会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 43. 发明专利
    • Illegal purchase warning system, illegal purchase warning method, and program
    • 非法采购警告系统,非法购买警告方法和程序
    • JP2013130933A
    • 2013-07-04
    • JP2011278480
    • 2011-12-20
    • Nec Biglobe LtdNecビッグローブ株式会社
    • NAGASAKA SHIGERU
    • G06Q30/06
    • G06Q30/0609G06Q20/4016
    • PROBLEM TO BE SOLVED: To provide an illegal purchase warning system, an illegal purchase warning method, and a program, which are capable of detecting in an early stage an illegal purchase by a third person who has illegally acquired identification information of a user.SOLUTION: An illegal purchase warning system which issues a warning about an illegal purchase of an article comprises: first storage means which stores prices of articles; second storage means which stores purchase prices of articles that have already been purchased by each user of the illegal purchase warning system; third storage means which stores upper limit values of total sum of purchase prices by each user; and control means which, upon receiving a purchase request indicating an intention of purchase of an article and identification information of the user, refers to the first to the third storage means and if the total sum of the purchase prices of the user who is identified by the identification information and the price of the article indicated in the purchase request exceeds the upper limit value, issues a warning about illegal purchase. The control means lowers the upper limit value if a predetermined condition for preventing illegal purchase is satisfied.
    • 要解决的问题:提供非法购买警告系统,非法购买警告方法和程序,其能够在非法获取用户的身份信息的第三人的早期检测非法购买。解决方案 :对非法购买物品发出警告的非法购买警告系统包括:存储物品价格的第一存储装置; 第二存储装置,其存储已经由非法购买警告系统的每个用户购买的物品的购买价格; 第三存储装置,其存储每个用户的购买价格总和的上限值; 以及控制单元,其在接收到指示购买物品的意图和用户的识别信息的购买请求时,指代第一至第三存储装置,并且如果用户的购买价格的总和由 购买请求中指出的物品的识别信息和价格超过上限值,发出非法购买警告。 如果满足防止非法购买的预定条件,则控制装置降低上限值。
    • 44. 发明专利
    • Credit card fraud prevention system
    • JP5215475B2
    • 2013-06-19
    • JP2011534246
    • 2010-09-28
    • 楽天株式会社
    • 義法 小林
    • G06Q20/40G06F21/62G06Q20/00
    • G06Q20/32G06Q20/20G06Q20/3224G06Q20/4016
    • An object of the present invention is to prevent a fraudulent use of a credit card such as spoofing. A server receives a card ID of a credit card, a credit amount, and a terminal ID for identifying a shop terminal from a shop terminal (S 102), to start credit processing. The server acquires a corresponding user ID from the card ID (S104), to find out whether this user has approved that location information can be acquired from his/her mobile terminal (S106). In the case where the user has approved that location information is acquired in advance (OK at S106), the server acquires a mobile phone number from the user ID (S108), to know a location of the mobile terminal with use of this mobile phone number (S110). Area information of a base station in which the mobile phone resides is provided in the case where the mobile terminal is not equipped with a GPS function. The server acquires a shop ID from the terminal ID (fixed-line telephone number) of the shop terminal (S112), to be able to acquire a shop location from the shop ID (S 114). The server compares the location of the mobile terminal and the location of the shop, to judge whether or not conformance is made with a predetermined condition (S116). In the case where it is judged that conformance is made with the condition (OK at S116), the server makes a normal credit judgment (S118), thereby sending a reply (availability/unavailability information) to the credit inquiry (S120 or S122).
    • 48. 发明专利
    • Application procedure illegal risk evaluation device
    • 应用程序非法风险评估装置
    • JP2009048402A
    • 2009-03-05
    • JP2007213620
    • 2007-08-20
    • Fujitsu Ltd富士通株式会社
    • KITAJIMA HIRONOBUOCHITANI AKIRAIKESAKA MORIO
    • G06Q50/00G06Q50/26
    • G06Q10/00G06Q10/04G06Q20/4016G06Q40/08
    • PROBLEM TO BE SOLVED: To quantitatively evaluate illegal risk of a chain of personal identification formed by a plurality of application procedures. SOLUTION: The relation of document groups and procedures required till acquisition of a document for personal identification required for a predetermined application, such as for example, a case that a driver's license or a combination of a health insurance card and an employee ID card is accepted as a personal identification document to the issuance application of a passport, that a health insurance card or a copy of certificate of residence is accepted as a personal identification document to the issuance application of the driver's license is stored in a personal identification diagram storage part 21. Cases of illegalness occurred in the application procedures and/or acquisition of an optional document for personal identification is accepted by an illegal case data accept part 31. An illegal risk evaluation part 41 evaluates the possibility of illegal use of any of the documents for personal identification based on the personal identification diagram and the illegal case data. COPYRIGHT: (C)2009,JPO&INPIT
    • 要解决的问题:定量评估由多个申请程序形成的个人识别链的非法风险。

      解决方案:在获得用于预定应用所需的个人身份证件的文档之前所需的文档组和过程的关系,例如驾驶执照或健康保险卡和雇员身份的组合的情况 卡作为护照的发行申请的个人身份证明文件被接受为身份证明图,存储健康保险卡或者住所证明文件作为个人身份证明文件作为个人身份证件发给驾驶执照的发行申请。 存储部分21.非法案件数据接受部分31接受申请程序中发生非法事件和/或获取用于个人身份证明的可选文件。非法风险评估部分41评估非法使用任何 基于个人识别图和非法情况资料的个人身份证明文件。 版权所有(C)2009,JPO&INPIT