Patent application number | Description | Published |
20120260209 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 10-11-2012 |
20120278767 | Indices for Credibility Trending, Monitoring, and Lead Generation - Some embodiments provide a credibility system that computes credibility scores to quantify the credibility of different businesses and to coalesce the generated credibility scores into various indices. The indices comparatively present the credibility of a particular business relative to other businesses along one or more dimensions. Based on the indices, the system identifies trends in the credibility of a particular business. The system derives preliminary credibility for a new business for which credibility data has not yet been obtained based on credibility that has been previously established for other businesses in an index associated with the new business. The system provides automated services for monitoring credibility of a business and for generating alerts to notify the business that its credibility has reached various thresholds. The system identifies business practices that improve upon or adversely affect the credibility of a particular business. | 11-01-2012 |
20120296804 | System and Methods for Producing a Credit Feedback Loop - Some embodiments provide a credit feedback loop system that directly identifies credit that is available to a credit seeker based on recent credit that others with similar qualifications (e.g., credit scores) as the credit seeker have obtained. The credit feedback loop system establishes a reciprocal system to benefit credit providers and credit seekers. The credit providers participate by providing information about the credit they have recently extended to credit seekers. In return, the credit feedback loop system acts as a lead generation platform for the credit providers by identifying potential new credit seekers. A credit seeker benefits by obtaining a direct and accurate measure of its available credit without having to divulge confidential information. In so doing, the credit feedback loop system allows a credit seeker to accurately identify its available credit and be quasi-preapproved for credit without having to apply for credit from any single credit provider. | 11-22-2012 |
20120310937 | People Engine Optimization - Some embodiments promote website credibility and the optimization of websites for people by automatedly quantifying various elements of a website into component credibility scores. In some embodiments, a set of encoded credibility scoring rules are used to compute each of the component credibility scores, wherein the credibility scoring rules are derived based on factors that have been identified by a grouping of people that preferably represent a primary demographic of users that consume the content of a particular classified type of website. In some such embodiments, the credibility scoring rules are derived from commonality that is identified from a sample set of known credible and/or non-credible websites of a particular classification. Once the credibility scoring rules are defined, the system applies the rules to other websites having the same classification as those from which the rules are derived to automatically generate credibility scores for the other websites. | 12-06-2012 |
20120323695 | Lead Generation Platform - Some embodiments provide a lead generation platform to promote lead generation on the basis reciprocity, whereby a business participating in the platform obtains access to the leads of other participating businesses that it has established network partnerships with and in return, makes its leads accessible to the other participating businesses. Leads can then be filtered to target a business' primary demographic and the filtered leads used to conduct a marketing campaign without intervening marketing service providers. As a result, a business identifies its primary demographic without engaging in costly market research. Also, by being able to control network partnerships, the business can gain access to a set of non-competing leads and valued existing customers of other businesses which is in contrast to the leads provided by other third party services, whereby one's competitors have access to the same sets of leads. | 12-20-2012 |
20130013553 | Automated Entity Verification - Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code. | 01-10-2013 |
20130013927 | Automated Entity Verification - Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code. | 01-10-2013 |
20130018699 | Automated Omnipresent Real-time Credibility Management System and Methods - Some embodiments provide a credibility management system that aggregates user posts from several social media sites contemporaneously with the posts being published to those sites. The system parses each of the aggregated posts to identify an entity that is targeted in each of the posts and presents the posts to the targeted entities in a real-time manner. The credibility management system computes a score to determine the impact that a user post would have on the credibility of a targeted entity. By presenting the computed scores and aggregated posts to the targeted entities, the credibility management system notifies the targeted entities about what is being said about them across social media, identifies the impact of those posts, and provides a platform whereby the targeted entities can reply in order to mitigate or improve the impact that the posts would have on credibility. | 01-17-2013 |
20130031105 | Automated Ranking of Entities Based on Trade References - Some embodiments perform automated entity ranking to accurately portray the influence that each ranked entity holds within a particular field, industry, region, or some combination thereof. The ranking is primarily derived based on the number of trade references obtained for a particular entity and the influence of those trade references. The rankings can be sold as informational commodities and can be compiled to produce lists of the most influential entities within a particular field, industry, region, or some combination thereof. | 01-31-2013 |
20130097251 | Method and System for Directly Targeting and Blasting Messages to Automatically Identified Entities on Social Media - Some embodiments provide a communication tool that directly sends messages to accounts of different entities across different social media sites by automatically identifying and associating the accounts of the entities when the entities are referenced in the contents of the messages. Such identification and association is performed without the message originator manually specifying the accounts as intended recipients for the messages. The communication tool also automatically sends messages to different social media accounts of the message originator. The communication tool also blasts messages to an information aggregator that aggregates messages to develop a database from which the messages that target a particular entity can be presented irrespective of whether the particular entity has registered an account with any social media site, irrespective of which social media site the messages are originally destined for, and irrespective of whether a recipient is explicitly specified for the messages by the message originator. | 04-18-2013 |
20130103600 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 04-25-2013 |
20130124540 | People Engine Optimization - Some embodiments promote website credibility and the optimization of websites for people by automatedly quantifying various elements of a website into component credibility scores. In some embodiments, a set of encoded credibility scoring rules are used to compute each of the component credibility scores, wherein the credibility scoring rules are derived based on factors that have been identified by a grouping of people that preferably represent a primary demographic of users that consume the content of a particular classified type of website. In some such embodiments, the credibility scoring rules are derived from commonality that is identified from a sample set of known credible and/or non-credible websites of a particular classification. Once the credibility scoring rules are defined, the system applies the rules to other websites having the same classification as those from which the rules are derived to automatically generate credibility scores for the other websites. | 05-16-2013 |
20130132151 | Automated Omnipresent Real-time Credibility Management System and Methods - Some embodiments provide a credibility management system that aggregates user posts from several social media sites contemporaneously with the posts being published to those sites. The system parses each of the aggregated posts to identify an entity that is targeted in each of the posts and presents the posts to the targeted entities in a real-time manner. The credibility management system computes a score to determine the impact that a user post would have on the credibility of a targeted entity. By presenting the computed scores and aggregated posts to the targeted entities, the credibility management system notifies the targeted entities about what is being said about them across social media, identifies the impact of those posts, and provides a platform whereby the targeted entities can reply in order to mitigate or improve the impact that the posts would have on credibility. | 05-23-2013 |
20130238387 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 09-12-2013 |
20130254214 | People Engine Optimization - Some embodiments promote website credibility and the optimization of websites for people by automatedly quantifying various elements of a website into component credibility scores. In some embodiments, a set of encoded credibility scoring rules are used to compute each of the component credibility scores, wherein the credibility scoring rules are derived based on factors that have been identified by a grouping of people that preferably represent a primary demographic of users that consume the content of a particular classified type of website. In some such embodiments, the credibility scoring rules are derived from commonality that is identified from a sample set of known credible and/or non-credible websites of a particular classification. Once the credibility scoring rules are defined, the system applies the rules to other websites having the same classification as those from which the rules are derived to automatically generate credibility scores for the other websites. | 09-26-2013 |
20130339141 | Single System for Authenticating Entities Across Different Third Party Platforms - Some embodiments provide an independent authentication system for authenticating entities that have registered accounts across different online service providers on behalf of the service providers. The authentication system maintains a database of previously verified entity information. A service provider requests authentication by providing the authentication system with unverified and basic identifying information used by an entity when registering with the service provider. The authentication system attempts to match the registration information against previously verified information for a known entity. When a match is found, the authentication system generates a series of challenge questions. The questions are submitted to the entity through the service provider and answers are processed in order to authenticate the entity. Authentication is thus provided on behalf of the service provider without the service provider accessing the previously verified information and without the service provider independently verifying the information within the generated challenge questions. | 12-19-2013 |
20140040230 | People Engine Optimization - Some embodiments promote website credibility and the optimization of websites for people by automatedly quantifying various elements of a website into component credibility scores. In some embodiments, a set of encoded credibility scoring rules are used to compute each of the component credibility scores, wherein the credibility scoring rules are derived based on factors that have been identified by a grouping of people that preferably represent a primary demographic of users that consume the content of a particular classified type of website. In some such embodiments, the credibility scoring rules are derived from commonality that is identified from a sample set of known credible and/or non-credible websites of a particular classification. Once the credibility scoring rules are defined, the system applies the rules to other websites having the same classification as those from which the rules are derived to automatically generate credibility scores for the other websites. | 02-06-2014 |
20140047505 | Automated Entity Verification - Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code. | 02-13-2014 |
20140095640 | Method and System for Directly Targeting and Blasting Messages to Automatically Identified Entities on Social Media - Some embodiments provide a communication tool that directly sends messages to accounts of different entities across different social media sites by automatically identifying and associating the accounts of the entities when the entities are referenced in the contents of the messages. Such identification and association is performed without the message originator manually specifying the accounts as intended recipients for the messages. The communication tool also automatically sends messages to different social media accounts of the message originator. The communication tool also blasts messages to an information aggregator that aggregates messages to develop a database from which the messages that target a particular entity can be presented irrespective of whether the particular entity has registered an account with any social media site, irrespective of which social media site the messages are originally destined for, and irrespective of whether a recipient is explicitly specified for the messages by the message originator. | 04-03-2014 |
20140122354 | Automated Omnipresent Real-time Credibility Management System and Methods - Some embodiments provide a credibility management system that aggregates user posts from several social media sites contemporaneously with the posts being published to those sites. The system parses each of the aggregated posts to identify an entity that is targeted in each of the posts and presents the posts to the targeted entities in a real-time manner. The credibility management system computes a score to determine the impact that a user post would have on the credibility of a targeted entity. By presenting the computed scores and aggregated posts to the targeted entities, the credibility management system notifies the targeted entities about what is being said about them across social media, identifies the impact of those posts, and provides a platform whereby the targeted entities can reply in order to mitigate or improve the impact that the posts would have on credibility. | 05-01-2014 |
20140250199 | Method and System for Directly Targeting and Blasting Messages to Automatically Identified Entities on Social Media - Some embodiments provide a communication tool that directly sends messages to accounts of different entities across different social media sites by automatically identifying and associating the accounts of the entities when the entities are referenced in the contents of the messages. Such identification and association is performed without the message originator manually specifying the accounts as intended recipients for the messages. The communication tool also automatically sends messages to different social media accounts of the message originator. The communication tool also blasts messages to an information aggregator that aggregates messages to develop a database from which the messages that target a particular entity can be presented irrespective of whether the particular entity has registered an account with any social media site, irrespective of which social media site the messages are originally destined for, and irrespective of whether a recipient is explicitly specified for the messages by the message originator. | 09-04-2014 |
20140279394 | Multi-Dimensional Credibility Scoring - A credibility scoring system produces a multi-dimensional entity credibility score that is derived from multiple dimensional component scores. The credibility scoring system derives each dimensional component score from a different set of credibility data pertaining to different dimensional aspect of overall credibility. The different dimensional aspects factoring into the overall credibility determination include a stability dimension, transparency dimension, trustworthiness dimension, and sentiment dimension. | 09-18-2014 |
20140280217 | Custom Score Generation System and Methods - Some embodiments provide a custom score generation system by offering third parties access to data from a shared database that they can merge with their own proprietary data for the purpose of defining and producing new data services. The system provides interfaces for selecting data elements from the shared database, attributing weights to the selected data elements, and defining scoring rules or parameters to automatically evaluate the significance of the data element values. Additionally, conditions may be specified to include different sets of the selected data elements, to attribute different weights to the different sets of the selected data elements, and to define different scoring rules according to which conditions are satisfied. The system then automatically formulates the algorithm to produce the custom score in conformance with the provided inputs and based on values for the selected data elements that are specific to different entities. | 09-18-2014 |
Patent application number | Description | Published |
20120246092 | Credibility Scoring and Reporting - Some embodiments provide methods, systems, and computer software products for producing a tangible asset in the form of a standardized score that quantifiably measures business credibility based on a variety of data sources and credibility data that includes quantitative data and qualitative data. Some embodiments produce a separate tangible asset in the form of a report from which each business can identify practices that have been successful, practices that have inhibited the success of the business, desired improvements by customers, where future growth opportunities lie, and changes that can be made to improve the future growth and success of the business and thereby improve on the credibility score of the business. | 09-27-2012 |
20120246093 | Credibility Score and Reporting - Some embodiments provide methods, systems, and computer software products for producing a tangible asset in the form of a standardized score that quantifiably measures business credibility based on a variety of data sources and credibility data that includes quantitative data and qualitative data. Some embodiments produce a separate tangible asset in the form of a report from which each business can identify practices that have been successful, practices that have inhibited the success of the business, desired improvements by customers, where future growth opportunities lie, and changes that can be made to improve the future growth and success of the business and thereby improve on the credibility score of the business. | 09-27-2012 |
20120278767 | Indices for Credibility Trending, Monitoring, and Lead Generation - Some embodiments provide a credibility system that computes credibility scores to quantify the credibility of different businesses and to coalesce the generated credibility scores into various indices. The indices comparatively present the credibility of a particular business relative to other businesses along one or more dimensions. Based on the indices, the system identifies trends in the credibility of a particular business. The system derives preliminary credibility for a new business for which credibility data has not yet been obtained based on credibility that has been previously established for other businesses in an index associated with the new business. The system provides automated services for monitoring credibility of a business and for generating alerts to notify the business that its credibility has reached various thresholds. The system identifies business practices that improve upon or adversely affect the credibility of a particular business. | 11-01-2012 |
20120296804 | System and Methods for Producing a Credit Feedback Loop - Some embodiments provide a credit feedback loop system that directly identifies credit that is available to a credit seeker based on recent credit that others with similar qualifications (e.g., credit scores) as the credit seeker have obtained. The credit feedback loop system establishes a reciprocal system to benefit credit providers and credit seekers. The credit providers participate by providing information about the credit they have recently extended to credit seekers. In return, the credit feedback loop system acts as a lead generation platform for the credit providers by identifying potential new credit seekers. A credit seeker benefits by obtaining a direct and accurate measure of its available credit without having to divulge confidential information. In so doing, the credit feedback loop system allows a credit seeker to accurately identify its available credit and be quasi-preapproved for credit without having to apply for credit from any single credit provider. | 11-22-2012 |
20120310937 | People Engine Optimization - Some embodiments promote website credibility and the optimization of websites for people by automatedly quantifying various elements of a website into component credibility scores. In some embodiments, a set of encoded credibility scoring rules are used to compute each of the component credibility scores, wherein the credibility scoring rules are derived based on factors that have been identified by a grouping of people that preferably represent a primary demographic of users that consume the content of a particular classified type of website. In some such embodiments, the credibility scoring rules are derived from commonality that is identified from a sample set of known credible and/or non-credible websites of a particular classification. Once the credibility scoring rules are defined, the system applies the rules to other websites having the same classification as those from which the rules are derived to automatically generate credibility scores for the other websites. | 12-06-2012 |
20130013553 | Automated Entity Verification - Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code. | 01-10-2013 |
20130013927 | Automated Entity Verification - Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code. | 01-10-2013 |
20130097251 | Method and System for Directly Targeting and Blasting Messages to Automatically Identified Entities on Social Media - Some embodiments provide a communication tool that directly sends messages to accounts of different entities across different social media sites by automatically identifying and associating the accounts of the entities when the entities are referenced in the contents of the messages. Such identification and association is performed without the message originator manually specifying the accounts as intended recipients for the messages. The communication tool also automatically sends messages to different social media accounts of the message originator. The communication tool also blasts messages to an information aggregator that aggregates messages to develop a database from which the messages that target a particular entity can be presented irrespective of whether the particular entity has registered an account with any social media site, irrespective of which social media site the messages are originally destined for, and irrespective of whether a recipient is explicitly specified for the messages by the message originator. | 04-18-2013 |
20130103600 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 04-25-2013 |
20130124540 | People Engine Optimization - Some embodiments promote website credibility and the optimization of websites for people by automatedly quantifying various elements of a website into component credibility scores. In some embodiments, a set of encoded credibility scoring rules are used to compute each of the component credibility scores, wherein the credibility scoring rules are derived based on factors that have been identified by a grouping of people that preferably represent a primary demographic of users that consume the content of a particular classified type of website. In some such embodiments, the credibility scoring rules are derived from commonality that is identified from a sample set of known credible and/or non-credible websites of a particular classification. Once the credibility scoring rules are defined, the system applies the rules to other websites having the same classification as those from which the rules are derived to automatically generate credibility scores for the other websites. | 05-16-2013 |
20130132151 | Automated Omnipresent Real-time Credibility Management System and Methods - Some embodiments provide a credibility management system that aggregates user posts from several social media sites contemporaneously with the posts being published to those sites. The system parses each of the aggregated posts to identify an entity that is targeted in each of the posts and presents the posts to the targeted entities in a real-time manner. The credibility management system computes a score to determine the impact that a user post would have on the credibility of a targeted entity. By presenting the computed scores and aggregated posts to the targeted entities, the credibility management system notifies the targeted entities about what is being said about them across social media, identifies the impact of those posts, and provides a platform whereby the targeted entities can reply in order to mitigate or improve the impact that the posts would have on credibility. | 05-23-2013 |
20130160089 | Advocate for Facilitating Verification for the Online Presence of an Entity - Some embodiments provide an advocate system to facilitate automated online presence verification for different entities on behalf of the entities. The advocate system places service providers on notice that profiles and information hosted by them and that form the online presence for a particular entity should first be verified with that particular entity. The advocate system further facilitates online presence verification by 1) directly or indirectly connecting the service providers that are placed on notice with the appropriate authoritative entities to facilitate the verification of the profiles and information, 2) selectively targeting service providers hosting profiles and information that are unverified, 3) automatedly verifying hosted profiles and information based on a verified profile lists and verified information that authoritative entities provide to a central repository. In so doing, the advocate system prevents potential damage to the authoritative entity's credibility while also mitigating potential for fraud, identity theft, etc. | 06-20-2013 |
20130238387 | Visualization Tools for Reviewing Credibility and Stateful Hierarchical Access to Credibility - Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer. | 09-12-2013 |
20130254214 | People Engine Optimization - Some embodiments promote website credibility and the optimization of websites for people by automatedly quantifying various elements of a website into component credibility scores. In some embodiments, a set of encoded credibility scoring rules are used to compute each of the component credibility scores, wherein the credibility scoring rules are derived based on factors that have been identified by a grouping of people that preferably represent a primary demographic of users that consume the content of a particular classified type of website. In some such embodiments, the credibility scoring rules are derived from commonality that is identified from a sample set of known credible and/or non-credible websites of a particular classification. Once the credibility scoring rules are defined, the system applies the rules to other websites having the same classification as those from which the rules are derived to automatically generate credibility scores for the other websites. | 09-26-2013 |
20130339141 | Single System for Authenticating Entities Across Different Third Party Platforms - Some embodiments provide an independent authentication system for authenticating entities that have registered accounts across different online service providers on behalf of the service providers. The authentication system maintains a database of previously verified entity information. A service provider requests authentication by providing the authentication system with unverified and basic identifying information used by an entity when registering with the service provider. The authentication system attempts to match the registration information against previously verified information for a known entity. When a match is found, the authentication system generates a series of challenge questions. The questions are submitted to the entity through the service provider and answers are processed in order to authenticate the entity. Authentication is thus provided on behalf of the service provider without the service provider accessing the previously verified information and without the service provider independently verifying the information within the generated challenge questions. | 12-19-2013 |
20140040230 | People Engine Optimization - Some embodiments promote website credibility and the optimization of websites for people by automatedly quantifying various elements of a website into component credibility scores. In some embodiments, a set of encoded credibility scoring rules are used to compute each of the component credibility scores, wherein the credibility scoring rules are derived based on factors that have been identified by a grouping of people that preferably represent a primary demographic of users that consume the content of a particular classified type of website. In some such embodiments, the credibility scoring rules are derived from commonality that is identified from a sample set of known credible and/or non-credible websites of a particular classification. Once the credibility scoring rules are defined, the system applies the rules to other websites having the same classification as those from which the rules are derived to automatically generate credibility scores for the other websites. | 02-06-2014 |
20140047505 | Automated Entity Verification - Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part verifies that the entity is the true owner of the entity account to be verified. This verification step involves (1) the entity receiving a verification code at the entity account and returning the verification code to the verification system, (2) the entity associating an account that it has registered at a service provider to an account that the verification system has registered at the service provider, (3) both. Another part verifies the entity can respond to communications that are sent to methods of contact that have been previously verified as belonging to the entity. The verification system submits a first communication with a code using a verified method of contact. The verification system then monitors for a second communication to be returned with the code. | 02-13-2014 |
20140095640 | Method and System for Directly Targeting and Blasting Messages to Automatically Identified Entities on Social Media - Some embodiments provide a communication tool that directly sends messages to accounts of different entities across different social media sites by automatically identifying and associating the accounts of the entities when the entities are referenced in the contents of the messages. Such identification and association is performed without the message originator manually specifying the accounts as intended recipients for the messages. The communication tool also automatically sends messages to different social media accounts of the message originator. The communication tool also blasts messages to an information aggregator that aggregates messages to develop a database from which the messages that target a particular entity can be presented irrespective of whether the particular entity has registered an account with any social media site, irrespective of which social media site the messages are originally destined for, and irrespective of whether a recipient is explicitly specified for the messages by the message originator. | 04-03-2014 |
20140122354 | Automated Omnipresent Real-time Credibility Management System and Methods - Some embodiments provide a credibility management system that aggregates user posts from several social media sites contemporaneously with the posts being published to those sites. The system parses each of the aggregated posts to identify an entity that is targeted in each of the posts and presents the posts to the targeted entities in a real-time manner. The credibility management system computes a score to determine the impact that a user post would have on the credibility of a targeted entity. By presenting the computed scores and aggregated posts to the targeted entities, the credibility management system notifies the targeted entities about what is being said about them across social media, identifies the impact of those posts, and provides a platform whereby the targeted entities can reply in order to mitigate or improve the impact that the posts would have on credibility. | 05-01-2014 |
20140173732 | Advocate for Facilitating Verification for the Online Presence of an Entity - Some embodiments provide an advocate system to facilitate automated online presence verification for different entities on behalf of the entities. The advocate system places service providers on notice that profiles and information hosted by them and that form the online presence for a particular entity should first be verified with that particular entity. The advocate system further facilitates online presence verification by 1) directly or indirectly connecting the service providers that are placed on notice with the appropriate authoritative entities to facilitate the verification of the profiles and information, 2) selectively targeting service providers hosting profiles and information that are unverified, 3) automatedly verifying hosted profiles and information based on a verified profile lists and verified information that authoritative entities provide to a central repository. In so doing, the advocate system prevents potential damage to the authoritative entity's credibility while also mitigating potential for fraud, identity theft, etc. | 06-19-2014 |
20140250199 | Method and System for Directly Targeting and Blasting Messages to Automatically Identified Entities on Social Media - Some embodiments provide a communication tool that directly sends messages to accounts of different entities across different social media sites by automatically identifying and associating the accounts of the entities when the entities are referenced in the contents of the messages. Such identification and association is performed without the message originator manually specifying the accounts as intended recipients for the messages. The communication tool also automatically sends messages to different social media accounts of the message originator. The communication tool also blasts messages to an information aggregator that aggregates messages to develop a database from which the messages that target a particular entity can be presented irrespective of whether the particular entity has registered an account with any social media site, irrespective of which social media site the messages are originally destined for, and irrespective of whether a recipient is explicitly specified for the messages by the message originator. | 09-04-2014 |
20140279394 | Multi-Dimensional Credibility Scoring - A credibility scoring system produces a multi-dimensional entity credibility score that is derived from multiple dimensional component scores. The credibility scoring system derives each dimensional component score from a different set of credibility data pertaining to different dimensional aspect of overall credibility. The different dimensional aspects factoring into the overall credibility determination include a stability dimension, transparency dimension, trustworthiness dimension, and sentiment dimension. | 09-18-2014 |
20140280217 | Custom Score Generation System and Methods - Some embodiments provide a custom score generation system by offering third parties access to data from a shared database that they can merge with their own proprietary data for the purpose of defining and producing new data services. The system provides interfaces for selecting data elements from the shared database, attributing weights to the selected data elements, and defining scoring rules or parameters to automatically evaluate the significance of the data element values. Additionally, conditions may be specified to include different sets of the selected data elements, to attribute different weights to the different sets of the selected data elements, and to define different scoring rules according to which conditions are satisfied. The system then automatically formulates the algorithm to produce the custom score in conformance with the provided inputs and based on values for the selected data elements that are specific to different entities. | 09-18-2014 |
20150026034 | Financial Systems and Methods for Increasing Capital Availability by Decreasing Lending Risk - Some embodiments provide a guarantor system for backstopping all or a substantial portion of a lender's portfolio of loans with an insurance guarantee. The guarantor system builds the insurance guarantee into the covered portion of the lender's portfolio in an integrated manner, whereby the overhead cost for insuring the loans of the portfolio is distributed across the portfolio instead of being distributed individually to each borrower based on the individual borrower's risk profile. Some embodiments also provide various monitoring services to reduce lender risk. These include contacting the borrower to remind the borrower of upcoming payments that are due, conducting a quasi-audit of the borrowers to inform the lenders of a potential risk of default, and establishing a credit profile for the borrower using the information collected as part of the quasi-audit. | 01-22-2015 |
20150067842 | Intelligent Communication Screening to Restrict Spam - A system is provided to restrict the ability of a spammer to freely contact an entity over a communication channel. To do so, the system reconfigures a communication channel used to contact the target entity such that the system can intercept a communication from a source contacting entity en route to the target entity. The system extracts an identifier (e.g., contacting entity's telephone number) from the communication and uses the identifier to query a database storing information about the contacting entity. The information reveals the contacting entity's industry, occupation, credibility, etc. From this information, the system automatically identifies the contacting entity as a spammer, potential spammer, or non-spammer. The system performs a default screening of the communication based on the classification. Alternatively, the target contacted entity can specify a configuration for different actions the system takes to screen the communication based on the source contacting entity classification. | 03-05-2015 |