Patent application number | Description | Published |
20090112773 | Automated Private Financing Network - A computerized and networked system and method empower individuals and businesses to obtain private financing from qualified investors by offering risk diversification and investment liquidity. In addition, progress of the individuals and businesses is monitored to ensure their compliance with the business plans submitted to the investors. Furthermore, suspicious activities are monitored, detected and reported in accordance with the anti-money laundering, anti-terrorist financing and/or anti-financial crimes regulatory requirements. | 04-30-2009 |
20090271617 | PRIVACY PROTECTED COOPERATION NETWORK - A computerized method and apparatus are established to identify a subject of common interest among multiple parties without releasing the true identity of any subject. Furthermore, a computerized network provides different parties at different locations with a mechanism to conduct cooperative activities concerning such a subject of common interest without exposing that subject to possible identity theft. | 10-29-2009 |
20100044430 | Automated Remittance Network - A computerized network empowers senders (or payers) to send funds and recipients (or payees) to receive funds at any time anywhere over the world through user-accessible terminals such as ATM terminals, check-cashing kiosks, money services kiosks, cash registers, checkout stands, computer, contactless device, wire line phone, mobile phone, smartphone, personal digital assistant, etc. Furthermore, the disclosed network collects and verifies senders' and recipients' identification information in accordance with the anti-money laundering, anti-terrorist financing, and anti-financial crimes regulatory requirements, such as the Bank Secrecy Act and the USA PATRIOT Act in the United States and any equivalent laws in other countries. | 02-25-2010 |
20100250364 | Privacy Protected Anti Identity Theft and Payment Network - A computerized and networked system protects individuals against identity theft without the need to disclose the detailed personal information of the individuals. Furthermore, the system helps prevent loss and damage to consumers, financial institutions and merchants caused by financial crimes related to identity theft. In addition, users can conduct payments in a secure manner without the need to use any traditional financial instrument. A pass code can be generated for each transaction and sent to a user's personal communications device. When the correct pass code is received from the user, the transaction is then authorized. | 09-30-2010 |
20100250390 | Anti-Crimes Online Transaction System - Anti-money laundering, anti-terrorist financing and other anti-crimes measures are enforced in compliance with the Bank Secrecy Act and the USA PATRIOT Act in the USA or equivalent laws in other countries, and crimes in financial transaction activities such as online banking, trading, money services, shopping, payment, etc. are reduced. Embedded identification information is read from a machine-readable official government issued identification document such as a passport, driver's license, etc., and such information is sent to a financial institution for approval and for anti-money laundering, anti-terrorist financing and other anti-crimes purposes. | 09-30-2010 |
20100250410 | CARDLESS FINANCIAL TRANSACTIONS SYSTEM - Users are enabled to conduct financial transactions in a secured manner without the need to use traditional financial instruments, such as credit cards, debit cards, prepaid cards, ATM cards, checks, cash, etc. In addition, user's identity is kept confidential in the financial transactions. | 09-30-2010 |
20100325026 | ANTI-CRIMES FINANCIAL NETWORK - A computerized system is established through a network to help business organizations conduct and manage their businesses with anti-financial crimes provisions according to the government regulations and laws, e.g., the Bank Secrecy and the USA PATRIOT Act, and to enable financial institutions to monitor and manage these business organizations with confidence in compliance with the regulatory requirements and applicable laws. | 12-23-2010 |
20110029428 | Mobile Remittance Network - A computerized network empowers senders (or payers) to send funds and recipients (or payees) to receive funds at any time anywhere in the world through user-accessible terminals such as ATM terminals, check-cashing kiosks, money services kiosks, cash registers, checkout stands, computers, contactless devices, wire line phones, mobile phones, smartphones, personal digital assistants, etc. Furthermore, the network collects and verifies senders' and recipients' identification information in accordance with the anti-money laundering, anti-terrorist financing, and anti-financial crimes regulatory requirements, such as the Bank Secrecy Act and the USA PATRIOT Act in the United States and any equivalent laws in other countries. | 02-03-2011 |
20110087576 | Client compliance system - A computerized system is established through a network to help business organizations conduct and manage their businesses with anti-financial crimes provisions according to the government regulations and laws, e.g., the Bank Secrecy and the USA PATRIOT Act, and to enable financial institutions to monitor and manage these business organizations with confidence in compliance with the regulatory requirements and applicable laws. | 04-14-2011 |
20110225045 | Paperless Coupon Transactions System - Users can conduct financial transactions in a secured manner without using traditional financial instruments, such as currency, credit cards, debit cards, prepaid cards, stored value cards, ATM cards, checks, coupons, tokens, tickets, vouchers, certificates, notes, securities, letters of credit, etc. In addition, a user's identity is kept confidential in the financial transactions. | 09-15-2011 |
20120123942 | Global Customer Identification Network - A computerized system conducts customer identification processing for customers who remotely open accounts with personal identification information that cannot be verified through available data sources. | 05-17-2012 |
20120150786 | MULTIDIMENSIONAL RISK-BASED DETECTION - A computerized method detects suspicious and fraudulent activities in a group of subjects by defining and dynamically integrating multidimensional risks into a mathematical model. A subset of multidimensional risk-weighted detection algorithms are selected so that suspicious or fraudulent activities in the group of subjects can be effectively detected with higher resolution and accuracy. A priority sequence is produced to determine the priority of each detected case during the investigation process. Any set of multidimensional risks identifies a group of subjects that contain this set of multidimensional risks so that group statistics can be obtained for comparison and other analytical purposes. The detection results may adjust the definitions of the multidimensional risks, the mathematical model, and the multidimensional risk-weighted detection algorithms. | 06-14-2012 |
20120158563 | MULTIDIMENSIONAL RISK-BASED DETECTION - A computerized method is established to detect suspicious and fraudulent activities in a group of subjects by defining and dynamically integrating multidimensional risks, which are based on the characteristics of the subjects, into a mathematical model to produce a set of the most up-to-date representative risk values for each subject based on its activities and background. These multidimensional risk definitions and representative risk values are used to select a subset of multidimensional risk-weighted detection algorithms so that suspicious or fraudulent activities in the group of subjects can be effectively detected with higher resolution and accuracy. A priority sequence, which is based on the set of detection algorithms that detect the subject and the representative risk values of the detected subject, is produced to determine the priority of each detected case during the investigation process. | 06-21-2012 |
20120284798 | CONFIDENTIAL COMMON SUBJECT IDENTIFICATION SYSTEM - A computerized method and apparatus are established to identify a subject of common interest among multiple parties without releasing the true identity of any subject. Furthermore, a computerized network provides different parties at different locations with a mechanism to conduct cooperative activities concerning such a subject of common interest without exposing that subject to possible identity theft. | 11-08-2012 |
20130065640 | INTELLIGENT PERSONAL COMMUNICATION DEVICE - An intelligent personal communication device, such as a cellular phone, integrates and interfaces an array of sensors to detect the components in the air so that information regarding the objects or materials that produced the air components can be quickly available to the user of the intelligent personal communication device. | 03-14-2013 |
20130103482 | ANTI-FRAUD FINANCIAL TRANSACTIONS SYSTEM - Users can conduct financial transactions in a secure manner without the need to use any traditional financial instrument, such as credit card, debit card, ATM card, gift card, stored value card, prepaid card, cash, check, coupon, token, ticket, voucher, certificate, note, security, etc. In addition, users' identities are kept confidential in the transactions without violating the Anti-Money Laundering and Anti-Terrorist Financing requirements. | 04-25-2013 |
20130219506 | CONFIDENTIAL COMMON SUBJECT IDENTIFICATION SYSTEM - A computerized method and apparatus are established to identify a subject of common interest among multiple parties without releasing the true identity of any subject. Furthermore, a computerized network provides different parties at different locations with a mechanism to conduct cooperative activities concerning such a subject of common interest without exposing that subject to possible identity theft. | 08-22-2013 |
20130318622 | PRIVATE INFORMATION SHARING SYSTEM - A computerized method and apparatus are established to identify a subject of common interest among multiple parties without releasing the true identity of any subject. Furthermore, a computerized network provides different parties at different locations with a mechanism to conduct cooperative activities concerning such a subject of common interest without exposing that subject to possible identity theft. | 11-28-2013 |
20140058914 | TRANSACTIONAL MONITORING SYSTEM - A computer system conducts transactional monitoring to detect different types of possible cases in order to prevent financial crimes and assist businesses to comply with different types of laws and regulations. The computer system derives a total risk score for each of a group of entities based on risk factors. Each of the risk factors is assigned a risk score. The computer system also detects an entity when the total risk score of the detected entity differs from a reference derived from total risk scores of the group of entities by a pre-determined margin. The computer system also assists a user to identify at least one transaction that has caused the detected entity to have a total risk score that differs from the reference derived from the total risk scores of the group of entities. | 02-27-2014 |
20140101052 | MOBILE FINANCIAL TRANSACTION SYSTEM - A computer system and computerized methods enable users to conduct financial transactions in a secured manner without using traditional financial instruments, such as credit cards, debit cards, prepaid cards, checks, cash, etc. | 04-10-2014 |
20150026776 | ANONYMOUS SUBJECT IDENTIFICATION SYSTEM - A computerized method and apparatus are established to identify a subject of common interest among multiple parties without releasing the true identity of any subject. Furthermore, a computerized network provides different parties at different locations with a mechanism to conduct cooperative activities concerning such a subject of common interest without exposing that subject to possible identity theft. | 01-22-2015 |