会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Application-specific method and apparatus for assessing similarity between two data objects
    • 用于评估两个数据对象之间的相似性的应用特定方法和装置
    • US06917952B1
    • 2005-07-12
    • US09988620
    • 2001-11-20
    • Matthew N. DaileyAnu K. PathriaMark A. LaffoonTheodore J. Crooks
    • Matthew N. DaileyAnu K. PathriaMark A. LaffoonTheodore J. Crooks
    • G06F17/27G06F17/30
    • G06F17/2775G06F17/2715G06F17/279G06F17/30616Y10S707/99932Y10S707/99935Y10S707/99945Y10S707/99954
    • The similarity between two data objects of the same type (e.g., two resumes, two job descriptions, etc.) is determined using predictive modeling. A basic assumption is that training datasets are available containing compatibility measures between objects of the first type and data objects of a second type, but that training datasets measuring similarity between objects of the first type are not. A first predictive model is trained to assess compatibility between data objects of a first type and data objects of a second type. Then, in one scenario, pairs of objects of the first type are compared for similarity by running them through the first predictive model as if one object of the pair is an object of the first type and the other object of the pair is an object of the second type. Alternatively, for each object in a set of objects of the first type, the first predictive model is used to create a respective vector of compatibility scores against a fixed set of objects of the second type; these various vectors are then used to derive measures of similarity between pairs of objects of the first type, from which a second predictive model is trained, and the second predictive model is then used to assess the similarity of pairs of objects of the first type.
    • 使用预测建模来确定相同类型的两个数据对象之间的相似性(例如,两个简历,两个作业描述等)。 一个基本的假设是训练数据集可用,包含第一类型的对象与第二种类型的数据对象之间的兼容性度量,但是测量第一类对象之间的相似性的训练数据集不是。 训练第一预测模型以评估第一类型的数据对象与第二类型的数据对象之间的兼容性。 然后,在一种情况下,通过使它们通过第一预测模型运行来比较第一类型的对象的对象,如同该对中的一个对象是第一类型的对象,并且该对的另一对象是对象的对象 第二种类型。 或者,对于第一类型的对象集合中的每个对象,第一预测模型用于针对第二类型的固定对象组创建相应的分数向量; 然后使用这些各种向量来导出第一类型的对象对之间的相似度测量,第二预测模型从该对象被训练,然后第二预测模型用于评估第一类型对象对的相似性。
    • 3. 发明授权
    • Comprehensive online fraud detection system and method
    • 综合在线欺诈检测系统及方法
    • US08001597B2
    • 2011-08-16
    • US11803927
    • 2007-05-15
    • Theodore J. Crooks
    • Theodore J. Crooks
    • H04L29/06
    • H04L63/1408G06Q20/40H04L2463/102
    • A fraud detection and protection method and system are disclosed. The method and system utilize a fraud detection and protection server to monitor online commercial transactions between a webserver and a client computer, and generate a risk assessment of a user associated with the client computer. The system and method further utilize a number of beacon servers geographically dispersed in an area. Each beacon server is configured to receive packet header information associated with the online commercial transactions, analyze the packet header information for authenticating information, and send the authenticating information to the fraud detection and protection server for the risk assessment.
    • 披露了欺诈检测和保护方法和系统。 该方法和系统利用欺诈检测和保护服务器来监视网络服务器和客户端计算机之间的在线商业交易,并且生成与客户计算机相关联的用户的风险评估。 该系统和方法还利用地理上分散在一个区域中的多个信标服务器。 每个信标服务器被配置为接收与在线商业交易相关联的分组报头信息,分析用于认证信息的分组报头信息,并将该认证信息发送到用于风险评估的欺诈检测和保护服务器。
    • 4. 发明授权
    • Comprehensive identity protection system
    • 综合身份保护制度
    • US08296250B2
    • 2012-10-23
    • US13195328
    • 2011-08-01
    • Theodore J. CrooksUwe F. MayerMichael A. Lazarus
    • Theodore J. CrooksUwe F. MayerMichael A. Lazarus
    • G06E1/00G06E3/00G06F15/18G06G7/00
    • G06Q50/18G06Q20/40G06Q20/4016G06Q20/403G06Q50/188
    • A system and method for protecting identity fraud are disclosed. A system includes a detection subsystem to identify applications and/or accounts at risk of identity fraud, and a disposition subsystem to process data provided by the detection system and to determine whether identity fraud exists in the applications and/or accounts. According to an implementation, one or more neural network models are defined, each neural network model being configured to handle a class of cases related to the subject and a specific data configuration describing a case of the class. The one or more neural network models are run to generate data requests about the subject's identity, and the data requests are passed to a detection system that monitor transactions associated with the subject. Additional data associated with the transactions is requested until a threshold certainty is achieved or until available data or models are exhausted.
    • 公开了一种保护身份欺诈的系统和方法。 系统包括检测子系统以识别身份欺诈风险的应用和/或帐户,以及处理子系统来处理由检测系统提供的数据并且确定身份欺诈是否存在于应用和/或帐户中。 根据实现,定义一个或多个神经网络模型,每个神经网络模型被配置为处理与主题相关的一类情况以及描述该类的情况的特定数据配置。 运行一个或多个神经网络模型以产生关于受试者身份的数据请求,并且将数据请求传递到监视与对象相关联的事务的检测系统。 请求与事务相关联的附加数据,直到实现阈值确定性或直到可用数据或模型耗尽为止。
    • 5. 发明申请
    • COMPREHENSIVE ONLINE FRAUD DETECTION SYSTEM AND METHOD
    • 全面的在线欺诈检测系统和方法
    • US20110302087A1
    • 2011-12-08
    • US13211268
    • 2011-08-16
    • Theodore J. Crooks
    • Theodore J. Crooks
    • G06Q30/00G06Q40/00
    • H04L63/1408G06Q20/40H04L2463/102
    • A fraud detection and protection method and system are disclosed. The method and system utilize a fraud detection and protection server to monitor online commercial transactions between a webserver and a client computer, and generate a risk assessment of a user associated with the client computer. The system and method further utilize a number of beacon servers geographically dispersed in an area. Each beacon server is configured to receive packet header information associated with the online commercial transactions, analyze the packet header information for authenticating information, and send the authenticating information to the fraud detection and protection server for the risk assessment.
    • 披露了欺诈检测和保护方法和系统。 该方法和系统利用欺诈检测和保护服务器来监视网络服务器和客户端计算机之间的在线商业交易,并且生成与客户计算机相关联的用户的风险评估。 该系统和方法还利用地理上分散在一个区域中的多个信标服务器。 每个信标服务器被配置为接收与在线商业交易相关联的分组报头信息,分析用于验证信息的分组报头信息,并将该认证信息发送到用于风险评估的欺诈检测和保护服务器。
    • 6. 发明授权
    • Comprehensive online fraud detection system and method
    • 综合在线欺诈检测系统及方法
    • US08683586B2
    • 2014-03-25
    • US13211268
    • 2011-08-16
    • Theodore J. Crooks
    • Theodore J. Crooks
    • H04L29/06
    • H04L63/1408G06Q20/40H04L2463/102
    • A fraud detection and protection method and system are disclosed. The method and system utilize a fraud detection and protection server to monitor online commercial transactions between a webserver and a client computer, and generate a risk assessment of a user associated with the client computer. The system and method further utilize a number of beacon servers geographically dispersed in an area. Each beacon server is configured to receive packet header information associated with the online commercial transactions, analyze the packet header information for authenticating information, and send the authenticating information to the fraud detection and protection server for the risk assessment.
    • 披露了欺诈检测和保护方法和系统。 该方法和系统利用欺诈检测和保护服务器来监视网络服务器和客户端计算机之间的在线商业交易,并且生成与客户计算机相关联的用户的风险评估。 该系统和方法还利用地理上分散在一个区域中的多个信标服务器。 每个信标服务器被配置为接收与在线商业交易相关联的分组报头信息,分析用于认证信息的分组报头信息,并将该认证信息发送到用于风险评估的欺诈检测和保护服务器。
    • 7. 发明授权
    • Comprehensive identity protection system
    • 综合身份保护制度
    • US07849029B2
    • 2010-12-07
    • US11421896
    • 2006-06-02
    • Theodore J. CrooksUwe F. MayerMichael A. Lazarus
    • Theodore J. CrooksUwe F. MayerMichael A. Lazarus
    • G06E1/00G06E3/00G06F15/18G06G7/00
    • G06Q50/18G06Q20/40G06Q20/4016G06Q20/403G06Q50/188
    • A system and method for protecting identity fraud are disclosed. A system includes a detection subsystem to identify applications and/or accounts at risk of identity fraud, and a disposition subsystem to process data provided by the detection system and to determine whether identity fraud exists in the applications and/or accounts. According to an implementation, one or more neural network models are defined, each neural network model being configured to handle a class of cases related to the subject and a specific data configuration describing a case of the class. The one or more neural network models are run to generate data requests about the subject's identity, and the data requests are passed to a detection system that monitor transactions associated with the subject. Additional data associated with the transactions is requested until a threshold certainty is achieved or until available data or models are exhausted.
    • 公开了一种保护身份欺诈的系统和方法。 系统包括检测子系统以识别身份欺诈风险的应用和/或帐户,以及处理子系统来处理由检测系统提供的数据并且确定身份欺诈是否存在于应用和/或帐户中。 根据实现,定义一个或多个神经网络模型,每个神经网络模型被配置为处理与主题相关的一类情况以及描述该类的情况的特定数据配置。 运行一个或多个神经网络模型以产生关于受试者身份的数据请求,并且将数据请求传递到监视与对象相关联的事务的检测系统。 请求与事务相关联的附加数据,直到实现阈值确定性或直到可用数据或模型耗尽为止。
    • 9. 发明授权
    • Apparatus for renting articles
    • 租用物品的设备
    • US5007518A
    • 1991-04-16
    • US309353
    • 1989-02-13
    • Theodore J. CrooksTerry L. ZentzMatthew G. Morris
    • Theodore J. CrooksTerry L. ZentzMatthew G. Morris
    • G07F7/00G07F7/06G07F11/54
    • G07F11/54G07F7/069Y10S194/906
    • An apparatus for rental of articles such as videocassettes comprises an outer housing, and a storage assembly within the housing having storage locations for storing a plurality of videocassettes. The housing has a front panel including an array of separate display areas each containing pictorial indicia representing a particular videocassette and a predetermined selection code corresponding to that videocassette, a selection device adjacent the array for allowing a user to enter the selection code of a selected videocassette, and a delivery chute for delivering selected videocassettes to users. A transport mechanism is provided for retrieving selected videocassettes from the storage assembly for delivery to users, and for returning videocassettes to the storage assembly. A control device associates each stored videocassette with its storage location and controls the transport mechanism to deliver selected videocassettes to customers.
    • 用于租赁诸如录像带的物品的装置包括外壳和在壳体内的存储组件,其具有用于存储多个录像带的存储位置。 壳体具有包括独立显示区域的阵列的前面板,每个显示区域包含表示特定录像带的图形标记和对应于该录像带的预定选择代码,与阵列相邻的选择设备,用于允许用户输入所选择的录像带的选择码 以及用于将选定的录像带传送给用户的传送滑槽。 提供了一种传送机构,用于从存储组件检索所选择的录像带以传送给用户,并将录像带返回到存储组件。 控制设备将每个存储的录像带与其存储位置相关联并且控制传送机制以将选定的录像带传送给客户。
    • 10. 发明申请
    • Comprehensive Identity Protection System
    • 全面的身份保护制度
    • US20110289032A1
    • 2011-11-24
    • US13195328
    • 2011-08-01
    • Theodore J. CrooksUwe F. MayerMichael A. Lazarus
    • Theodore J. CrooksUwe F. MayerMichael A. Lazarus
    • G06N3/02
    • G06Q50/18G06Q20/40G06Q20/4016G06Q20/403G06Q50/188
    • A system and method for protecting identity fraud are disclosed. A system includes a detection subsystem to identify applications and/or accounts at risk of identity fraud, and a disposition subsystem to process data provided by the detection system and to determine whether identity fraud exists in the applications and/or accounts. According to an implementation, one or more neural network models are defined, each neural network model being configured to handle a class of cases related to the subject and a specific data configuration describing a case of the class. The one or more neural network models are run to generate data requests about the subject's identity, and the data requests are passed to a detection system that monitor transactions associated with the subject. Additional data associated with the transactions is requested until a threshold certainty is achieved or until available data or models are exhausted.
    • 公开了一种保护身份欺诈的系统和方法。 系统包括检测子系统以识别身份欺诈风险的应用和/或帐户,以及处理子系统来处理由检测系统提供的数据并且确定身份欺诈是否存在于应用和/或帐户中。 根据实现,定义一个或多个神经网络模型,每个神经网络模型被配置为处理与主题相关的一类情况以及描述该类的情况的特定数据配置。 运行一个或多个神经网络模型以产生关于受试者身份的数据请求,并且将数据请求传递到监视与对象相关联的事务的检测系统。 请求与事务相关联的附加数据,直到实现阈值确定性或直到可用数据或模型耗尽为止。