SYSTEMS AND METHODS FOR DETECTING AND ELIMINATING UNAUTHORIZED DIGITAL COMMUNICATIONS
First Claim
1. A computer-implemented method for detecting and eliminating unauthorized digital communications, the method comprising:
- building source profiles associated with a plurality of product sources, wherein building source profiles associated with a plurality of product sources comprises;
generating a set of search queries based on a set of product definitions;
executing the set of search queries to obtain a set of gathered resources;
creating a set of source profiles based on the set of gathered resources; and
updating the set of source profiles with information retrieved from the set of gathered resources using a set of parsing rules;
determining whether one or more aspects of a source profile of the set of source profiles exceed one or more predetermined remediation thresholds by calculating a presentation assessment score based on a comparison of brand information presented in the set of gathered resources used to create the source profile to brand information presentation guidelines identified in a product definition used to create the source profile; and
in response to determining that one or more aspects of the source profile exceed one or more predetermined remediation thresholds;
creating a remediation workflow having one or more remediation steps; and
executing the remediation steps of the remediation workflow.
1 Assignment
0 Petitions
Accused Products
Abstract
Online communications are susceptible to high levels of fraud or other unauthorized communications. Online sources of information about goods, including business-to-business resources, marketplace web sites, custom retail web sites, and the like may knowingly or unknowingly transmit communications representing counterfeit goods as genuine, communications regarding overstock goods at low prices without production and commission costs, and solicit customers anonymously. In some embodiments of the present disclosure, electronic information sources are monitored using data metrics to track electronic retailer activities, monitor distribution volumes by source, and monitor pricing. Analysis of such communications may be used to detect potentially fraudulent activity, and, based on manufacturer policy and threshold settings, may automatically report, notify, or take action against such illicit communications.
19 Citations
20 Claims
-
1. A computer-implemented method for detecting and eliminating unauthorized digital communications, the method comprising:
-
building source profiles associated with a plurality of product sources, wherein building source profiles associated with a plurality of product sources comprises; generating a set of search queries based on a set of product definitions; executing the set of search queries to obtain a set of gathered resources; creating a set of source profiles based on the set of gathered resources; and updating the set of source profiles with information retrieved from the set of gathered resources using a set of parsing rules; determining whether one or more aspects of a source profile of the set of source profiles exceed one or more predetermined remediation thresholds by calculating a presentation assessment score based on a comparison of brand information presented in the set of gathered resources used to create the source profile to brand information presentation guidelines identified in a product definition used to create the source profile; and in response to determining that one or more aspects of the source profile exceed one or more predetermined remediation thresholds; creating a remediation workflow having one or more remediation steps; and executing the remediation steps of the remediation workflow. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for detecting and eliminating unauthorized digital communications, the system comprising at least one computing device configured to:
-
build source profiles associated with a plurality of product sources, wherein building source profiles associated with a plurality of product sources comprises; generating a set of search queries based on a set of product definitions; executing the set of search queries to obtain a set of gathered resources; creating a set of source profiles based on the set of gathered resources; and updating the set of source profiles with information retrieved from the set of gathered resources using a set of parsing rules; determine whether one or more aspects of a source profile of the set of source profiles exceed one or more predetermined remediation thresholds by calculating a presentation assessment score based on a comparison of brand information presented in the set of gathered resources used to create the source profile to brand information presentation guidelines identified in a product definition used to create the source profile; and in response to determining that one or more aspects of the source profile exceed one or more predetermined remediation thresholds; create a remediation workflow having one or more remediation steps; and execute the remediation steps of the remediation workflow. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium having computer-executable instructions stored thereon that, in response to execution by one or more processors of one or more computing devices, cause the one or more computing devices to perform actions for detecting and eliminating unauthorized digital communications, the actions comprising:
-
building source profiles associated with a plurality of product sources, wherein building source profiles associated with a plurality of product sources comprises; generating a set of search queries based on a set of product definitions; executing the set of search queries to obtain a set of gathered resources; creating a set of source profiles based on the set of gathered resources; and updating the set of source profiles with information retrieved from the set of gathered resources using a set of parsing rules; determining whether one or more aspects of a source profile of the set of source profiles exceed one or more predetermined remediation thresholds by calculating a presentation assessment score based on a comparison of brand information presented in the set of gathered resources used to create the source profile to brand information presentation guidelines identified in a product definition used to create the source profile; and in response to determining that one or more aspects of the source profile exceed one or more predetermined remediation thresholds; creating a remediation workflow having one or more remediation steps; and executing the remediation steps of the remediation workflow. - View Dependent Claims (20)
-
Specification