Managing meeting data
    31.
    发明授权

    公开(公告)号:US10263799B1

    公开(公告)日:2019-04-16

    申请号:US16116600

    申请日:2018-08-29

    Abstract: A device may receive meeting data associated with a first meeting, the first meeting having previously occurred. The device may obtain, based on the meeting data, data identifying at least one individual associated with the first meeting and data identifying at least one topic associated with the first meeting. In addition, the device may identify a second meeting based on the at least one individual or the at least one topic, the second meeting having not yet occurred. The device may provide, to a user device associated with the second meeting and based on identifying the second meeting, at least a portion of the meeting data associated with the first meeting.

    Methods and processes for utilizing information collected for enhanced verification

    公开(公告)号:US10257181B1

    公开(公告)日:2019-04-09

    申请号:US15972697

    申请日:2018-05-07

    Abstract: A system for verifying a user identity is disclosed. The system is configured to generate a first profile related to the user and receive an indication that the account is accessed by an accessor through an accessor device. The system receives, from the accessor device, identity data associated with the accessor. The system is configured to store the identity data subsets in clusters, analyze the clusters, and output the cluster analyses to node instances that weighs the cluster analyses outputs. The system also generates a second profile related to the accessor based on the received identity data and weighted cluster analysis. The system determines a likelihood factor that the accessor is the user based on a comparison of the first profile and the second profile.

    Methods and processes for utilizing information collected for enhanced verification

    公开(公告)号:US12041043B2

    公开(公告)日:2024-07-16

    申请号:US18311092

    申请日:2023-05-02

    Abstract: A system for verifying a user identity. The system comprises one or more memory devices storing instructions and one or more processors configured to execute the instructions. The processors are configured to receive information associated with an account of a user. The processors are further configured to generate a first profile, where the first profile being related to the user. The processors also receive an indication that the account is accessed by an accessor through an accessor device; and receive, from the accessor device, identity data comprising a plurality of data subsets associated with the accessor. The processors are configured to store the data subsets in respective clusters. The processors are further configured generate cluster analyses by analyzing the data subsets in respective clusters; and output the cluster analyses to node instances that weighs the cluster analyses outputs. The processors also generate a second profile, the second profile related to the accessor and being based on the received identity data and weighted cluster analysis. And the processors are configured to determine a likelihood factor that the accessor is the user based on a comparison of the first profile and the second profile.

    Transaction card with integrated USB device

    公开(公告)号:US11829979B2

    公开(公告)日:2023-11-28

    申请号:US17884362

    申请日:2022-08-09

    CPC classification number: G06Q20/204 G06F13/4282 G06Q20/382 G06F2213/0042

    Abstract: A transaction card is provided for communicating with a computing device. The transaction card may comprise a computer interface device, at least one memory, at least one processor, and a card reader module. The card reader module configured to receive, from the computing device through the computer interface device, a first data packet comprising a request associated with a transaction, the first data packet being compatible with an interface protocol. The card reader module may process the first data packet to generate a second data packet compatible with the payment authentication protocol; provide the second data packet to the processor; receive, from the processor, a third data packet comprising a response to the request; process the third data packet to generate a fourth data packet based on the response, the fourth data packet compatible with the interface protocol; and transmit, to the computer interface device, the fourth data packet.

    Methods and processes for utilizing information collected for enhanced verification

    公开(公告)号:US11665149B2

    公开(公告)日:2023-05-30

    申请号:US17332266

    申请日:2021-05-27

    Abstract: A system for verifying a user identity. The system comprises one or more memory devices storing instructions and one or more processors configured to execute the instructions. The processors are configured to receive information associated with an account of a user. The processors are further configured to generate a first profile, where the first profile being related to the user. The processors also receives an indication that the account is accessed by an accessor through an accessor device; and receive, from the accessor device, identity data comprising a plurality of data subsets associated with the accessor. The processors are configured to store the data subsets in respective clusters. The processors are further configured generate cluster analyses by analyzing the data subsets in respective clusters; and output the cluster analyses to node instances that weighs the cluster analyses outputs. The processors also generate a second profile, the second profile related to the accessor and being based on the received identity data and weighted cluster analysis. And the processors are configured to determine a likelihood factor that the accessor is the user based on a comparison of the first profile and the second profile.

    Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity

    公开(公告)号:US11470116B2

    公开(公告)日:2022-10-11

    申请号:US16686762

    申请日:2019-11-18

    Abstract: Embodiments disclosed herein generally relate to a system and method for detecting fraudulent computer activity. A computing system generates a plurality of synthetic identities. Each of the plurality of synthetic identities mimics information associated with a verified identity. The computing system receives, from a user, an input attempt. The input attempt includes a synthetic identity of the plurality of synthetic identities. The computing system compares input information in the input attempt to the plurality of synthetic identities. The computing system determines that the input information in the input attempt includes information from the plurality of synthetic identities, if it does, the computing system rejects the input attempt.

Patent Agency Ranking