Artificial Intelligence – Fred Sadaghiani, Alex Paino, Jacob Burnim, Keren Gu, Gary Lee, Noah Grant, Eugenia Ho, Doug Beeferman, Sift Science Inc

Abstract for “System and methods to dynamically mitigate digital threats”

“Systems and Methods include collecting digital data from at most one remote source of data; using that digital data as an input to the primary machine learning ensemble that predicts digital fraud and/or abuse; identifying sub-requests for specific digital threats scores for digital abuse types; responding to the sub-request with the input of collected data to a secondary model ensemble of machine learning that predicts a likelihood for the identified type of digital abuse; generating the specific digital risk score for that type of digital abuse type by the secondary machinelearning ensemble; transmitting the global and the targeted digital threat

Background for “System and methods to dynamically mitigate digital threats”

The modern web and internet allow entities to engage in and perform an infinite number of activities. Many of these activities involve user to user activities or user-to business activities (or both). These activities are often between users or between users and organizations over the internet. They involve the access to, use and/or exchange information by one or more parties. Digital actors can use online services Internet-accessible apps (e.g. web or mobile) to commit digital fraud and/or abuse. This is due to the flexibility of the digital realm in which these activities operate. Some of these bad actors might also seek to steal information (e.g. hack) that is being exchanged between legitimate entities involved in these activities. These digital threats could also be committed by malicious third parties who attempt to illegally or inexplicably take advantage of data or information exchanged. If not exchanged, then data or information about users’ actions and/or businesses on-the web.

“Other digital threats that involve a malicious party, a bad actor, or an unintended act (or both) to misuse digital resources of a provider to commit fraud or other illegal activities that are significant to legitimate service providers and Internet users.”

While there are technologies available that can detect digital fraud, digital abuse, or other malicious activities over the Internet (or near it), these technology implementations may not be able to detect malicious digital activity over the Internet with sufficient accuracy and in real time to allow an affected party to respond appropriately. These technology implementations are not able to detect digital threats that have never been seen before and can’t automatically evolve to address and neutralize them.

“There is therefore a need for a digital solution to detect multiple digital threats in digital fraud and/or abuse using digital resources provided by a service provider. The technical solutions provided by the inventions described in this application address at least the above need.

Summary for “System and methods to dynamically mitigate digital threats”

The modern web and internet allow entities to engage in and perform an infinite number of activities. Many of these activities involve user to user activities or user-to business activities (or both). These activities are often between users or between users and organizations over the internet. They involve the access to, use and/or exchange information by one or more parties. Digital actors can use online services Internet-accessible apps (e.g. web or mobile) to commit digital fraud and/or abuse. This is due to the flexibility of the digital realm in which these activities operate. Some of these bad actors might also seek to steal information (e.g. hack) that is being exchanged between legitimate entities involved in these activities. These digital threats could also be committed by malicious third parties who attempt to illegally or inexplicably take advantage of data or information exchanged. If not exchanged, then data or information about users’ actions and/or businesses on-the web.

“Other digital threats that involve a malicious party, a bad actor, or an unintended act (or both) to misuse digital resources of a provider to commit fraud or other illegal activities that are significant to legitimate service providers and Internet users.”

While there are technologies available that can detect digital fraud, digital abuse, or other malicious activities over the Internet (or near it), these technology implementations may not be able to detect malicious digital activity over the Internet with sufficient accuracy and in real time to allow an affected party to respond appropriately. These technology implementations are not able to detect digital threats that have never been seen before and can’t automatically evolve to address and neutralize them.

“There is therefore a need for a digital solution to detect multiple digital threats in digital fraud and/or abuse using digital resources provided by a service provider. The technical solutions provided by the inventions described in this application address at least the above need.

Click here to view the patent on Google Patents.

How to Search for Patents

A patent search is the first step to getting your patent. You can do a google patent search or do a USPTO search. Patent-pending is the term for the product that has been covered by the patent application. You can search the public pair to find the patent application. After the patent office approves your application, you will be able to do a patent number look to locate the patent issued. Your product is now patentable. You can also use the USPTO search engine. See below for details. You can get help from a patent lawyer. Patents in the United States are granted by the US trademark and patent office or the United States Patent and Trademark office. This office also reviews trademark applications.

Are you interested in similar patents? These are the steps to follow:

1. Brainstorm terms to describe your invention, based on its purpose, composition, or use.

Write down a brief, but precise description of the invention. Don’t use generic terms such as “device”, “process,” or “system”. Consider synonyms for the terms you chose initially. Next, take note of important technical terms as well as keywords.

Use the questions below to help you identify keywords or concepts.

  • What is the purpose of the invention Is it a utilitarian device or an ornamental design?
  • Is invention a way to create something or perform a function? Is it a product?
  • What is the composition and function of the invention? What is the physical composition of the invention?
  • What’s the purpose of the invention
  • What are the technical terms and keywords used to describe an invention’s nature? A technical dictionary can help you locate the right terms.

2. These terms will allow you to search for relevant Cooperative Patent Classifications at Classification Search Tool. If you are unable to find the right classification for your invention, scan through the classification’s class Schemas (class schedules) and try again. If you don’t get any results from the Classification Text Search, you might consider substituting your words to describe your invention with synonyms.

3. Check the CPC Classification Definition for confirmation of the CPC classification you found. If the selected classification title has a blue box with a “D” at its left, the hyperlink will take you to a CPC classification description. CPC classification definitions will help you determine the applicable classification’s scope so that you can choose the most relevant. These definitions may also include search tips or other suggestions that could be helpful for further research.

4. The Patents Full-Text Database and the Image Database allow you to retrieve patent documents that include the CPC classification. By focusing on the abstracts and representative drawings, you can narrow down your search for the most relevant patent publications.

5. This selection of patent publications is the best to look at for any similarities to your invention. Pay attention to the claims and specification. Refer to the applicant and patent examiner for additional patents.

6. You can retrieve published patent applications that match the CPC classification you chose in Step 3. You can also use the same search strategy that you used in Step 4 to narrow your search results to only the most relevant patent applications by reviewing the abstracts and representative drawings for each page. Next, examine all published patent applications carefully, paying special attention to the claims, and other drawings.

7. You can search for additional US patent publications by keyword searching in AppFT or PatFT databases, as well as classification searching of patents not from the United States per below. Also, you can use web search engines to search non-patent literature disclosures about inventions. Here are some examples:

  • Add keywords to your search. Keyword searches may turn up documents that are not well-categorized or have missed classifications during Step 2. For example, US patent examiners often supplement their classification searches with keyword searches. Think about the use of technical engineering terminology rather than everyday words.
  • Search for foreign patents using the CPC classification. Then, re-run the search using international patent office search engines such as Espacenet, the European Patent Office’s worldwide patent publication database of over 130 million patent publications. Other national databases include:
  • Search non-patent literature. Inventions can be made public in many non-patent publications. It is recommended that you search journals, books, websites, technical catalogs, conference proceedings, and other print and electronic publications.

To review your search, you can hire a registered patent attorney to assist. A preliminary search will help one better prepare to talk about their invention and other related inventions with a professional patent attorney. In addition, the attorney will not spend too much time or money on patenting basics.

Download patent guide file – Click here