Steven D. Domenikos - Millis MA, US Stamatis Astras - Boston MA, US Iris Seri - Roslindale MA, US
Assignee:
IndentityTruth, Inc. - Waltham MA
International Classification:
G06Q 99/00
US Classification:
705325, 705 11
Abstract:
In general, in one aspect, the invention relates to a system for providing identity protection that, in one embodiment, includes a fraud model for specifying patterns of events indicative of identity fraud and a business rules subsystem used to identify fraud that is specified by the fraud models. The system aggregates data from a variety of sources, and has an analytical engine that operates on the aggregated data and determines, using the business rules, whether there are events that are correlative with the fraud models that are indicative of fraud.
Systems And Methods For Supporting On-Line Delivery Of Communication Services
George Domenikos - Chelsea MA, US Steven Domenikos - Millis MA, US
International Classification:
G06F015/16
US Classification:
709/203000
Abstract:
Systems and methods for supporting the delivery of communication services to a consumer from a plurality of different vendors. To this end, these systems may include a flexible and scalable middleware server platform that allows for the facile integration of a vendor's communication service and that presents to the consumer a user interface that accepts an enterprise-wide password identification number (PIN) that the server may employ to grant the consumer access to a plurality of different vendors, each offering different products and services. The PIN may be representative of a phone number that the is assigned to and belongs to the consumer. Account information, including balance and subscribed services may be maintained by the server platform for that PIN account.
Systems And Methods For Improving Service Delivery
Kevin Farrell - Windham NH, US Steven Domenikos - Millis MA, US George Domenikos - Saugus MA, US Sasha Epstein - Reading MA, US
International Classification:
G06F015/177
US Classification:
709/220000
Abstract:
Methods for deploying improved telecommunication services. The methods comprise the steps of providing one or more existing service packages, each being a set of instruction for deploying a telecommunications service. In a further step the method provides a platform runtime environment that has a work flow engine and a pipeline engine that is capable of interpreting the service package to carry out the instructions therein. In an additional step, the method provides a user interface for configuring the one or more service packages. The user interface is configured to receive user input by offering a plurality of functional elements that may be manipulated by a user to describe one or more operations of the service packages, each functional element having one or more properties that may be controlled by the user. In a further step the method configures one or more features of the service package in response to the user input to alter the telecommunications service.
Steven D. Domenikos - Millis MA, US Stamatis Astras - Boston MA, US Iris Seri - Roslindale MA, US
International Classification:
G06Q 40/00 G06F 17/30 G06F 17/40
US Classification:
705 1
Abstract:
In general, in one aspect, the invention relates to a system for providing identity protection that, in one embodiment, includes a fraud model for specifying patterns of events indicative of identity fraud and a business rules subsystem used to identify fraud that is specified by the fraud models. The system aggregates data from a variety of sources, and has an analytical engine that operates on the aggregated data and determines, using the business rules, whether there are events that are correlative with the fraud models that are indicative of fraud.
Steven D. Domenikos - Millis MA, US Stamatis Astras - Boston MA, US Iris Seri - Roslindale MA, US
International Classification:
G06Q 40/00 G06F 17/30 G06F 17/40
US Classification:
705 1
Abstract:
In general, in one aspect, the invention relates to a system for providing identity protection that, in one embodiment, includes a fraud model for specifying patterns of events indicative of identity fraud and a business rules subsystem used to identify fraud that is specified by the fraud models. The system aggregates data from a variety of sources, and has an analytical engine that operates on the aggregated data and determines, using the business rules, whether there are events that are correlative with the fraud models that are indicative of fraud.
Systems, Methods, And Apparatus For Determining Fraud Probability Scores And Identity Health Scores
Steven D. Domenikos - Millis MA, US Stamatis Astras - Boston MA, US Iris Seri - Roslindale MA, US Steven E. Samler - Andover MA, US
International Classification:
G06N 5/02 G06Q 99/00 G06Q 40/00
US Classification:
705 38, 705325, 706 52
Abstract:
In general, in one embodiment, a computing system that evaluates a fraud probability score for an identity event relevant to a user first queries a data store to identify the identity event. A fraud probability score is then computed for the identity event using a behavioral module that models multiple categories of suspected fraud.
Systems And Methods For Executing Application Programs From A Memory Device Linked To A Server
Steven D. Domenikos - Millis MA George C. Domenikos - Chelsea MA
International Classification:
H04N 1413
US Classification:
709203
Abstract:
Systems and processes of the invention allow a computer to connect to a server of an Internet site for executing an application program that is stored on a disk linked to that server. Specifically, processes are disclosed that provide a data transport interface for connecting to the server. The processes transport from the server a server address signal representative of a network address of the server, and a path name signal representative of a file system that includes an application program. The process further generates a mount request as a function of the path name signal and transports the mount request to the server to direct the server to provide an array of server file pointers that point to a file descriptor representative of the file system that includes the application program. The processes generate an array of remote file pointers, as a function of the server address signal and the array of server file pointers, and provide the array of remote file pointers to a program loader that transports from the disk at the server site to a local program memory element, a file block associated with the selected remote file pointer. The process can employ a redirector that translates requests to access remote files into HTTP compliant commands for collecting files from an HTTP server site.
Systems And Methods For Executing Application Programs From A Memory Device Linked To A Server
Steven D. Domenikos - Millis MA George C. Domenikos - Chelsea MA
International Classification:
H04L 1200
US Classification:
709217
Abstract:
Systems and processes of the invention allow a computer to connect to a server of an Internet site for executing an application program that is stored on a disk linked to that server. Specifically, processes are disclosed that provide a data transport interface for connecting to the server. The processes transport from the server a server address signal representative of a network address of the server, and a path name signal representative of a file system that includes an application program. The process further generates a mount request as a function of the path name signal and transports the mount request to the server to direct the server to provide an array of server file pointers that point to a file descriptor representative of the file system that includes the application program. The processes generate an array of remote file pointers, as a function of the server address signal and the array of server file pointers, and provide the array of remote file pointers to a program loader that transports from the disk at the server site to a local program memory element, a file block associated with the selected remote file pointer. The process can employ a redirector that translates requests to access remote files into HTTP compliant commands for collecting files from an HTTP server site.
Name / Title
Company / Classification
Phones & Addresses
Steven Domenikos President, Chief Executive Officer
IDENTITYTRUTH, INC
404 Wyman St, Waltham, MA 02451 Somerville, MA 02145 7816841300
Steven D. Domenikos President
TELEGEA SECURITIES CORPORATION
245 Winter St, Waltham, MA 02451 54 Myrtle St, Newton, MA 02165
Steven D. Domenikos President
IENION CORPORATION
54 Myrtle St, Millis, MA 02054
Steven D. Domenikos President
TELEGEA, INC Security Broker/Dealer
245 Winter St, Waltham, MA 02451 7814666688, 7814666920
Steven Domenikos Manager
PHOENIXONE, LLC
54 Myrtle St, Millis, MA 02054
Steven D. Domenikos President, Principal
IERION, INC Business Services at Non-Commercial Site · Nonclassifiable Establishments
54 Myrtle St, Millis, MA 02054
Youtube
Why AR needs Touch! | Steven Domenikos | AR i...
AR in ACTION convenes the top minds in the Augmented Reality Ecosystem...
Duration:
10m 39s
Tactai demo of force feedback technology.
Steven Domenikos, CEO of Tactai, demonstrates touch feedback for virtu...
Duration:
2m 59s
El Greco, Adoration of the Shepherds
El Greco (Domenikos Theotokopoulos), Adoration of the Shepherds, ca. 1...
Duration:
4m 10s
Steven Strait & Dominique Tipper Interview - ...
JoBlo.com sits down with Steven Strait & Dominique Tipper to discuss t...
Duration:
15m 29s
Giorgione, The Tempest
Giorgione, The Tempest, c. 1506-8 (Accademia, Venice) Speakers: Dr. St...
Duration:
5m 55s
Amazon Prime Video's The Expanse: Cast and Pr...
Join the stars of The Expanse - Steven Strait, Dominique Tipper, Wes C...
Duration:
1h 2m 55s
Microservices and You - the straight dope
by Steven Pousty You have started to hear about microservices and you ...
Duration:
36m 12s
CEOs, Sales Is A Strategic Opportunity - Stev...
In this Video Seminar, Steven Norman discusses the topic of 'CEOs, Sal...