会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Data transaction profile compression
    • 数据交易配置文件压缩
    • US07853526B2
    • 2010-12-14
    • US11800348
    • 2007-05-04
    • Joseph P. Milana
    • Joseph P. Milana
    • G06Q40/00
    • G06Q20/02G06Q20/10G06Q20/105G06Q20/389G06Q20/4016G06Q30/02G06Q40/00G06Q40/025
    • Techniques for compressing data transaction history profiles are disclosed. Such profiles can include a plurality of profile variables with each profile variable comprising a real number that provides a factor for determining whether a proposed data transaction is indicative of fraud. A bit string is generated for each profile variable in the profiles that characterizes a first value plus a second value. The first value is equal to a mantissa for the real number corresponding to the profile variable. The second value is equal to a number of orders of magnitude above a minimum required expressed as multiples of the number of orders magnitude required to represent the plurality of real numbers in each the plurality of transaction history profiles divided by a range of bits. The generated bit string is stored as compressed profile variable within the data transaction history profiles. Related systems, apparatus, methods, and/or articles are also described.
    • 公开了用于压缩数据交易历史概况的技术。 这样的简档可以包括多个简档变量,其中每个简档变量包括实数,其提供用于确定所提出的数据事务是否指示欺诈的因素。 对于表征第一个值加上第二个值的配置文件中的每个配置文件变量生成一个位串。 第一个值等于对应于轮廓变量的实数的尾数。 第二个值等于高于最小值数量级的数量,表示为表示多个交易历史图表中每个多个交易历史曲线除以一个比特范围的多个实数所需的数量级数的倍数。 生成的位串在数据事务历史配置文件中作为压缩配置文件变量存储。 还描述了相关系统,装置,方法和/或制品。
    • 8. 发明申请
    • APPARATUS AND METHOD FOR SIMULATING AN ANALYTIC VALUE CHAIN
    • 用于模拟分析价值链的装置和方法
    • US20080313073A1
    • 2008-12-18
    • US12143428
    • 2008-06-20
    • Gerald FahnerJoseph P. Milana
    • Gerald FahnerJoseph P. Milana
    • G06Q40/00
    • G06Q10/00G06Q20/10G06Q40/00G06Q40/025
    • A computer-implemented simulator models the entire analytic value chain so that data generation, model fitting and strategy optimization are an integral part of the simulation. Data collection efforts, data mining algorithms, predictive modeling technologies and strategy development methodologies define the analytic value chain of a business operation: data→models→strategies→profit. Inputs to the simulator include consumer data and potential actions to be taken regarding a consumer or account. The invention maps what is known about a consumer or an account and the potential actions that the business can take on that consumer or account to potential future financial performance. After iteratively performing simulations using varying inputs, modeling the effect of the innovation on a profit model, the simulator outputs a prediction of the commercial value of an analytic innovation.
    • 计算机实现的模拟器建模整个分析价值链,使数据生成,模型拟合和策略优化成为模拟的重要组成部分。 数据收集工作,数据挖掘算法,预测建模技术和策略开发方法定义了业务运营的分析价值链:数据 - 模型 - 策略 - 利润。 对模拟器的输入包括消费者数据和对消费者或帐户采取的潜在行动。 本发明将已知的消费者或帐户以及企业可能对该消费者或帐户采取的潜在行动映射到潜在的未来财务业绩。 在使用不同的输入迭代地执行模拟之后,对创新对利润模型的影响进行建模,模拟器输出了分析创新的商业价值的预测。
    • 9. 发明授权
    • Consumer-driven secure sockets layer modulator
    • 消费者驱动的安全套接字层调制器
    • US08677129B2
    • 2014-03-18
    • US12120215
    • 2008-05-13
    • Joseph P. MilanaStuart L. Crawford
    • Joseph P. MilanaStuart L. Crawford
    • G06F21/00
    • H04L9/3226H04L63/12H04L63/1441H04L63/1466H04L2209/56
    • A software system and method for executing secure commercial transactions online is disclosed. A user's password is received to initiate secure socket layer (SSL) communications with a transaction site on a server. A web session associated with the SSL communications is encrypted by associating a domain name of the transaction site with its SSL public key. Then, the user's password is added to a hypertext markup language (HTML) header of a message within the web session. When added, the password is invisible to a hypothetical man-in-the-middle (MITM) attacker, who cannot read the encrypted message nor mimic the user. The MITM is thus unable to compromise the user's account as the MITM is unable to provide the correct password into any fraudulent message.
    • 公开了一种用于在线执行安全商业交易的软件系统和方法。 接收用户的密码以启动与服务器上的事务站点的安全套接字层(SSL)通信。 与SSL通信相关联的Web会话通过将事务站点的域名与其SSL公钥相关联来加密。 然后,用户密码被添加到web会话内的消息的超文本标记语言(HTML)头部。 当添加时,密码对于假设的中间人(MITM)攻击者是不可见的,谁不能读取加密的消息,也不会模仿用户。 因此,MITM无法妥协用户的帐户,因为MITM无法向任何欺诈性消息提供正确的密码。
    • 10. 发明授权
    • Apparatus and method for simulating an analytic value chain
    • 用于模拟分析价值链的装置和方法
    • US07774272B2
    • 2010-08-10
    • US12143453
    • 2008-06-20
    • Gerald FahnerJoseph P. Milana
    • Gerald FahnerJoseph P. Milana
    • G06Q40/00
    • G06Q10/00G06Q20/10G06Q40/00G06Q40/025
    • A computer-implemented simulator models the entire analytic value chain so that data generation, model fitting and strategy optimization are an integral part of the simulation. Data collection efforts, data mining algorithms, predictive modeling technologies and strategy development methodologies define the analytic value chain of a business operation: data→models→strategies→profit. Inputs to the simulator include consumer data and potential actions to be taken regarding a consumer or account. The invention maps what is known about a consumer or an account and the potential actions that the business can take on that consumer or account to potential future financial performance. After iteratively performing simulations using varying inputs, modeling the effect of the innovation on a profit model, the simulator outputs a prediction of the commercial value of an analytic innovation.
    • 计算机实现的模拟器建模整个分析价值链,使数据生成,模型拟合和策略优化成为模拟的重要组成部分。 数据收集工作,数据挖掘算法,预测建模技术和策略开发方法定义了业务运营的分析价值链:数据→模型→策略→利润。 对模拟器的输入包括消费者数据和对消费者或帐户采取的潜在行动。 本发明将已知的消费者或帐户以及企业可能对该消费者或帐户采取的潜在行动映射到潜在的未来财务业绩。 在使用不同的输入迭代地执行模拟之后,对创新对利润模型的影响进行建模,模拟器输出了分析创新的商业价值的预测。