13th week of 2015 patent applcation highlights part 63 |
Patent application number | Title | Published |
20150088716 | ACTIVITY HISTORY FOR A FINANCIAL AND SOCIAL MANAGEMENT SYSTEM - Embodiments of the invention comprise systems, computer program products, and methods for a financial and social management system that provides improved tracking and management related to how, where, when, and with whom a user enters into activities. The financial and social management system captures activity information and images from various sources of information, including but not limited to social networking accounts, e-receipts, location determination devices, and the like, and associates the activity information and images with the activities. The financial and social management system identifies activity history for a location or time period in the past, and displays the activities, activity information, and images for the location or time period in the in past in an activity history interface. At least a portion of the activity history may be shared with other users, and offers may be shared based on the activity history. | 2015-03-26 |
20150088717 | LINKING USERS AND TRANSACTIONS THROUGH ACTIVITY INFORMATION IN A FINANCIAL AND SOCIAL MANAGEMENT SYSTEM - Embodiments of the invention comprise systems, computer program products, and methods for a financial and social management system that provides improved tracking and management related to how, where, when, and with whom a user enters into activities. The financial and social management system captures activity information and images from various sources of information, including but not limited to social networking accounts, e-receipts, contact lists, calendars, and the like, and associates the activity information and images with the activities. The financial and social management system may identify activities associated with other users (e.g., gift deposit) that can be ultimately linked to other activities associated with merchants (e.g., purchase of a product). The financial and social management system may provide social relationship information between users based on the activities entered by the first user when other users are involved or linked to the activities. | 2015-03-26 |
20150088718 | PAST PACKAGES FOR A FINANCIAL AND SOCIAL MANAGEMENT SYSTEM - Embodiments of the invention comprise systems, computer program products, and methods for a financial and social management system that provides improved tracking and management related to how, where, when, and with whom a user enters into activities. The financial and social management system captures activity information and images from various sources of information, including but not limited to social networking accounts, e-receipts, calendars, contact lists, location determination devices, and the like, and associates the activity information and images with the activities. The financial and social management system captures past activities that occurred at the same or similar locations or time periods, and assemblies the activities into packages. The packages are supplemented with the images and the activity information related to the activities captured from the various sources of information, and the activities, activity information, and images are displayed in a package interface. | 2015-03-26 |
20150088719 | Method for Predicting Financial Market Variability - A system that is able to predict, model and monitor time lines of chaotic non-linier data or events such as commodity, stock and financial market performance indicators. | 2015-03-26 |
20150088720 | Secure Exchange Feed Market Data Embargo - Methods, devices, and systems for communicating market data with market participants involve obfuscating at least a portion of a first financial message. Communicating the market data also involves augmenting a second financial message with a key configured to remove the obfuscation from the obfuscated portion of the first financial message. The market data is ultimately communicated by transmitting the first financial message to a particular participant, and transmitting the second message to a plurality of participants. The particular participant may then use the key from the second financial message to remove the obfuscation of the first financial message. | 2015-03-26 |
20150088721 | DIGITAL TRANSACTIONAL PROCEDURES & IMPLEMENTS - This invention describes a set of related procedures designed to co-operate with mints of digital money in order to allow for said money to be properly, securely, and conveniently traded by, various size and various type of trading crowds. The procedures refer mainly to distribution of responsibility. This invention also specifies the construction of digital coins encapsulated in a physical housing to amount to off-line tradable digital coins. | 2015-03-26 |
20150088722 | Methods and Apparatus to Implement Spin-Gesture Based Trade Action Parameter Selection - Methods and apparatus to implement spin-gesture based trade action parameter selection are disclosed herein. An example method includes detecting, via a user interface of a trading application generated by a computing device, an activation event associated with an interface control corresponding to a trade action, wherein the activation event is a gestural input received via the generated user interface. The example method also includes updating, via the user interface, a value of a trade action parameter associated with the trade action, wherein the value of the trade action parameter updates in a sequence based on a direction associated with the gestural input. | 2015-03-26 |
20150088723 | SECURE EXCHANGE FEED MARKET DATA EMBARGO - Methods, devices, and systems for communicating market data with market participants may involve obfuscating at least a portion of financial messages. Communicating the market data also involves augmenting a financial message with a key configured to remove the obfuscation from the obfuscated portion of the financial messages. The market data is ultimately communicated by transmitting the financial messages to a plurality of participants. The plurality of participants may then use the key from the financial message to remove the obfuscation of the other financial messages. | 2015-03-26 |
20150088724 | SYSTEM AND METHOD FOR PREVENTING CROSS TRADING - Information regarding the current state in the market is used to prevent orders from crossing. In an example provided herein, when an order is entered into a market, information regarding current positions in the market is taken into account to determine whether the order will cross with other orders. If the orders would cross, appropriate action is taken to prevent the crossing of orders in a way suitable for the person or persons trading. The teachings described herein may be used for any reason to prevent orders from crossing. Moreover, they may be used in other areas of trading to assist the trader in obeying any other rule or regulation that might involve analyzing current positions in the market before taking action. | 2015-03-26 |
20150088725 | SYSTEM AND METHOD FOR MANAGING TRADING ORDERS RECEIVED FROM MARKET MAKERS - According to one embodiment, a method of managing trading is provided. A first offer for a particular instrument in a particular market is received from a first market maker at a first offer price. A first bid for the same particular instrument in the same particular market is received from a second market maker at a first bid price, the first bid price being higher than or equal to the first offer price. As a result of the first bid price being higher than or equal to the first offer price, the first offer price is automatically increased to a price higher than the first bid price such that a trade is not executed between the first offer and the first bid. In some embodiments, such method may be used to protect market makers from unwanted trades caused by inherent latency in the market makers' pricing engines and/or networks. | 2015-03-26 |
20150088726 | SYNCHRONIZED PROCESSING OF DATA BY NETWORKED COMPUTING RESOURCES | 2015-03-26 |
20150088727 | METHOD FOR DETERMINING CREDITWORTHINESS FOR EXCHANGE OF A PROJECTED, FUTURE ASSET - Methods and systems for extending credit to a business borrower and, more specifically, methods and systems for estimating future receivables for the borrower based on historical business data and exchanging the estimated future receivables for an early payment and, more preferably, for an early payment by a customer of the borrower. | 2015-03-26 |
20150088728 | METHOD AND SYSTEM FOR MANAGEMENT OF LOANS - A computerized information management system involving a client-server architecture. A memory comprises instructions for: storing information on each of several loans, wherein each loan is issued by a financial institution and received by a business actor, wherein the information on each loan comprises support provided to the financial institution and one or more obligations imposed on the financial institution, wherein the one or more obligations are imposed in exchange for the provided support; and retrieving some or all of the stored information in response to one or more requests from a client; and for using the retrieved information to check compliance with the imposed obligations. The obligations may include installment-free years of loans. As a result, businesses may retain more of the loan as operating capital, thus enhancing business activity, employment and tax payment. | 2015-03-26 |
20150088729 | ONLINE PROPERTY RESERVATION SERVICE PROVIDER FOR RESERVING PROPERTIES FOR LEASE - Provided are a computer program product, system, and method for an online property reservation service provider to reserve properties for lease. A computer implemented property reservation service database stores information on rental properties, a hold amount, a cancellation period and an authorization hold period defined for an authorization hold, wherein the authorization hold period is greater than the cancellation period and runs following the cancellation period. A reservation request is received from the renter computer for a reserved property comprising one of the properties and information on a renter financial account. At least one online electronic transaction is initiated to place an authorization hold of the hold amount on the renter financial account for the reserved property in response to the reservation request, wherein the authorization hold maintains the hold amount as unavailable in the renter financial account. | 2015-03-26 |
20150088730 | INBOUND INTEGRATED PRODUCTION MESSAGES TRANSACTION FILE SPLITTER - A payment card transaction clearing system includes a payment card network. A file distribution system coupled to the payment card network includes a split processor configured to receive a batch of payment card transaction records from the payment card network, and split the batch of payment card transactions into one or more split files according to one or more processing agreements. A split monitor processor is configured to send the one or more split files to the payment card network. | 2015-03-26 |
20150088731 | KIOSK MANAGEMENT SYSTEM - A kiosk management system may identify items with which to pre-stock a plurality of geographically distributed kiosks. The identified items may be delivered from a distribution center to one or more distribution agents, who then deliver the identified items to individual kiosks. When the kiosk management system receives a request for an item from a consumer who has been browsing items in, e.g., an electronic marketplace, the kiosk management system can determine whether the requested item is available at any kiosks in proximity of the consumer and provide a list of such kiosks to the consumer for selection. Following selection of a kiosk by the consumer, the kiosk management system can send the consumer a notification identifying the designated kiosk and including a generated code for use by the consumer in retrieving of the requested item from the designated kiosk. | 2015-03-26 |
20150088732 | Integrated Electronic Disbursement and Cash Flow Management System and Method - A system and method are provided for managing electronic disbursements transferred from a business client of a financial institution to customers of the business client. The system includes a disbursement instruction processor receiving a disbursement instruction over a network from a business client system, the disbursement instruction processor processing the instruction and performing multiple steps. The steps include using a customer identifier to determine available payment channels for the customer and selecting an electronic payment channel when available payment channels include an electronic payment channel. An electronic disbursement notification is forwarded to the customer. A confirmation may be provided upon acceptance of the disbursement through the disbursement notification | 2015-03-26 |
20150088733 | SYSTEM AND METHOD FOR ENSURING SAFETY OF ONLINE TRANSACTIONS - Online transaction security is improved by detecting a start of an online financial transaction between a user-controlled online transaction application and a remote payment service. A protected data input module, a protected environment module, and a safe data transfer module each provides a corresponding set of protection operations. A risk level of conducting the financial transaction is assessed based on a vulnerability assessment and on present condition of the local computing system. An initial degree of protection for each of the modules is set, and subsequently adjusted based on the risk level. | 2015-03-26 |
20150088734 | WIRELESS UTILITY METER READING SYSTEM AND METHOD - A wireless meter reading system and method are provided to facilitate billing a consumer for utility usage. The method comprises providing a camera or imaging device optionally coupled to a utility meter at a consumer site. The camera or imaging device operates to provide one or more wireless meter reading images of the utility meter from time to time. The one or more wireless meter reading images comprise utility usage data and identifying data of the utility meter. The one or more wireless meter reading images are transmitted to the utility provider. The utility consumer receives from the utility provider a billing statement for utility usage at the consumer site for a defined time period. The billing statement is based on the one or more wireless meter reading images transmitted to the utility provider. | 2015-03-26 |
20150088735 | CHIP CARD DEPLOYMENT DRIVEN BY TRAVEL ITINERARY METHOD AND APPARATUS - A system, method, and computer-readable storage medium to issue CHIP-enabled payment cards to cardholders based on their propensity to travel to locations where the use of CHIP is dominant. | 2015-03-26 |
20150088736 | METHOD, APPARATUS AND RECORDING MEDIUM FOR SUPPORTING ELECTRONIC PAYMENT - A method comprises receiving user payment information including a user identifier for paying for an item from a user terminal or a shop payment terminal, determining at least one payment mean available at the payment terminal based on a shop payment information database, comparing payment conditions when two or more payment means are available, and transmitting the prioritized payment means based on a result of the comparison to the user terminal or the shop payment terminal. An electronic wallet server comprises a controller configured to compare payment conditions when two or more payment means are available, and cause the transceiver to transmit prioritized payment means based on a result of the comparison to the user terminal or the shop payment terminal. | 2015-03-26 |
20150088737 | METHOD FOR ELECTRICALLY PERSONALIZING A PAYMENT CHIP AND A PAYMENT CHIP - Various embodiments provide a method for electrically personalizing a payment chip, the method comprising a. storing software onto the payment chip, the software comprising one or more parameters, the one or more parameters being configurable to define functions of the payment chip; and b. setting at least one parameter to a default value to configure at least one function of the payment chip to electrically personalize the payment chip, wherein step a. is performed by at least one entity and step b. is performed by the same at least one entity. | 2015-03-26 |
20150088738 | Transaction Systems, and Related Methods - A portable device configured to enable completion of transactions. The portable device comprises an input mechanism arranged to enable input of an identifier into the portable device, and a selection mechanism arranged to enable the user to select a payment mechanism to be associated with the identifier. The portable device further comprises a communication module arranged to transmit data relating to the identifier and the payment mechanism selection to a remote server. Completion of a subsequent transaction relating to the identifier is enabled using the selected payment mechanism. | 2015-03-26 |
20150088739 | LIFE OCCURRENCE HANDLING AND RESOLUTION - A method is disclosed herein in accordance with an embodiment of the present invention. The method may include deriving at a mobile transaction platform a multi-dimensional context from one or more user transactions and determining at least one life occurrence based, at least in part, on the multi-dimensional context. The one or more user transactions may be conducted through the mobile transaction platform. The one or more user transactions may be stored on a third-party source. In an aspect, the at least one life occurrence has yet to occur. In another aspect of the invention, the life occurrence has already occurred. The multi-dimensional context may include at least one of user location information and life occurrence location information. The multi-dimensional context may include at least one of a time of life occurrence and a current time. | 2015-03-26 |
20150088740 | SYSTEM AND METHOD FOR MANAGING FINANCIAL TRANSACTIONS BASED ON ELECTRONIC CHECK DATA - A system and method of transmitting a check-type payment between a payor and a payee using a third-party service includes registering a payor, receiving a check-type payment request from the payor by the third-party service, generating a unique identifier for the check-type payment request and associating payment information with the unique identifier, transmitting a payment notice to the payee, receiving a deposit request to a deposit account from the payee by the third-party, generating a depositable item responsive to the deposit request, and depositing the depositable item into the deposit account by the third-party service. | 2015-03-26 |
20150088741 | Spending Delegation - Methods and systems are provided for delegating spending from a user device, such as a parent's smart telephone, to another device, such as a child's smart telephone. In this manner, the owner of the other device, e.g., the child, can be allowed to purchase products. Restrictions can be placed upon the spending ability of the other device. For example, in order for the spending to be done, the other device can be required to be within a certain distance of the user device. Thus, purchases by the owner of the other device, e.g., the child, can be supervised. | 2015-03-26 |
20150088742 | APPARATUS AND METHOD FOR SECURED COMMERCIAL TRANSACTIONS - A transaction security code database and a method and apparatus for generating the transaction security code database. The transaction security code database is comprised of multiple transaction security codes, each transaction security code constituting a transaction code generated based upon a transaction initiated by a user, which is appended to or linked to a security code which is based upon a biometric sensor code generated by a biometric sensor from a biometric presentation of a biometric feature of the user. | 2015-03-26 |
20150088743 | SERVER, A TERMINAL APPARATUS, AND A METHOD FOR PROVIDING CARD INFORMATION TRANSMITTING SERVICE - Disclosed is a method for providing a card information transmitting service by a terminal apparatus. The method for providing a card information transmitting service includes: when a card transaction is performed in a merchant by using a card registered in a card information transmitting service, receiving location information of the merchant from a card information transmitting service providing server; detecting a notification providing mode set in a terminal apparatus in association with the card information transmitting service; and providing notification by using the location information of the merchant received according to the detected notification providing mode. | 2015-03-26 |
20150088744 | Transaction Authentication - Information is received that includes a request to authenticate a transaction. Based on the received information, a location associated with the transaction and a user associated with the transaction are identified. Location data is accessed that identifies one or more locations associated with the user. The location associated with the transaction and the one or more locations associated with the user are compared to determine whether the location associated with the transaction corresponds to a location associated with the user. A response to the request is provided based on determining whether the location associated with the transaction corresponds to the location associated with the user. | 2015-03-26 |
20150088745 | ACCOUNT IDENTIFICATION - A method of account identification is performed on suitably programmed computing apparatus. An account number comprising a plurality of numeric characters is assigned to an account. The characters of the account number are divided into a numeric identifier and a convertible string. The convertible string is compressed into a compressed convertible string using an expanded character set. There are fewer characters in the compressed convertible string than in the uncompressed convertible string. A compressed account number is provided comprising the numeric identifier and the compressed convertible string. This may then be used in transactions without compromising the original account number while retaining the identifier for use in identifying transactions. A method of performing a transaction is also described, as is suitable apparatus for carrying out the methods described. | 2015-03-26 |
20150088746 | METHOD AND SYSTEM FOR IMPLEMENTING FINANCIAL TRANSACTIONS - A method for implementing a financial transaction via a user device is disclosed. The method involves receiving financial transaction information used to generate an alphanumeric Secure Transaction Code that binds the received information to the financial transaction, receiving information from a user device that includes the Secure Transaction Code and a voice entry of the Secure Transaction Code, verifying that the voice entry of the Secure Transaction Code corresponds to a Voice Authentication Master (VAM) file of a registered user, verifying that the received Secure Transaction Code is a valid Secure Transaction Code and, if both are verified authorizing the financial transaction and sending an indication that the financial transaction has been authorized to the user device. In an embodiment the transaction is between a merchant and user of a mobile user device or can be a request for secure access. | 2015-03-26 |
20150088747 | SYSTEMS AND METHODS FOR MOBILE PAYMENTS - Systems and methods are provided for mobile payments. A financial institution may offer an electronic prepaid card of a merchant for sale to holders of Demand Deposit Accounts (DDA) and/or Line of Credit Account and/or Loan Account. If the DDA account holder and/or Line of Credit Account holder and/or Loan Account holder purchases the prepaid card through the financial institution, the account holder may be able to redeem the prepaid card at the merchant. The prepaid card may be provided in electronic form that may be scanned off the account holder's mobile device or by the account holder's mobile device. When the account holder purchases the prepaid card, the financial institution may perform a real-time check whether the account holder has sufficient funds for the purchase. If funds are sufficient, a transfer may be performed from the account holder's DDA account and/or Line of Credit Account and/or Loan Account to a holding account of another party at the same financial institution via ON-US transfer. The other party may settle the account with the merchant with ACH or ON-US transfer with or without a clearing account in a settlement (clearing) bank. The time to purchase the prepaid card prior to redemption can be shorten to seconds as if the purchase happened in the same time as the redemption (e.g., Instant Prepaid Card) at a physical point of sale. The time duration between prepaid card purchase and its redemption can be so short that the purchaser does not feel the prepay process behind the scene. This Instant Prepaid Card may be referred to as an AnyWhereMobile Debit Card if Demand Deposit Accounts are used as founding source and may be referred to as an AnyWhereMobile Credit Card if a Line of Credit Account or Loan Account is used as founding source. | 2015-03-26 |
20150088748 | Payment Action Page Queue for a Mobile Device - In an exemplary embodiment, a method includes identifying a plurality of initiated payments awaiting approval. An initiated payment is associated with a plurality of payment details describing the initiated payment. A queue comprising a plurality of payment action pages is generated. A payment action page comprises the plurality of payment details describing a corresponding initiated payment. The method further includes displaying on a mobile device a first payment action page of the plurality of payment action pages in the queue and displaying on the mobile device a second payment action page of the plurality of payment action pages in the queue in response to receiving a payment action associated with the first payment action page from the user of the mobile device. | 2015-03-26 |
20150088749 | SYSTEM AND METHOD FOR TRANSACTION SECURITY ENHANCEMENT - The present disclosure involves a system that includes a computer memory storage component configured to store computer programming instructions and a computer processor component operatively coupled to the computer memory storage component. The computer processor component is configured to run a secure operating system and a non-secure operating system in parallel. The secure and non-secure operating systems are isolated from each other. The computer processor component is configured to execute code to perform the following operations: receiving an authentication request from an application that is run by the non-secure operating system, wherein the authentication request contains credentials of the application; communicating with a secure applet that is run by the secure operating system, and wherein the communicating includes transferring the credentials of the application to the secure applet; and authenticating and vetting the application based on the credentials of the application. | 2015-03-26 |
20150088750 | METHOD, APPARATUS, AND SYSTEM FOR PERFORMING ONLINE TRANSACTIONS WITH BIOMETRIC AUTHENTICATION - An apparatus, system and method for conducting financial and other transactions using a wireless device are provided. A computing device includes a display screen, a user input interface, and one or more processors. A memory device has stored therein a wallet application for completing transactions based on wireless data communications between the computing device and a merchant system. The memory device further stores at least one electronic credential. The computing device is configured to wirelessly communicate with the merchant system via at least one of a network transceiver and a short-range RF transceiver, and to display information regarding one or more transactions with the merchant system on the display screen. At least one electronic credential is transmitted to the merchant system based on comparing the biometric characteristic of the user with stored biometric information to initiate the one or more transactions with the merchant system. | 2015-03-26 |
20150088751 | TRANSACTION VERIFICATION SYSTEM BASED ON USER LOCATION - Embodiments of the invention provide misappropriation protection with user location verification. The methods, apparatus and computer program products provide for approving a transaction based at least partially on a determining that a mobile device associated with an account holder associated with a transaction is located within a predetermined distance from the location associated with the transaction. In some example implementations where the mobile device is located outside the predetermined distance from the location associated with the transaction, information associated with previously approved transactions is received and the transaction approved based at least partially on a determination that previously approved transaction have occurred at the same location. | 2015-03-26 |
20150088752 | METHODS, APPARATUS, SYSTEMS AND COMPUTER READABLE MEDIUMS FOR ANONYMIZED IDENTIFICATION OF PAYMENT CARD ACCOUNTS BELONGING TO A SAME ENTITY - In one embodiment, a method includes receiving, by a processing device, data representing a plurality of payment card transactions made in association with payment card accounts, the data including personally identifiable information; anonymizing, by a processing device, the data by hashing the personally identifiable information; determining, by a processing device, a plurality of the payment card accounts that belong to a same entity based on the hashed personally identifiable information without decoding the hashed personally identifiable information to recover the personally identifiable information; and identifying, by a processing device, the determined plurality of payment card accounts as belonging to the same entity. | 2015-03-26 |
20150088753 | METHOD AND APPARATUS FOR PROVIDING A VIRTUAL GIFT CARD SYSTEM - An approach is provided for linking one or more virtual gift cards to the wallet database associated with the unique identifier of at least one mobile device. The approach involves receiving a request for registering a virtual gift card to a mobile device, wherein the request specifies a unique identifier associated with the mobile device. The approach also involves determining a card identifier associated with the virtual gift card. The approach further involves generating a card token for the virtual gift card based on the card identifier. The approach also involves storing the card token in a wallet database, wherein the wallet database is associated with the unique identifier of the mobile device, and wherein the wallet database is accessed from an application of the mobile device. | 2015-03-26 |
20150088754 | METHOD AND SYSTEM FOR FULLY ENCRYPTED REPOSITORY - According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device. | 2015-03-26 |
20150088755 | SYSTEMS, METHODS, AND DEVICES FOR IMPROVED TRANSACTIONS AT A POINT OF SALE - Techniques for improved Point of Sale (PoS) transactions are disclosed. The techniques include a PoS terminal that receives biometric data from a consumer, determines an encryption key based on the biometric data, and transmits the encryption key to a mobile device associated with the consumer to cause the mobile device to decrypt a consumer key and transmit an indication of a successful decryption. The PoS terminal further receives the indication of the successful decryption from the mobile device, and retrieves consumer account information responsive to receiving the indication of the successful decryption. | 2015-03-26 |
20150088756 | Secure Remote Payment Transaction Processing Including Consumer Authentication - Embodiments of the invention are directed to methods, apparatuses, computer-readable media, and systems for securely processing remote transactions. One embodiment is directed to a method of processing a remote transaction initiated by a communication device. The method comprising a server computer receiving a payment request including encrypted payment information that is encrypted using a first key. The encrypted payment information including security information. The method further comprises decrypting the encrypted payment information using a second key, obtaining an authentication response value for the remote transaction from an authentication computer associated with an issuer, updating the decrypted payment information to include the authentication response value, re-encrypting the decrypted payment information using a third key, and sending a payment response including the re-encrypted payment information to a transaction processor. The transaction processor decrypting the re-encrypted payment information using a fourth key and initiating a payment transaction using the decrypted payment information. | 2015-03-26 |
20150088757 | ONE-TOUCH PAYMENT USING HAPTIC CONTROL VIA A MESSAGING AND CALLING MULTIMEDIA SYSTEM ON MOBILE DEVICE AND WEARABLE DEVICE, CURRENCY TOKEN INTERFACE, POINT OF SALE DEVICE, AND ELECTRONIC PAYMENT CARD - Provided are computer implemented methods and systems for messaging, calling, and one-touch payments via mobile and wearable devices. An exemplary system comprises a processor and a database in communication with the processor. The processor is configured to provide an integrated interface for selection of an activity mode. The activity mode includes a messaging mode, a calling mode, and a one-touch payment mode. The processor is further configured to receive the selection of the activity mode via the integrated interface from a user. If the messaging mode is selected, a message from the user is received and sent to a recipient via a data network. If the calling mode is selected, a data network call is initiated on a call request of the user. If the one-touch payment mode is selected, a payment request is transmitted to a financial organization. | 2015-03-26 |
20150088758 | AUTHENTICATING USERS TO ATMS AND OTHER SECURE MACHINES FOR CARDLESS TRANSACTIONS - Systems, apparatus, methods, and computer program products for using quick response (QR) codes for authenticating users to ATMs and other secure machines for cardless transactions are disclosed. Embodiments of the present disclosure read an image displayed on a display of an external device using a mobile device associated with a user authorized to access a secure resource, decode transaction information encoded in the image, transmit the transaction information and an identifier of the mobile device from the mobile device to an authentication system, and grant access to the secure resource if the transaction information and the identifier satisfy an authentication test performed at the authentication system. | 2015-03-26 |
20150088759 | Tokenizing Sensitive Data - Included are embodiments for tokenizing sensitive data. Some embodiments of systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and utilize a proprietary algorithm, based on the token key to generate a vendor-specific token that is associated with the sensitive data. Some embodiments include creating a token identifier that comprises data related to the token key sending the vendor-specific token and the token identifier to the vendor. | 2015-03-26 |
20150088760 | AUTOMATIC INJECTION OF SECURITY CONFIRMATION - Technology is described to monitor incoming channels or messages for a security confirmation code, capture a received confirmation code, recognize a designated field or other destination opportunity to enter a security confirmation code, and automatically inject the captured code to the recognized destination. Various other aspects of the technology are described herein. | 2015-03-26 |
20150088761 | IMPLEMENTING A BARGAINING STRATEGY BETWEEN TEAMS WITH MAJORITY VOTING - A method of implementing a bargaining strategy includes receiving a first plurality of attributes corresponding to team members of a first team, and a second plurality of attributes corresponding to team members of a second team. The two teams participate in a bargaining process and each team bargains pursuant to a majority rule. The method includes determining at least one critical first team member from the first team using the first plurality of attributes, and at least one critical second team member from the second team using the second plurality of attributes. The at least one critical first and second team members are determinative of an agreeable outcome of the bargaining process. The method includes generating suggested bargaining terms likely to result in the agreeable outcome of the bargaining process between the first and second teams according to the at least one critical first and second team members. | 2015-03-26 |
20150088762 | IMPLEMENTING A BARGAINING STRATEGY BETWEEN TEAMS WITH MAJORITY VOTING - A method of implementing a bargaining strategy includes receiving a first plurality of attributes corresponding to team members of a first team, and a second plurality of attributes corresponding to team members of a second team. The two teams participate in a bargaining process and each team bargains pursuant to a majority rule. The method includes determining at least one critical first team member from the first team using the first plurality of attributes, and at least one critical second team member from the second team using the second plurality of attributes. The at least one critical first and second team members are determinative of an agreeable outcome of the bargaining process. The method includes generating suggested bargaining terms likely to result in the agreeable outcome of the bargaining process between the first and second teams according to the at least one critical first and second team members. | 2015-03-26 |
20150088763 | CONVERSATION AND OPPORTUNITY MESSAGE SHARING - A method includes automatically generating a log that identifies information presented at a first electronic device. In response to receiving a request to transmit at least a portion of information included in the log to a second electronic device, initiating transmission of an opportunity message from the first electronic device to the second electronic device, wherein the opportunity message includes at least the portion of the information included in the log, and initiating transmission of the log from the first electronic device to a server via the network. The server may be configured to store the log in a database, and the log may be accessible to the second electronic device via the server. | 2015-03-26 |
20150088764 | ONE-STOP COMPREHENSIVE PRODUCT WARRANTY COMPUTERIZED MANAGEMENT SYSTEM - A Warranty Management System (WMS) and method are disclosed including computer software modules that when executed allow a user to enter warranty information for multiple products and services into a database for management of the warranties. The management of the warranties include a single repository for all warranty information, offer of extended warranties, access to additional information related to products and/or their warranties from manufacturers and third party service providers, reminders and alerts about status and warranty expiration dates, warranty repair providers, warranty claim management, addition and editing of warranty information, information search, warranty certificate storage, and the like. | 2015-03-26 |
20150088765 | SESSION MEMORY FOR VIRTUAL ASSISTANT DIALOG MANAGEMENT - Embodiments of the invention provide systems and methods for managing a customer interaction with a virtual assistant. Managing a customer interaction with a virtual assistant can comprise receiving a request to initiate an interaction between the virtual assistant and the customer. A context of the request or the interaction between the virtual assistant and the customer can be identified. The context can be based on information identifying at least one of the customer or a product or service that is a subject of the interaction. Information relevant to the interaction between the virtual assistant and the customer can be retrieved based on the identified context. The retrieved information can be stored in a session memory supporting the interaction and the interaction with the customer can be conducted dynamically through the virtual assistant based on the information stored in the session memory. | 2015-03-26 |
20150088766 | AUTOMATED-VALUATION-MODEL TRAINING-DATA OPTIMIZATION SYSTEMS AND METHODS - To optimize training data used by a predictive real-estate valuation model, a search space having multiple dimensions may be defined. Each search dimension corresponds to a range of candidate values for a search criterion for selecting subsets of sales-transaction records. The multiple dimensions include a temporal dimension and a geographic dimension. An accuracy-optimized subset of a multiplicity of sales-transaction records is identified by evaluating points that vary along each dimension within the multi-dimension search space. A statistical measure of model accuracy is used to evaluate each candidate point. The accuracy-optimized subset of the multiplicity of sales-transaction records is provided to a predictive model to generate an automated value prediction for a subject real-estate property as of an effective date. | 2015-03-26 |
20150088767 | REUSABLE SHIPPING PACKAGES FOR ELECTRONIC MARKETPLACE SELLERS - Techniques for improving the efficiency of an electronic marketplace are disclosed herein. In particular, methods for implementing reusable packaging in fulfillment of orders by participants who are both consumers and sellers in an electronic marketplace are described. The reusable packaging may be provided on a one-to-one basis as compared to a seller's pending outgoing orders and an order placed by the seller acting as a consumer to an electronic marketplace, on a one-to-N basis as compared to the seller's selling history, or may be based on a multi-modal assessment of the seller's past and pending orders and accommodate multiple representative orders. Reusable packaging may include a wide variety of containers and additional materials to aid a seller in its use. | 2015-03-26 |
20150088768 | Method and apparatus for dynamically assigning usage rights to digital works - A method, system and computer program product for dynamically assigning usage rights to digital content for use in a system having at least one repository, including specifying a usage right, the usage right specifying an authorized use of digital content and being enforceable by a repository; determining a status of a dynamic condition; and dynamically assigning the usage right to the digital content based on the status of the dynamic condition. | 2015-03-26 |
20150088769 | ACTIVE TICKET WITH DYNAMIC CHARACTERISTIC SUCH AS APPEARANCE WITH VARIOUS VALIDATION OPTIONS - A method and apparatus is provided for providing an active ticket in a mobile terminal for use by a mobile terminal user, wherein at least one active ticket has a ticket characteristic that dynamically changes based on one or more states in a life cycle of the active ticket. Dynamic changes to the ticket characteristic include multimedia changes or other presentation data, including text, sound (audio), animation, video, still pictures, or some combination thereof. The active ticket can have different states in it's life cycle, such as purchased, validated, invalid for certain events. Also the ticket service provider or issuer can send new control data to change the characteristic and/or contents of the active ticket. | 2015-03-26 |
20150088770 | SYSTEMS AND METHODS FOR REDUCING THE UNAUTHORIZED RESALE OF EVENT TICKETS - The present invention relates to (a) a ticket management system for purchasing and allocating event tickets; (b) a ticket authentication system for authenticating tickets presented at an event; and (c) a secondary market system for the authorized resale of event tickets. These systems, individually and collectively, facilitate the reduction of ticket scalping by requiring the production of valid registered valued identification for the purchase, allocation, and resale of event tickets and the admittance to an event. | 2015-03-26 |
20150088771 | FINANCIAL AND SOCIAL MANAGEMENT SYSTEM - Embodiments of the invention comprise systems, computer program products, and methods for a financial and social management system that provides improved tracking and management related to how, where, when, and with whom a user enters into activities. The financial and social management system captures activity information and images from various sources of information, including but not limited to social networking accounts, e-receipts, location determination devices, and the like, and associates the activity information and images with the activities. The financial and social management system may tag the activities with activity information, such as location, social relationship, entity, and category information. Moreover, the financial and social management system may display the activity and activity information in activity list interfaces, packaged activity interfaces, filtered activity interfaces, activity history interfaces, activity review interfaces, or other like interfaces that incorporate aspects of financial transactions and social networking information. | 2015-03-26 |
20150088772 | ENHANCING IT SERVICE MANAGEMENT ONTOLOGY USING CROWDSOURCING - A computer implemented method performs an IT service management operation such as analyzing a problem, associated with an entity configuration in a domain having an ontology, wherein each entity has relationships with other entities. Information provided by the ontology is used to create a specified question pertaining to the operation. It is then determined whether an answer to the question is initially available. Responsive to an answer being initially available, information provided by the initially available answer and the ontology, selectively, is used to create a second question, wherein the second question pertains to the operation and is directed to one of the entities. Responsive to an answer to the specified question not being initially available, a crowdsourcing technique is used to seek an answer to the specified question. | 2015-03-26 |
20150088773 | METHOD AND SYSTEM FOR IN-MEMORY POLICY ANALYTICS - A method, system, and computer-program product for in-memory policy analytics are disclosed. The method includes creating a policy model and determining an effect of a change to one of a value of one of one or more parameters. The policy model is configured to represent one or more policy scenarios by virtue of comprising one or more parameters, and each of the one or more scenarios is defined, at least in part, by each of the one or more parameters comprising a value or a plurality of values. Further, the effect is on at least one of the one or more scenarios. | 2015-03-26 |
20150088774 | PLATFORM FOR GENERATING PERSONALIZED CAREER PATHWAYS - The disclosure provides for generating an adaptive career pathway for an individual. An apparatus is provided that includes at least one processing unit to: (A) receive data indicative of two or more of an educational level, a skill level, a personality metric, a residence location, a score in an educational course, a score in a vocational course, a job location, and a skill set selected by the individual; (B) compute an assessment vector associated with the individual based on the received data; (C) perform a GAP analysis to compare the assessment vector to a database of job taxonomy vectors, wherein each job taxonomy vector comprises data indicative of deconstruction parameters associated with a specified job; and (D) classify the individual, based on the GAP analysis, according to at least one of a coursework recommendation, a career pathway recommendation, and an employability score. | 2015-03-26 |
20150088775 | METHODS AND SYSTEMS FOR INSPECTION OF INDIVIDUALS - The systems and methods described herein attempt to increase traveler throughput, increase officer safety, and increase bystander safety at a security checkpoint. The systems and methods described herein attempt to optimize traveler processing via segregation and pre-information selective targeting in order to allow more effective enforcement activities while facilitating the flow of legitimate trade and travel. The systems and methods implement electronic document readers, gates, and biometrics in an attempt to provide the improved functionality. | 2015-03-26 |
20150088776 | APPARATUS, SYSTEM, AND METHOD SUPPORTING COMPLIANCE WITH CUSTOMS/BORDER REQUIREMENTS - A system includes a kiosk configured to collect information associated with a traveler. The information includes information from a passport of the traveler, a photograph of the traveler, and travel-related information associated with the traveler. The system also includes a camera configured to obtain an image of the traveler approaching or within a specified portion of a customs/border enforcement area. The system further includes at least one computing device configured to receive the information from the kiosk, provide at least a portion of the information to an external system, and receive a disposition code from the external system. The disposition code identifies whether the traveler is allowed to pass the customs/border enforcement area. The at least one computing device is also configured to receive the image, perform facial recognition to identify the traveler, and provide at least some of the information to an agent associated with the customs/border enforcement area. | 2015-03-26 |
20150088777 | SYSTEM AND METHOD TO DETECT ONLINE PRIVACY VIOLATION - The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field. | 2015-03-26 |
20150088778 | System and method for verifying a travelers authorization to enter into a jurisdiction using a software application installed on a personal electronic device - The present disclosure relates generally to a system and method, which allows travelers to process themselves using a software application installed on a personal electronic device to receive authorization to enter into a jurisdiction. Such system and method includes: a personal electronic device software application (App) for electronically storing therein official passport data for a traveler and members of the traveler's family group and pictures used to identify each passport holder, for posing a series of questions to the traveler, for receiving authorizations to enter into a jurisdiction, and for displaying a secure encrypted receipt on a personal electronic device; means for authenticating the secure receipt; means to transmit passport and travel information to customs authorities from a personal electronic device to determine whether the traveler and the members of the traveler's family group have received authorization to enter into a jurisdiction; and a kiosk for capturing travelers' biometrics and for transmitting passport, biometric and travel information to customs authorities to determine whether the traveler and the members of the traveler's family group have received authorization to enter into a jurisdiction. | 2015-03-26 |
20150088779 | Food Delivery Service - Embodiments provide an integrated real-time, customer-company process that materially improves the end-to-end customer experience for delivery of products and services. The invention enables more efficient management of a company's supply-demand relationship, unit costs, and return on investment. Example embodiments are directed to an inter-related, customer-company management process for a food delivery business. A process on an intelligent, processor-based platform provides an improved end-to-end customer experience, for example, by reducing wait times and using convenient payment options so that customer does not need to handle money. The process further enables a food truck operator to more efficiently manage the business, both at a single site and across multiple sites. There is a substantial, real-time interdependency between the customers and the food truck operator. The process provides ongoing Just-in-Time order status information to customers and ongoing Just-in-Time operating and cooking instructions to the food truck operator. | 2015-03-26 |
20150088780 | DYNAMIC ROUTE PLANNING - A system for route planning and loading transport vehicles comprises a computer having a database with shipment data allocated to objects for transport. The computer uses the shipment data per object for each transport vehicle to generate a first route plan for object delivery on a transport date. A conveyor belt conveys objects according to the route plan to the allocated transport vehicles. A checking station checks for a route plan for passing objects and signals an error if there is no route plan. A recognition station uses the error signal to indicate new shipment data to the computer. The computer allocates the object with the new data to an appropriate vehicle, during conveyance to the transport vehicles, and converts the first route plan for the transport vehicle into a second route plan considering the new shipment data. | 2015-03-26 |
20150088781 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR FACILITATING LABEL LESS RETURNS - An apparatus is provided for facilitating label-less returns. The apparatus may include a memory and a processor(s) configured to receive a shipment identifier of an item(s) responsive to a device scanning a label or marking(s) on the item(s) delivered to a customer for a shipper. The processor is also configured to determine whether the customer is registered in a returns program and whether the item(s) qualifies for return based on analyzing the identifier. The processor is also configured to generate a return authorization number (RAN) or indicator for the item(s) and link the RAN/indicator to the identifier responsive to verifying that the customer is registered and that the item(s) qualifies for return. The processor is further configured to cause return delivery of the item(s) to the shipper using the label or the marking(s) on the item(s) responsive to verifying the RAN/indicator is linked to the identifier. Corresponding computer program products and methods are also provided. | 2015-03-26 |
20150088782 | INTELLIGENT CUSTOMER QUEUING AND NOTIFICATION SYSTEM - An intelligent customer queuing and notification system includes a kiosk, to receive customer information, and a customer reception system each of which are connected to and communicate over a common network. The customer reception system receives customer information sent to it by the kiosk and uses this information to assign a customer to an appropriate position in a queue. The customer reception system generates and sends a notification message to a customer communication device that includes the customer's current queue position and wait time, and the customer reception system receives responses from the customer. | 2015-03-26 |
20150088783 | SYSTEM AND METHOD FOR MODELING AND QUANTIFYING REGULATORY CAPITAL, KEY RISK INDICATORS, PROBABILITY OF DEFAULT, EXPOSURE AT DEFAULT, LOSS GIVEN DEFAULT, LIQUIDITY RATIOS, AND VALUE AT RISK, WITHIN THE AREAS OF ASSET LIABILITY MANAGEMENT, CREDIT RISK, MARKET RISK, OPERATIONAL RISK, AND LIQUIDITY RISK FOR BANKS - The present invention is in the field of modeling and quantifying Regulatory Capital, Key Risk Indicators, Probability of Default, Exposure at Default, Loss Given Default, Liquidity Ratios, and Value at Risk, using quantitative models, Monte Carlo risk simulations, credit models, and business statistics, and relates to the modeling and analysis of Asset Liability Management, Credit Risk, Market Risk, Operational Risk, and Liquidity Risk for banks or financial institutions, allowing these firms to properly identify, assess, quantify, value, diversify, hedge, and generate periodic regulatory reports for supervisory authorities and Central Banks on their credit, market, and operational risk areas. | 2015-03-26 |
20150088784 | SYSTEM AND METHOD OF MESSAGE THREAD MANAGEMENT - Disclosed herein are systems, methods, and computer-readable storage device for managing message threads. An example system configured to practice this method can first identify a usage pattern of a user interacting with a message thread. Next, based on that usage pattern, the system can analyze messages in the message thread to identify a high-priority message. Then the system highlights the high-priority message when the system renders the message thread on a display. The messages can be email messages, text messages, instant messages, etc. The system can further associate the high-priority message with a repository, and grant a repository user, access to the high-priority message. | 2015-03-26 |
20150088785 | Robust System and Method for Forecasting Soil Compaction Performance - The present disclosure considers a system and method that can predict soil compaction and machine-specific productivity rate across multiple soil conditions without requiring site-specific samples and multi-variable lab testing. The method and system disclosed here can utilize predictive algorithms combined with a soils database to predict soil response to compaction energy across a range of soil moistures for the range of compaction machines available to predict compaction performance. | 2015-03-26 |
20150088786 | system, method and device to record personal environment, enable preferred personal indoor environment envelope and raise alerts for deviation thereof - The system has number of environmental sensors to sense various environmental parameters of the personal environment envelope surrounding the individual and multiple biological sensors to sense biological and physiological condition of the individual. The system includes a personal environment envelop setting module to define preferred settings based on input from the individual. The system has a processing module to process the environmental parameters sensed by the sensors and the preferred settings to generate alerts. The processing module, also receives information from other sources and is capable of dynamically compute recommendations, map these with the preferences of the individual for enabling the preferred conditions. The system also has a server module configured to receive, store, analyze and machine learn from data of the plurality of environmental parameters sensed by the plurality of sensors and the preferred settings along with ambient environmental data from plurality of persons for epidemiology study. | 2015-03-26 |
20150088787 | METHOD, SOFTWARE AND GRAPHICAL USER INTERFACE FOR FORMING A PREDICTION MODEL FOR CHEMOMETRIC ANALYSIS - A method for forming a prediction model for chemometric analysis is presented. A first graphical area is configured to display a first set of graphical objects; each of the graphical objects is representing a calculation module suitable for use in the prediction model. A second graphical area is configured to display a second set of graphical objects representing the set of the calculation modules added to a prediction model. The calculation modules are added to the second area by the user. By building the calculation modules in such a way that any of the calculation modules may follow or be followed by any of the calculation modules, the user is allowed to add one/several calculation module(s) in any order and number, without restrictions. | 2015-03-26 |
20150088788 | SYSTEMS AND METHODS FOR CONTENT RESPONSE PREDICTION - Techniques for predicting a user response to content are described. According to various embodiments, a configuration file is accessed, where the configuration file includes a user-specification of raw data accessible via external data sources and raw data encoding rules. In some embodiments, the raw data includes raw member data associated with a particular member and raw content data associated with a particular content item. Thereafter, source modules encode the raw data from the external data sources into feature vectors, based on the raw data encoding rules. An assembler module assembles one or more of the feature vectors into an assembled feature vector, based on user-specified assembly rules included in the configuration file. A prediction module performs a prediction modeling process based on the assembled feature vector and a prediction model, to predict a likelihood of the particular member performing a particular user action on the particular content item. | 2015-03-26 |
20150088789 | HIERARCHICAL LATENT VARIABLE MODEL ESTIMATION DEVICE, HIERARCHICAL LATENT VARIABLE MODEL ESTIMATION METHOD, SUPPLY AMOUNT PREDICTION DEVICE, SUPPLY AMOUNT PREDICTION METHOD, AND RECORDING MEDIUM - A hierarchical latent structure setting unit | 2015-03-26 |
20150088790 | HYBRID SYSTEM FOR DEMAND PREDICTION - In demand prediction, a history of demand for a resource is modeled to generate a baseline model of the demand, and demand for the resource at a prediction time is predicted by evaluating a regression function of depth k operating on an input data set including at least the demand for the resource at the prediction time output by the baseline model and measured demand for the resource measured at k times prior to the prediction time. The resource may be off-street parking, and the input data set may further include weather data. The regression function may comprise a support vector regression (SVR) function that is trained on the history of demand for the resource. The baseline model suitably comprises a Fourier model of the history of demand for the resource. | 2015-03-26 |
20150088791 | GENERATING DATA FROM IMBALANCED TRAINING DATA SETS - Injecting generated data samples into a minority data class of an imbalanced training data set is provided. In response to receiving an input to balance the imbalanced training data set that includes a majority data class and the minority data class, a set of data samples is generated for the minority data class. A distance is calculated from each data sample in the set of generated data samples to a center of a kernel that includes a set of data samples of the majority data class. Each data sample in the set of generated data samples is stored within a corresponding distance score bucket based on the calculated distance of a data sample. Generated data samples are selected from a number of highest ranking distance score buckets. The generated data samples selected from the number of highest ranking distance score buckets are injected into the minority data class. | 2015-03-26 |
20150088792 | Learning Geofence Models Directly - Methods and apparatus are directed to geofencing applications that utilize machine learning. A computing device can receive a plurality of geofence-status indications, where a geofence-status indication includes training data associated with a geofence at a first location. The geofence is associated with a geographical area. The computing device trains a geofence-status classifier to determine a geofence status by providing the training data as input to the geofence-status classifier. The training data includes data for a plurality of training features. After the geofence-status classifier is trained, the computing device receives query data associated with a second location. The query data includes data for a plurality of query features. The query features include a query feature that corresponds to a training feature. The query data is input to the geofence-status classifier. After providing the query data, the trained geofence-status classifier indicates the geofence status. | 2015-03-26 |
20150088793 | SKILLS ONTOLOGY CREATION - Disclosed in some examples are systems, methods, and machine readable mediums which allow for the automatic creation of a skills hierarchy. The skills hierarchy comprises an organization of a standardized list of skills into a hierarchy that describes category relationships between the skills in the hierarchy. The category relationships may include no relationships, parent relationships, and child relationships. A skill may be considered a parent of another skill if the parent skill describes a broader category of skill that includes the child. Other relationships such as grandparent (e.g., a parent's parent), great-grandparent, grandchild, great grandchild and so on may be defined inferentially as well. In some examples, the constructed hierarchy may be organized with broader skills at higher levels and narrower skills at lower levels. | 2015-03-26 |
20150088794 | METHODS AND SYSTEMS OF SUPERVISED LEARNING OF SEMANTIC RELATEDNESS - A method of evaluating a semantic relatedness of terms. The method comprises providing a plurality of text segments, calculating, using a processor, a plurality of weights each for another of the plurality of text segments, calculating a prevalence of a co-appearance of each of a plurality of pairs of terms in the plurality of text segments, and evaluating a semantic relatedness between members of each the pair according to a combination of a respective the prevalence and a weight of each of the plurality of text segments wherein a co-appearance of the pair occurs. | 2015-03-26 |
20150088795 | Minimizing Global Error in an Artificial Neural Network - Computer systems, machine-implemented methods, and stored instructions are provided for minimizing an approximate global error in an artificial neural network that is configured to predict model outputs based at least in part on one or more model inputs. A model manager stores the artificial neural network model. The model manager may then minimize an approximate global error in the artificial neural network model at least in part by causing evaluation of a mixed integer linear program that determines weights between artificial neurons in the artificial neural network model. The mixed integer linear program accounts for piecewise linear activation functions for artificial neurons in the artificial neural network model. The mixed integer linear program comprises a functional expression of a difference between actual data and modeled data, and a set of one or more constraints that reference variables in the functional expression. | 2015-03-26 |
20150088796 | METHODS AND APPARATUS FOR IMPLEMENTATION OF GROUP TAGS FOR NEURAL MODELS - Certain aspects of the present disclosure support assigning neurons and/or synapses to group tags where group tags have an associated set of parameters. By using group tags, neurons or synapses in a population can be assigned a group tag. Then, by changing a parameter associated with the group tag, all synapses or neurons in the group may have that parameter changed. | 2015-03-26 |
20150088797 | SYNAPSE CIRCUITS FOR CONNECTING NEURON CIRCUITS, UNIT CELLS COMPOSING NEUROMORPHIC CIRCUIT, AND NEUROMORPHIC CIRCUITS - Example embodiments relate to a synapse circuit connecting neuron circuits by using two memristors so as to enhance symmetry, a neuromorphic circuit using the same, and a unit cell composing the neuromorphic circuit. | 2015-03-26 |
20150088798 | DETECTING BEHAVIORAL PATTERNS AND ANOMALIES USING METADATA - A method and a system are provided that include retrieving, from one or more databases, a first set of information including metadata of electronic communications of one or more entities, and retrieving, from one or more databases, a second set of information including metadata of telecom communications of the one or more entities. The method and system also include analyzing the metadata of the electronic communications and the metadata of the telecom communications to determine one or more interconnection associations of the one or more entities, and identifying activities and characteristics attributable to the one or more entities based on the one or more interconnection associations. The method and system are useful for identifying networks through metadata to prevent criminal or other unlawful activity (e.g., fraud, theft, etc.) and/or to mine for opportunities. | 2015-03-26 |
20150088799 | INPUT ASSISTANCE DEVICE, INPUT ASSISTING METHOD, AND RECORDING MEDIUM STORING INPUT ASSISTANCE PROGRAM - An input assistance device according to an exemplary aspect of the present invention includes: an operation storing unit which stores a plurality of types of operations targeting a display object arranged in a shared screen shared by a plurality of terminal devices; an operation history storing unit which stores a history operation that is a performed operation targeting an arranged object which is the display object stored in display object storing unit and arranged in the shared screen, in order of performance of the history operation, and stores participating user identifiers that are identifiers of users of the plurality of terminal devices; and an operation score deriving unit which derives an operation probability being a probability that a target user performs next time a candidate operation being the operation stored in the operation storing unit, based on a target user identifier, the history operation, and the participating user identifier. | 2015-03-26 |
20150088800 | SYSTEM AND METHOD FOR TESTING AND CONFIGURING APPLICATION CONTROL RULES - Disclosed are systems, methods and computer program products for configuring application control rules. The system creates a new application control rule that specifies restrictions or permission on execution a software application, a function of an application or a category of applications. The system then collects information about one or more computers in a network, including information about software applications deployed on the computers and existing application control rules. The system then tests the new application control rule using the collected information to determine verdicts rendered by the new application control rule that restrict or permit execution of an application, certain function of an application or a category of applications. The system then compares verdicts rendered by the new application rule with the verdicts rendered by the existing application control rules to identify conflicting rules, and reconfigures the new application control rule to eliminate conflicts. | 2015-03-26 |
20150088801 | Predicting Interest Levels Associated with Publication and Content Item Combinations - A method of predicting interest levels associated with publication and content item combinations is described. Additionally, a server computing device for predicting interest levels associated with publication and content item combinations is described. Further, a computer-readable storage device having processor-executable instructions embodied thereon is described. The processor-executable instructions are for predicting interest levels associated with publication and content item combinations. | 2015-03-26 |
20150088802 | METHOD OF DETERMINING SHORT TERM DRIVING TENDENCY AND SYSTEM OF CONTROLLING SHIFT USING THE SAME - A method of determining a short term driving tendency and a system of controlling shift using the same that reflects precisely a will of a driver on the shift by determining a short term driving tendency is disclosed. The method may include detecting input variables, determining whether determination condition of the short term driving tendency is satisfied, calculating tendencies and output membership function values according to a plurality of fuzzy rules based on the input variables if the determination condition of the short term driving tendency is satisfied, and determining a short term driving tendency index based on the tendencies and the output membership function values according to the plurality of fuzzy rules. | 2015-03-26 |
20150088803 | CHARACTERIZING TARGET MATERIAL PROPERTIES BASED ON PROPERTIES OF SIMILAR MATERIALS - Roughly described, a technique for approximating a target property of a target material is provided. For each material in a plurality of anchor materials, a correspondence is provided between the value for a predetermined index property of the material and a value for the target property of the material, the values of all the index properties being different. A predictor function is identified in dependence upon the correspondence. A computer system determines a value for the target property for the target material in dependence upon the predictor function and a value for the index property for the target material. The determined value for the target property for the target material is reported to a user. The correspondence can be provided in a database on a non-transitory computer readable medium. The correspondence can be determined experimentally or analytically for each material in a plurality of anchor materials. | 2015-03-26 |
20150088804 | HIERARCHICAL LATENT VARIABLE MODEL ESTIMATION DEVICE, HIERARCHICAL LATENT VARIABLE MODEL ESTIMATION METHOD, AND RECORDING MEDIUM - A hierarchical latent structure setting unit | 2015-03-26 |
20150088805 | AUTOMATIC CACHING OF SCAN AND RANDOM ACCESS DATA IN COMPUTING SYSTEMS - Approaches, techniques, and mechanisms are disclosed for improved caching in database systems that deal with multiple data access patterns, such as in database systems that interface with both OLTP and Data Warehouse clients. A cache is deployed between a database server and a storage system that stores data units. Some of the data units accessed by the database server are buffered within the cache. The data units may be associated with data access patterns, such as a random data access pattern or a scan data access pattern, in accordance with which the database server is or appears to be accessing the data units. A processor selects when to cache data units accessed by the database server, based at least on the associated data access patterns. Recent access counts may also be stored for the data units, and may further be utilized to select when to cache data units. | 2015-03-26 |
20150088806 | SUPPORTING MULTI-TENANCY IN A FEDERATED DATA MANAGEMENT SYSTEM - A system and method for supporting multi-tenancy in a federated data management system are provided herein. The method includes receiving a query from a client at a data management server, wherein the query includes a tenant property condition corresponding to the client. The method also includes identifying an external data store including data specified by the query and determining whether the external data store is multi-tenant enabled. The method further includes removing the tenant property condition and executing the query to retrieve the specified data if the external data store is not multi-tenant enabled. | 2015-03-26 |
20150088807 | SYSTEM AND METHOD FOR GRANULAR SCALABILITY IN ANALYTICAL DATA PROCESSING - A method of resolving data queries in a data processing system. The method comprises receiving in the data processing system a data query, where the data processing system stores a plurality of information units describing pluralities of data elements, a first information unit having a retrieval subunit that includes information for retrieving all unique data elements in a first plurality of data elements and a summary subunit including summarized information about data elements in the first plurality of data elements. The method further includes deriving, via the data processing system, a result of the data query, wherein the result of the data query comprises a plurality of new data elements. The data processing system uses summary subunits of information units to select a set of information units describing data elements that are sufficient to resolve the data query. | 2015-03-26 |
20150088808 | Dynamic Determination of Pattern Type and Chart Type for Visual Analytics - Systems and methods for determining alternative visual analytics are described. Visual analytics result from the application of visual analytic patterns that include instructions for generating visualizations of analytical data. Analytical data is the result of the execution of analytical operations specified in a report definition on an underlying business object. By analyzing the metadata associated with the report definition or visual analytic pattern, alternative visual analytic patterns may be determined that better represent the character of the analytical data. The metadata may include a mapping that associates alternative visual analytic pattern s with a business object, a report definition, or another visual analytic pattern. Accordingly, the determination of the alternative visual analytic patterns may be based on the mappings. The alternative visual analytic pattern s may then be applied to the analytic data to generate one or more alternative visual analytics that may be selected by a user. | 2015-03-26 |
20150088809 | DENSELY GROUPING DIMENSIONAL DATA - Methods, computer systems, and stored instructions are described herein for densely grouping dimensional data and/or aggregating data using a data structure, such as one that is constructed based on dimensional data. When smaller tables are joined with a larger table, a server may analyze the smaller tables first to determine actual value combinations that occur in the smaller tables, and these actual value combinations are used to more efficiently process the larger table. A dense data structure may be generated by processing dimensional data before processing data from fact table. The dense data structure may be generated by compressing ranges of values that are possible in dimensions into a range of values that actually occurs in the dimensions. The compressed range of values may be represented by dense set identifiers rather than the actual compressed range of values. | 2015-03-26 |
20150088810 | EFFICIENT COORDINATION ACROSS DISTRIBUTED COMPUTING SYSTEMS - A first computer of a distributed computing system receives a request for a transaction. The transaction is an eXtended Architecture (XA) protocol based global transaction. The first computer generates a unique identifier for the request. The first computer sends the unique identifier to a second computer of the distributed computing system. The unique identifier enables the second computer to participate with the first computer as an XA protocol based resource participant. | 2015-03-26 |
20150088811 | MECHANISM TO RUN OLTP WORKLOAD ON IN-MEMORY DATABASE UNDER MEMORY PRESSURE - Techniques are provided for maintaining data persistently in one format, but making that data available to a database server in more than one format. For example, one of the formats in which the data is made available for query processing is based on the on-disk format, while another of the formats in which the data is made available for query processing is independent of the on-disk format. Data that is in the format that is independent of the disk format may be maintained exclusively in volatile memory to reduce the overhead associated with keeping the data in sync with the on-disk format copies of the data. | 2015-03-26 |
20150088812 | MAINTAINING STALENESS INFORMATION FOR AGGREGATE DATA - Computer systems, machine-implemented methods, and stored instructions are provided herein for maintaining information that describes aggregate characteristics of data within zones. Stored data may be separated into defined zone(s). Data structure(s), such as zone map(s), may store, for each of the zone(s), aggregate characteristic(s) of data in the zone, and a stored indication of whether or not the zone is stale. When a change is made to data in a particular zone that was not stale, a zone manager causes the particular zone to become stale if the change can result in the particular zone having data that is not included in the particular zone's stored aggregate characteristic(s). On the other hand, if the change cannot result in the particular zone having data that is not included in the particular zone's stored aggregate characteristic(s), then the zone manager does not cause the particular zone to become stale. | 2015-03-26 |
20150088813 | Combined Row and Columnar Storage for In-Memory Databases for OLTP and Analytics Workloads - Columns of a table are stored in either row-major format or column-major format in an in-memory DBMS. For a given table, one set of columns is stored in column-major format; another set of columns for a table are stored in row-major format. This way of storing columns of a table is referred to herein as dual-major format. In addition, a row in a dual-major table is updated “in-place”, that is, updates are made directly to column-major columns without creating an interim row-major form of the column-major columns of the row. Users may submit database definition language (“DDL”) commands that declare the row-major columns and column-major columns of a table. | 2015-03-26 |
20150088814 | POINT OF INTEREST DATABASE MAINTENANCE SYSTEM - A method of processing data at a server | 2015-03-26 |
20150088815 | METHOD AND SYSTEM FOR EFFECTING INCREMENTAL CHANGES TO A REPOSITORY - A method, system, and computer-program product for effecting incremental changes to a repository are disclosed. The method includes receiving an incremental feature package and applying the one or more revisions to the repository. In such methods, systems, and computer-program products, the incremental feature package includes one or more revisions to be made to a repository. | 2015-03-26 |