<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: RUKSHANA S CSE</title>
    <description>The latest articles on DEV Community by RUKSHANA S CSE (@rukshana_scse_b9329f0303).</description>
    <link>https://dev.to/rukshana_scse_b9329f0303</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3827841%2Fe1938ff0-365c-44ae-9688-252be5099bcb.png</url>
      <title>DEV Community: RUKSHANA S CSE</title>
      <link>https://dev.to/rukshana_scse_b9329f0303</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rukshana_scse_b9329f0303"/>
    <language>en</language>
    <item>
      <title>DeliverGuard AI – Building Trust in Micro-Insurance for Gig Workers</title>
      <dc:creator>RUKSHANA S CSE</dc:creator>
      <pubDate>Mon, 30 Mar 2026 18:09:30 +0000</pubDate>
      <link>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-9de</link>
      <guid>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-9de</guid>
      <description>&lt;p&gt;DeliverGuard AI is a parametric micro-insurance platform designed for delivery partners of Zomato.&lt;br&gt;&lt;br&gt;
It protects workers from income loss caused by external disruptions such as rain, traffic, extreme heat, and environmental conditions.&lt;/p&gt;

&lt;p&gt;The system uses AI monitoring, OCR verification, and fraud detection to ensure fair and automated payouts.&lt;/p&gt;




&lt;h2&gt;
  
  
  Problem Statement
&lt;/h2&gt;

&lt;p&gt;Delivery workers depend on daily or weekly earnings, but external factors such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Heavy rain&lt;/li&gt;
&lt;li&gt;Flood&lt;/li&gt;
&lt;li&gt;Traffic congestion
&lt;/li&gt;
&lt;li&gt;Extreme heat
&lt;/li&gt;
&lt;li&gt;Environmental disturbances
&lt;/li&gt;
&lt;li&gt;Curfew / strike
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;can reduce or completely stop their ability to work.&lt;/p&gt;

&lt;p&gt;Currently, there is no reliable system to compensate short-term income loss.&lt;/p&gt;




&lt;h2&gt;
  
  
  Deliverable Expectations and it's Solutions
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Expectations&lt;/th&gt;
&lt;th&gt;Solutions&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Onboarding&lt;/td&gt;
&lt;td&gt;OCR-based income extraction with simple user profiling&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Risk Profiling&lt;/td&gt;
&lt;td&gt;AI-powered analysis using weather, AQI, traffic, and behavioral data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Policy Creation&lt;/td&gt;
&lt;td&gt;Weekly income-based pricing with dynamic risk evaluation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Claim Triggering&lt;/td&gt;
&lt;td&gt;Automated detection of disruptions (rain, AQI, traffic)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Payout Processing&lt;/td&gt;
&lt;td&gt;Secure and instant bank transfers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Analytics Dashboard&lt;/td&gt;
&lt;td&gt;Real-time insights on claims, payouts, and risk trends&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Fraud Detection&lt;/td&gt;
&lt;td&gt;GPS, IP tracking, device fingerprinting, and behavior analysis&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Phase 1 – Building a Secure &amp;amp; Reliable Foundation
&lt;/h2&gt;

&lt;p&gt;In the first phase of our project, we focused heavily on trust, verification, and fraud prevention, which are critical for any insurance system.&lt;/p&gt;




&lt;h2&gt;
  
  
  Adversarial Defense &amp;amp; Anti-Spoofing
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" alt="Flowchart" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;DeliverGuard AI implements a multi-layer fraud detection system that validates user activity using location, device, network, and behavioral signals. Each feature is designed to detect a specific type of fraud and contribute to a unified risk score.&lt;/p&gt;




&lt;h2&gt;
  
  
  Detection Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. GPS Verification System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can spoof GPS using fake location apps, making it appear they are working when they are not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Continuously validate location consistency instead of trusting a single GPS point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect GPS coordinates periodically (every few seconds)
&lt;/li&gt;
&lt;li&gt;Store previous and current locations
&lt;/li&gt;
&lt;li&gt;Calculate distance between points
&lt;/li&gt;
&lt;li&gt;Detect abnormal jumps (e.g., 100 km in seconds)
&lt;/li&gt;
&lt;li&gt;Flag inconsistent movement
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;navigator.geolocation&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  2. IP Address Verification
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
User’s network location may not match their physical location.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cross-check IP-based location with GPS coordinates.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Extract IP address from request
&lt;/li&gt;
&lt;li&gt;Use IP geolocation API to get location
&lt;/li&gt;
&lt;li&gt;Compare IP location with GPS location
&lt;/li&gt;
&lt;li&gt;Calculate distance mismatch
&lt;/li&gt;
&lt;li&gt;Flag large inconsistencies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipapi / ipinfo
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  3. VPN Detection Mechanism
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can hide their real location using VPN or proxy services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect anonymized IP addresses and unusual location switching.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Check IP against VPN/proxy database
&lt;/li&gt;
&lt;li&gt;Detect rapid country switching
&lt;/li&gt;
&lt;li&gt;Identify high-risk IP patterns
&lt;/li&gt;
&lt;li&gt;Mark suspicious sessions
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipqualityscore
&lt;/li&gt;
&lt;li&gt;proxycheck.io
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  4. Device &amp;amp; Emulator Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters create multiple fake accounts using emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Generate unique device fingerprint and detect emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect device information (OS, browser, screen)
&lt;/li&gt;
&lt;li&gt;Generate hashed deviceId (SHA-256)
&lt;/li&gt;
&lt;li&gt;Detect emulator signatures
&lt;/li&gt;
&lt;li&gt;Track multiple accounts on same device
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FingerprintJS
&lt;/li&gt;
&lt;li&gt;Crypto hashing
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  5. Movement &amp;amp; Speed Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake GPS creates unrealistic movement patterns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze speed and movement consistency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Calculate distance between GPS points
&lt;/li&gt;
&lt;li&gt;Compute speed = distance / time
&lt;/li&gt;
&lt;li&gt;Detect:

&lt;ul&gt;
&lt;li&gt;No movement
&lt;/li&gt;
&lt;li&gt;Unrealistic speed (&amp;gt;120 km/h)
&lt;/li&gt;
&lt;li&gt;Sudden jumps
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Flag suspicious behavior
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  6. Route Validation System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake routes do not follow real-world roads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Compare user path with actual map routes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track sequence of GPS points
&lt;/li&gt;
&lt;li&gt;Map points onto real road network
&lt;/li&gt;
&lt;li&gt;Detect invalid paths (through buildings/water)
&lt;/li&gt;
&lt;li&gt;Validate route realism
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OpenStreetMap
&lt;/li&gt;
&lt;li&gt;Leaflet
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  7. Log-Based Monitoring System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraud patterns cannot be identified from a single event.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Maintain historical logs for analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store all tracking data (GPS, IP, device, timestamp)
&lt;/li&gt;
&lt;li&gt;Analyze repeated anomalies
&lt;/li&gt;
&lt;li&gt;Detect long-term suspicious patterns
&lt;/li&gt;
&lt;li&gt;Flag repeat offenders
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB
&lt;/li&gt;
&lt;li&gt;Logging system&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Intelligence Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  8. Spatio-Temporal Correlation
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters operate in coordinated groups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze location and time relationships.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Compare multiple users’ activity
&lt;/li&gt;
&lt;li&gt;Identify same location + same time patterns
&lt;/li&gt;
&lt;li&gt;Detect clustering behavior
&lt;/li&gt;
&lt;li&gt;Flag coordinated activity
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB aggregation
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  9. Shared IP &amp;amp; Device Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
One attacker controls multiple accounts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect shared device and IP usage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store deviceId and IP for each user
&lt;/li&gt;
&lt;li&gt;Group users with same identifiers
&lt;/li&gt;
&lt;li&gt;Detect abnormal sharing
&lt;/li&gt;
&lt;li&gt;Flag accounts for investigation
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Backend grouping logic
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  10. Fraud Ring Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Large-scale fraud networks operate together.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Identify clusters of users with similar behavior.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Analyze user patterns (routes, timing, devices)
&lt;/li&gt;
&lt;li&gt;Detect repeated similarities across accounts
&lt;/li&gt;
&lt;li&gt;Build clusters of related users
&lt;/li&gt;
&lt;li&gt;Identify fraud networks
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Graph-based analysis
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  11. Behavioral Pattern Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake users behave unnaturally compared to real users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze behavioral patterns over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track delivery frequency and timing
&lt;/li&gt;
&lt;li&gt;Identify unusual consistency
&lt;/li&gt;
&lt;li&gt;Detect robotic or scripted behavior
&lt;/li&gt;
&lt;li&gt;Flag anomalies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Statistical models
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  12. Multi-Signal Fusion Engine
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Single signal is unreliable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Combine all signals for stronger detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect signals (GPS, IP, device, behavior)
&lt;/li&gt;
&lt;li&gt;Assign weight to each signal
&lt;/li&gt;
&lt;li&gt;Combine into unified decision
&lt;/li&gt;
&lt;li&gt;Detect fraud based on multiple indicators
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based engine
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Risk Scoring System
&lt;/h2&gt;

&lt;h3&gt;
  
  
  13. Dynamic Risk Scoring
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Not all anomalies indicate fraud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Assign weighted risk scores.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Each anomaly adds risk points
&lt;/li&gt;
&lt;li&gt;Combine scores from all modules
&lt;/li&gt;
&lt;li&gt;Calculate final risk score
&lt;/li&gt;
&lt;li&gt;Classify user risk level
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based scoring system
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Insight
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;DeliverGuard AI combines detection, intelligence, and risk scoring layers to build a robust, real-time fraud prevention system that ensures security while minimizing false positives. &lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  OCR-Based Income Verification
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" alt="OCR" width="800" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To ensure accurate and automated income verification, DeliverGuard AI uses OCR (Optical Character Recognition) powered by EasyOCR.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why OCR is Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Eliminates manual verification of income proof
&lt;/li&gt;
&lt;li&gt;Automatically extracts data from transaction screenshots
&lt;/li&gt;
&lt;li&gt;Speeds up onboarding and claim validation
&lt;/li&gt;
&lt;li&gt;Reduces human errors and improves efficiency
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How It Works
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;The user uploads a screenshot of their transaction or earnings proof
&lt;/li&gt;
&lt;li&gt;The system uses EasyOCR to extract text from the image
&lt;/li&gt;
&lt;li&gt;Key details such as:

&lt;ul&gt;
&lt;li&gt;Platform name (e.g., Zomato, Swiggy)
&lt;/li&gt;
&lt;li&gt;Transaction amount
&lt;/li&gt;
&lt;li&gt;Date and time
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extracted data is processed and structured in the system&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Example:&lt;br&gt;&lt;br&gt;
Input:&lt;br&gt;
INR 3139 credited via ZOMATO&lt;br&gt;&lt;br&gt;
Output:&lt;br&gt;
Premium Rate : 8% (Standard Plan)&lt;br&gt;Insurance Premium : ₹251&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Fraud Prevention Mechanism
&lt;/h3&gt;

&lt;p&gt;OCR alone cannot verify whether an image is original or edited. Therefore, DeliverGuard AI combines OCR with multiple validation techniques:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identifies inconsistent formatting in manipulated screenshots
&lt;/li&gt;
&lt;li&gt;Flags duplicate or reused images
&lt;/li&gt;
&lt;li&gt;Uses metadata analysis as an additional validation layer
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cross-Verification with Delivery Platforms
&lt;/h3&gt;

&lt;p&gt;To enhance reliability, the system can cross-verify user income with Zomato delivery platforms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The extracted income data is compared with actual earnings records
&lt;/li&gt;
&lt;li&gt;Ensures that the submitted screenshot matches real transaction history
&lt;/li&gt;
&lt;li&gt;Prevents fraud caused by edited or AI-generated screenshots
&lt;/li&gt;
&lt;li&gt;Acts as a strong validation layer beyond OCR
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Since OCR only reads visible text, cross-verification ensures authenticity by validating the data from trusted sources.&lt;br&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Workflow
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" alt="OCR Workflow" width="800" height="436"&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Technology Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;EasyOCR – for text extraction from images
&lt;/li&gt;
&lt;li&gt;Image preprocessing – to improve OCR accuracy
&lt;/li&gt;
&lt;li&gt;Backend validation logic – for data matching
&lt;/li&gt;
&lt;li&gt;Platform verification (Zomato integration) – for authenticity checks
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  System Workflow
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Collect user data
&lt;/li&gt;
&lt;li&gt;Validate inputs
&lt;/li&gt;
&lt;li&gt;Analyze patterns
&lt;/li&gt;
&lt;li&gt;Assign risk score
&lt;/li&gt;
&lt;li&gt;Trigger actions
&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  Phase 1 Outcome
&lt;/h3&gt;

&lt;p&gt;By the end of Phase 1, we successfully built:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A robust fraud detection system&lt;/li&gt;
&lt;li&gt;A secure onboarding and verification pipeline &lt;/li&gt;
&lt;li&gt;A trust-first foundation for insurance processing
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This allowed us to confidently move to the next stage.&lt;/p&gt;




&lt;h2&gt;
  
  
  Phase 2 – Expanding Intelligence &amp;amp; Insurance Logic
&lt;/h2&gt;

&lt;p&gt;After establishing a strong foundation, we progressed to Phase 2, where we focused on making the system smarter and more user-centric.&lt;/p&gt;




&lt;h2&gt;
  
  
  Insurance Plans
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" alt="Insurance plan" width="800" height="396"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Plan&lt;/th&gt;
&lt;th&gt;Premium&lt;/th&gt;
&lt;th&gt;Hour Threshold&lt;/th&gt;
&lt;th&gt;Max Weekly Payout&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Basic&lt;/td&gt;
&lt;td&gt;5%&lt;/td&gt;
&lt;td&gt;8 hrs&lt;/td&gt;
&lt;td&gt;₹2000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Standard&lt;/td&gt;
&lt;td&gt;8%&lt;/td&gt;
&lt;td&gt;6 hrs&lt;/td&gt;
&lt;td&gt;₹4000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Premium&lt;/td&gt;
&lt;td&gt;10%&lt;/td&gt;
&lt;td&gt;4 hrs&lt;/td&gt;
&lt;td&gt;₹8000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Premium Calculation
&lt;/h2&gt;

&lt;p&gt;Weekly Premium = Weekly Income × Plan %&lt;/p&gt;

&lt;p&gt;Example (Weekly Income = ₹7000):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Basic → ₹350
&lt;/li&gt;
&lt;li&gt;Standard → ₹560
&lt;/li&gt;
&lt;li&gt;Premium → ₹700
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Payout Calculation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Hourly Income
&lt;/h3&gt;

&lt;p&gt;Weekly Income ÷ 42 (6 hours/day × 7 days)&lt;/p&gt;

&lt;h3&gt;
  
  
  Claim Types
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Day Claim → 6 × Hourly Income
&lt;/li&gt;
&lt;li&gt;Hour Claim → Threshold × Hourly Income
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Final Rule
&lt;/h3&gt;

&lt;p&gt;Final Payout = min(calculated amount, plan limit)&lt;/p&gt;




&lt;h2&gt;
  
  
  Disruption Detection
&lt;/h2&gt;

&lt;p&gt;The system uses real-time APIs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Weather API → Rain / flood
&lt;/li&gt;
&lt;li&gt;AQI API → Pollution
&lt;/li&gt;
&lt;li&gt;Traffic API → Congestion
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Trigger conditions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rainfall ≥ 50 mm/hr
&lt;/li&gt;
&lt;li&gt;AQI ≥ 300
&lt;/li&gt;
&lt;li&gt;Traffic ≥ defined threshold
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Loyalty Rewards
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" alt="Badges" width="800" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Levels
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Silver → 3 months
&lt;/li&gt;
&lt;li&gt;Gold → 6 months
&lt;/li&gt;
&lt;li&gt;Diamond → 1 year
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Benefits
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fuel rewards
&lt;/li&gt;
&lt;li&gt;Premium discounts
&lt;/li&gt;
&lt;li&gt;Faster claim processing
&lt;/li&gt;
&lt;li&gt;Increased coverage
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Thought
&lt;/h2&gt;

&lt;p&gt;DeliverGuard AI is not just an insurance system — it is a smart protection layer for gig workers, ensuring they are supported even when they cannot work.&lt;/p&gt;

&lt;p&gt;By combining verification, intelligence, and automation, we are building a system that is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fair
&lt;/li&gt;
&lt;li&gt;Secure
&lt;/li&gt;
&lt;li&gt;Reliable
&lt;/li&gt;
&lt;li&gt;Worker-centric
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>hackathon</category>
      <category>machinelearning</category>
      <category>startup</category>
    </item>
    <item>
      <title>DeliverGuard AI – Building Trust in Micro-Insurance for Gig Workers</title>
      <dc:creator>RUKSHANA S CSE</dc:creator>
      <pubDate>Mon, 30 Mar 2026 18:09:30 +0000</pubDate>
      <link>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-4ghp</link>
      <guid>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-4ghp</guid>
      <description>&lt;p&gt;DeliverGuard AI is a parametric micro-insurance platform designed for delivery partners of Zomato.&lt;br&gt;&lt;br&gt;
It protects workers from income loss caused by external disruptions such as rain, traffic, extreme heat, and environmental conditions.&lt;/p&gt;

&lt;p&gt;The system uses AI monitoring, OCR verification, and fraud detection to ensure fair and automated payouts.&lt;/p&gt;




&lt;h2&gt;
  
  
  Problem Statement
&lt;/h2&gt;

&lt;p&gt;Delivery workers depend on daily or weekly earnings, but external factors such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Heavy rain&lt;/li&gt;
&lt;li&gt;Flood&lt;/li&gt;
&lt;li&gt;Traffic congestion
&lt;/li&gt;
&lt;li&gt;Extreme heat
&lt;/li&gt;
&lt;li&gt;Environmental disturbances
&lt;/li&gt;
&lt;li&gt;Curfew / strike
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;can reduce or completely stop their ability to work.&lt;/p&gt;

&lt;p&gt;Currently, there is no reliable system to compensate short-term income loss.&lt;/p&gt;




&lt;h2&gt;
  
  
  Deliverable Expectations and it's Solutions
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Expectations&lt;/th&gt;
&lt;th&gt;Solutions&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Onboarding&lt;/td&gt;
&lt;td&gt;OCR-based income extraction with simple user profiling&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Risk Profiling&lt;/td&gt;
&lt;td&gt;AI-powered analysis using weather, AQI, traffic, and behavioral data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Policy Creation&lt;/td&gt;
&lt;td&gt;Weekly income-based pricing with dynamic risk evaluation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Claim Triggering&lt;/td&gt;
&lt;td&gt;Automated detection of disruptions (rain, AQI, traffic)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Payout Processing&lt;/td&gt;
&lt;td&gt;Secure and instant bank transfers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Analytics Dashboard&lt;/td&gt;
&lt;td&gt;Real-time insights on claims, payouts, and risk trends&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Fraud Detection&lt;/td&gt;
&lt;td&gt;GPS, IP tracking, device fingerprinting, and behavior analysis&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Phase 1 – Building a Secure &amp;amp; Reliable Foundation
&lt;/h2&gt;

&lt;p&gt;In the first phase of our project, we focused heavily on trust, verification, and fraud prevention, which are critical for any insurance system.&lt;/p&gt;




&lt;h2&gt;
  
  
  Adversarial Defense &amp;amp; Anti-Spoofing
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" alt="Flowchart" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;DeliverGuard AI implements a multi-layer fraud detection system that validates user activity using location, device, network, and behavioral signals. Each feature is designed to detect a specific type of fraud and contribute to a unified risk score.&lt;/p&gt;




&lt;h2&gt;
  
  
  Detection Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. GPS Verification System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can spoof GPS using fake location apps, making it appear they are working when they are not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Continuously validate location consistency instead of trusting a single GPS point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect GPS coordinates periodically (every few seconds)
&lt;/li&gt;
&lt;li&gt;Store previous and current locations
&lt;/li&gt;
&lt;li&gt;Calculate distance between points
&lt;/li&gt;
&lt;li&gt;Detect abnormal jumps (e.g., 100 km in seconds)
&lt;/li&gt;
&lt;li&gt;Flag inconsistent movement
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;navigator.geolocation&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  2. IP Address Verification
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
User’s network location may not match their physical location.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cross-check IP-based location with GPS coordinates.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Extract IP address from request
&lt;/li&gt;
&lt;li&gt;Use IP geolocation API to get location
&lt;/li&gt;
&lt;li&gt;Compare IP location with GPS location
&lt;/li&gt;
&lt;li&gt;Calculate distance mismatch
&lt;/li&gt;
&lt;li&gt;Flag large inconsistencies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipapi / ipinfo
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  3. VPN Detection Mechanism
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can hide their real location using VPN or proxy services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect anonymized IP addresses and unusual location switching.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Check IP against VPN/proxy database
&lt;/li&gt;
&lt;li&gt;Detect rapid country switching
&lt;/li&gt;
&lt;li&gt;Identify high-risk IP patterns
&lt;/li&gt;
&lt;li&gt;Mark suspicious sessions
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipqualityscore
&lt;/li&gt;
&lt;li&gt;proxycheck.io
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  4. Device &amp;amp; Emulator Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters create multiple fake accounts using emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Generate unique device fingerprint and detect emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect device information (OS, browser, screen)
&lt;/li&gt;
&lt;li&gt;Generate hashed deviceId (SHA-256)
&lt;/li&gt;
&lt;li&gt;Detect emulator signatures
&lt;/li&gt;
&lt;li&gt;Track multiple accounts on same device
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FingerprintJS
&lt;/li&gt;
&lt;li&gt;Crypto hashing
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  5. Movement &amp;amp; Speed Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake GPS creates unrealistic movement patterns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze speed and movement consistency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Calculate distance between GPS points
&lt;/li&gt;
&lt;li&gt;Compute speed = distance / time
&lt;/li&gt;
&lt;li&gt;Detect:

&lt;ul&gt;
&lt;li&gt;No movement
&lt;/li&gt;
&lt;li&gt;Unrealistic speed (&amp;gt;120 km/h)
&lt;/li&gt;
&lt;li&gt;Sudden jumps
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Flag suspicious behavior
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  6. Route Validation System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake routes do not follow real-world roads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Compare user path with actual map routes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track sequence of GPS points
&lt;/li&gt;
&lt;li&gt;Map points onto real road network
&lt;/li&gt;
&lt;li&gt;Detect invalid paths (through buildings/water)
&lt;/li&gt;
&lt;li&gt;Validate route realism
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OpenStreetMap
&lt;/li&gt;
&lt;li&gt;Leaflet
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  7. Log-Based Monitoring System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraud patterns cannot be identified from a single event.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Maintain historical logs for analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store all tracking data (GPS, IP, device, timestamp)
&lt;/li&gt;
&lt;li&gt;Analyze repeated anomalies
&lt;/li&gt;
&lt;li&gt;Detect long-term suspicious patterns
&lt;/li&gt;
&lt;li&gt;Flag repeat offenders
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB
&lt;/li&gt;
&lt;li&gt;Logging system&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Intelligence Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  8. Spatio-Temporal Correlation
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters operate in coordinated groups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze location and time relationships.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Compare multiple users’ activity
&lt;/li&gt;
&lt;li&gt;Identify same location + same time patterns
&lt;/li&gt;
&lt;li&gt;Detect clustering behavior
&lt;/li&gt;
&lt;li&gt;Flag coordinated activity
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB aggregation
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  9. Shared IP &amp;amp; Device Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
One attacker controls multiple accounts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect shared device and IP usage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store deviceId and IP for each user
&lt;/li&gt;
&lt;li&gt;Group users with same identifiers
&lt;/li&gt;
&lt;li&gt;Detect abnormal sharing
&lt;/li&gt;
&lt;li&gt;Flag accounts for investigation
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Backend grouping logic
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  10. Fraud Ring Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Large-scale fraud networks operate together.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Identify clusters of users with similar behavior.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Analyze user patterns (routes, timing, devices)
&lt;/li&gt;
&lt;li&gt;Detect repeated similarities across accounts
&lt;/li&gt;
&lt;li&gt;Build clusters of related users
&lt;/li&gt;
&lt;li&gt;Identify fraud networks
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Graph-based analysis
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  11. Behavioral Pattern Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake users behave unnaturally compared to real users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze behavioral patterns over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track delivery frequency and timing
&lt;/li&gt;
&lt;li&gt;Identify unusual consistency
&lt;/li&gt;
&lt;li&gt;Detect robotic or scripted behavior
&lt;/li&gt;
&lt;li&gt;Flag anomalies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Statistical models
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  12. Multi-Signal Fusion Engine
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Single signal is unreliable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Combine all signals for stronger detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect signals (GPS, IP, device, behavior)
&lt;/li&gt;
&lt;li&gt;Assign weight to each signal
&lt;/li&gt;
&lt;li&gt;Combine into unified decision
&lt;/li&gt;
&lt;li&gt;Detect fraud based on multiple indicators
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based engine
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Risk Scoring System
&lt;/h2&gt;

&lt;h3&gt;
  
  
  13. Dynamic Risk Scoring
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Not all anomalies indicate fraud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Assign weighted risk scores.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Each anomaly adds risk points
&lt;/li&gt;
&lt;li&gt;Combine scores from all modules
&lt;/li&gt;
&lt;li&gt;Calculate final risk score
&lt;/li&gt;
&lt;li&gt;Classify user risk level
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based scoring system
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Insight
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;DeliverGuard AI combines detection, intelligence, and risk scoring layers to build a robust, real-time fraud prevention system that ensures security while minimizing false positives. &lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  OCR-Based Income Verification
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" alt="OCR" width="800" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To ensure accurate and automated income verification, DeliverGuard AI uses OCR (Optical Character Recognition) powered by EasyOCR.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why OCR is Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Eliminates manual verification of income proof
&lt;/li&gt;
&lt;li&gt;Automatically extracts data from transaction screenshots
&lt;/li&gt;
&lt;li&gt;Speeds up onboarding and claim validation
&lt;/li&gt;
&lt;li&gt;Reduces human errors and improves efficiency
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How It Works
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;The user uploads a screenshot of their transaction or earnings proof
&lt;/li&gt;
&lt;li&gt;The system uses EasyOCR to extract text from the image
&lt;/li&gt;
&lt;li&gt;Key details such as:

&lt;ul&gt;
&lt;li&gt;Platform name (e.g., Zomato, Swiggy)
&lt;/li&gt;
&lt;li&gt;Transaction amount
&lt;/li&gt;
&lt;li&gt;Date and time
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extracted data is processed and structured in the system&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Example:&lt;br&gt;&lt;br&gt;
Input:&lt;br&gt;
INR 3139 credited via ZOMATO&lt;br&gt;&lt;br&gt;
Output:&lt;br&gt;
Premium Rate : 8% (Standard Plan)&lt;br&gt;Insurance Premium : ₹251&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Fraud Prevention Mechanism
&lt;/h3&gt;

&lt;p&gt;OCR alone cannot verify whether an image is original or edited. Therefore, DeliverGuard AI combines OCR with multiple validation techniques:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identifies inconsistent formatting in manipulated screenshots
&lt;/li&gt;
&lt;li&gt;Flags duplicate or reused images
&lt;/li&gt;
&lt;li&gt;Uses metadata analysis as an additional validation layer
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cross-Verification with Delivery Platforms
&lt;/h3&gt;

&lt;p&gt;To enhance reliability, the system can cross-verify user income with Zomato delivery platforms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The extracted income data is compared with actual earnings records
&lt;/li&gt;
&lt;li&gt;Ensures that the submitted screenshot matches real transaction history
&lt;/li&gt;
&lt;li&gt;Prevents fraud caused by edited or AI-generated screenshots
&lt;/li&gt;
&lt;li&gt;Acts as a strong validation layer beyond OCR
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Since OCR only reads visible text, cross-verification ensures authenticity by validating the data from trusted sources.&lt;br&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Workflow
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" alt="OCR Workflow" width="800" height="436"&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Technology Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;EasyOCR – for text extraction from images
&lt;/li&gt;
&lt;li&gt;Image preprocessing – to improve OCR accuracy
&lt;/li&gt;
&lt;li&gt;Backend validation logic – for data matching
&lt;/li&gt;
&lt;li&gt;Platform verification (Zomato integration) – for authenticity checks
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  System Workflow
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Collect user data
&lt;/li&gt;
&lt;li&gt;Validate inputs
&lt;/li&gt;
&lt;li&gt;Analyze patterns
&lt;/li&gt;
&lt;li&gt;Assign risk score
&lt;/li&gt;
&lt;li&gt;Trigger actions
&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  Phase 1 Outcome
&lt;/h3&gt;

&lt;p&gt;By the end of Phase 1, we successfully built:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A robust fraud detection system&lt;/li&gt;
&lt;li&gt;A secure onboarding and verification pipeline &lt;/li&gt;
&lt;li&gt;A trust-first foundation for insurance processing
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This allowed us to confidently move to the next stage.&lt;/p&gt;




&lt;h2&gt;
  
  
  Phase 2 – Expanding Intelligence &amp;amp; Insurance Logic
&lt;/h2&gt;

&lt;p&gt;After establishing a strong foundation, we progressed to Phase 2, where we focused on making the system smarter and more user-centric.&lt;/p&gt;




&lt;h2&gt;
  
  
  Insurance Plans
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" alt="Insurance plan" width="800" height="396"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Plan&lt;/th&gt;
&lt;th&gt;Premium&lt;/th&gt;
&lt;th&gt;Hour Threshold&lt;/th&gt;
&lt;th&gt;Max Weekly Payout&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Basic&lt;/td&gt;
&lt;td&gt;5%&lt;/td&gt;
&lt;td&gt;8 hrs&lt;/td&gt;
&lt;td&gt;₹2000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Standard&lt;/td&gt;
&lt;td&gt;8%&lt;/td&gt;
&lt;td&gt;6 hrs&lt;/td&gt;
&lt;td&gt;₹4000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Premium&lt;/td&gt;
&lt;td&gt;10%&lt;/td&gt;
&lt;td&gt;4 hrs&lt;/td&gt;
&lt;td&gt;₹8000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Premium Calculation
&lt;/h2&gt;

&lt;p&gt;Weekly Premium = Weekly Income × Plan %&lt;/p&gt;

&lt;p&gt;Example (Weekly Income = ₹7000):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Basic → ₹350
&lt;/li&gt;
&lt;li&gt;Standard → ₹560
&lt;/li&gt;
&lt;li&gt;Premium → ₹700
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Payout Calculation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Hourly Income
&lt;/h3&gt;

&lt;p&gt;Weekly Income ÷ 42 (6 hours/day × 7 days)&lt;/p&gt;

&lt;h3&gt;
  
  
  Claim Types
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Day Claim → 6 × Hourly Income
&lt;/li&gt;
&lt;li&gt;Hour Claim → Threshold × Hourly Income
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Final Rule
&lt;/h3&gt;

&lt;p&gt;Final Payout = min(calculated amount, plan limit)&lt;/p&gt;




&lt;h2&gt;
  
  
  Disruption Detection
&lt;/h2&gt;

&lt;p&gt;The system uses real-time APIs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Weather API → Rain / flood
&lt;/li&gt;
&lt;li&gt;AQI API → Pollution
&lt;/li&gt;
&lt;li&gt;Traffic API → Congestion
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Trigger conditions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rainfall ≥ 50 mm/hr
&lt;/li&gt;
&lt;li&gt;AQI ≥ 300
&lt;/li&gt;
&lt;li&gt;Traffic ≥ defined threshold
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Loyalty Rewards
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" alt="Badges" width="800" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Levels
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Silver → 3 months
&lt;/li&gt;
&lt;li&gt;Gold → 6 months
&lt;/li&gt;
&lt;li&gt;Diamond → 1 year
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Benefits
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fuel rewards
&lt;/li&gt;
&lt;li&gt;Premium discounts
&lt;/li&gt;
&lt;li&gt;Faster claim processing
&lt;/li&gt;
&lt;li&gt;Increased coverage
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Thought
&lt;/h2&gt;

&lt;p&gt;DeliverGuard AI is not just an insurance system — it is a smart protection layer for gig workers, ensuring they are supported even when they cannot work.&lt;/p&gt;

&lt;p&gt;By combining verification, intelligence, and automation, we are building a system that is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fair
&lt;/li&gt;
&lt;li&gt;Secure
&lt;/li&gt;
&lt;li&gt;Reliable
&lt;/li&gt;
&lt;li&gt;Worker-centric
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>hackathon</category>
      <category>machinelearning</category>
      <category>startup</category>
    </item>
    <item>
      <title>DeliverGuard AI – Building Trust in Micro-Insurance for Gig Workers</title>
      <dc:creator>RUKSHANA S CSE</dc:creator>
      <pubDate>Mon, 30 Mar 2026 18:09:30 +0000</pubDate>
      <link>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-218e</link>
      <guid>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-218e</guid>
      <description>&lt;p&gt;DeliverGuard AI is a parametric micro-insurance platform designed for delivery partners of Zomato.&lt;br&gt;&lt;br&gt;
It protects workers from income loss caused by external disruptions such as rain, traffic, extreme heat, and environmental conditions.&lt;/p&gt;

&lt;p&gt;The system uses AI monitoring, OCR verification, and fraud detection to ensure fair and automated payouts.&lt;/p&gt;




&lt;h2&gt;
  
  
  Problem Statement
&lt;/h2&gt;

&lt;p&gt;Delivery workers depend on daily or weekly earnings, but external factors such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Heavy rain&lt;/li&gt;
&lt;li&gt;Flood&lt;/li&gt;
&lt;li&gt;Traffic congestion
&lt;/li&gt;
&lt;li&gt;Extreme heat
&lt;/li&gt;
&lt;li&gt;Environmental disturbances
&lt;/li&gt;
&lt;li&gt;Curfew / strike
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;can reduce or completely stop their ability to work.&lt;/p&gt;

&lt;p&gt;Currently, there is no reliable system to compensate short-term income loss.&lt;/p&gt;




&lt;h2&gt;
  
  
  Deliverable Expectations and it's Solutions
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Expectations&lt;/th&gt;
&lt;th&gt;Solutions&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Onboarding&lt;/td&gt;
&lt;td&gt;OCR-based income extraction with simple user profiling&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Risk Profiling&lt;/td&gt;
&lt;td&gt;AI-powered analysis using weather, AQI, traffic, and behavioral data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Policy Creation&lt;/td&gt;
&lt;td&gt;Weekly income-based pricing with dynamic risk evaluation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Claim Triggering&lt;/td&gt;
&lt;td&gt;Automated detection of disruptions (rain, AQI, traffic)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Payout Processing&lt;/td&gt;
&lt;td&gt;Secure and instant bank transfers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Analytics Dashboard&lt;/td&gt;
&lt;td&gt;Real-time insights on claims, payouts, and risk trends&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Fraud Detection&lt;/td&gt;
&lt;td&gt;GPS, IP tracking, device fingerprinting, and behavior analysis&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Phase 1 – Building a Secure &amp;amp; Reliable Foundation
&lt;/h2&gt;

&lt;p&gt;In the first phase of our project, we focused heavily on trust, verification, and fraud prevention, which are critical for any insurance system.&lt;/p&gt;




&lt;h2&gt;
  
  
  Adversarial Defense &amp;amp; Anti-Spoofing
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" alt="Flowchart" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;DeliverGuard AI implements a multi-layer fraud detection system that validates user activity using location, device, network, and behavioral signals. Each feature is designed to detect a specific type of fraud and contribute to a unified risk score.&lt;/p&gt;




&lt;h2&gt;
  
  
  Detection Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. GPS Verification System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can spoof GPS using fake location apps, making it appear they are working when they are not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Continuously validate location consistency instead of trusting a single GPS point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect GPS coordinates periodically (every few seconds)
&lt;/li&gt;
&lt;li&gt;Store previous and current locations
&lt;/li&gt;
&lt;li&gt;Calculate distance between points
&lt;/li&gt;
&lt;li&gt;Detect abnormal jumps (e.g., 100 km in seconds)
&lt;/li&gt;
&lt;li&gt;Flag inconsistent movement
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;navigator.geolocation&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  2. IP Address Verification
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
User’s network location may not match their physical location.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cross-check IP-based location with GPS coordinates.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Extract IP address from request
&lt;/li&gt;
&lt;li&gt;Use IP geolocation API to get location
&lt;/li&gt;
&lt;li&gt;Compare IP location with GPS location
&lt;/li&gt;
&lt;li&gt;Calculate distance mismatch
&lt;/li&gt;
&lt;li&gt;Flag large inconsistencies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipapi / ipinfo
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  3. VPN Detection Mechanism
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can hide their real location using VPN or proxy services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect anonymized IP addresses and unusual location switching.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Check IP against VPN/proxy database
&lt;/li&gt;
&lt;li&gt;Detect rapid country switching
&lt;/li&gt;
&lt;li&gt;Identify high-risk IP patterns
&lt;/li&gt;
&lt;li&gt;Mark suspicious sessions
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipqualityscore
&lt;/li&gt;
&lt;li&gt;proxycheck.io
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  4. Device &amp;amp; Emulator Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters create multiple fake accounts using emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Generate unique device fingerprint and detect emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect device information (OS, browser, screen)
&lt;/li&gt;
&lt;li&gt;Generate hashed deviceId (SHA-256)
&lt;/li&gt;
&lt;li&gt;Detect emulator signatures
&lt;/li&gt;
&lt;li&gt;Track multiple accounts on same device
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FingerprintJS
&lt;/li&gt;
&lt;li&gt;Crypto hashing
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  5. Movement &amp;amp; Speed Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake GPS creates unrealistic movement patterns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze speed and movement consistency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Calculate distance between GPS points
&lt;/li&gt;
&lt;li&gt;Compute speed = distance / time
&lt;/li&gt;
&lt;li&gt;Detect:

&lt;ul&gt;
&lt;li&gt;No movement
&lt;/li&gt;
&lt;li&gt;Unrealistic speed (&amp;gt;120 km/h)
&lt;/li&gt;
&lt;li&gt;Sudden jumps
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Flag suspicious behavior
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  6. Route Validation System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake routes do not follow real-world roads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Compare user path with actual map routes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track sequence of GPS points
&lt;/li&gt;
&lt;li&gt;Map points onto real road network
&lt;/li&gt;
&lt;li&gt;Detect invalid paths (through buildings/water)
&lt;/li&gt;
&lt;li&gt;Validate route realism
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OpenStreetMap
&lt;/li&gt;
&lt;li&gt;Leaflet
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  7. Log-Based Monitoring System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraud patterns cannot be identified from a single event.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Maintain historical logs for analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store all tracking data (GPS, IP, device, timestamp)
&lt;/li&gt;
&lt;li&gt;Analyze repeated anomalies
&lt;/li&gt;
&lt;li&gt;Detect long-term suspicious patterns
&lt;/li&gt;
&lt;li&gt;Flag repeat offenders
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB
&lt;/li&gt;
&lt;li&gt;Logging system&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Intelligence Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  8. Spatio-Temporal Correlation
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters operate in coordinated groups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze location and time relationships.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Compare multiple users’ activity
&lt;/li&gt;
&lt;li&gt;Identify same location + same time patterns
&lt;/li&gt;
&lt;li&gt;Detect clustering behavior
&lt;/li&gt;
&lt;li&gt;Flag coordinated activity
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB aggregation
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  9. Shared IP &amp;amp; Device Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
One attacker controls multiple accounts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect shared device and IP usage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store deviceId and IP for each user
&lt;/li&gt;
&lt;li&gt;Group users with same identifiers
&lt;/li&gt;
&lt;li&gt;Detect abnormal sharing
&lt;/li&gt;
&lt;li&gt;Flag accounts for investigation
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Backend grouping logic
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  10. Fraud Ring Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Large-scale fraud networks operate together.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Identify clusters of users with similar behavior.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Analyze user patterns (routes, timing, devices)
&lt;/li&gt;
&lt;li&gt;Detect repeated similarities across accounts
&lt;/li&gt;
&lt;li&gt;Build clusters of related users
&lt;/li&gt;
&lt;li&gt;Identify fraud networks
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Graph-based analysis
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  11. Behavioral Pattern Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake users behave unnaturally compared to real users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze behavioral patterns over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track delivery frequency and timing
&lt;/li&gt;
&lt;li&gt;Identify unusual consistency
&lt;/li&gt;
&lt;li&gt;Detect robotic or scripted behavior
&lt;/li&gt;
&lt;li&gt;Flag anomalies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Statistical models
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  12. Multi-Signal Fusion Engine
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Single signal is unreliable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Combine all signals for stronger detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect signals (GPS, IP, device, behavior)
&lt;/li&gt;
&lt;li&gt;Assign weight to each signal
&lt;/li&gt;
&lt;li&gt;Combine into unified decision
&lt;/li&gt;
&lt;li&gt;Detect fraud based on multiple indicators
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based engine
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Risk Scoring System
&lt;/h2&gt;

&lt;h3&gt;
  
  
  13. Dynamic Risk Scoring
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Not all anomalies indicate fraud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Assign weighted risk scores.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Each anomaly adds risk points
&lt;/li&gt;
&lt;li&gt;Combine scores from all modules
&lt;/li&gt;
&lt;li&gt;Calculate final risk score
&lt;/li&gt;
&lt;li&gt;Classify user risk level
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based scoring system
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Insight
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;DeliverGuard AI combines detection, intelligence, and risk scoring layers to build a robust, real-time fraud prevention system that ensures security while minimizing false positives. &lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  OCR-Based Income Verification
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" alt="OCR" width="800" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To ensure accurate and automated income verification, DeliverGuard AI uses OCR (Optical Character Recognition) powered by EasyOCR.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why OCR is Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Eliminates manual verification of income proof
&lt;/li&gt;
&lt;li&gt;Automatically extracts data from transaction screenshots
&lt;/li&gt;
&lt;li&gt;Speeds up onboarding and claim validation
&lt;/li&gt;
&lt;li&gt;Reduces human errors and improves efficiency
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How It Works
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;The user uploads a screenshot of their transaction or earnings proof
&lt;/li&gt;
&lt;li&gt;The system uses EasyOCR to extract text from the image
&lt;/li&gt;
&lt;li&gt;Key details such as:

&lt;ul&gt;
&lt;li&gt;Platform name (e.g., Zomato, Swiggy)
&lt;/li&gt;
&lt;li&gt;Transaction amount
&lt;/li&gt;
&lt;li&gt;Date and time
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extracted data is processed and structured in the system&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Example:&lt;br&gt;&lt;br&gt;
Input:&lt;br&gt;
INR 3139 credited via ZOMATO&lt;br&gt;&lt;br&gt;
Output:&lt;br&gt;
Premium Rate : 8% (Standard Plan)&lt;br&gt;Insurance Premium : ₹251&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Fraud Prevention Mechanism
&lt;/h3&gt;

&lt;p&gt;OCR alone cannot verify whether an image is original or edited. Therefore, DeliverGuard AI combines OCR with multiple validation techniques:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identifies inconsistent formatting in manipulated screenshots
&lt;/li&gt;
&lt;li&gt;Flags duplicate or reused images
&lt;/li&gt;
&lt;li&gt;Uses metadata analysis as an additional validation layer
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cross-Verification with Delivery Platforms
&lt;/h3&gt;

&lt;p&gt;To enhance reliability, the system can cross-verify user income with Zomato delivery platforms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The extracted income data is compared with actual earnings records
&lt;/li&gt;
&lt;li&gt;Ensures that the submitted screenshot matches real transaction history
&lt;/li&gt;
&lt;li&gt;Prevents fraud caused by edited or AI-generated screenshots
&lt;/li&gt;
&lt;li&gt;Acts as a strong validation layer beyond OCR
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Since OCR only reads visible text, cross-verification ensures authenticity by validating the data from trusted sources.&lt;br&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Workflow
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" alt="OCR Workflow" width="800" height="436"&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Technology Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;EasyOCR – for text extraction from images
&lt;/li&gt;
&lt;li&gt;Image preprocessing – to improve OCR accuracy
&lt;/li&gt;
&lt;li&gt;Backend validation logic – for data matching
&lt;/li&gt;
&lt;li&gt;Platform verification (Zomato integration) – for authenticity checks
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  System Workflow
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Collect user data
&lt;/li&gt;
&lt;li&gt;Validate inputs
&lt;/li&gt;
&lt;li&gt;Analyze patterns
&lt;/li&gt;
&lt;li&gt;Assign risk score
&lt;/li&gt;
&lt;li&gt;Trigger actions
&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  Phase 1 Outcome
&lt;/h3&gt;

&lt;p&gt;By the end of Phase 1, we successfully built:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A robust fraud detection system&lt;/li&gt;
&lt;li&gt;A secure onboarding and verification pipeline &lt;/li&gt;
&lt;li&gt;A trust-first foundation for insurance processing
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This allowed us to confidently move to the next stage.&lt;/p&gt;




&lt;h2&gt;
  
  
  Phase 2 – Expanding Intelligence &amp;amp; Insurance Logic
&lt;/h2&gt;

&lt;p&gt;After establishing a strong foundation, we progressed to Phase 2, where we focused on making the system smarter and more user-centric.&lt;/p&gt;




&lt;h2&gt;
  
  
  Insurance Plans
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" alt="Insurance plan" width="800" height="396"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Plan&lt;/th&gt;
&lt;th&gt;Premium&lt;/th&gt;
&lt;th&gt;Hour Threshold&lt;/th&gt;
&lt;th&gt;Max Weekly Payout&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Basic&lt;/td&gt;
&lt;td&gt;5%&lt;/td&gt;
&lt;td&gt;8 hrs&lt;/td&gt;
&lt;td&gt;₹2000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Standard&lt;/td&gt;
&lt;td&gt;8%&lt;/td&gt;
&lt;td&gt;6 hrs&lt;/td&gt;
&lt;td&gt;₹4000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Premium&lt;/td&gt;
&lt;td&gt;10%&lt;/td&gt;
&lt;td&gt;4 hrs&lt;/td&gt;
&lt;td&gt;₹8000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Premium Calculation
&lt;/h2&gt;

&lt;p&gt;Weekly Premium = Weekly Income × Plan %&lt;/p&gt;

&lt;p&gt;Example (Weekly Income = ₹7000):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Basic → ₹350
&lt;/li&gt;
&lt;li&gt;Standard → ₹560
&lt;/li&gt;
&lt;li&gt;Premium → ₹700
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Payout Calculation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Hourly Income
&lt;/h3&gt;

&lt;p&gt;Weekly Income ÷ 42 (6 hours/day × 7 days)&lt;/p&gt;

&lt;h3&gt;
  
  
  Claim Types
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Day Claim → 6 × Hourly Income
&lt;/li&gt;
&lt;li&gt;Hour Claim → Threshold × Hourly Income
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Final Rule
&lt;/h3&gt;

&lt;p&gt;Final Payout = min(calculated amount, plan limit)&lt;/p&gt;




&lt;h2&gt;
  
  
  Disruption Detection
&lt;/h2&gt;

&lt;p&gt;The system uses real-time APIs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Weather API → Rain / flood
&lt;/li&gt;
&lt;li&gt;AQI API → Pollution
&lt;/li&gt;
&lt;li&gt;Traffic API → Congestion
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Trigger conditions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rainfall ≥ 50 mm/hr
&lt;/li&gt;
&lt;li&gt;AQI ≥ 300
&lt;/li&gt;
&lt;li&gt;Traffic ≥ defined threshold
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Loyalty Rewards
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" alt="Badges" width="800" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Levels
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Silver → 3 months
&lt;/li&gt;
&lt;li&gt;Gold → 6 months
&lt;/li&gt;
&lt;li&gt;Diamond → 1 year
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Benefits
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fuel rewards
&lt;/li&gt;
&lt;li&gt;Premium discounts
&lt;/li&gt;
&lt;li&gt;Faster claim processing
&lt;/li&gt;
&lt;li&gt;Increased coverage
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Thought
&lt;/h2&gt;

&lt;p&gt;DeliverGuard AI is not just an insurance system — it is a smart protection layer for gig workers, ensuring they are supported even when they cannot work.&lt;/p&gt;

&lt;p&gt;By combining verification, intelligence, and automation, we are building a system that is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fair
&lt;/li&gt;
&lt;li&gt;Secure
&lt;/li&gt;
&lt;li&gt;Reliable
&lt;/li&gt;
&lt;li&gt;Worker-centric
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>hackathon</category>
      <category>machinelearning</category>
      <category>startup</category>
    </item>
    <item>
      <title>DeliverGuard AI – Building Trust in Micro-Insurance for Gig Workers</title>
      <dc:creator>RUKSHANA S CSE</dc:creator>
      <pubDate>Mon, 30 Mar 2026 18:09:30 +0000</pubDate>
      <link>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-525d</link>
      <guid>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-525d</guid>
      <description>&lt;p&gt;DeliverGuard AI is a parametric micro-insurance platform designed for delivery partners of Zomato.&lt;br&gt;&lt;br&gt;
It protects workers from income loss caused by external disruptions such as rain, traffic, extreme heat, and environmental conditions.&lt;/p&gt;

&lt;p&gt;The system uses AI monitoring, OCR verification, and fraud detection to ensure fair and automated payouts.&lt;/p&gt;




&lt;h2&gt;
  
  
  Problem Statement
&lt;/h2&gt;

&lt;p&gt;Delivery workers depend on daily or weekly earnings, but external factors such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Heavy rain&lt;/li&gt;
&lt;li&gt;Flood&lt;/li&gt;
&lt;li&gt;Traffic congestion
&lt;/li&gt;
&lt;li&gt;Extreme heat
&lt;/li&gt;
&lt;li&gt;Environmental disturbances
&lt;/li&gt;
&lt;li&gt;Curfew / strike
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;can reduce or completely stop their ability to work.&lt;/p&gt;

&lt;p&gt;Currently, there is no reliable system to compensate short-term income loss.&lt;/p&gt;




&lt;h2&gt;
  
  
  Deliverable Expectations and it's Solutions
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Expectations&lt;/th&gt;
&lt;th&gt;Solutions&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Onboarding&lt;/td&gt;
&lt;td&gt;OCR-based income extraction with simple user profiling&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Risk Profiling&lt;/td&gt;
&lt;td&gt;AI-powered analysis using weather, AQI, traffic, and behavioral data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Policy Creation&lt;/td&gt;
&lt;td&gt;Weekly income-based pricing with dynamic risk evaluation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Claim Triggering&lt;/td&gt;
&lt;td&gt;Automated detection of disruptions (rain, AQI, traffic)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Payout Processing&lt;/td&gt;
&lt;td&gt;Secure and instant bank transfers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Analytics Dashboard&lt;/td&gt;
&lt;td&gt;Real-time insights on claims, payouts, and risk trends&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Fraud Detection&lt;/td&gt;
&lt;td&gt;GPS, IP tracking, device fingerprinting, and behavior analysis&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Phase 1 – Building a Secure &amp;amp; Reliable Foundation
&lt;/h2&gt;

&lt;p&gt;In the first phase of our project, we focused heavily on trust, verification, and fraud prevention, which are critical for any insurance system.&lt;/p&gt;




&lt;h2&gt;
  
  
  Adversarial Defense &amp;amp; Anti-Spoofing
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" alt="Flowchart" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;DeliverGuard AI implements a multi-layer fraud detection system that validates user activity using location, device, network, and behavioral signals. Each feature is designed to detect a specific type of fraud and contribute to a unified risk score.&lt;/p&gt;




&lt;h2&gt;
  
  
  Detection Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. GPS Verification System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can spoof GPS using fake location apps, making it appear they are working when they are not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Continuously validate location consistency instead of trusting a single GPS point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect GPS coordinates periodically (every few seconds)
&lt;/li&gt;
&lt;li&gt;Store previous and current locations
&lt;/li&gt;
&lt;li&gt;Calculate distance between points
&lt;/li&gt;
&lt;li&gt;Detect abnormal jumps (e.g., 100 km in seconds)
&lt;/li&gt;
&lt;li&gt;Flag inconsistent movement
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;navigator.geolocation&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  2. IP Address Verification
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
User’s network location may not match their physical location.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cross-check IP-based location with GPS coordinates.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Extract IP address from request
&lt;/li&gt;
&lt;li&gt;Use IP geolocation API to get location
&lt;/li&gt;
&lt;li&gt;Compare IP location with GPS location
&lt;/li&gt;
&lt;li&gt;Calculate distance mismatch
&lt;/li&gt;
&lt;li&gt;Flag large inconsistencies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipapi / ipinfo
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  3. VPN Detection Mechanism
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can hide their real location using VPN or proxy services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect anonymized IP addresses and unusual location switching.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Check IP against VPN/proxy database
&lt;/li&gt;
&lt;li&gt;Detect rapid country switching
&lt;/li&gt;
&lt;li&gt;Identify high-risk IP patterns
&lt;/li&gt;
&lt;li&gt;Mark suspicious sessions
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipqualityscore
&lt;/li&gt;
&lt;li&gt;proxycheck.io
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  4. Device &amp;amp; Emulator Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters create multiple fake accounts using emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Generate unique device fingerprint and detect emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect device information (OS, browser, screen)
&lt;/li&gt;
&lt;li&gt;Generate hashed deviceId (SHA-256)
&lt;/li&gt;
&lt;li&gt;Detect emulator signatures
&lt;/li&gt;
&lt;li&gt;Track multiple accounts on same device
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FingerprintJS
&lt;/li&gt;
&lt;li&gt;Crypto hashing
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  5. Movement &amp;amp; Speed Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake GPS creates unrealistic movement patterns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze speed and movement consistency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Calculate distance between GPS points
&lt;/li&gt;
&lt;li&gt;Compute speed = distance / time
&lt;/li&gt;
&lt;li&gt;Detect:

&lt;ul&gt;
&lt;li&gt;No movement
&lt;/li&gt;
&lt;li&gt;Unrealistic speed (&amp;gt;120 km/h)
&lt;/li&gt;
&lt;li&gt;Sudden jumps
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Flag suspicious behavior
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  6. Route Validation System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake routes do not follow real-world roads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Compare user path with actual map routes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track sequence of GPS points
&lt;/li&gt;
&lt;li&gt;Map points onto real road network
&lt;/li&gt;
&lt;li&gt;Detect invalid paths (through buildings/water)
&lt;/li&gt;
&lt;li&gt;Validate route realism
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OpenStreetMap
&lt;/li&gt;
&lt;li&gt;Leaflet
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  7. Log-Based Monitoring System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraud patterns cannot be identified from a single event.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Maintain historical logs for analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store all tracking data (GPS, IP, device, timestamp)
&lt;/li&gt;
&lt;li&gt;Analyze repeated anomalies
&lt;/li&gt;
&lt;li&gt;Detect long-term suspicious patterns
&lt;/li&gt;
&lt;li&gt;Flag repeat offenders
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB
&lt;/li&gt;
&lt;li&gt;Logging system&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Intelligence Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  8. Spatio-Temporal Correlation
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters operate in coordinated groups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze location and time relationships.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Compare multiple users’ activity
&lt;/li&gt;
&lt;li&gt;Identify same location + same time patterns
&lt;/li&gt;
&lt;li&gt;Detect clustering behavior
&lt;/li&gt;
&lt;li&gt;Flag coordinated activity
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB aggregation
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  9. Shared IP &amp;amp; Device Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
One attacker controls multiple accounts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect shared device and IP usage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store deviceId and IP for each user
&lt;/li&gt;
&lt;li&gt;Group users with same identifiers
&lt;/li&gt;
&lt;li&gt;Detect abnormal sharing
&lt;/li&gt;
&lt;li&gt;Flag accounts for investigation
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Backend grouping logic
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  10. Fraud Ring Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Large-scale fraud networks operate together.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Identify clusters of users with similar behavior.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Analyze user patterns (routes, timing, devices)
&lt;/li&gt;
&lt;li&gt;Detect repeated similarities across accounts
&lt;/li&gt;
&lt;li&gt;Build clusters of related users
&lt;/li&gt;
&lt;li&gt;Identify fraud networks
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Graph-based analysis
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  11. Behavioral Pattern Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake users behave unnaturally compared to real users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze behavioral patterns over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track delivery frequency and timing
&lt;/li&gt;
&lt;li&gt;Identify unusual consistency
&lt;/li&gt;
&lt;li&gt;Detect robotic or scripted behavior
&lt;/li&gt;
&lt;li&gt;Flag anomalies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Statistical models
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  12. Multi-Signal Fusion Engine
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Single signal is unreliable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Combine all signals for stronger detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect signals (GPS, IP, device, behavior)
&lt;/li&gt;
&lt;li&gt;Assign weight to each signal
&lt;/li&gt;
&lt;li&gt;Combine into unified decision
&lt;/li&gt;
&lt;li&gt;Detect fraud based on multiple indicators
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based engine
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Risk Scoring System
&lt;/h2&gt;

&lt;h3&gt;
  
  
  13. Dynamic Risk Scoring
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Not all anomalies indicate fraud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Assign weighted risk scores.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Each anomaly adds risk points
&lt;/li&gt;
&lt;li&gt;Combine scores from all modules
&lt;/li&gt;
&lt;li&gt;Calculate final risk score
&lt;/li&gt;
&lt;li&gt;Classify user risk level
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based scoring system
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Insight
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;DeliverGuard AI combines detection, intelligence, and risk scoring layers to build a robust, real-time fraud prevention system that ensures security while minimizing false positives. &lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  OCR-Based Income Verification
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" alt="OCR" width="800" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To ensure accurate and automated income verification, DeliverGuard AI uses OCR (Optical Character Recognition) powered by EasyOCR.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why OCR is Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Eliminates manual verification of income proof
&lt;/li&gt;
&lt;li&gt;Automatically extracts data from transaction screenshots
&lt;/li&gt;
&lt;li&gt;Speeds up onboarding and claim validation
&lt;/li&gt;
&lt;li&gt;Reduces human errors and improves efficiency
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How It Works
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;The user uploads a screenshot of their transaction or earnings proof
&lt;/li&gt;
&lt;li&gt;The system uses EasyOCR to extract text from the image
&lt;/li&gt;
&lt;li&gt;Key details such as:

&lt;ul&gt;
&lt;li&gt;Platform name (e.g., Zomato, Swiggy)
&lt;/li&gt;
&lt;li&gt;Transaction amount
&lt;/li&gt;
&lt;li&gt;Date and time
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extracted data is processed and structured in the system&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Example:&lt;br&gt;&lt;br&gt;
Input:&lt;br&gt;
INR 3139 credited via ZOMATO&lt;br&gt;&lt;br&gt;
Output:&lt;br&gt;
Premium Rate : 8% (Standard Plan)&lt;br&gt;Insurance Premium : ₹251&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Fraud Prevention Mechanism
&lt;/h3&gt;

&lt;p&gt;OCR alone cannot verify whether an image is original or edited. Therefore, DeliverGuard AI combines OCR with multiple validation techniques:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identifies inconsistent formatting in manipulated screenshots
&lt;/li&gt;
&lt;li&gt;Flags duplicate or reused images
&lt;/li&gt;
&lt;li&gt;Uses metadata analysis as an additional validation layer
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cross-Verification with Delivery Platforms
&lt;/h3&gt;

&lt;p&gt;To enhance reliability, the system can cross-verify user income with Zomato delivery platforms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The extracted income data is compared with actual earnings records
&lt;/li&gt;
&lt;li&gt;Ensures that the submitted screenshot matches real transaction history
&lt;/li&gt;
&lt;li&gt;Prevents fraud caused by edited or AI-generated screenshots
&lt;/li&gt;
&lt;li&gt;Acts as a strong validation layer beyond OCR
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Since OCR only reads visible text, cross-verification ensures authenticity by validating the data from trusted sources.&lt;br&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Workflow
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" alt="OCR Workflow" width="800" height="436"&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Technology Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;EasyOCR – for text extraction from images
&lt;/li&gt;
&lt;li&gt;Image preprocessing – to improve OCR accuracy
&lt;/li&gt;
&lt;li&gt;Backend validation logic – for data matching
&lt;/li&gt;
&lt;li&gt;Platform verification (Zomato integration) – for authenticity checks
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  System Workflow
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Collect user data
&lt;/li&gt;
&lt;li&gt;Validate inputs
&lt;/li&gt;
&lt;li&gt;Analyze patterns
&lt;/li&gt;
&lt;li&gt;Assign risk score
&lt;/li&gt;
&lt;li&gt;Trigger actions
&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  Phase 1 Outcome
&lt;/h3&gt;

&lt;p&gt;By the end of Phase 1, we successfully built:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A robust fraud detection system&lt;/li&gt;
&lt;li&gt;A secure onboarding and verification pipeline &lt;/li&gt;
&lt;li&gt;A trust-first foundation for insurance processing
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This allowed us to confidently move to the next stage.&lt;/p&gt;




&lt;h2&gt;
  
  
  Phase 2 – Expanding Intelligence &amp;amp; Insurance Logic
&lt;/h2&gt;

&lt;p&gt;After establishing a strong foundation, we progressed to Phase 2, where we focused on making the system smarter and more user-centric.&lt;/p&gt;




&lt;h2&gt;
  
  
  Insurance Plans
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" alt="Insurance plan" width="800" height="396"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Plan&lt;/th&gt;
&lt;th&gt;Premium&lt;/th&gt;
&lt;th&gt;Hour Threshold&lt;/th&gt;
&lt;th&gt;Max Weekly Payout&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Basic&lt;/td&gt;
&lt;td&gt;5%&lt;/td&gt;
&lt;td&gt;8 hrs&lt;/td&gt;
&lt;td&gt;₹2000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Standard&lt;/td&gt;
&lt;td&gt;8%&lt;/td&gt;
&lt;td&gt;6 hrs&lt;/td&gt;
&lt;td&gt;₹4000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Premium&lt;/td&gt;
&lt;td&gt;10%&lt;/td&gt;
&lt;td&gt;4 hrs&lt;/td&gt;
&lt;td&gt;₹8000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Premium Calculation
&lt;/h2&gt;

&lt;p&gt;Weekly Premium = Weekly Income × Plan %&lt;/p&gt;

&lt;p&gt;Example (Weekly Income = ₹7000):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Basic → ₹350
&lt;/li&gt;
&lt;li&gt;Standard → ₹560
&lt;/li&gt;
&lt;li&gt;Premium → ₹700
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Payout Calculation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Hourly Income
&lt;/h3&gt;

&lt;p&gt;Weekly Income ÷ 42 (6 hours/day × 7 days)&lt;/p&gt;

&lt;h3&gt;
  
  
  Claim Types
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Day Claim → 6 × Hourly Income
&lt;/li&gt;
&lt;li&gt;Hour Claim → Threshold × Hourly Income
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Final Rule
&lt;/h3&gt;

&lt;p&gt;Final Payout = min(calculated amount, plan limit)&lt;/p&gt;




&lt;h2&gt;
  
  
  Disruption Detection
&lt;/h2&gt;

&lt;p&gt;The system uses real-time APIs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Weather API → Rain / flood
&lt;/li&gt;
&lt;li&gt;AQI API → Pollution
&lt;/li&gt;
&lt;li&gt;Traffic API → Congestion
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Trigger conditions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rainfall ≥ 50 mm/hr
&lt;/li&gt;
&lt;li&gt;AQI ≥ 300
&lt;/li&gt;
&lt;li&gt;Traffic ≥ defined threshold
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Loyalty Rewards
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" alt="Badges" width="800" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Levels
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Silver → 3 months
&lt;/li&gt;
&lt;li&gt;Gold → 6 months
&lt;/li&gt;
&lt;li&gt;Diamond → 1 year
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Benefits
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fuel rewards
&lt;/li&gt;
&lt;li&gt;Premium discounts
&lt;/li&gt;
&lt;li&gt;Faster claim processing
&lt;/li&gt;
&lt;li&gt;Increased coverage
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Thought
&lt;/h2&gt;

&lt;p&gt;DeliverGuard AI is not just an insurance system — it is a smart protection layer for gig workers, ensuring they are supported even when they cannot work.&lt;/p&gt;

&lt;p&gt;By combining verification, intelligence, and automation, we are building a system that is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fair
&lt;/li&gt;
&lt;li&gt;Secure
&lt;/li&gt;
&lt;li&gt;Reliable
&lt;/li&gt;
&lt;li&gt;Worker-centric
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>hackathon</category>
      <category>machinelearning</category>
      <category>startup</category>
    </item>
    <item>
      <title>DeliverGuard AI – Building Trust in Micro-Insurance for Gig Workers</title>
      <dc:creator>RUKSHANA S CSE</dc:creator>
      <pubDate>Mon, 30 Mar 2026 18:09:29 +0000</pubDate>
      <link>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-1ago</link>
      <guid>https://dev.to/rukshana_scse_b9329f0303/deliverguard-ai-building-trust-in-micro-insurance-for-gig-workers-1ago</guid>
      <description>&lt;p&gt;DeliverGuard AI is a parametric micro-insurance platform designed for delivery partners of Zomato.&lt;br&gt;&lt;br&gt;
It protects workers from income loss caused by external disruptions such as rain, traffic, extreme heat, and environmental conditions.&lt;/p&gt;

&lt;p&gt;The system uses AI monitoring, OCR verification, and fraud detection to ensure fair and automated payouts.&lt;/p&gt;




&lt;h2&gt;
  
  
  Problem Statement
&lt;/h2&gt;

&lt;p&gt;Delivery workers depend on daily or weekly earnings, but external factors such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Heavy rain&lt;/li&gt;
&lt;li&gt;Flood&lt;/li&gt;
&lt;li&gt;Traffic congestion
&lt;/li&gt;
&lt;li&gt;Extreme heat
&lt;/li&gt;
&lt;li&gt;Environmental disturbances
&lt;/li&gt;
&lt;li&gt;Curfew / strike
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;can reduce or completely stop their ability to work.&lt;/p&gt;

&lt;p&gt;Currently, there is no reliable system to compensate short-term income loss.&lt;/p&gt;




&lt;h2&gt;
  
  
  Deliverable Expectations and it's Solutions
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Expectations&lt;/th&gt;
&lt;th&gt;Solutions&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Onboarding&lt;/td&gt;
&lt;td&gt;OCR-based income extraction with simple user profiling&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Risk Profiling&lt;/td&gt;
&lt;td&gt;AI-powered analysis using weather, AQI, traffic, and behavioral data&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Policy Creation&lt;/td&gt;
&lt;td&gt;Weekly income-based pricing with dynamic risk evaluation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Claim Triggering&lt;/td&gt;
&lt;td&gt;Automated detection of disruptions (rain, AQI, traffic)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Payout Processing&lt;/td&gt;
&lt;td&gt;Secure and instant bank transfers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Analytics Dashboard&lt;/td&gt;
&lt;td&gt;Real-time insights on claims, payouts, and risk trends&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Fraud Detection&lt;/td&gt;
&lt;td&gt;GPS, IP tracking, device fingerprinting, and behavior analysis&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Phase 1 – Building a Secure &amp;amp; Reliable Foundation
&lt;/h2&gt;

&lt;p&gt;In the first phase of our project, we focused heavily on trust, verification, and fraud prevention, which are critical for any insurance system.&lt;/p&gt;




&lt;h2&gt;
  
  
  Adversarial Defense &amp;amp; Anti-Spoofing
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6if6o0wny3utueep5wts.jpeg" alt="Flowchart" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;DeliverGuard AI implements a multi-layer fraud detection system that validates user activity using location, device, network, and behavioral signals. Each feature is designed to detect a specific type of fraud and contribute to a unified risk score.&lt;/p&gt;




&lt;h2&gt;
  
  
  Detection Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. GPS Verification System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can spoof GPS using fake location apps, making it appear they are working when they are not.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Continuously validate location consistency instead of trusting a single GPS point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect GPS coordinates periodically (every few seconds)
&lt;/li&gt;
&lt;li&gt;Store previous and current locations
&lt;/li&gt;
&lt;li&gt;Calculate distance between points
&lt;/li&gt;
&lt;li&gt;Detect abnormal jumps (e.g., 100 km in seconds)
&lt;/li&gt;
&lt;li&gt;Flag inconsistent movement
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;navigator.geolocation&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  2. IP Address Verification
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
User’s network location may not match their physical location.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cross-check IP-based location with GPS coordinates.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Extract IP address from request
&lt;/li&gt;
&lt;li&gt;Use IP geolocation API to get location
&lt;/li&gt;
&lt;li&gt;Compare IP location with GPS location
&lt;/li&gt;
&lt;li&gt;Calculate distance mismatch
&lt;/li&gt;
&lt;li&gt;Flag large inconsistencies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipapi / ipinfo
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  3. VPN Detection Mechanism
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Users can hide their real location using VPN or proxy services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect anonymized IP addresses and unusual location switching.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Check IP against VPN/proxy database
&lt;/li&gt;
&lt;li&gt;Detect rapid country switching
&lt;/li&gt;
&lt;li&gt;Identify high-risk IP patterns
&lt;/li&gt;
&lt;li&gt;Mark suspicious sessions
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ipqualityscore
&lt;/li&gt;
&lt;li&gt;proxycheck.io
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  4. Device &amp;amp; Emulator Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters create multiple fake accounts using emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Generate unique device fingerprint and detect emulators.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect device information (OS, browser, screen)
&lt;/li&gt;
&lt;li&gt;Generate hashed deviceId (SHA-256)
&lt;/li&gt;
&lt;li&gt;Detect emulator signatures
&lt;/li&gt;
&lt;li&gt;Track multiple accounts on same device
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FingerprintJS
&lt;/li&gt;
&lt;li&gt;Crypto hashing
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  5. Movement &amp;amp; Speed Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake GPS creates unrealistic movement patterns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze speed and movement consistency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Calculate distance between GPS points
&lt;/li&gt;
&lt;li&gt;Compute speed = distance / time
&lt;/li&gt;
&lt;li&gt;Detect:

&lt;ul&gt;
&lt;li&gt;No movement
&lt;/li&gt;
&lt;li&gt;Unrealistic speed (&amp;gt;120 km/h)
&lt;/li&gt;
&lt;li&gt;Sudden jumps
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Flag suspicious behavior
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Haversine formula
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  6. Route Validation System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake routes do not follow real-world roads.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Compare user path with actual map routes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track sequence of GPS points
&lt;/li&gt;
&lt;li&gt;Map points onto real road network
&lt;/li&gt;
&lt;li&gt;Detect invalid paths (through buildings/water)
&lt;/li&gt;
&lt;li&gt;Validate route realism
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OpenStreetMap
&lt;/li&gt;
&lt;li&gt;Leaflet
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  7. Log-Based Monitoring System
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraud patterns cannot be identified from a single event.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Maintain historical logs for analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store all tracking data (GPS, IP, device, timestamp)
&lt;/li&gt;
&lt;li&gt;Analyze repeated anomalies
&lt;/li&gt;
&lt;li&gt;Detect long-term suspicious patterns
&lt;/li&gt;
&lt;li&gt;Flag repeat offenders
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB
&lt;/li&gt;
&lt;li&gt;Logging system&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Intelligence Layer
&lt;/h2&gt;

&lt;h3&gt;
  
  
  8. Spatio-Temporal Correlation
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fraudsters operate in coordinated groups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze location and time relationships.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Compare multiple users’ activity
&lt;/li&gt;
&lt;li&gt;Identify same location + same time patterns
&lt;/li&gt;
&lt;li&gt;Detect clustering behavior
&lt;/li&gt;
&lt;li&gt;Flag coordinated activity
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MongoDB aggregation
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  9. Shared IP &amp;amp; Device Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
One attacker controls multiple accounts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Detect shared device and IP usage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Store deviceId and IP for each user
&lt;/li&gt;
&lt;li&gt;Group users with same identifiers
&lt;/li&gt;
&lt;li&gt;Detect abnormal sharing
&lt;/li&gt;
&lt;li&gt;Flag accounts for investigation
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Backend grouping logic
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  10. Fraud Ring Detection
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Large-scale fraud networks operate together.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Identify clusters of users with similar behavior.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Analyze user patterns (routes, timing, devices)
&lt;/li&gt;
&lt;li&gt;Detect repeated similarities across accounts
&lt;/li&gt;
&lt;li&gt;Build clusters of related users
&lt;/li&gt;
&lt;li&gt;Identify fraud networks
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Graph-based analysis
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  11. Behavioral Pattern Analysis
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Fake users behave unnaturally compared to real users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Analyze behavioral patterns over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Track delivery frequency and timing
&lt;/li&gt;
&lt;li&gt;Identify unusual consistency
&lt;/li&gt;
&lt;li&gt;Detect robotic or scripted behavior
&lt;/li&gt;
&lt;li&gt;Flag anomalies
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Statistical models
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  12. Multi-Signal Fusion Engine
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Single signal is unreliable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Combine all signals for stronger detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Collect signals (GPS, IP, device, behavior)
&lt;/li&gt;
&lt;li&gt;Assign weight to each signal
&lt;/li&gt;
&lt;li&gt;Combine into unified decision
&lt;/li&gt;
&lt;li&gt;Detect fraud based on multiple indicators
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based engine
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Risk Scoring System
&lt;/h2&gt;

&lt;h3&gt;
  
  
  13. Dynamic Risk Scoring
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Problem:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Not all anomalies indicate fraud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Assign weighted risk scores.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How it Works:&lt;/strong&gt;  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Each anomaly adds risk points
&lt;/li&gt;
&lt;li&gt;Combine scores from all modules
&lt;/li&gt;
&lt;li&gt;Calculate final risk score
&lt;/li&gt;
&lt;li&gt;Classify user risk level
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Tech Stack:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rule-based scoring system
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Insight
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;DeliverGuard AI combines detection, intelligence, and risk scoring layers to build a robust, real-time fraud prevention system that ensures security while minimizing false positives. &lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  OCR-Based Income Verification
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhe6o2i4vvjxgifpz4ky8.jpeg" alt="OCR" width="800" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To ensure accurate and automated income verification, DeliverGuard AI uses OCR (Optical Character Recognition) powered by EasyOCR.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why OCR is Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Eliminates manual verification of income proof
&lt;/li&gt;
&lt;li&gt;Automatically extracts data from transaction screenshots
&lt;/li&gt;
&lt;li&gt;Speeds up onboarding and claim validation
&lt;/li&gt;
&lt;li&gt;Reduces human errors and improves efficiency
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  How It Works
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;The user uploads a screenshot of their transaction or earnings proof
&lt;/li&gt;
&lt;li&gt;The system uses EasyOCR to extract text from the image
&lt;/li&gt;
&lt;li&gt;Key details such as:

&lt;ul&gt;
&lt;li&gt;Platform name (e.g., Zomato, Swiggy)
&lt;/li&gt;
&lt;li&gt;Transaction amount
&lt;/li&gt;
&lt;li&gt;Date and time
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extracted data is processed and structured in the system&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Example:&lt;br&gt;&lt;br&gt;
Input:&lt;br&gt;
INR 3139 credited via ZOMATO&lt;br&gt;&lt;br&gt;
Output:&lt;br&gt;
Premium Rate : 8% (Standard Plan)&lt;br&gt;Insurance Premium : ₹251&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Fraud Prevention Mechanism
&lt;/h3&gt;

&lt;p&gt;OCR alone cannot verify whether an image is original or edited. Therefore, DeliverGuard AI combines OCR with multiple validation techniques:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identifies inconsistent formatting in manipulated screenshots
&lt;/li&gt;
&lt;li&gt;Flags duplicate or reused images
&lt;/li&gt;
&lt;li&gt;Uses metadata analysis as an additional validation layer
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Cross-Verification with Delivery Platforms
&lt;/h3&gt;

&lt;p&gt;To enhance reliability, the system can cross-verify user income with Zomato delivery platforms:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The extracted income data is compared with actual earnings records
&lt;/li&gt;
&lt;li&gt;Ensures that the submitted screenshot matches real transaction history
&lt;/li&gt;
&lt;li&gt;Prevents fraud caused by edited or AI-generated screenshots
&lt;/li&gt;
&lt;li&gt;Acts as a strong validation layer beyond OCR
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Since OCR only reads visible text, cross-verification ensures authenticity by validating the data from trusted sources.&lt;br&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Workflow
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffxaw8cls0b7ujiaengev.jpeg" alt="OCR Workflow" width="800" height="436"&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Technology Used
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;EasyOCR – for text extraction from images
&lt;/li&gt;
&lt;li&gt;Image preprocessing – to improve OCR accuracy
&lt;/li&gt;
&lt;li&gt;Backend validation logic – for data matching
&lt;/li&gt;
&lt;li&gt;Platform verification (Zomato integration) – for authenticity checks
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  System Workflow
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Collect user data
&lt;/li&gt;
&lt;li&gt;Validate inputs
&lt;/li&gt;
&lt;li&gt;Analyze patterns
&lt;/li&gt;
&lt;li&gt;Assign risk score
&lt;/li&gt;
&lt;li&gt;Trigger actions
&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  Phase 1 Outcome
&lt;/h3&gt;

&lt;p&gt;By the end of Phase 1, we successfully built:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A robust fraud detection system&lt;/li&gt;
&lt;li&gt;A secure onboarding and verification pipeline &lt;/li&gt;
&lt;li&gt;A trust-first foundation for insurance processing
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This allowed us to confidently move to the next stage.&lt;/p&gt;




&lt;h2&gt;
  
  
  Phase 2 – Expanding Intelligence &amp;amp; Insurance Logic
&lt;/h2&gt;

&lt;p&gt;After establishing a strong foundation, we progressed to Phase 2, where we focused on making the system smarter and more user-centric.&lt;/p&gt;




&lt;h2&gt;
  
  
  Insurance Plans
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fccgi95vsk6vpu9qyo5ra.png" alt="Insurance plan" width="800" height="396"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Plan&lt;/th&gt;
&lt;th&gt;Premium&lt;/th&gt;
&lt;th&gt;Hour Threshold&lt;/th&gt;
&lt;th&gt;Max Weekly Payout&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Basic&lt;/td&gt;
&lt;td&gt;5%&lt;/td&gt;
&lt;td&gt;8 hrs&lt;/td&gt;
&lt;td&gt;₹2000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Standard&lt;/td&gt;
&lt;td&gt;8%&lt;/td&gt;
&lt;td&gt;6 hrs&lt;/td&gt;
&lt;td&gt;₹4000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Premium&lt;/td&gt;
&lt;td&gt;10%&lt;/td&gt;
&lt;td&gt;4 hrs&lt;/td&gt;
&lt;td&gt;₹8000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Premium Calculation
&lt;/h2&gt;

&lt;p&gt;Weekly Premium = Weekly Income × Plan %&lt;/p&gt;

&lt;p&gt;Example (Weekly Income = ₹7000):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Basic → ₹350
&lt;/li&gt;
&lt;li&gt;Standard → ₹560
&lt;/li&gt;
&lt;li&gt;Premium → ₹700
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Payout Calculation
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Hourly Income
&lt;/h3&gt;

&lt;p&gt;Weekly Income ÷ 42 (6 hours/day × 7 days)&lt;/p&gt;

&lt;h3&gt;
  
  
  Claim Types
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Day Claim → 6 × Hourly Income
&lt;/li&gt;
&lt;li&gt;Hour Claim → Threshold × Hourly Income
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Final Rule
&lt;/h3&gt;

&lt;p&gt;Final Payout = min(calculated amount, plan limit)&lt;/p&gt;




&lt;h2&gt;
  
  
  Disruption Detection
&lt;/h2&gt;

&lt;p&gt;The system uses real-time APIs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Weather API → Rain / flood
&lt;/li&gt;
&lt;li&gt;AQI API → Pollution
&lt;/li&gt;
&lt;li&gt;Traffic API → Congestion
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Trigger conditions:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Rainfall ≥ 50 mm/hr
&lt;/li&gt;
&lt;li&gt;AQI ≥ 300
&lt;/li&gt;
&lt;li&gt;Traffic ≥ defined threshold
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Loyalty Rewards
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkkph4x8tgdgph0ellq6.png" alt="Badges" width="800" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Levels
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Silver → 3 months
&lt;/li&gt;
&lt;li&gt;Gold → 6 months
&lt;/li&gt;
&lt;li&gt;Diamond → 1 year
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Benefits
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fuel rewards
&lt;/li&gt;
&lt;li&gt;Premium discounts
&lt;/li&gt;
&lt;li&gt;Faster claim processing
&lt;/li&gt;
&lt;li&gt;Increased coverage
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Final Thought
&lt;/h2&gt;

&lt;p&gt;DeliverGuard AI is not just an insurance system — it is a smart protection layer for gig workers, ensuring they are supported even when they cannot work.&lt;/p&gt;

&lt;p&gt;By combining verification, intelligence, and automation, we are building a system that is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fair
&lt;/li&gt;
&lt;li&gt;Secure
&lt;/li&gt;
&lt;li&gt;Reliable
&lt;/li&gt;
&lt;li&gt;Worker-centric
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>hackathon</category>
      <category>machinelearning</category>
      <category>startup</category>
    </item>
    <item>
      <title>Protecting the Gig Workforce: A Smarter Approach to Micro-Insurance</title>
      <dc:creator>RUKSHANA S CSE</dc:creator>
      <pubDate>Mon, 16 Mar 2026 18:20:52 +0000</pubDate>
      <link>https://dev.to/rukshana_scse_b9329f0303/protecting-the-gig-workforce-a-smarter-approach-to-micro-insurance-5f2j</link>
      <guid>https://dev.to/rukshana_scse_b9329f0303/protecting-the-gig-workforce-a-smarter-approach-to-micro-insurance-5f2j</guid>
      <description>&lt;p&gt;&lt;em&gt;DEVTrails 2026 | InsurTech | Social Impact&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Unexpected events reveal how fragile financial security can be.”&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  A Moment That Changes the Day
&lt;/h2&gt;

&lt;p&gt;Picture a delivery partner working across the city. Suddenly, heavy rain starts pouring, roads begin to flood, and traffic slows down everywhere.&lt;/p&gt;

&lt;p&gt;For most people, this might simply mean ordering food and waiting indoors.&lt;/p&gt;

&lt;p&gt;But for the delivery worker on the road, the situation becomes much more serious.&lt;/p&gt;

&lt;p&gt;They must decide whether to continue working in unsafe conditions or stop working and lose a portion of their daily income.&lt;/p&gt;

&lt;p&gt;This situation represents a challenge faced by many gig workers every day.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Challenge in the Gig Economy
&lt;/h2&gt;

&lt;p&gt;The gig economy has grown rapidly, especially in sectors such as food delivery and logistics.&lt;/p&gt;

&lt;p&gt;However, many workers in this sector do not have the same financial protections that traditional employees receive.&lt;/p&gt;

&lt;p&gt;External disruptions such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;extreme weather conditions&lt;/li&gt;
&lt;li&gt;heavy traffic congestion&lt;/li&gt;
&lt;li&gt;public disturbances&lt;/li&gt;
&lt;li&gt;environmental hazards&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;can immediately reduce their ability to work and earn.&lt;/p&gt;

&lt;p&gt;Even losing a few hours of work can significantly impact weekly income.&lt;/p&gt;




&lt;h2&gt;
  
  
  Rethinking Financial Protection
&lt;/h2&gt;

&lt;p&gt;While exploring solutions during the DEVTrails hackathon, we started thinking about how technology could help address this issue.&lt;/p&gt;

&lt;p&gt;Instead of creating another typical application, the goal was to design a system that could act as a financial safety layer for gig workers when unexpected disruptions occur.&lt;/p&gt;

&lt;p&gt;The idea was simple: create a system that automatically detects disruptions and compensates workers fairly when their work is affected.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Concept
&lt;/h2&gt;

&lt;p&gt;The platform focuses on parametric micro-insurance for delivery partners.&lt;/p&gt;

&lt;p&gt;Rather than requiring manual claims, the system monitors real-world conditions and determines when workers are unable to complete deliveries.&lt;/p&gt;

&lt;p&gt;When disruptions are detected, compensation is calculated based on previous income patterns.&lt;/p&gt;

&lt;p&gt;This approach helps ensure faster payouts and reduces the complexity of traditional insurance processes.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fczabt56mft1lh9r9c5v7.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fczabt56mft1lh9r9c5v7.jpeg" alt=" " width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How the Platform Works
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Worker Profile
&lt;/h3&gt;

&lt;p&gt;Delivery partners first provide information such as their work zones, typical working hours, and weekly income.&lt;/p&gt;

&lt;p&gt;This data helps estimate potential earnings and calculate fair compensation.&lt;/p&gt;




&lt;h3&gt;
  
  
  Insurance Plans
&lt;/h3&gt;

&lt;p&gt;The platform offers multiple coverage plans designed around workers’ income levels.&lt;/p&gt;

&lt;p&gt;Each plan adjusts parameters such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;premium percentage&lt;/li&gt;
&lt;li&gt;claim thresholds&lt;/li&gt;
&lt;li&gt;maximum payout limits&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;while keeping the coverage events consistent across plans.&lt;/p&gt;




&lt;h3&gt;
  
  
  Monitoring External Conditions
&lt;/h3&gt;

&lt;p&gt;The system continuously monitors environmental and urban factors that may affect deliveries.&lt;/p&gt;

&lt;p&gt;Examples include weather conditions, traffic congestion, and other disruptions that can limit a worker’s ability to complete orders.&lt;/p&gt;




&lt;h3&gt;
  
  
  Automatic Claim Calculation
&lt;/h3&gt;

&lt;p&gt;When a disruption affects working hours, the system calculates compensation using a transparent formula based on the worker’s recent income history.&lt;/p&gt;

&lt;p&gt;This removes the need for complex claim submissions.&lt;/p&gt;




&lt;h3&gt;
  
  
  Fast Payout Processing
&lt;/h3&gt;

&lt;p&gt;Once the disruption is validated, payouts are processed and transferred to the worker through the platform’s payment system.&lt;/p&gt;

&lt;p&gt;This ensures workers receive support quickly during unexpected interruptions.&lt;/p&gt;




&lt;h2&gt;
  
  
  Encouraging Consistency
&lt;/h2&gt;

&lt;p&gt;The system can also include reward mechanisms for workers who consistently participate in the program.&lt;/p&gt;

&lt;p&gt;Workers who maintain regular contributions without filing claims over long periods can receive benefits such as improved coverage or reduced premiums.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why This Approach Matters
&lt;/h2&gt;

&lt;p&gt;The gig economy continues to expand, but financial protections for gig workers have not always evolved at the same pace.&lt;/p&gt;

&lt;p&gt;By combining real-time monitoring, automated claim logic, and simplified insurance structures, technology can create more accessible protection systems for workers who rely on daily earnings.&lt;/p&gt;

&lt;p&gt;Solutions like this demonstrate how digital tools can support workers and make financial protection more practical for modern work environments.&lt;/p&gt;




&lt;h2&gt;
  
  
  Looking Forward
&lt;/h2&gt;

&lt;p&gt;Innovations in data analytics, automation, and digital platforms make it possible to rethink how insurance works for emerging economies.&lt;/p&gt;

&lt;p&gt;Designing systems that protect workers from sudden disruptions is one step toward building a more resilient gig economy.&lt;/p&gt;

</description>
      <category>career</category>
      <category>discuss</category>
      <category>startup</category>
    </item>
  </channel>
</rss>
