Patent application number | Description | Published |
20130273901 | Scalable Common Infrastructure for Information Collection from Networked Devices - A common infrastructure collects diverse data and information from large numbers of mobile devices and traditional sensors at Internet scale to support multiple different applications simultaneously. The infrastructure includes a backend phenomenon layer that provides high level abstractions to applications such that they can express their data and information needs in a declarative fashion and coordinate the data collection and processing activities for all applications. An edge layer that manages devices, receives collection requirements from the backend layer, configures and instructs devices for data collection, and conducts aggregation and primitive processing of the data. This layer contains network edge nodes, such as base stations in a cellular network. Each node manages a set of local data generating networked devices. The device agent data layer using common agents on the data generating networked devices receives data collection instructions from the edge layer, performs data collection. | 10-17-2013 |
20130275569 | Scalable Common Infrastructure for Information Collection from Networked Devices - A common infrastructure collects diverse data and information from large numbers of mobile devices and traditional sensors at Internet scale to support multiple different applications simultaneously. The infrastructure includes a backend phenomenon layer that provides high level abstractions to applications such that they can express their data and information needs in a declarative fashion and coordinate the data collection and processing activities for all applications. An edge layer that manages devices, receives collection requirements from the backend layer, configures and instructs devices for data collection, and conducts aggregation and primitive processing of the data. This layer contains network edge nodes, such as base stations in a cellular network. Each node manages a set of local data generating networked devices. The device agent data layer using common agents on the data generating networked devices receives data collection instructions from the edge layer, performs data collection. | 10-17-2013 |
20140278228 | MAPPING UNCERTAIN GEOMETRIES TO GRATICULES - A geohash based cover for a geometry whose uncertainty is described as a circle with center point and a radius is disclosed. In one example, a geohash cover is computed that does not require any expensive geodesic calculations, providing roughly an order of magnitude improvement in speed up of cover calculation. In another example, distance computations are exact compared to a conventional process. In another example, the geohashes returned by the technique can vary between 4 to 9—with a median 6 (a certain conventional process would always return 9 hashes (all the 8 neighbors and the self geohash)). In another example, results are accurate, while still avoiding expensive geodesic computations. | 09-18-2014 |
20140379628 | PRIVACY RISK METRICS IN LOCATION BASED SERVICES - The present disclosure relates generally to mechanisms for the estimation of location privacy risk, comprising: building one or more trajectory models from auxiliary information (e.g., one or more maps, one or more routes); capturing common behavioral patterns (e.g., shortest route(s),/fastest route(s)); identifying, given unlinked trajectories for a plurality of users, most likely linkages using the trajectory model(s); eliminating one or more unlikely linkages based on deviation from the shortest route(s) and/or the fastest route(s); measuring privacy as the percentage of linkages correctly identified; and outputting the measured privacy. | 12-25-2014 |
20150046452 | GEOTAGGING UNSTRUCTURED TEXT - Mechanisms are described to extract location information from unstructured text, comprising: building a language model from geo-tagged text; building a classifier for differentiating referred and physical location; given unstructured text, identifying referred location using the language model (that is, the location to which the unstructured text refers); given the unstructured text, identifying if referred location is also the physical location using the classifier; and predicting (that is, performing calculation(s) and/or estimation(s) of degree of confidence) of referred and physical location. | 02-12-2015 |
20150278277 | TRACK RECONCILIATION FROM MULTIPLE DATA SOURCES - Embodiments relate to reconciling different entity identifiers. A method of reconciling different entity identifiers of a same entity is provided. The method receives a plurality of series of location-time data items from a plurality of tracking systems that each track one or more entities. Each series of location-time data items is associated with an entity identifier. The method categorizes each location-data item into a space-time region. The method generates a track for each of the plurality of series of location-time data items based on the space-time regions into which the location-data items are categorized, and generates a track signature for each of the generated tracks based on a segment of the generated track. The method compares the track signatures to find matching track signatures. Based on a plurality of matching signatures, the method reconciles the plurality of entity identifiers associated with the plurality of matching signatures to a particular entity. | 10-01-2015 |
20150286666 | TRACK RECONCILIATION FROM MULTIPLE DATA SOURCES - Embodiments relate to reconciling different entity identifiers. A method of reconciling different entity identifiers of a same entity is provided. The method receives a plurality of series of location-time data items from a plurality of tracking systems that each track one or more entities. Each series of location-time data items is associated with an entity identifier. The method categorizes each location-data item into a space-time region. The method generates a track for each of the plurality of series of location-time data items based on the space-time regions into which the location-data items are categorized, and generates a track signature for each of the generated tracks based on a segment of the generated track. The method compares the track signatures to find matching track signatures. Based on a plurality of matching signatures, the method reconciles the plurality of entity identifiers associated with the plurality of matching signatures to a particular entity. | 10-08-2015 |
Patent application number | Description | Published |
20100234693 | ACTIVITY MONITORING DEVICE AND METHOD - A physical activity monitoring method and system in one embodiment includes a communications network, a wearable sensor device configured to generate physiologic data associated with a sensed physiologic condition of a wearer, and to generate audio context data associated with a sensed audio context of the wearer, and to form a communication link with the communications network, a memory for storing the physiologic data and the audio context data, a computer and a computer program executed by the computer, wherein the computer program comprises computer instructions for rendering activity data associated with the physiologic data and the audio context data, and a user interface operably connected to the computer for rendering the activity data. | 09-16-2010 |
20120245716 | Activity Monitoring Device and Method - A physical activity monitoring method and system in one embodiment includes a communications network, a wearable sensor device configured to generate physiologic data associated with a sensed physiologic condition of a wearer, and to generate audio context data associated with a sensed audio context of the wearer, and to form a communication link with the communications network, a memory for storing the physiologic data and the audio context data, a computer and a computer program executed by the computer, wherein the computer program comprises computer instructions for rendering activity data associated with the physiologic data and the audio context data, and a user interface operably connected to the computer for rendering the activity data. | 09-27-2012 |
Patent application number | Description | Published |
20140099938 | Multi-tier Indexing Methodology for Scalable Mobile Device Data Collection - A mobile device indexing system includes a plurality of edge nodes in communication with each other across a communication network and a plurality of mobile devices configured to communicate with the edge nodes. Each mobile device has both computing and communication functionalities. A separate mobile device index is maintained at each one of the plurality of edge nodes. Each mobile device index is a geographical spatio-temporal index having entries for a unique set of mobile devices derived from the plurality of mobile devices. Each unique set contains only mobile devices registered to the edge node associated with that mobile device index. | 04-10-2014 |
20140136545 | Multi-tier Indexing Methodology for Scalable Mobile Device Data Collection - A mobile device indexing system includes a plurality of edge nodes in communication with each other across a communication network and a plurality of mobile devices configured to communicate with the edge nodes. Each mobile device has both computing and communication functionalities. A separate mobile device index is maintained at each one of the plurality of edge nodes. Each mobile device index is a geographical spatio-temporal index having entries for a unique set of mobile devices derived from the plurality of mobile devices. Each unique set contains only mobile devices registered to the edge node associated with that mobile device index. | 05-15-2014 |
20140266819 | COMPACTLY STORING GEODETIC POINTS - Mechanisms are provided for the compact storage of geographical geometries as a collection of points, where individual points are encoded as binary/ternary strings (with the property that points closer to each other share a longer binary/ternary prefix) and the geometry is encoded by compressing the binary/ternary representation of common-prefix points. Mechanisms are also provided for the representation of a geometry using a ternary string that allows efficient storage of arbitrary shapes (e.g., long line segments, oblong polygons) as opposed to binary representations that are more efficient when the geometries are square or nearly square shaped. | 09-18-2014 |
20140279970 | COMPACTLY STORING GEODETIC POINTS - Mechanisms are provided for the compact storage of geographical geometries as a collection of points, where individual points are encoded as binary/ternary strings (with the property that points closer to each other share a longer binary/ternary prefix) and the geometry is encoded by compressing the binary/ternary representation of common-prefix points. Mechanisms are also provided for the representation of a geometry using a ternary string that allows efficient storage of arbitrary shapes (e.g., long line segments, oblong polygons) as opposed to binary representations that are more efficient when the geometries are square or nearly square shaped. | 09-18-2014 |
20140365517 | QA Based on Context Aware, Real-Time Information from Mobile Devices - A common infrastructure collects data from a plurality of mobile devices and traditional sensors at Internet scale to respond to natural language queries received at different applications. The infrastructure includes a semantic interpreter to translate the natural language query to a data request specification that is processed by the data collection system. The data collection system includes a phenomenon layer that expresses data and information needs in a declarative fashion and coordinates data collection and processing for queries. An edge layer manages devices, receives collection requirements from the backend layer, configures and instructs devices for data collection, and conducts aggregation and primitive processing of data. This layer contains network edge nodes, such as base stations in a cellular network. Each node manages a set of local data generating networked devices. The device agent data layer using common agents on the networked devices receives data collection instructions and performs data collection. | 12-11-2014 |
20140365518 | QA Based on Context Aware, Real-Time Information from Mobile Devices - A common infrastructure collects data from a plurality of mobile devices and traditional sensors at Internet scale to respond to natural language queries received at different applications. The infrastructure includes a semantic interpreter to translate the natural language query to a data request specification that is processed by the data collection system. The data collection system includes a phenomenon layer that expresses data and information needs in a declarative fashion and coordinates data collection and processing for queries. An edge layer manages devices, receives collection requirements from the backend layer, configures and instructs devices for data collection, and conducts aggregation and primitive processing of data. This layer contains network edge nodes, such as base stations in a cellular network. Each node manages a set of local data generating networked devices. The device agent data layer using common agents on the networked devices receives data collection instructions and performs data collection. | 12-11-2014 |
Patent application number | Description | Published |
20100219871 | GENERATION OF A LOW JITTER CLOCK SIGNAL - Systems and methods for generation of a low jitter clock signal for wireless circuits are disclosed. In an implementation, the system includes a wireless circuit powered by a first power supply and a low jitter clock (LJC) generator powered by a second power supply. The LJC generator provides at least one clock signal to the wireless circuit. The system further includes an LJC driver circuit including a clock buffer powered by the first power supply and a receive buffer powered by the second power supply. | 09-02-2010 |
20100220868 | COUPLING OF SPEAKERS WITH INTEGRATED CIRCUIT - Systems and methods for a low pin architecture to couple speakers with integrated circuits are disclosed herein. In an implementation, the low pin architecture facilitates in reducing the required pin interfaces to couple a low power speaker, a high power speaker, and earphone speakers with integrated circuits (ICs). For this, the high power speaker can be cross-coupled between the pin interfaces that are coupled to the low power speaker and the earphone speakers. These pin interfaces are driven by corresponding driver circuits. In said implementation, some of the driver circuits can be shared to drive multiple pin interfaces. These shared driver circuits include a combined cascode circuit having a first cascode circuit integrated with a second cascode circuit to reliably and selectively drive one or more of the pin interfaces. | 09-02-2010 |
20120287969 | Isolation and Protection Circuit for a Receiver in a Wireless Communication Device - A protection circuit protects a receiver from high-energy signals. In one exemplary embodiment, the protection circuit comprises a snapback transistor and a controller. The snapback transistor comprises a gate, a drain connected to an input of the receiver and a source connected to ground. The controller configured to connect the gate to a bias voltage to close the gate in a transmit mode, and to disconnect the gate from the bias voltage to open the gate in a receive mode. The snapback transistor is configured to enter into snapback responsive to a high energy signal at the drain to provide a current path from the drain to the source even when the gate is open and thus protect the receiver. | 11-15-2012 |
20130116005 | Multi-Standard Transceiver Architecture with Common Balun and Mixer - A multi-standard transceiver comprises a common balun, a controller, at least one first switch, and at least one second switch. The common balun comprises a primary coil and a secondary coil. The at least one first switch connects the primary coil of the balun to a first signal path associated with a first communication standard, or to a second signal path associated with a second communication standard responsive to a control signal provided by the controller. The at least one second switch connects the secondary coil of the balun to a first amplification path associated with the first communication standard, or to a second amplification path associated with the second communication standard responsive to a control signal provided by the controller. A common mixer is configured to provide upconverted signals to one of the signal paths depending on which communication standard has been selected. | 05-09-2013 |
Patent application number | Description | Published |
20130213054 | Gas Turbine Inlet System with Solid-State Heat Pump - A gas turbine inlet system includes a first passage that delivers inlet air to a compressor, a second passage that delivers fuel to a combustor, and a heat pump that transfers heat from the inlet air to the fuel by consuming electric power. The heat transfer causes the turbine inlet air temperature to drop and fuel temperature to increase with favorable effects on both turbine output and heat rate. | 08-22-2013 |
20130247584 | ACTIVE CONTROL OF COMPRESSOR EXTRACTION FLOWS USED TO COOL A TURBINE EXHAUST FRAME - A gas turbine includes at least one combustor and an exhaust frame; a compressor adapted to supply air to the combustor and to supply bleed air to the exhaust frame. A cooling air supply duct is arranged to supply ambient air to the exhaust frame and at least one ejector is. arranged to supply the bleed air to the cooling air supply duct upstream of the exhaust frame. A control valve is configured to control the supply of compressor bleed air to the cooling air supply duct and to the exhaust frame as a function of turbine exhaust temperature and/or turbine load conditions and cooling requirements at the various turbine load conditions. | 09-26-2013 |
20140060054 | THERMODYNAMIC CYCLE OPTIMIZATION FOR A STEAM TURBINE CYCLE - Heat flow from a steam seal header could be used in a stage, such as a low pressure stage, of a steam turbine. However, the dump steam temperature from the steam seal header can be too high requiring removal of excess heat, typically through attemperation, before the dump steam is provided to the low pressure stage. Attemperation poses reliability and life issues and lowers efficiency. To address such short comings, one or more heat pumps are used to transfer heat from the dump steam to the fluid entering a boiler. This allows the dump steam temperature to be within acceptable limits, and at the same time, increase the temperature of the fluid so that the steam cycle performance is enhanced. Preferably, solid-state heat pumps are used as they are reliable, silent and can be precisely controlled. | 03-06-2014 |
20150198089 | GAS TURBINE OXIDANT SEPARATION SYSTEM - In one embodiment, a system includes a gas turbine system, having: a turbine driven by combustion products produced by a turbine combustion system; and a separation unit positioned between turbine stages of the turbine, wherein the separation unit separates oxygen out of the combustion products. The separation unit may include an ion transport membrane. | 07-16-2015 |
Patent application number | Description | Published |
20090076529 | Removable support clamp for balloon angioplasty - An apparatus consists of two or more semi-circular clamshell clamps to surround a lumen externally during balloon angioplasty procedure. When the clamps are closed, they are prevented from opening during the procedure, with the use of a positive stop or a fastener. The procedure facilitates the use of higher than normal pressures within the balloon, which further assists in creating larger passages of the lumen without the fear of rupturing unsupported lumen walls. The procedure also facilitates the use of stronger and larger stents to be implanted internally or externally to the lumen. | 03-19-2009 |
20090183638 | Wooden bottle for ageing liquids - A wooden bottle of suitable size for sale in stores and with interior walls flame treated, is filled directly with liquor to be aged and subsequently marketed at retail, thus eliminating the need for barrels and glass bottles. | 07-23-2009 |
20090324334 | Prevention of flood from a water channel - Preventing a flood by lowering the water level of the water channel in the flood prone zone by methods consisting of pushing large quantities of water downstream and partially blocking the inflow of water at various strategic locations. | 12-31-2009 |
20110186470 | Pill-pouch-pocket-packet folder, a flexible pill carrier - A flexible, compact, and securely closed pill pouch pocket packet folder designed for secure handling, has multiple pockets, containing securely stored pouches for easy and orderly storing and retrieving of pills or similar small items, as when needed, for home or travel. | 08-04-2011 |
20110214236 | Special bed to self induce body traction - A special bed and apparatus, having a fixed section and a movable section, supports a person lying face up, and allows self to restrain two regions of self's body, one on the fixed section and another on the movable section, and further allows the person to self induce traction force between the restrained regions. | 09-08-2011 |
20130259994 | Fluids - solids separating / essence exchanging apparatus - A vertical apparatus,—for mixtures of solids & liquids,—used to exchange essence between them,—or used to separate solids from liquids or vice a versa,—placed on the inside floor of a container, has:
| 10-03-2013 |
Patent application number | Description | Published |
20090315363 | Floor Top Crossmember - A device for securing a rear seat within a cab of a vehicle, comprising a crossmember configured for attachment to a floor pan of the vehicle, the crossmember cooperating with the floor pan to provide a cavity for storing items within the cab. When the crossmember is attached to the floor pan and the rear seat is attached to the crossmember, the crossmember is contained within the space between the seat and the floor pan without extending into a passenger leg room area. | 12-24-2009 |
20120313399 | Reinforced Frame-To-Body Attachment - A reinforced frame structure for a vehicle is provided. The frame structure includes a frame portion having a first portion and a pair of wall portions extending therefrom. A first reinforcement is rigidly coupled to the wall portions, and the first portion, the wall portions, and first reinforcement combine to define an enclosure. | 12-13-2012 |
20150375808 | FLOOR LOAD STRUCTURE FOR VEHICLE BODY TO FRAME MOUNT - A vehicle floor structure includes a cross member having a substantially constant cross section shape. A spacing member is disposed beneath the cross member for securing to a chassis frame. The spacing member is positioned relative to the cross member to define an enclosed cavity between the spacing member and the cross member. The floor structure also includes a first collar affixed within the enclosed cavity. A fastener extends through the spacing member and the cross member, and compresses the first collar when the floor structure is secured to the chassis frame. | 12-31-2015 |
Patent application number | Description | Published |
20110154133 | TECHNIQUES FOR ENHANCING FIRMWARE-ASSISTED SYSTEM DUMP IN A VIRTUALIZED COMPUTER SYSTEM EMPLOYING ACTIVE MEMORY SHARING - A technique for performing a system dump in a data processing system that implements active memory sharing includes assigning, via a hypervisor, a logical partition to a portion of a shared memory. One or more virtual block storage devices are also assigned by the hypervisor to the logical partition to facilitate active memory sharing of the shared memory. When a hypervisor-aided firmware-assisted system dump is indicated and a failure of the logical partition is detected, firmware initiates a system dump of information from the assigned portion of the shared memory to the one or more virtual block storage devices. An operating system of the logical partition is rebooted when enough of the assigned portion of the shared memory is freed to facilitate a reboot of the operating system and the hypervisor-aided firmware-assisted system dump is indicated. | 06-23-2011 |
20120036214 | ALTERNATIVE TRANSFER OF LOGICAL PARTITIONS (LPAR) FROM ONE LPAR COMPUTER SYSTEM TO ANOTHER - An alternative migration of an LPAR from one server system to another when either or both of the server systems cannot access a Storage Area Network (SAN) or like external storage network. If said source and destination server system do not have access to the same SAN, then a mirror image of said all data storage supporting the transferred LPAR is created and transmitted to local storage supporting the destination server system and then the logical partition (LPAR) is transmitted over the connecting network from the source server system to the destination server system. | 02-09-2012 |
20120084071 | Mechanism for NPIV Client Recovery When NPIV Server Goes Down - With N_Port ID Virtualization (NPIV), a managed system can be configured so that multiple logical partitions (LPARs) can access independent physical storage through the same physical fibre channel adapter. An NPIV client recovery component of a virtualization management component, such as a Power Hypervisor (pHYP), provides the emulation mapping between server and client virtual fibre channel adapters. The pHYP also provides a mechanism that prevents client partition crashes when the NPIV server (e.g., a VIOS logical partition) goes down. When the NPIV server is rebooted or powers down, the pHYP handles the client LPARs to avoid a crash by removing processing resources from the client logical partition. Thereby, the client logical partition is prevented from attempting to access a root volume group in physical storage via the NPIV server. The pHYP allocates processor resources to the client LPAR when the NPIV server is again available for UO processing. | 04-05-2012 |
20120110275 | Supporting Virtual Input/Output (I/O) Server (VIOS) Active Memory Sharing in a Cluster Environment - A method, system, and computer program product provide a shared virtual memory space via a cluster-aware virtual input/output (I/O) server (VIOS). The VIOS receives a paging file request from a first LPAR and thin-provisions a logical unit (LU) within the virtual memory space as a shared paging file of the same storage amount as the minimum required capacity. The VIOS also autonomously maintains a logical redundancy LU (redundant LU) as a real-time copy of the provisioned/allocated LU, where the redundant LU is a dynamic copy of the allocated LU that is autonomously updated responsive to any changes within the allocated LU. Responsive to a second VIOS attempting to read a LU currently utilized by a first VIOS, the read request is autonomously redirected to the logical redundancy LU. The redundant LU can be utilized to facilitate migration of a client LPAR to a different computing electronic complex (CEC). | 05-03-2012 |
20120179771 | SUPPORTING AUTONOMOUS LIVE PARTITION MOBILITY DURING A CLUSTER SPLIT-BRAINED CONDITION - A method, data processing system, and computer program product autonomously migrate clients serviced by a first VIOS to other VIOSes in the event of a VIOS cluster “split-brain” scenario generating a primary sub-cluster and a secondary sub-cluster, where the first VIOS is in the secondary sub-cluster. The VIOSes in the cluster continually exchange keep-alive information to provide each VIOS with an up-to-date status of other VIOSes within the cluster and to notify the VIOSes when one or more nodes loose connection to or are no longer communicating with other nodes within the cluster, as occurs with a cluster split-brain event/condition. When this event is detected, a first sub-cluster assumes a primary sub-cluster role and one or more clients served by one or more VIOSes within the secondary sub-cluster are autonomously migrated to other VIOSes in the primary sub-cluster, thus minimizing downtime for clients previously served by the unavailable/uncommunicative VIOSes. | 07-12-2012 |
20120246517 | PROVIDING FIRST FIELD DATA CAPTURE IN A VIRTUAL INPUT/OUTPUT SERVER (VIOS) CLUSTER ENVIRONMENT WITH CLUSTER-AWARE VIOSES - A first virtual I/O server (VIOS) provides a cluster aware (CA) operating system (OS) executing on a processor resource of the first VIOS to register the first VIOS within a VIOS cluster. The first VIOS comprises a first field/failure data capture (FFDC) module that executes within the first VIOS and performs the functions of: receiving from an event listener a signal indicating that an FFFDC event/condition has been detected by the first VIOS; and automatically transmitting FFDC data to the shared storage repository for storage of the FFDC data within the shared storage repository. The FFDC module further performs the functions of: transmitting to one or more second VIOSes within the VIOS cluster, one or more messages to inform the one or more second VIOSes of an occurrence of the FFDC event/condition that was detected by the first VIOS. | 09-27-2012 |
20130013285 | Mechanism for NPIV Client Recovery When NPIV Server Goes Down - With N_Port ID Virtualization (NPIV), a managed system can he configured so that multiple logical partitions (LPARs) can access independent physical storage through the same physical fibre channel adapter. An NPIV client recovery component of a virtualization management component, such as a Power Hypervisor (pHYP), provides the emulation mapping between server and client virtual fibre channel adapters. The pHYP also provides a mechanism that prevents client partition crashes when the NPIV server (e.g., a VIOS logical partition) goes down. When the NPIV server is rebooted or powers down, the pHYP handles the client LPARs to avoid a crash by removing processing resources from the client logical partition. Thereby, the client logical partition is prevented from attempting to access a root volume group in physical storage via the NPIV server. The pHYP allocates processor resources to the client LPAR when the NPIV server is again available for I/O processing. | 01-10-2013 |
20130031341 | Hibernation and Remote Restarting Hibernation Data in a Cluster Environment - Hibernation and remote restore functions of a client logical partition (LPAR) that exists within a data processing system having cluster-aware Virtual Input/Output (I/O) Servers (VIOSes) is performed via receipt of commands via a virtual control panel (VCP) through an underlying hypervisor. The client hibernation data file is stored in a shared repository by a source/original VIOS assigned to the client. The hypervisor receives a remote restart command and assigns a target/remote client LPAR and a target VIOS. The source I/O adapters and target I/O adapters are locked and the target VIOS gathers adapter configuration information from the source VIOS and configures the target adapters to be able to perform the I/O functionality provided by the source adapters to the client LPAR. The target VIOS then retrieves the client's hibernation data file, and the client LPAR is restored at the remote LPAR with the target VIOS providing the client's I/O functionality. | 01-31-2013 |
Patent application number | Description | Published |
20120158540 | FLAGGING SUSPECT TRANSACTIONS BASED ON SELECTIVE APPLICATION AND ANALYSIS OF RULES - A fraud management system is configured to store rules for detecting fraud. The fraud management system is configured to: receive a transaction involving a consumer and a merchant; select a set of the rules based on information associated with the transaction, information associated with the consumer, or information associated with the merchant; process the transaction, in parallel, using the selected rules to generate a set of alarms; group the alarms, into groups, based on information associated with the transaction; analyze the groups to generate a fraud score; and output information regarding the fraud score to the merchant to notify the merchant whether the transaction is potentially fraudulent. | 06-21-2012 |
20120158541 | USING NETWORK SECURITY INFORMATION TO DETECTION TRANSACTION FRAUD - A fraud management system is configured to store rules for detecting fraud. The fraud management system is further configured to receive a transaction involving a consumer and a merchant; obtain network security information associated with malicious activity in a voice network or a data network, where the network security information indicates that the consumer has been involved in malicious activity in the voice network or in the data network; select a subset of rules based on the network security information and information associated with the transaction, the merchant, or the consumer; process the transaction using the subset of rules to generate alarms; process the alarms to generate a fraud score for the transaction; and output information regarding the fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. | 06-21-2012 |
20120158585 | ITERATIVE PROCESSING OF TRANSACTION INFORMATION TO DETECT FRAUD - A fraud management system is configured to store rules for detecting fraud, receive a transaction from a merchant, process the transaction using a first subset of rules to generate a fraud score for the transaction, and output information regarding the fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. The fraud management system is further configured to receive, after outputting the information regarding the fraud score to the merchant, additional information relating to the transaction, re-process the transaction using a second subset of rules to generate an update fraud score, and output information regarding the updated fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. | 06-21-2012 |
20120158586 | AGGREGATING TRANSACTION INFORMATION TO DETECT FRAUD - A fraud management system is configured to receive a transaction from a merchant; select rules to use to process the transaction; process the transaction using the selected rules to generate a set of alarms; and generate an alarm score for each of the alarms. The fraud management system is further configured to combine the alarms with alarms from one or more other transactions to form a combined set of alarms; sorting alarms, in the combined set of alarms, into groups based on attributes of the transaction; generate a group score, for each group, based on at least one of the alarm scores for at least one alarm in the group; generate a fraud score, for the transaction, based on one or more of the group scores; and output information regarding the fraud score to the merchant to notify the merchant whether the transaction is potentially fraudulent. | 06-21-2012 |