APPARATUS AND METHOD FOR DETERMINING A LOCATION-SPOOFING APPLICATION

    公开(公告)号:US20240334192A1

    公开(公告)日:2024-10-03

    申请号:US18293445

    申请日:2022-08-02

    IPC分类号: H04W12/104 H04W12/12

    CPC分类号: H04W12/104 H04W12/12

    摘要: The present disclosure provides an apparatus and a method for determining a location-spoofing application, the method comprising: generating a numeric representation of an application name of an application used for generating a geolocation position signal of a user using a variable derived from a list of application names relating to a plurality of other applications capable of generating a geolocation position signal of a user; and determining a prediction on whether the application is a location-spoofing application based on a scale of the generated numeric representation of the application name.

    Detecting for fraud and tampering at a payment terminal

    公开(公告)号:US12106307B2

    公开(公告)日:2024-10-01

    申请号:US17827466

    申请日:2022-05-27

    申请人: Block, Inc.

    摘要: A payment terminal may include payment interfaces to receive payment information from payment devices. The payment interfaces can include an interface configured to receive a payment card. Monitoring components may monitor the payment interfaces. In addition, a detection signal can be provided while a payment card is communicatively coupled to its corresponding payment interface. The monitored information and the detection signal may be used by the payment terminal to determine whether a transaction is fraudulent or if a tamper attempt is ongoing, based on local test criteria. In addition, the monitored information and detection signal may be provided to a server, which may store the monitored information and detection signal, test for fraudulent transactions and tamper attempts based on server test criteria, and determine updates to the local test criteria.

    Security breach notification
    4.
    发明授权

    公开(公告)号:US12101340B1

    公开(公告)日:2024-09-24

    申请号:US17453089

    申请日:2021-11-01

    IPC分类号: H04L9/40 G06Q20/38 H04W12/12

    摘要: Systems and methods are disclosed for security breach notification. In one implementation, an indication of a security breach is received, at a first device with respect to a user account. Based on the indication of the security breach, a processing device generates a security breach notification, the security breach notification including an instruction to initiate at an account repository one or more actions with respect to the user account. An attempt is made to transmit the security breach notification to the account repository via a first communication interface of the first device. In response to a determination that the security breach notification was not successfully transmitted to the account repository, the security breach notification is transmitted to a second device via a second communication interface of the first device.

    Wireless tracking of power tools and related devices

    公开(公告)号:US12089047B2

    公开(公告)日:2024-09-10

    申请号:US17551445

    申请日:2021-12-15

    摘要: A method and system for wirelessly tracking power tools and related devices to aid with inventory management and to help minimize, prevent, and recover misplaced or stolen tools throughout the job site. The tools and/or batteries include wireless transmitting capabilities (e.g., an ISM unit) to transmit data to a fob, puck repeater, and/or gateway over an ISM network. The gateway is operable to translate and output the ISM communications over a cellular network to a remote monitoring unit, such as a personal computer or smart phone. Additionally, the gateway is further operable to translate and output cellular communications from the remote monitoring unit to ISM communications over the ISM network. A wireless tethering system and method is also disclosed whereby an ISM battery places a power tool in a lock-out or limp mode after the ISM battery remains outside of ISM communications for a prolonged period of time.

    Identification of malicious activity based on analysis of travel path of a mobile device

    公开(公告)号:US12033152B2

    公开(公告)日:2024-07-09

    申请号:US17516701

    申请日:2021-11-02

    摘要: A method for identification of malicious activity based on analysis of a travel path of a mobile device through multiple geographic areas includes receiving at least three location data associated with the mobile communication device, the first location data comprising indication of the geographic area of the mobile subscriber and a receipt timestamp; determining the actual travel time of the mobile subscriber from the first geographic area and the third geographic area based on a difference between timestamps of the first location data and the third location data; determining a minimum transition time for the subscriber of the mobile device to move from the first geographic area to the third geographic area; and identifying a malicious activity based on comparison of the actual travel time and the minimum transition time wherein actual travel time is less than minimum transition time between the first geographic area and the third geographic area.