. The system further includes at least one computing device configured to receive the information from the kiosk, provide at least a portion of the information to an external system, and receive a disposition code from the external system. The disposition code identifies whether the traveler is allowed to pass the customs/border enforcement area. The at least one computing device is also configured to receive the image, perform facial recognition to identify the traveler, and provide at least some of the information to an agent associated with the customs/border enforcement area. | 03-26-2015 |
20150088777 | SYSTEM AND METHOD TO DETECT ONLINE PRIVACY VIOLATION - The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field. | 03-26-2015 |
20150088778 | System and method for verifying a travelers authorization to enter into a jurisdiction using a software application installed on a personal electronic device - The present disclosure relates generally to a system and method, which allows travelers to process themselves using a software application installed on a personal electronic device to receive authorization to enter into a jurisdiction. Such system and method includes: a personal electronic device software application (App) for electronically storing therein official passport data for a traveler and members of the traveler's family group and pictures used to identify each passport holder, for posing a series of questions to the traveler, for receiving authorizations to enter into a jurisdiction, and for displaying a secure encrypted receipt on a personal electronic device; means for authenticating the secure receipt; means to transmit passport and travel information to customs authorities from a personal electronic device to determine whether the traveler and the members of the traveler's family group have received authorization to enter into a jurisdiction; and a kiosk for capturing travelers' biometrics and for transmitting passport, biometric and travel information to customs authorities to determine whether the traveler and the members of the traveler's family group have received authorization to enter into a jurisdiction. | 03-26-2015 |
20150095251 | COMMUNICATION SYSTEM FOR DETECTING LAW ENFORCEMENT VIOLATIONS - A communication system ( | 04-02-2015 |
20150095252 | Table-Connected Tokenization - A tokenization system tokenizes sensitive data to prevent unauthorized entities from accessing the sensitive data. The tokenization system accesses sensitive data, and retrieves an initialization vector (IV) from an IV table using a first portion of the sensitive data. A second portion of the sensitive data is modified using the accessed initialization vector. A token table is selected from a set of token tables using a third portion of the sensitive data. The modified second portion of data is used to query the selected token table, and a token associated with the value of the modified second portion of data is accessed. The second portion of the sensitive data is replaced with the accessed token to form tokenized data. | 04-02-2015 |
20150106287 | DEVICES, METHODS, AND SYSTEMS FOR MANAGING REPRESENTATIONS OF ENTITIES THROUGH USE OF PRIVACY BEACONS - Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 04-16-2015 |
20150106288 | DEVICES, METHODS, AND SYSTEMS FOR MANAGING REPRESENTATIONS OF ENTITIES THROUGH USE OF PRIVACY BEACONS - Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 04-16-2015 |
20150106289 | BEHAVIOR BASED DRIVING RECORD MANAGEMENT AND REHABILITATION - The behavior-based driving record management program is designed to assist drivers that have received driving penalties or “demerit points” to improve their behavior and “rehabilitate” to recover their driving privileges. Telematics are used to monitor the driving behavior over time and provide feedback to the driver. The system can also be used to implement graduated licensing programs to ensure that only qualified young drivers are graduating from one level to another demonstrating actual driver behavior and driving experience while reducing fraud. | 04-16-2015 |
20150112883 | PORTABLE SYSTEM FOR MANAGING EVENTS - A system for interacting with a portable device is provided. The system is configured to process both personal and premises events, and includes at least one processor configured to generate device data for determining the location of the portable device and process sensor data in response to an event. The processor is further configured to generate situational data for the processed event. The situational data is based on the sensor data and the device data. The situational data includes information indicative of whether the event is an alarm event and if the event is the alarm event, whether the alarm event is one of a personal event and premises event. The processor is further configured to provide at least a portion of the situational data to the remote service site if the event is the alarm event and determine that confirmation has been received. | 04-23-2015 |
20150112884 | Identifying Genetic Relatives Without Compromising Privacy - Aspects of the invention include determining relatedness between genomes without compromising privacy. In one aspect, secure genome sketches of genomes can be made publicly available without compromising privacy. These are compared to privately held (unsecured) genome sketches to determine relatedness. | 04-23-2015 |
20150127570 | AUTOMATIC ACCIDENT REPORTING DEVICE - A device is configured to receive vehicle information associated with a vehicle, and determine that the vehicle has been in an accident based on the vehicle information. The device is configured to generate an accident report based on determining that the vehicle has been in the accident and based on the vehicle information. The device is configured to provide the accident report for display, and to receive a confirmation that the accident report is accurate based on providing the accident report for display. The device is configured to output the accident report based on receiving the confirmation. | 05-07-2015 |
20150142686 | Marketplace Exchange of Personal Data - Transparent collection and profiling of personal data builds trust. A central database aggregates personal data reported by source devices. Users may view their individual personal data. Users may approve the personal data for sharing with approved entities, such as trusted retailers. | 05-21-2015 |
20150149377 | MODELING POTENTIALLY HAZARDOUS SITES AND PREDICTING HAZARDOUS CONDITIONS - Implementations include methods for monitoring and reporting on actual hazardous conditions at a facility including actions of receiving data associated with a site, the site being susceptible to potentially hazardous conditions, processing the data, one or more models, and one or more prediction rules, determining that a hazardous condition is predicted to occur at the site, providing output data reflecting the hazardous condition, processing the output data to provide indicator data for providing a graphical representation of the site, the graphical representation providing a graphical depiction of the hazardous condition, and providing the indicator data to one or more user devices, the indicator data being processed by each of the one or more user devices to display the graphical representation. | 05-28-2015 |
20150294432 | GESTURE-BASED NOTIFICATION - Systems, methods, and computer program products for use by a financial institution employee in a financial institution environment to determine a preferred level of service based on gesture recognition. Embodiments of the invention involve a memory device; and a processing device operatively coupled to a memory; a computing processor; and a module configured to cause the one or more computing processors to: receive from a first device, an input associated with one or more gestures from an employee in a business environment; compare the received input to one or more predetermined gestures stored in a database, wherein the one or more predetermined gestures stored in the database are associated with one or more actions; based on the comparison, determine a match, and execute the one or more actions associated the received input. | 10-15-2015 |
20150310575 | SYSTEM AND METHOD FOR CONTROLLING COMMUNICATION OF PRIVATE INFORMATION OVER A NETWORK - A system and method for controlling access to private information over a network is provided including a privacy preference repository accessible by one or more subjects of the private information and by a private access bureau. The privacy preference repository stores privacy preferences configured by the subjects to indicate conditions for disclosure of said private information. A policy repository that stores legal criteria for accessing the private information is also accessible by the private access bureau. The private access bureau is configurable to receive requests from privacy-enabled systems for privacy directives that take into account the privacy preferences and legal criteria required to release particular documents on said privacy enabled system in response to the privacy-enabled systems. | 10-29-2015 |
20150332424 | Integrated Systems and Methods Providing Situational Awareness of Operations In An Orgranization - A system which comprises a series of native applications, suited to run on mobile devices, and a series of web-based applications for which functionality and processing are optimized. The native applications and the web-based applications are coordinated to optimize processes of acquiring, storing and disseminating data for speed, integrity and security. | 11-19-2015 |
20150356702 | Integrated Systems and Methods Providing Situational Awareness of Operations In An Orgranization - A system which comprises a series of native applications, suited to run on mobile devices, and a series of web-based applications for which functionality and processing are optimized. The native applications and the web-based applications are coordinated to optimize processes of acquiring, storing and disseminating data for speed, integrity and security. | 12-10-2015 |
20150363902 | AUTOMATIC SUCCESS/FAILURE DETERMINATION NOTIFICATION SYSTEM AND METHOD FOR SAFETY SURVEY RESULTS - A safety management server receives code data from a mobile terminal, and on the basis of the code data, extracts safety inspection data including a safety inspection item, and determination data for making a pass/fail determination on the safety inspection item, and transmits the safety inspection data and the determination data to the mobile terminal. Subsequently, the mobile terminal receives the safety inspection data and the determination data, and on the basis of the determination data, makes a pass/fail determination of an inspection result input as data into the safety inspection item among the safety inspection data. | 12-17-2015 |
20150379656 | METHOD FOR MONITORING THE USE OF CONTROLLED SUBSTANCES - A method for monitoring use of controlled substances by one or more test subjects includes the steps of: entering contact data for a test subject into a monitoring program interacting with appropriate communication hardware to contact the test subject; the said step of entering, the monitoring program thereafter executing the step of: scheduling a random date for a drug test or drug usage test or both for the test subject; the monitoring program thereafter executing the step of attempting to contact the test subject and if successful contact is made, executing the step of advising the test subject as to the random date and, if successful contact is not made, executing the step of recording a failed contact entry and associating the failed contact entry with the test subject. | 12-31-2015 |
20160012560 | SYSTEM AND METHOD FOR EMERGENCY PLANNING MANAGEMENT | 01-14-2016 |
20160019668 | RADIAL DATA VISUALIZATION SYSTEM - A method for interactive visualization of a decision assessment on a graphical user interface, including generating, by a computer processor, that includes generating, by a computer processor, the decision assessment model having a first set of circular sectors on a first ring, a second set of circular sectors on a second ring wherein each of the second set of circular sectors is related to a corresponding first circular sector, and a third set of circular sectors on a third ring wherein each of the third circular sectors is related to a corresponding second circular sector. The first set of circular sectors, the second set of circular sectors and the third set of circular sectors include concentric rings with a common center. | 01-21-2016 |
20160027079 | Identity Authentication And Verification - Methods, software, products and systems of an identity authentication and verifcation system which provide one or more users to verify by electronic and non-electronic means the identity of a person with whom a user is interacting. | 01-28-2016 |
20160027139 | System and Method for Preparing and Implementing Emergency Response Plans - A system and computer implemented method for implementing an emergency response plan in real time includes the steps of electronically providing an emergency plan flow chart including action items that a user must progress through and complete in real time during an emergency incident, and electronically time stamping the completed action items of the emergency plan flow chart as the user progresses through the emergency plan flow chart during the emergency incident. The user can add notes to the time-stamped competed action items and can save an incident record for the emergency incident record as either an actual emergency incident or a drill. | 01-28-2016 |
20160063075 | SYSTEMS AND METHODS FOR CLIENT SCREENING IN THE FINANCIAL SERVICES INDUSTRY - Systems, methods, and interfaces for screening clients for security compliance with a Customer Identification Program are disclosed. An illustrative system for screening clients can include a client screening engine adapted to filter client account data based on one or more filtering criteria, a database adapted to store client account information and verification status information, and a graphical user interface adapted to selectively display client account information and verification status information for one or more selected clients on a screen. The system can be used to submit identity verification requests to Customer Identification Program vendors for only those clients whose identity have not been verified. | 03-03-2016 |
20160063657 | METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS - The present teaching relates to managing identity information of a person at an identity center. In one example, the person is associated with a first set of identity attributes that are verified to be associated with the person. Upon the person being associated with the first set of identity attributes, the person is linked with a first user account at a source entity. A consent is received from the person to share one or more attributes of the first user account at the source entity with a receiving entity. The sharing of the one or more attributes of the first user account from the source entity to the receiving entity is facilitated in accordance with the received consent. | 03-03-2016 |
20160071112 | METHOD AND SYSTEM FOR PROVIDING TRANSPARENCY IN DATA COLLECTION AND USAGE - A method for providing transparency for gathered purchase data includes: storing a plurality of account profiles, each profile including data related to a transaction account associated with a consumer including an account identifier and a plurality of consumer data entries, each entry including data associated with the associated consumer including a data value; receiving a data request, the request including a specific account identifier and one or more requested consumer data entries; identifying a specific account profile where the account identifier corresponds to the specific account identifier; identifying, in the specific account profile, one or more consumer data entries corresponding to the one or more requested consumer data entries; and transmitting the data value included in each of the identified consumer data entries, wherein the data values are based on one or more payment transactions or use of a payment card associated with the related transaction account. | 03-10-2016 |
20160078579 | Method Implemented on Portable Electronic Device to Invoke Legal Rights - A method implemented on portable electronic device for assisting users to properly invoke legal right(s) is provided, whereby a user uses an electronic device to either display a text message or play an audio message, or both, stating that the user chooses to invoke his or her legal right(s), initiate a phone call or email, or both, to seek legal assistance, display a text message reminding the user that he or she has invoked his or her legal right(s). | 03-17-2016 |
20160078580 | Method Implemented on Portable Electronic Device to Check USCIS Application Status - A method implemented on portable electronic device for assisting users to check United States Citizenship and Immigration Services (USCIS) immigration related application status, whereby a user uses an portable electronic device to enter the receipt number of an immigration related application, retrieve the application status and detailed application status description, and display the application status and detailed status description on the portable electronic device. | 03-17-2016 |
20160078581 | MOBILE CUSTOMS DECLARATION SYSTEM AND METHOD - Mobile collection and vetting of user supplied information is described. The systems, techniques, devices, methods, and approaches described herein can be used to obtain, validate, and vet information, such as customs information, in a mobile environment. In embodiments, methods comprise receiving information input via a mobile device. The information is encapsulated by an intermediate to escort the information through a firewall to the database. In response to vetting the information to determine if it meets one or more criteria, the method involves creating a record associated with a unique identifier, information that bio-identifies a user, or an indication of a determination that results from the vetting. In this embodiment, the method includes generating an electronic receipt for communication to the mobile device, the electronic receipt including the unique identifier. | 03-17-2016 |
20160092469 | CONTEXT-AWARE REPUTATION OF A PLACE - In an example, one or more computing devices operate to provide a context-aware reputation of a place, such as in relation to a human user. Context may include the user's identity and purpose, as well as environmental factors such as time of day, weather, and political drivers. The device may communicate with a server to receive globalized safety intelligence. When the user enters a zone, the device may determine a context-sensitive reputation, such as “Green,” “Yellow,” or “Red.” Depending on the reputation, the device may then take an appropriate action, such as warning the user or providing additional information. | 03-31-2016 |
20160110835 | A METHOD FOR DETERMINING ECOLOGICAL RISKS OF HEAVY METAL POLLUTION IN RIVER AND LAKE SEDIMENTS - The present disclosure discloses a method for determining ecological risks of heavy metal pollution in sediments of river and lake. The method includes the following steps of: (1) determining concentration levels of heavy metal pollutants at different positions of water body sediments; (2) conducting statistic analysis on distribution characteristics of concentration data of various heavy metal pollutants in the water body sediments; (3) calculating an ecological risk index of a heavy metal pollutant using a formula; (4) calculating a final result of E | 04-21-2016 |
20160132981 | EMERGENCY PLANNING SYSTEM AND METHOD - Methods, systems, and kits for an emergency planning system. In one aspect, a method includes selecting a geographic location, receiving an aerial representation of the geographic location, overlaying the aerial representation with at least one icon, generating location emergency data for the geographic location based on the aerial representation and the at least one icon overlay, and publishing the location emergency data. Other aspects include receiving an emergency request associated with the geographic location, querying at least one database for the location emergency data associated with the geographic location, receiving the location emergency data for the geographic location on at least one user device, condensed information sheets, materials sheets, preprinted icon sheets for overlaying aerial representation, accessing location emergency data on user device(s) by emergency services, and/or integration of GPS and/or other telemetry measurements. | 05-12-2016 |
20160148331 | CUSTOMER IDENTITY VERIFICATION - Customer identity verification. Receiving a request for verification of a customer's identity. The request includes fields of customer identity data. Requesting, from a first verification resource, verification of the customer's identity using the customer identity data. Receiving from the first verification resource, first verification results including at least one new field of customer identity data. The first verification results being insufficient to verify the customer's identity. Requesting, from a second verification resource, verification of the customer's identity using the at least one new field of customer identity data. Receiving, from the second verification resource, second verification results. For second verification results sufficient to verify the customer's identity, communicating to the customer a successful verification of the customer's identity. | 05-26-2016 |
20160148488 | DISTRESS IDENTIFIER TO CAUSE AN ACTION - Embodiments relate to systems and methods for providing digital dye packs and/or distress signals on a device user interface in connection with a transaction. In an embodiment, a system includes a communication module that interacts with a device having an input device that receives, from a user of the device, specific distress identifier information in connection with conducting a transaction via the device. The system also includes a non-transitory memory comprising a database storing specific distress identifier information with corresponding defensive actions that are executed based on the specific distress identifier information. The system further includes at least one hardware processor in communication with the non-transitory memory and the communication module for executing the defensive actions corresponding to the specific distress identifier information based at least in part on the specific distress identifier information received from the user of the device in connection with the transaction. | 05-26-2016 |
20160163011 | SYSTEMS AND METHODS FOR SEARCHING REMOTE DATABASES - The present disclosure is directed towards systems and methods for performing an on-line database search, which comprises receiving a personal device request signal from a personal device. In response to receipt of the personal device request signal, a first piece of information from a first public records database is identified and a second piece of information from a second public records database is identified. A report is generated associated with the first piece of information and the second piece of information. A report signal associated with the report is then transmitted to the personal device. | 06-09-2016 |
20160163012 | SYSTEM AND METHOD OF IDENTITY VERIFICATION - A system and method of verifying the identity of a user or registrant. The user or registrant provides identification information and registration information. The identification information may be a visual representation of an identifying item associated with location information. In some embodiments, the identification information may be a visual representation of a government issued identity. An identification module verifies the identification information and compares the verified identification information to the registration information. | 06-09-2016 |
20160179814 | A SYSTEM AND A METHOD FOR CALCULATING PARAMETERS FOR THE DETERMINATION OF THE REPUTATIONAL RATING OF NATURAL AND LEGAL PERSONS | 06-23-2016 |
20160189323 | RISK DETERMINATION METHOD, RISK DETERMINATION DEVICE, RISK DETERMINATION SYSTEM, AND RISK OUTPUT DEVICE - In a risk determination method: moving body information, in which accompanying information that indicates the current position of a moving body and a current-position image that indicates a situation around the moving body at the current position are included in correspondence to each other, is obtained; and, if risk occurrence information corresponding to the current position indicated in the accompanying information included in the moving body information is not stored in a risk occurrence information manager and risk occurrence information corresponding to a position other than the current position is stored in the risk occurrence information manager, a degree of risk at the current position is determined on the basis of a similarity between the current-position image included in the moving body information and a risky-position image included in at least one piece of risk occurrence information stored in the risk occurrence information manager. | 06-30-2016 |
20160196628 | SYSTEMS AND METHODS FOR FACILITATING REMOTE SECURITY THREAT DETECTION | 07-07-2016 |
20160379326 | RISK MODELING SYSTEM - The system provides early warning intelligence feeds which analyze risks of potential human caused threats and naturally caused hazards. It includes data mining functions that autonomously search and categorize threats/hazards from worldwide open source data on a continuing basis. Data comes from many news feeds, social media feeds, government databases, etc. Key word analyses allow potential threats/hazards to be sorted into categories traditionally used by government agencies. Physical and cybersecurity vulnerabilities are analyzed and measured with threats to disclose potential impacts to people, properties, processes, special events, and related critical infrastructures and industries. Overall risk scores are instantly displayed as color coded icons on a worldwide electronic map/dashboard at any geolocation. Daily Intelligence reports and certain immediate alerts are also produced. | 12-29-2016 |
20170236231 | Emergency Evacuation Procedure and Monitoring | 08-17-2017 |
20170236232 | Integrated Security Inspection System | 08-17-2017 |
20180025030 | CONTEXT-AWARE REPUTATION OF A PLACE | 01-25-2018 |
20220138882 | IDENTITY MANAGEMENT - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for identitying management, are disclosed. In one aspect, a method includes the actions of receiving, at a given time, a request to verify an identity of a user and a location of the user. The actions further include, in response to the request to verify the identity of the user, identifying a computing device associated with the user. The actions further include determining a previous time and a previous location that computing device verified the identity of the user. The actions further include, based on the given time, the location of the user, the previous time, and the previous location, determining whether to output data verifying the identity of the user at the location. | 05-05-2022 |