Patent application number | Description | Published |
20110055074 | VISUALIZATION FOR PAYMENT CARD TRANSACTION FRAUD ANALYSIS - A computer-implemented method and system for visualizing card transaction fraud analysis is presented. Transaction data and account data related to one or more payment card accounts is stored in a database. The transaction data includes a fraud score. A computer processor generates one or more of a plurality of visualizations of activity of at least one suspicious account from the one or more payment card accounts for display in a graphical user interface, each of the plurality of visualizations providing at least a graphical representation of the transaction data and which is selectable from a menu provided by the computer processor in the graphical user interface. The visualizations assist in case judgment of the one or more payment cards. | 03-03-2011 |
20140222737 | System and Method for Developing Proxy Models - A system and method for developing proxy models is provided. The system for developing proxy models comprising a proxy model development computer system in electronic communication with a training database storing training data therein, and a plurality of computer models including a complex model and a proxy model that are trained by the computer system using the training data from the training database, wherein the computer system evaluates performance of each of the plurality of computer models, and if the computer system determines that the proxy model at least meets pre-defined performance criteria and approximates performance of the complex model, then the computer system communicates to a user that the proxy model can substitute the complex model. | 08-07-2014 |
20140279306 | System and Method for Detecting Merchant Points of Compromise Using Network Analysis and Modeling - Provided is a system for detecting a merchant point of compromise. More specifically, provided is a system for detecting a merchant point of compromise comprising a computer system in electronic communication with a transaction processing network containing transaction information, the computer system comprising a point-of-compromise detector, said point-of-compromise detector performing the steps of electronically receiving from the transaction processing network the transaction information; generating at least one of an undirected network or a directed network based on the transaction information; extracting features from the at least one of the undirected network or the directed network; and identifying one or more point-of-compromise merchants based on the extracted features. | 09-18-2014 |
20140279752 | System and Method for Generating Ultimate Reason Codes for Computer Models - A system and method for generating ultimate reason codes for computer models is provided. The system for generating ultimate reason codes for computer models comprising a computer system for receiving a data set, and an ultimate reason code generation engine stored on the computer system which, when executed by the computer system, causes the computer system to train a base model with a plurality of reason codes, wherein each reason code includes one or more variables, each of which belongs to only one reason code, train a subsequent model using a subset of the plurality of reason codes, determine whether a high score exists in the base model, determine a scored difference if a high score exists in the base model, and designate a reason code having a largest drop of score as an ultimate reason code. | 09-18-2014 |
20140279815 | System and Method for Generating Greedy Reason Codes for Computer Models - A system and method for generating greedy reason codes for computer models is provided. The system for generating greedy reason codes for computer models, comprising a computer system for receiving and processing a computer model of a set of data, said computer model having at least one record scored by the model, and a greedy reason code generation engine stored on the computer system which, when executed by the computer system, causes the computer system to identify reason code variables that explain why a record of the model is scored high by the model, and build an approximate model to simulate a likelihood of a high score being generated by at least one of the reason code variables identified by the engine. | 09-18-2014 |
Patent application number | Description | Published |
20090320122 | CONGESTION MANAGEMENT OF SESSION NEGOTIATIONS IN NETWORK DEVICES - A network device implements congestion management of sessions of a network protocol. In one implementation, an incoming request component receives session requests for a negotiation session between the network device and a second network device. A capacity pool stores a value relating to capacity of the network device to continue to efficiently process the session requests. New sessions are initiated when the value stored in the capacity pool is less than an estimate of the capacity of the network device at which the network device maximizes processor usage while minimizing session timeouts. | 12-24-2009 |
20100278181 | POINT-TO-MULTI-POINT/NON-BROADCASTING MUTLI-ACCESS VPN TUNNELS - A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier. | 11-04-2010 |
20120137358 | POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS - A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier. | 05-31-2012 |
Patent application number | Description | Published |
20120236012 | Method and Device for Displaying Application Image - A method and a device for displaying an application image are provided, and the method includes the following steps: receiving a display request from a second operating system, and reading the application image stored in a storage area; judging whether it is required to process the application image through a window manager according to the configuration of the local image display system, and if required, sending the application image to the window manager, and sending the application image processed by the window manager to a display graphics library for processing; if not, directly sending the application image to the display graphics library for processing; and acquiring the location of the display memory through a display driver, sending the application image processed by the display graphics library to the display memory, and displaying the application image through the display memory. Using the solution, the application image of the installable operating system can be displayed in the local operating system. | 09-20-2012 |
20130305026 | SYSTEM AND METHOD FOR INPUT TOOL INVOCATION AND PROXY DEVICE - A system and a method for input tool invocation and a proxy device enable an installable operating system to perform input operation by invoking the input tool of a local operating system, such as a soft keyboard of the local operating system, an input method of the local operating system, or a soft keyboard and an input method of the local operating system. Even an operating system not installed with input tools can perform input operation by invoking an input tool of a local operating system, thereby avoiding repeated installations of input tools for different operating systems, and resolving the issue of large resource usage caused by repetitive installations of input tools. | 11-14-2013 |
20140169337 | COMMUNICATION IMPLEMENTATION METHOD, CENTRAL PROCESSING UNIT AND TERMINAL - A method for implementing communication includes: determining an operating system corresponding to a current time slice, the determined operating system supporting a communication network standard; determining a memory partition; running the determined operating system based on the determined memory partition and driving a Digital Signal Processor, a signal processing module supporting the communication network standard and a Radio Frequency signal transceiver based on a hardware driving program included in a system program of the determined operating system; controlling the signal processing module to read authentication information of the terminal and controlling the Digital Signal Processor to encapsulate, based on a communication protocol, the authentication information of the terminal to generate a communication network signal; and controlling the Radio Frequency signal transceiver to convert the communication network signal into a Radio Frequency signal and send the Radio Frequency signal to a communication network. | 06-19-2014 |