21st week of 2014 patent applcation highlights part 59 |
Patent application number | Title | Published |
20140143118 | System and Method for Providing Market Updates in an Electronic Trading Environment - A system and method are provided for modifying how market updates are provided in an electronic trading environment upon detecting one or more triggering events. One example method includes defining an event to be used to trigger modification of how market updates are provided to a client entity, receiving a market update from an electronic exchange, and, when the event is detected, modifying how the market update is provided to the client entity. As an example, the modification of how the market update is provided to the client entity may include providing less data in relation to market updates, and sending the market updates less frequently. | 2014-05-22 |
20140143119 | System And Method For Optimizing The Frequency Of Market Information Updates In An Electronic Trading Environment - A system and method for optimizing the frequency of market information updates in an electronic trading environment are described herein. According to one example embodiment, by optimizing the frequency of market information updates, the burden on the client device to update the graphical user interface may be reduced, while still providing an accurate portrayal of the market to the user. An example method includes associating different precedence levels with messages comprising market information. Messages containing market information related to the inside market may be associated to a higher precedence level. Whereas messages containing market information relating to the quantities at prices outside the inside market may be associated with a lower precedence level. Based on the precedence level associated with a message, a client device may update the graphical user interface or the message may be stored in a data structure until a pre-defined condition is satisfied. | 2014-05-22 |
20140143120 | METHOD FOR ESTABLISHING INVESTMENT TRANSACTIONS USING SECOND SCREEN TECHNOLOGY AND A COMPUTER NETWORK SYSTEM EMPLOYING SAME - A method and a computer network system for establishing a transaction for transferring security shares in exchange of capital investment via the use of second screen technology is disclosed. The system synchronizes a plurality of client computing devices by periodically sending thereto a notification regarding a television program about a fund-seeking company currently in broadcast. An investment user registered with the system may use the client computing device to obtain further information regarding the fund-seeking company while watching the television program, and complete a transaction to acquire shares thereof. | 2014-05-22 |
20140143121 | System and Method for Programming a Trading System - A trading system includes a server co-located at a financial exchange, a programmable logic device, a logic programmer, a user account that is accessible over a network connection a code storage device that stores code associated with the user account to be programmed into the programmable logic device and a network connection between the programmable logic device and a financial exchange. A method of programming a trading system connected to a financial exchange includes transmitting code to a server, storing code on a server, compiling the code and at least one code library by synthesizing logic elements and mapping logic elements to logic elements in a programmable logic device, and programming a programmable logic device connected to a financial exchange. | 2014-05-22 |
20140143122 | Systems and Methods for Implementing a Confirmation Period - Systems and methods for implementing a confirmation period are disclosed. An example method includes identifying a market condition associated with a quantity of a tradeable object of a trading strategy, wherein the market condition triggers an adjustment to the trading strategy; initiating a confirmation period in response to the market condition; when a reevaluation of the market condition during the confirmation period indicates that the market condition has ceased, preventing the adjustment to the trading strategy; and when the market condition persists throughout the confirmation period, proceeding with the adjustment to the trading strategy. | 2014-05-22 |
20140143123 | DETECTION AND MITIGATION OF EFFECTS OF HIGH VELOCITY PRICE CHANGES - The disclosed embodiments relate to mechanisms to rapidly detect and respond to situations where a market is not operating in a fair and balanced manner or otherwise where the market value is not reflective of a true consensus of the value of the traded products among the market participants. In particular, the disclosed embodiments continually scan for, rapidly detect and respond to extreme changes, either up (“spike”) or down (“dip”) in the market, such as a “flash crash,” where a precipitous market move occurs. Generally, the disclosed embodiments determine when a market for a particular product moves too quickly in too short of period of time, e.g. the velocity of the market exceeds a defined threshold limit. | 2014-05-22 |
20140143124 | Equity Crowd Funding With Heterogeneous Investors - In some embodiments of the invention, a method operates an equity crowd funding system with different types of investors. The method includes registering a company with an equity crowd funding system. The method may also include registering a first investor with the equity crowd funding system. The method may also include registering a second investor with the equity crowd funding system. Each of the first and second investors is an unaccredited investor, an accredited investor, an institutional investor, a non-profit investor, or an entrepreneur. Further, the first and second investors are different types of investors. The method may also include sending offers for equity holdings in the company in exchange for funds to the first and second investors. | 2014-05-22 |
20140143125 | Automated Securities Trade Execution System And Method - An automated securities order execution system includes order entering means for a client to enter an order and at least one filtering means for determining whether the order can be automatically executed. Routing means are used for routing the order to a destination based upon the determination made by each of the filtering means. After the order has been properly routed, the order is executed and the result of the order execution is reported to the client. | 2014-05-22 |
20140143126 | Loan Analysis And Management System - A computer implemented method and a system for analyzing and managing multiple syndicated loan transaction elements, for example, legal loan transaction documents, bank books, compliance reports, etc., are provided. An information analysis platform (IAP) receives the syndicated loan transaction elements from multiple data sources. The IAP extracts data items from the syndicated loan transaction elements and converts the data items into multiple data fields for enhanced review, interpretation, comparison, and statistical analysis of the syndicated loan transaction elements. The IAP analyzes the syndicated loan transaction elements using the data fields via analytical tools and expert inputs received via a graphical user interface, and estimates one or more factors, for example, impact of structural elements on loss given default, probability of default and pricing, impact of each data field for short and long term changes in default and loss given default assumptions, etc., based on the analysis. | 2014-05-22 |
20140143127 | SYSTEMS AND METHODS FOR PROVIDING SELLER-INITIATED FINANCING IN PRIVATE SALES - Methods and systems are disclosed for providing seller-initiated financing in a sale of an item between private parties. A financial service system configures a financing program to give sellers the opportunity to offer prospective buyers financing directly. The financial service system enrolls a given seller in the program, providing resources and services to the seller to help market the sale and select a credit-worthy buyer. Once the transaction is completed, the financial service system transfers proceeds to the seller, then configures a loan account and payment plan for the buyer. Alternatively, the program can be implemented with an intermediate service provider, such as an online marketplace retailer. The service provider enrolls the seller and assists with marketing and buyer selection, and the financial service system transfers proceeds to the seller and service provider, and configures a loan account and payment plan for the buyer. | 2014-05-22 |
20140143128 | UNSECURED TO SECURED LOAN CONVERSION IN AUTOMOBILE FINANCE - Systems and methods are disclosed for configuring a loan account program to provide buyers of items, particularly automobiles, the full principal of the loan directly into a financial service account. A financial service system receives a request for a loan from a buyer. Following a risk assessment check, the financial service system configures an unsecured loan product for the buyer and transfers the entire financed principal into a financial service account associated with the buyer. Upon confirmation of the purchase and/or satisfaction of other criteria, the buyer's loan account may be converted to a secured loan account product with more favorable terms. | 2014-05-22 |
20140143129 | VERSATILE SYSTEM FOR MORTGAGE PROCESSING - The present invention provides a versatile, automated system for processing mortgages in a convenient, easy and economical manner. The system of the present disclosure provides an operational kernel that consolidates all aspects of applying for, processing, underwriting, and approving a mortgage. The system provides various structures, engines and methods for consolidating all aspects of mortgage application, handling, administration and approval processes within a unified operational environment. | 2014-05-22 |
20140143130 | VERSATILE SYSTEM FOR MORTGAGE PROCESSING - A versatile, automated system for processing mortgages in a convenient, easy and economical manner. The system of the present disclosure provides an operational kernel that consolidates all aspects of applying for, processing, underwriting, and approving a mortgage. The system provides various structures, engines and methods for consolidating all aspects of mortgage application, handling, administration and approval processes within a unified operational environment. | 2014-05-22 |
20140143131 | VERSATILE SYSTEM FOR MORTGAGE PROCESSING - A versatile, automated system for processing mortgages in a convenient, easy and economical manner. The system of the present disclosure provides an operational kernel that consolidates all aspects of applying for, processing, underwriting, and approving a mortgage. The system provides various structures, engines and methods for consolidating all aspects of mortgage application, handling, administration and approval processes within a unified operational environment. | 2014-05-22 |
20140143132 | VERSATILE USER INTERFACE SYSTEM FOR LOAN PROCESSING - The present invention provides a versatile, automated system for processing mortgages in a convenient, easy and economical manner. The system of the present disclosure provides an operational kernel that consolidates all aspects of applying for, processing, underwriting, and approving a mortgage. The system provides various structures, engines and methods for consolidating all aspects of mortgage application, handling, administration and approval processes within a unified operational environment. | 2014-05-22 |
20140143133 | Method and System for Private Association Rating System - A method and system for obtaining a numerical expression based on statistical analysis of the risk, quality and performance of a private association, to represent the creditworthiness and health of that private association. Users of the system can use the resulting score number in assisting with purchasing or investment decisions. | 2014-05-22 |
20140143134 | SYSTEM AND METHOD OF DETECTING AND ASSESSING MULTIPLE TYPES OF RISKS RELATED TO MORTGAGE LENDING - Embodiments include systems and methods of detecting and assessing multiple types of risks related to mortgage lending. One embodiment includes a system and method of detecting and assessing risks including fraud risks, early payment default risks, and risks related to fraudulently stated income on loan applications. One embodiment includes a computerized method that includes creating a combined risk detection model based on a plurality of risk detection models and using the combined risk detection model to evaluate loan application data and generate a combined risk score that takes into account interaction of different types of risks individually and collectively detected by the plurality of risk detection models. | 2014-05-22 |
20140143135 | VOLUME BASED TRANSACTION COST RECOVERY - Apparatus and methods for determining a surcharge yield are provided. A surcharge behavior may be monitored during a time period. A change in a first performance metric may be monitored during the time period. A change in a second performance metric may be monitored during the time period. A relationship between the surcharge behavior, the change in the first performance metric and the change in the second performance metric may be determined. The surcharge yield may be determined based on the relationship. Apparatus and methods for adjusting a transaction cost recovery amount are provided. A rate of change in a transaction volume may be monitored. The transaction volume may be associated with a merchant location. When a threshold rate of change is detected the transaction cost recovery amount may be adjusted. | 2014-05-22 |
20140143136 | SYSTEM AND METHOD FOR SIMPLIFIED CHECKOUT WITH PAYMENT FLOAT - In various embodiments, a system and method for providing simplified checkout with payment float are provided. In example embodiments, an identifier that corresponds to a payment account of a user is received at a payment provider system. A determination is made that the identifier corresponds to a payment account of the user at the payment provider system. A determination is made to provide a float option to float payment for the user in a payment transaction involving a merchant system. A user interface providing the float option is presented to the user. If the user selects the float option, payment is floated to the user and the user agrees to pay back the floated payment within a predetermined time period. | 2014-05-22 |
20140143137 | DEVICE PAIRING VIA TRUSTED INTERMEDIARY - Embodiments are directed at systems, apparatuses, and methods for indirect device pairing through a trusted intermediary. One embodiment is directed to a method including receiving a pairing identifier associated with an untrusted device controller. The method further comprises extracting the pairing identifier from the pairing request, searching a pairing identifier database for a matching pairing identifier, determining an untrusted device controller associated with the matching pairing identifier, and sending the pairing request to the untrusted device controller. The untrusted device controller may identify the untrusted device, associate the pairing identifier with the trusted intermediary, and lock the pairing identifier. The method further comprises receiving a pairing response indicating that the untrusted device is paired with the computer. Accordingly, the trusted device is indirectly paired to the untrusted device and the trusted device is configured to complete a transaction with the untrusted device without communicating transaction information to the untrusted device. | 2014-05-22 |
20140143138 | REPUTATION ASSESSMENT VIA KARMA POINTS - This patent describes a system and/or a method that facilitates ensuring reliability in an online transaction. An interference component can receive data related to at least one user involved with an online transaction associated with commerce. An evaluation component can generate a reputation associated with the user based on at least one online activity and can employ a pre-determined handshake period for at least one of a feedback on the online transaction or an acknowledgement of a portion of the online transaction. | 2014-05-22 |
20140143139 | SYSTEM AND METHOD FOR FACILITATING A TRANSACTION BETWEEN AN ENTERPRISE AND A PERSON USING A MOBILE DEVICE - A system and method for a transaction between a person using a mobile device and an enterprise is disclosed. A computing system, application program interface, and data storage, and network connectivity is provided. Data files can be presented to the mobile device. A system and method for conducting a transaction structured between a merchant and a customer with a mobile device involving the interchange of information is also disclosed, Data is presented to the mobile device of the customer by a push notification, messaging, text messaging, SMS, multimedia messaging, MMS, internet communication, mobile web communication, mWeb, application program communication, mobile application program, mApp, electronic mail and/or e-mail. The transaction may comprise a session; session data is available for a specified use or time. Information may comprise personally-identifiable information (PII), private health-care information (PHI), private credit information (PCI) and/or enterprise secure data (ESD). | 2014-05-22 |
20140143140 | Financial Account Management - An automated account management system provides a user with the ability to establish rules that dictate how the account management system is to manage the user's accounts. Once the user specifies a set of rules, the system automatically manages multiple accounts across multiple financial institutions in accordance with the user-defined rules. Other features, such as an on-line bill payment system, a money transfer system, and a retirement planning system, may be integrated within the automated account management system to provide the user with even greater control over his or her financial assets. | 2014-05-22 |
20140143141 | Method for expert Advisors to provide one on one phone call or chat advice services through unique empowered independent agents to consumers using mobile devices - The present invention provides techniques for managing, supporting and empowering Independent Agents to offer a method for enabling expert Advisors to deliver, and charge for, advice to consumers, by connecting two parties in real time in an online chat using mobile devices. The present invention also provides the method and techniques for expert Advisors, in turn, to provide their service through a multiplicity of Independent Agent channels without the potential for communication device conflict; thereby ensuring successful connections for consumers. | 2014-05-22 |
20140143142 | Electronic Currency System - An electronic currency system having Currency Issuing Authorities that are coupled to a money generator device for generating and issuing to subscribing customers electronic currency backed by correspondent Currency Issuing Authorities and participating Financial Institutions that accept and distribute the electronic money; a plurality of devices that are used by subscribers for storing electronic money and for performing money transactions with other participants and participating Currency Issuing Authorities and Authorized Financial Institutions, for exchanging electronic money with other like transactions; and verification arrangement for maintaining the integrity of the system, and for detecting counterfeiting and tampering within the system. The electronic currency consists of data in a form suitable to be stored in a participant's data storage medium, comprising information on the currency value, authentication values, certificate chain, and identification of the participants' devices. | 2014-05-22 |
20140143143 | USING CARD IMAGE TO EXTRACT BANK ACCOUNT INFORMATION - A method to complete a sales transaction. The method includes (a) obtaining, by a merchant mobile device, a digital image of a financial card of a consumer, wherein the digital image captures a code and an account number, (b) requesting a payment of the sales transaction by (i) extracting, by a processor of the merchant mobile device using optical character recognition, the account number and the code, (ii) identifying a depository financial institution and a consumer financial account based on the code and the account number, respectively, and (iii) sending a request to the depository financial institution to transfer an amount of the payment from the consumer financial account to a merchant financial account controlled by the merchant, and (c) receiving, by the merchant mobile device, a confirmation of completing the electronic funds transfer, wherein the sales transaction is completed in response to the confirmation. | 2014-05-22 |
20140143144 | SYSTEMS AND METHODS FOR PROCESSING ELECTRONIC PAYMENTS USING A GLOBAL PAYMENT DIRECTORY - A computer system for use with a memory device for facilitating electronic payments to a payee from an account associated with a payor is provided. Payor profile information is stored in the memory device, which payor profile information is associated with the payor. A token identifier is created which is associated with the payor profile information. The token identifier is transmitted to a payee, for retransmittal of the token identifier by the payee to the computer system during a subsequent transaction between the payor and the payee. | 2014-05-22 |
20140143145 | ENVIRONMENT AND METHODS FOR ENABLING ELECTRONIC TRANSACTIONS - A method includes receiving a request for registered payment options associated with a user computing device, where the request includes an identifier uniquely identifying one of the user computing device and the user. The method includes identifying one or more payment options associated with the device identifier, where each of the one or more payment options is associated with respective payment instrument information. The method includes providing one or more codes, where each code of the one or more codes identifies a respective payment option of the one or more payment options. The method includes receiving a first code of the one or more codes and transaction information. The method includes accessing, based upon the first code, payment instrument information associated with the payment option identified by the first code, and causing the processing of the payment instrument information in relation to a transaction identified by the transaction data. | 2014-05-22 |
20140143146 | SYSTEMS AND METHODS FOR GENERATING AND USING A TOKEN FOR USE IN A TRANSACTION - Systems and methods are provided for generating and using a token for authorizing a payment to satisfy an agreement for goods and/or services. The token may be generated based on information related to the agreement, as well as a specified validity period and token type. The generated token may then be used within the specified validity period to authorize a payment to satisfy the agreement. The token may be a limited-use token having a predetermined number of uses, such that after the token has been used the predetermined number of times, the token may be destroyed such that the payment is not authorized more than the predetermined number of uses. | 2014-05-22 |
20140143147 | TRANSACTION FEE NEGOTIATION FOR CURRENCY REMITTANCE - Described herein are systems and methods for conducting remittances transactions with mobile and other electronic devices. In some embodiments, the systems and methods permit a user of a mobile or other electronic device to query multiple service providers for fee information from a single location. And in some instances, such fee information is provided to the user in real time. | 2014-05-22 |
20140143148 | SYSTEM AND METHOD FOR IMPROVING RELIABILITY OF DISTRIBUTED ELECTRONIC TRANSACTIONS - A system and method are disclosed that separate control functionality from the management functionality for conducting electronic transactions. The control functions are performed by a third party resulting in a low overhead since significant overhead is incurred in response to an anomalous event, thus facilitating high throughput electronic transactions when anomalous events are infrequent. Further, the third party does not need to have access to confidential information since it only controls by observing, validating and certifying the observed communications in a specified manner to prevent confidential information from leaving the context of the transaction. Management of the transactions based on consideration of substantive information is provided by the participants. A preferred system of the invention comprises a validation authority, a logical boundary at which validation authority undertakes control of communications, and validation rules specifying parameters for observation and the nature of comparisons. | 2014-05-22 |
20140143149 | Contextualized Access Control - Contextual information associated with a mobile device can be automatically acquired using various sensors on the device. Based on the contextual information and an access control policy associated with an application on the mobile device, a level of access to the application can be determined. An entity may be identified, authenticated and authorized to gain full access, varying degree of restricted access or no access to the application based on the access control policy. Different applications may be provided different levels of access based on the access control policy associated with each application. | 2014-05-22 |
20140143150 | ELECTRONIC PAYMENT METHOD AND DEVICE FOR SECURELY EXCHANGING PAYMENT INFORMATION - The present invention relates to an electronic payment method for securely exchanging information between an authentication device and a server via a communication device. The method comprises the following steps: acquiring by the authentication device a payment amount and a seller identifier, displaying the payment amount on a display of said authentication device, acquiring by the authentication device user feedback data by means of a user interface of said authentication device, generating, at the authentication device, a secure payment request comprising the displayed payment amount, said seller identifier and an authentication device identifier stored in the authentication device, and transmitting said secure payment request to the server by using said communication device as relaying device. | 2014-05-22 |
20140143151 | SYSTEM AND METHOD FOR SIMPLIFIED CHECKOUT - In various embodiments, a system and method for providing simplified checkout are provided. In example embodiments, an identifier that corresponds to a payment account of a user is received at a payment provider system. Account information from the payment account of the user is retrieved from a payment data storage of the payment provider system. The account information is used in a payment transaction involving a merchant system. A payment interface having transaction fields populated with the account information retrieved from the payment account of the user is presented to the user while the user maintains a presence on a webpage of a merchant system. | 2014-05-22 |
20140143152 | METHODS AND SYSTEMS USING CONTACTLESS CARD - It is desirable to implement security features that can prevent the unauthorized use of a customer's sensitive account information from an RFID sticker. The methods and systems described herein attempt to resolve the deficiencies with the conventional RFID stickers. In a more secure implementation, a financial institution allows a customer to activate or deactivate the account for use with the RFID sticker by submitting a request to the financial institution using internet banking, mobile banking, SMS texting, or other communications method. | 2014-05-22 |
20140143153 | INFORMATION DISTRIBUTION APPARATUS, INFORMATION DISTRIBUTION SYSTEM, INFORMATION DISTRIBUTION METHOD, AND RECORDING MEDIUM - An information distribution apparatus includes an acquiring unit that acquires individual identification information, product identification information, and user identification information. The information distribution apparatus includes a storing unit that stores the authentication information and the user identification information in an associated manner in a predetermined storing device. The information distribution apparatus includes a deciding unit that decides, whether the received authentication information and the received user identification information are stored in an associated manner in the predetermined storing device. The information distribution apparatus includes a distributing unit that distributes, when it is decided by the deciding unit that the received authentication information and the received user identification information are stored in an associated manner in the predetermined storing device, content that is identified by product identification information that is associated with the authentication information to the terminal device. | 2014-05-22 |
20140143154 | Software DRM Offline Purchase - A system and method for protecting content is described, the system and method comprising a content item which has been segmented into at least two portions, each portion being encrypted according to a different encryption key, a single content rights license associated with the content item, the license including at least two encrypted decryption keys operative to decrypt at least one of the at least two portions, such that any two encrypted decryption keys of the at least two encrypted decryption keys includes a first key which is less securely encrypted than the second key, a plurality of decryption keys, each one of the decryption keys being able to decrypt at least one of the at least two encrypted decryption keys, a decryptor for decrypting the at least one of the at least two encrypted decryption keys, and a second decryptor for decrypting, with the at least one of the at least two encrypted decryption keys, at least one portion of the at least two portions of the content item. | 2014-05-22 |
20140143155 | ELECTRONIC PAYMENT METHOD, SYSTEM AND DEVICE FOR SECURELY EXCHANGING PAYMENT INFORMATION - Electronic payment method for securely exchanging payment information between an authentication device and an authorization server via a communication device. The authentication device comprising an interface for data exchange with the device, a user interface for user authentication data input, a nonvolatile memory for storing an authentication device ID, a data memory for storing a cryptographic key and a crypto-processor for performing cryptographic operations. The communication device comprising a device ID and an interface for receiving and sending data, the authorization server comprising an interface for data exchange with the device, a database for storing a plurality of customer accounts each including an authentication device ID associated to a device holder authentication data, a data storage for storing a second cryptographic key, and a cryptographic unit for performing cryptographic operations. | 2014-05-22 |
20140143156 | Computer architecture for managing courseware in a shared use operating environment - Methods, devices, and systems are provided in a multi-level computer architecture which provides improved capabilities for managing courseware and other content in a shared use operating environment such as a computer network. In particular, the invention provides a commercial networked instruction content delivery method and system which does not exclude synchronous sharing but is focused on asynchronous sharing. Security means in the architecture provide content property holders with the ability to know how many minutes of use an individual made of licensed material and with increased certainty that their material cannot be used, copied, or sold in usable form unless and until a user site is connected or reconnected to a minute-by-minute counter which is located off the premises of the user. This security link helps protect software and other works which are being sold or licensed to an individual, organization, or entity, and creates income opportunities for owners of such content. | 2014-05-22 |
20140143157 | Design and Analysis of Customer Feedback Surveys - Systems and methods of design, delivery, and analysis of customer feedback surveys include receiving interaction content. Interaction content is analyzed to identify at least one issue arising in the interaction content. A survey of a plurality of questions is automatedly created based upon the identified at least one issue. A delivery channel for the survey is determined. The survey is delivered through the determined delivery channel. A survey response with survey results data is received. | 2014-05-22 |
20140143158 | Methods, Software And Devices For Automatically Calculating Valuations Of Leasable Commercial Property - Methods, software and devices for valuing leasable assets are disclosed. A data model of future cash flows in defined time periods for those leasable assets is created. The data model is automatically populated with rent predicted by analyzing stored records of executed leasing agreements, each specifying rent for one of the leasable assets. The data model is also automatically populated with rent predicted by analyzing stored records of planned leasing agreements, each specifying rent for one of the leasable assets in time periods when rent is not specified by one of the executed leasing agreements. The data model is also automatically populated with rent predicted for the leasable assets by analyzing at least pre-defined market conditions, in time periods when rent is not specified by one of the executed leasing agreements or planned leasing agreements. A value of the leasable assets is calculated in dependence on the populated data model. | 2014-05-22 |
20140143159 | Method for a Transactional Flow to enable In-Store Reading - A transactional flow to facilitate lending of digital content at an authorized location to an authenticated electronic device. | 2014-05-22 |
20140143160 | RENTAL SERVICE PROVIDER MESSAGING SYSTEM - Disclosed is a rental service provider messaging system comprised of a system database configured to receive registration details of rental service providers. The database is configured for the registered rental service providers to enter details of clients required to contact the rental service provider. The client details include particulars of predetermined acceptable government-issued identification associated with that client and is also configured to be searched by any registered rental service provider when initially engaging with a client for any recorded entries for that client. The search includes the particulars of details of predetermined acceptable government-issued identification of the client. The database is also configured to electronically message the registered rental service provider that listed the client on the database if the client is revealed in the database search. The electronic message advises the rental provider of predetermined details of the client initially engaging the services of another rental service provider. | 2014-05-22 |
20140143161 | SYSTEM AND KIOSK APPARATUS FOR COLLECTING END-OF-LIFE MOBILE PHONES - A system for collecting end-of-life mobile phones includes a kiosk apparatus for performing an authentication procedure in which an authentication request is made using registration information including registrant information and end-of-life mobile phone information and a barcode label is issued when an authentication number is input according to the authentication request, and an identifying procedure for storing or discharging the end-of-life mobile phone by checking the presence of the barcode label attached thereto and identifying whether the mobile terminal is a normal mobile phone when the end-of-life mobile phone is put therein; and an integrated operation system having an operating system program to communicate with a plurality of kiosk apparatuses through a network, issue the authentication number corresponding to the authentication request of the kiosk apparatus, and check and statistically analyze an individual or integrated collection amount of kiosk apparatuses. | 2014-05-22 |
20140143162 | SYSTEM AND METHOD FOR GATHERING DATA FOR DETECTING FRAUDULENT TRANSACTIONS - A system and method for gathering data for detecting fraudulent transactions includes, in one embodiment, a web page that contains a fraud data gathering script and causes a client device to download a fraud detection applet. The fraud data gathering script causes the client device to collect information from the client device that is usable to identify the client device. The fraud detection applet causes the client device to connect to an identification echo service server to obtain the actual IP address of the client device. The fraud detection data, including the identifying information and the actual IP address, are then sent to a web server and/or a fraud data gathering server for further processing and to determine whether a transaction with the client device is likely to be fraudulent. | 2014-05-22 |
20140143163 | USER CHARACTERISTICS-BASED SPONSORED JOB POSTINGS - A system may include a network interface, a user interface, and a recommendation engine. The user interface may be configured to receive a job characteristic of a job profile of a job posted to the social network and a job bid from an entity related to job to the social network. The recommendation engine may be configured to determine an aggregate job score for the user based on a relevance of the job characteristic to a user characteristic and the job bid. The network interface may be configured to transmit a message related to the job to the user based, at least in part, on the aggregate job score. | 2014-05-22 |
20140143164 | TECHNIQUES FOR QUANTIFYING THE JOB-SEEKING PROPENSITY OF MEMBERS OF A SOCIAL NETWORK SERVICE - Techniques are described herein for deriving, for each member of a social network service, a metric representing the job-seeking propensity of the member. Additionally, techniques for classifying each member with a job-seeking status (e.g., active job-seeker, passive job-seeker, or non-job-seeker) are described. A score-generating algorithm will analyze a variety of input data—including member profile data, social graph data, and activity or behavior data—to derive a job-seeker score, representing the job-seeking propensity of a member. | 2014-05-22 |
20140143165 | CUSTOMIZING A USER-EXPERIENCE BASED ON A JOB-SEEKER SCORE - Techniques are described herein for deriving, for each member of a social network service, a metric representing the job-seeking propensity of the member. Additionally, techniques for classifying each member with a job-seeking status (e.g., active job-seeker, passive job-seeker, or non-job-seeker) are described. A score-generating algorithm will analyze a variety of input data—including member profile data, social graph data, and activity or behavior data—to derive a job-seeker score, representing the job-seeking propensity of a member. Once derived, the metric is used to customize, personalize or otherwise tailor a user-experience. | 2014-05-22 |
20140143166 | IDENTIFYING MEMBERS OF A SOCIAL NETWORK AS CANDIDATE REFERRAL SOURCES - Systems and methods for identifying members of a social network service as job referral sources are described. In some example embodiments, the systems and methods may receive or access information associated with an available job, and for a member of a social network that is affiliated with the available job (e.g., is employed by the company providing the available job), identify a connection within the social network that is a suitable job referral source by utilizing an algorithmic process that determines the suitability of members connected to the identified connection as candidates for the available job. | 2014-05-22 |
20140143167 | IDENTIFYING MEMBERS OF A SOCIAL NETWORK AS CANDIDATE REFERRAL SOURCES - Systems and methods for identifying members of a social network service as candidate referral sources are described. In some example embodiments, the systems and methods may receive or access information associated with an available job, and for a member of a social network that is affiliated with the available job (e.g., is employed by the company providing the available job), identify a connection within the social network that is a suitable candidate referral source by utilizing an algorithmic process that determines the suitability of members connected to the identified connection as candidates for the available job. | 2014-05-22 |
20140143168 | Method and Apparatus for Work File and Profile Pool - The present system provides a method and apparatus for automatically creating a profile for an individual based on an individual's biographical information, work history, awards and recognition, training, and certifications. The system captures the most recent update of an individual's biographical information when applying for a job or providing up to date information to an employer; records work history including job title and dates when an individual is hired, transferred, or promoted, or changes employment between companies; tracks the list of recognition and awards received by an individual; tracks the list of courses taken and successfully passed; captures any certifications earned; allows an individual to share some or all of the information to a prospective employers; allows an employer to search the collection of profiles; and enables auto-fill of information in an application form for a potential job opportunity. | 2014-05-22 |
20140143169 | SYSTEMS, DEVICES, AND METHODS FOR CARRIER VERIFICATION IN A FREIGHT TRANSPORTATION NETWORK - Computer-implemented systems, and methods of using the same, for freight carrier verification comprising: a database of freight carriers, freight transport equipment, and operators; a database of freight transport orders, each order comprising an associated carrier; a device attached to freight transport equipment and configured to transmit freight transport equipment information; a device attached to freight transport equipment and configured to transmit operator biometric information; and a software module configured to generate a shared portal that displays information associated with the orders including the carrier, the equipment, the operator, and the biometric information, wherein the portal is accessible by all users associated with an order. | 2014-05-22 |
20140143170 | MANIFEST DELIVERY SYSTEM AND METHOD - There is provided a method and system of determining efficient routing of a mail piece in a delivery system for delivering mail pieces. The system determines whether or not the mail piece requires urgent delivery. The system determines a weight of the mail piece. Also, the system determines, based on the urgency determination and the weight determination, a most cost-effective place in which to introduce the mail piece into the delivery system. | 2014-05-22 |
20140143171 | ENHANCED LOCATION INFORMATION FOR POINTS OF INTEREST - Systems, methods, and computer program products are provided for identifying a serviceable address that is associated with a street network connection point and a parcel drop-off point. For example, in one embodiment, the serviceable address may be associated with a street network connection point that is part of a digital map. The serviceable address may also be associated with a parcel drop-off point that includes parcel drop-off point information, such as a parcel drop-off point geo coordinate associated with the parcel drop-off point and street network connection point geo coordinate associated with the street network connection point. | 2014-05-22 |
20140143172 | SYSTEM, METHOD, SOFTWARE ARRANGEMENT AND COMPUTER-ACCESSIBLE MEDIUM FOR A MOBILE-COMMERCE STORE GENERATOR THAT AUTOMATICALLY EXTRACTS AND CONVERTS DATA FROM AN ELECTRONIC-COMMERCE STORE - Electronic documents, such as e-commerce stores and electronic forms, can be displayed on a range of devices, which have different screen properties. In order to present e-commerce stores in a visually consistent and readable way, they need to be converted. The present disclosure is applied to e-commerce stores that can be converted and provides a mobile engine with data from one or more e-commerce stores in an internal standardized format so that the mobile engine can adjust and optimize the data so that it can be optimally rendered into one or more mobile commerce stores for targeted end user machines. The automatic content identifier can be used to extract the relevant data from one or more e-commerce stores | 2014-05-22 |
20140143173 | SYSTEMS AND METHODS FOR USING A REVERSE MORTGAGE AS A PORTFOLIO SUPPLEMENT - Systems and methods are described for providing information to retirees wishing to supplement a retirement investment portfolio by judicious use of funds from one of several available reverse mortgage programs. System inputs can include data about the retiree(s), the investment portfolio, a primary residence, a desired amount of funds to be drawn on a monthly, yearly, or other regular basis. Based at least in part on the accepted data, various simulations can be run which show the likelihood of the portfolio lasting and providing the desired funds across the length of the retirement planning horizon. Simulations can include, scenarios in which (a) no reverse mortgage funds are used, (b) reverse mortgage funds are used until they are exhausted before beginning to draw funds from the investment portfolio, and/or (c) scenarios in which regularly scheduled reverse mortgage funds are used to supplement (and thereby reduce) portfolio withdrawals. | 2014-05-22 |
20140143174 | Method And Apparatus For Evaluating And Monitoring Collateralized Debt Obligations - Systems, methods, apparatus, computer program code and means for evaluating and monitoring collateralized debt obligations (CDOs) are provided which include identifying a first investment including interests in a first plurality of assets, identifying a second investment including interests in a second plurality of assets, identifying a common feature associated with both the first and second plurality of assets, and identifying a relative exposure to risk associated with the common feature. | 2014-05-22 |
20140143175 | RETIREMENT PLANNING METHOD - Retirement planning methods and systems for use with an individual investor having a retirement plan comprising assets and future liabilities. One or more computing devices perform the methods. Embodiments of the methods include determining a net present value of the assets and a net present value of the future liabilities. A funded ratio is calculated as a function of the net present value of the assets and the net present value of the future liabilities. If the funded ratio is less than a predetermined threshold value, the retirement plan is at risk of being underfunded. If the funded ratio is greater than the predetermined threshold value, the retirement plan is not at risk of being underfunded. An indication may be displayed indicating whether the retirement plan is at risk of being underfunded. | 2014-05-22 |
20140143176 | Leveraging to Minimize the Expected Inverse Assets - The question of how much should be placed at risk on a given investment, relative to the total assets available for investment, is basically that of determining the optimal leverage. An existing well known method for calculating optimal leverage does not appear to be derived from sound principles. The approach taken by the method described in this specification is to optimize the expected future inverse assets, conditioned on the assets having some estimated distribution. Asymptotically over time, the distribution of log-assets becomes Gaussian. Using this analysis, a couple of the more obvious strategies are ruled out, while the strategy of minimizing the reciprocal expected assets yields an elegant result that can also be interpreted in some sense as minimizing the risk of bankruptcy. Besides being applicable to Gaussian long term continuous time leveraging, methods are claimed for minimizing the inverse assets for intermediate and finite horizon continuous time leveraging, as well as for discrete time leveraging. It seems this inverse asset strategy is particularly relevant for insurance companies, financial security ratings, and financial leveraging. | 2014-05-22 |
20140143177 | SYSTEM AND METHOD FOR MANAGING TAX-DEFERRED RETIREMENT ACCOUNTS - A system and method of managing tax-deferred retirement accounts that enable the participants to invest in exchange traded funds (ETFs) and to forecast and intelligently plan for their retirement savings needs. The system and method preferably allow each participant to select an asset allocation model pursuant to which their investments will be managed and periodically rebalance the portfolio of each participant based on the selected asset allocation model. | 2014-05-22 |
20140143178 | MANAGING CONSISTENT INTERFACES FOR CREDIT PORTFOLIO BUSINESS OBJECTS ACROSS HETEROGENEOUS SYSTEMS - A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a credit portfolio model, a credit portfolio analytical result, a credit portfolio management process control, a financial instrument exposure profile analytical result, and/or a material supply and demand allocation business object. | 2014-05-22 |
20140143179 | ENERGY-SAVING EVALUATION DEVICE, ENERGY-SAVING EVALUATION METHOD, SERVER DEVICE, AND PROGRAM - Breakdown estimation unit obtains, by first processing portion, component ratio, by application, of energy usage amount in year using model case, and prorates, by second processing portion, record value of energy usage amount in year, by application, with component ratio obtained by first processing portion. Breakdown estimation unit prorates, by month, by third processing portion, energy usage amounts obtained by the second processing portion, excluding energy usage amount of one application, with component ratio, by month, of energy usage amount of the corresponding application in model case. Breakdown estimation unit estimates, by fourth processing portion, for each month, residual amount obtained by subtracting energy usage amounts prorated by third processing portion from record value of energy usage amount as the energy usage amount of the one application in month. | 2014-05-22 |
20140143180 | METHOD OF MAXIMIZING SHIPPING EFFICIENCY OF ABSORBENT ARTICLES - A process for shipping absorbent products having a substantially airfelt free absorbent core, on pallets, is provided. The loaded pallet comprises a plurality of packages, each having a plurality of disposable absorbent articles disposed within the interior space of the package, wherein the plurality of packages are arranged on the pallet such that the plurality of packages on the pallet exhibit a density of from about 11.0 lbs/ft | 2014-05-22 |
20140143181 | SYSTEMS AND METHODS FOR PROVIDING NETWORK OBJECTS THAT MOVE FREELY, EXPAND KNOWLEDGE AUTONOMOUSLY, AND COMMUNICATE WITH USERS OF A NETWORK - A method for providing information to a user of a computer in a network of computers via an object program which moves freely about the network to access and store data relating to knowledge attributes of property fields available in the network, expanding autonomously the knowledge attributes over time as the object moves about the network, and communicating the information of the knowledge attributes to and from the computers of requestors as requested. | 2014-05-22 |
20140143182 | SIMILARITY ANALYSIS WITH TRI-POINT DATA ARBITRATION - Systems, methods, and other embodiments associated with similarity analysis using tri-point arbitration are described. In one embodiment, a method includes selecting a data point pair and an arbiter point from a data set. A tri-point arbitration coefficient (ρTAC) is calculated for data point pairs based, at least in part, on a distance between the first and second data points and the arbiter point. A similarity metric is determined for the data set based, at least in part, on an aggregation of tri-point arbitration coefficients for data point pairs in the set of data points using the selected arbiter point. | 2014-05-22 |
20140143183 | HIERARCHICAL MODEL FOR HUMAN ACTIVITY RECOGNITION - The disclosure provides an approach for recognizing and analyzing activities. In one embodiment, a learning application trains parameters of a hierarchical model which represents human (or object) activity at multiple levels of detail. Higher levels of detail may consider more context, and vice versa. Further, learning may be optimized for a user-preferred type of inference by adjusting a learning criterion. An inference application may use the trained model to answer queries about variable(s) at any level of detail. In one embodiment, the inference application may determine scores for each possible value of the query variable by finding the best hierarchical event representation that maximizes a scoring function while fixing the value of the query variable to its possible values. Here, the inference application may approximately determine the best hierarchical event representation by iteratively optimizing one level-of-detail variable at a time while fixing other level-of-detail variables, until convergence. | 2014-05-22 |
20140143184 | TURN RESTRICTION INFERENCING - Architecture that extracts turn restrictions from geolocation traces both offline and online (in realtime). By identifying from the location traces which specific turns a driver takes and at which points in time, turn restrictions and associated time-dependence can be mined (inferred). Turn restrictions can be inferred based on the nature of drivers who tend to take the shortest route. The architecture can infer allowed turns and turn restrictions by mining user location traces, infer turn restrictions and associated confidence scores by comparing the routes followed by users with the routes that are shortest when applying the set of known turn restrictions, and infer turn restrictions based on the accessibility criterion such as each road section (between two adjacent intersections) is accessible in at least one way. A scoring method is provided for calculating the probability for a turn restriction to exist by fusing the scores described above with statistical information. | 2014-05-22 |
20140143185 | METHOD AND APPARATUS FOR INFERRING LOGICAL DEPENDENCIES BETWEEN RANDOM PROCESSES - Certain aspects of the present disclosure relate to methods and apparatus for inferring causal relationship between random processes using a temporal learning algorithm. The temporal learning algorithm determines structure of a causal graph with a set of nodes. Input to the nodes may be binary time series (e.g., random processes). The output of the temporal learning algorithm may be a labeled directed graph in which the direction of the connection between each two node indicates causal direction and the strength of connectivity between the nodes indicates intensity of the causal influence. The temporal learning algorithm may iteratively update strength of connections between nodes to track variations in real time. | 2014-05-22 |
20140143186 | HYBRID CLUSTERING FOR DATA ANALYTICS - The invention includes methods and systems for analyzing data to determine trends in the data and to identify outliers. The methods and systems include a learning algorithm whereby a data space is co-populated with artificial, evenly distributed data, and then the data space is carved into smaller portions whereupon the number of real and artificial data points are compared. Through an iterative process, clusters having less than evenly distributed real data are discarded. Additionally, a final quality control measurement is used to merge clusters that are too similar to be meaningful. The invention is widely applicable to data analytics, generally, including financial transactions, retail sales, elections, and sports. | 2014-05-22 |
20140143187 | METHOD FOR PROBABILISTICALLY PREDICTING LOCATION OF OBJECT - Provided is a method for predicting location of an object by using a learning model which includes an input layer, a hidden layer, and an output layer each including one or more nodes, that are associated with each other by a weight. When a definitive time value is input to the input layer, the output layer is configured to output a probability value that the object is located at a specific place. | 2014-05-22 |
20140143188 | METHOD OF MACHINE LEARNING, EMPLOYING BAYESIAN LATENT CLASS INFERENCE: COMBINING MULTIPLE GENOMIC FEATURE DETECTION ALGORITHMS TO PRODUCE AN INTEGRATED GENOMIC FEATURE SET WITH SPECIFICITY, SENSITIVITY AND ACCURACY - BAYSIC (BAYesian System for Integrated Combination) combines sets of genomic and other biological data features to optimize selected data feature attributes, for example, detecting genome variants including single nucleotide variants (SNVs) and small insertion/deletions in genomes. The present disclosure presents one possible embodiment employing BAYSIC to combine single nucleotide variants detected by several distinct variant calling methods into an integrated SNV call set that is more accurate than any single SNV calling method or any ad hoc method of combining call sets. BAYSIC is a, tested and validated method using unsupervised machine learning, employing Bayesian latent class inference to combine variant sets produced by different packages. | 2014-05-22 |
20140143189 | ON-DEMAND POWER CONTROL SYSTEM, ON-DEMAND POWER CONTROL SYSTEM PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM RECORDING THE SAME PROGRAM - In order to estimate behavior of a person at home from a feature and a power consumption pattern of an electrical device, an on-demand power control system of the present invention includes initial human-induced probability value estimation means that estimates a state of the electrical device, and estimates an initial value of a human-induced probability of the electrical device based on the estimated state of the electrical device, human position estimation means for calling up the initial value of the human-induced probability of the electrical device and a likelihood map of this device from a memory, performing, for all samples, a process of referring to a sample human position selected from the likelihood map and calculating a weight of the device by multiplying a human position and the human-induced probability of the device, and estimating a probability of a human position at each time point until a final time; and human-induced probability re-estimation means for performing recalculation of the human-induced probability based on the human-induced probability and a human position probability, performing the recalculation of the human-induced probability until a value of the recalculation converges, and outputting the human-induced probability and the human position probability when the value converges. | 2014-05-22 |
20140143190 | PIECEWISE LINEAR NEURON MODELING - Methods and apparatus for piecewise linear neuron modeling and implementing artificial neurons in an artificial nervous system based on linearized neuron models. One example method for operating an artificial neuron generally includes determining that a first state of the artificial neuron is within a first region; determining a second state of the artificial neuron based at least in part on a first set of linear equations, wherein the first set of linear equations is based at least in part on a first set of parameters corresponding to the first region; determining that the second state of the artificial neuron is within a second region; and determining a third state of the artificial neuron based at least in part on a second set of linear equations, wherein the second set of linear equations is based at least in part on a second set of parameters corresponding to the second region. | 2014-05-22 |
20140143191 | PIECEWISE LINEAR NEURON MODELING - Methods and apparatus for piecewise linear neuron modeling and implementing one or more artificial neurons in an artificial nervous system based on one or more linearized neuron models. One example method (for implementing a combination of a plurality of neuron models in a system of neural processing units) generally includes loading parameters for a first neuron model selected from the plurality of neuron models into a first neural processing unit, determining a first state of the first neural processing unit based at least in part on the parameters for the first neuron model, and determining a second state of the first neural processing unit based at least in part on the parameters for the first neuron model and on the first state. This method may also include updating the plurality of neuron models (e.g., by adding, deleting, or adjusting parameters for the first neuron model or another neuron model). | 2014-05-22 |
20140143192 | PREDICTION DEVICE, PREDICTION METHOD, AND COMPUTER READABLE MEDIUM - For each item, a factorial effect value is derived that represents the SN ratio of the prediction object to each data including the data of the item relative to the SN ratio of the prediction object to each data excluding the data of the item. The strength of the SN ratio of the comprehensive estimated value to the data of a plurality of items selected in descending order of the derived factorial effect value is calculated for each value of the number of items. On the basis of the calculated SN ratio of the comprehensive estimated value, the number of items is determined. In descending order of the derived factorial effect value, items in the determined number of items are selected. On the basis of the data of the selected items, a change of the prediction object is predicted by using a method such as a T-method. | 2014-05-22 |
20140143193 | METHOD AND APPARATUS FOR DESIGNING EMERGENT MULTI-LAYER SPIKING NETWORKS - Certain aspects of the present disclosure support a technique for designing an emergent multi-layer spiking neural network. Parameters of the neural network can be first determined based upon desired one or more functional features of the neural network. Then, the one or more functional features can be developed towards the desired functional features as the determined parameters are further adapted, tuned and updated. The parameters can comprise at least one of time constants of neuron circuits of the neural network, time constants of synapse connections of the neural network, timing parameters of the neural network, or timing aspects of learning in the neural network. The one or more functional features can comprise at least one of feature detection in a layer of the multi-layer spiking neural network or saliency detection in another layer of the multi-layer spiking neural network. | 2014-05-22 |
20140143194 | PIECEWISE LINEAR NEURON MODELING - Methods and apparatus for piecewise linear neuron modeling and implementing artificial neurons in an artificial nervous system based on linearized neuron models. One example method for operating an artificial neuron generally includes determining that a first state of the artificial neuron is within a first region; determining a second state of the artificial neuron based at least in part on a first set of linear equations, wherein the first set of linear equations is based at least in part on a first set of parameters corresponding to the first region; determining that the second state of the artificial neuron is within a second region; and determining a third state of the artificial neuron based at least in part on a second set of linear equations, wherein the second set of linear equations is based at least in part on a second set of parameters corresponding to the second region. | 2014-05-22 |
20140143195 | COMPLEX NFA STATE MATCHING - Disclosed is a method and system for matching a complex NFA state comprising a spinner followed by a character class sequence which may be represented by the general regular expression form [S] {N,M}[A0][A1] . . . [Ak−1]. An input transition activates the spinner and the spin count increments with successive matches of the spin class [S]. When the spin count is between N and M, sequence matching begins. Several base sequence CCLs are compared in parallel with a corresponding window of input symbols. If all match, a signal enters a delay line until the end of the base sequence. When the signal exits the delay line, extended sequence CCLs are accessed from a table sequentially and compared with successive input symbols. After the final extension CCL matches, an output transition is signaled. For short sequences, unused base sequence CCLs may be configured with look-ahead classes. | 2014-05-22 |
20140143196 | TASK COMPLETION - The concepts relate to task completion and specifically to aiding a user to complete an unfinished task at a subsequent time and/or on another device. One example can identify that a user is working on a task on a computing device associated with the user. In an instance when the user stops using the computing device without completing the task, the example can predict a likelihood that the user will subsequently resume the task on a second computing device associated with the user. In an instance where the likelihood exceeds a threshold, the example can attempt to aid the user in completing the task on the second computing device. | 2014-05-22 |
20140143197 | SYSTEM AND METHOD FOR DECISION REASONING - A method for decision reasoning, the method comprising using at least one hardware processor to: provide a database comprising decisions, questions and reasons; receive, from a user, a selection of a decision being part of said decisions; retrieve, from said database, relevant questions out of said questions, wherein said relevant questions are associated, within said database, with said decision received from the user; receive, from the user, answers to at least some of said relevant questions; process said answers so as to retrieve, from said database, one or more relevant reasons out of said reasons; and display said one or more relevant reasons to the user. | 2014-05-22 |
20140143198 | AUTOMATIC TEST GENERATION FOR DECISION TABLE BASED RULES - Systems and methods are disclosed for testing decision table-based rules. In an embodiment, a memory device may store instructions that cause a processor to perform a method comprising receiving one or more constraints for a set of data attributes, generating a structured data set of the data attributes having values based on the one or more constraints, and providing the structured data set to a decision table-based rule set. | 2014-05-22 |
20140143199 | GLOBAL POLICY FRAMEWORK ANALYZER - Analyzing a set of policies. A goal comprising a particular outcome is received. An analysis object comprising a data structure maintaining information needed to perform an analysis of the goal is defined. The analysis object is configured to limit a number of calculations needed to achieve the goal. Each member of a set of expressions found in the set of policies has an output. The output is the same for each expression. One of the set of expressions is solved. The solved output is cached in the analysis object such that the solved output is associated with each member of the set of expressions. The analysis object is processed to create a set of values that achieves the goal. Processing includes referencing the cache to retrieve the solved output each time a member of the set of expressions is to be solved during processing of the analysis object. | 2014-05-22 |
20140143200 | SYSTEM AND METHOD FOR DETERMINING FUZZY CAUSE AND EFFECT RELATIONSHIPS IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified. As such, fuzzy logic may the be applied to any such patterns to determine possible relationships among the potential causes and the potential effects associated with the infrastructure operational state. | 2014-05-22 |
20140143201 | DYNAMIC CONTENT FILE SYNCHRONIZATION - Dynamic file synchronization is performed in a client server environment. A first file is received including a first portion containing metadata and a second portion containing at least one content object. An address and a protocol for accessing a second file are determined using the first portion of the first file. Upon accessing the second file using the address and the protocol, a determination is made as to whether synchronization is needed. Upon determining that synchronization is needed, the first and second files are synchronized. | 2014-05-22 |
20140143202 | Regulated Texting Solution for Mobile Devices - A system for consolidating data messages includes a memory that stores data messages. Each of the data messages has a user field, an outside party field, and a timestamp field. The first data message's user field is associated with a first user, the outside party field is associated with a first outside party, and the timestamp field is associated with a first timestamp. The third data message's user field is associated with a first user, the outside party field is associated with a first outside party, and the timestamp field is associated with a third timestamp. A processor then groups the first data message and the third data message based at least in part upon the user field, outside party field, and timestamp field of each message. The processor then combines the first data message and the third data message into a consolidated data message. | 2014-05-22 |
20140143203 | INTELLIGENT IDENTIFICATION OF MULTIMEDIA CONTENT FOR SYNCHRONIZATION - An intelligent synchronization tool ensures access to desired content in a manner that automatically keeps the content current on the portable media device. A variation threshold or user-specified degree of content variation may be introduced among content downloaded to a user's mobile device to prevent the user from becoming bored. Furthermore, intelligent synchronization may automatically populate the portable media device with popular content to save a user time and/or use passive monitoring techniques to ascertain a user's preferences for subsequent population. | 2014-05-22 |
20140143204 | INTELLIGENT IDENTIFICATION OF MULTIMEDIA CONTENT FOR GROUPING - An intelligent synchronization tool ensures access to desired content in a manner that automatically keeps the content current on the portable media device. A variation threshold or user-specified degree of content variation may be introduced among content downloaded to a user's mobile device to prevent the user from becoming bored. Furthermore, intelligent synchronization may automatically populate the portable media device with popular content to save a user time and/or use passive monitoring techniques to ascertain a user's preferences for subsequent population. | 2014-05-22 |
20140143205 | Data replication protocol with efficient update of replica machines - Steady state data distribution is provided between a client application, a leader machine, and a plurality of replica machines. The distribution comprises the leader machine receiving an operation request from the client application, the leader machine sending the prepare message to each of the plurality of replica machines, the replica machines recording in their logs information on the operation, the replica machines sending acknowledgement messages to the leader machine, and the leader machine sending commit command messages to the replica machines. A new quorum of the replica machines is created by using log information. Replica machines that become part of the new quorum are updated in an efficient manner. | 2014-05-22 |
20140143206 | CONFIRMING DATA CONSISTENCY IN A DATA STORAGE ENVIRONMENT - A method for confirming replicated data at a data site, including utilizing a hash function, computing a first hash value based on first data at a first data site and utilizing the same hash function, computing a second hash value based on second data at a second data site, wherein the first data had previously been replicated from the first data site to the second data site as the second data. The method also includes comparing the first and second hash values to determine whether the second data is a valid replication of the first data. In additional embodiments, the first data may be modified based on seed data prior to computing the first hash value and the second data may be modified based on the same seed data prior to computing the second hash value. The process can be repeated to increase reliability of the results. | 2014-05-22 |
20140143207 | MANAGING REPLICATED DATA - An approach for managing replicated data is presented. Metadata is received specifying inter-data correlation(s), inter-replica correlation(s), and data-replica correlation(s) among replicas generated for a system. A unified replication metadata model specifying the correlations is generated. Based on the inter-replica correlation(s), a proper subset of the replicas is selected. Based on the inter-replica and inter-data correlation(s), the selected proper subset of replicas is indexed to generate a unified content index. A query is received to locate a data item in at least one of the replicas. Based on the unified content index, the unified replication metadata model, and the query, candidate replica(s) and corresponding confidence score(s) are determined. The confidence score(s) indicate respective likelihood(s) that the candidate replica(s) include the data item. | 2014-05-22 |
20140143208 | MAINTAINING ACCESS CONTROL LISTS IN NON-IDENTITY-PRESERVING REPLICATED DATA REPOSITORIES - Managing access control lists (ACLs) across replicated data repositories can include selecting, from a first data processing system, a controlled object and an ACL object bound to the controlled object, wherein the first data processing system is associated with a first user identity space, and creating, using a processor, a replicated version of the controlled object within a second data processing system associated with a second user identity space, wherein the second user identity space is different from the first user identity space. Managing ACLs further includes, creating, using the processor, a replicated version of the ACL object within the second data processing system and substituting, within the replicated version of the ACL object, an identity from the first user identity space with a selected identity from the second user identity space. | 2014-05-22 |
20140143209 | EMPLOYING USER-CONTEXT IN CONNECTION WITH BACKUP OR RESTORE OF DATA - The claimed subject matter relates to architectures for facilitating network-accessible or local backup or restore features in a manner that leverages event-oriented contextual information associated with one or more users of the data to be backed up or restored. In particular, a first restore-based architecture can interface with an associated second backup-based architecture that hosts or maintains a backup data store in order to retrieve a version of the data file that is desired by a user. Additionally, the first architecture can obtain a log of contextual event descriptions that can be aggregated by the second architecture or obtained independently from, e.g., a social networking service or a calendar application associated with the user. Thus, in addition to displaying time and date information associated with the desired version, the first architecture can provide the user with a social context of event from the social services feeds to aid the user in distinguishing between multiple versions of the data file. | 2014-05-22 |
20140143210 | SYSTEM AND METHOD FOR MANIPULATING DATA RECORDS - Systems and methods for manipulating data records in a byte accessible format are provided. Records may be loaded into one of two byte accessible files or arrays, with a determined record length added to the beginning and/or end of each record. Records may then be slewed between the two files and records added, removed, or modified at the split between the two files. | 2014-05-22 |
20140143211 | Managing and Reconciling Information Technology Assets in a Configuration Database - A method and system for managing and reconciling naming conflicts in a configuration database. Attributes are collected about a detected resource in a network. Valid names for the detected resource are created based on the collected attributes and a set of naming rules. A valid name is created for each naming rule, and the naming rules have a priority order. A master-alias table is search to locate a match between existing names of known resources recorded in the master-alias table and any of the valid names. A partial match of resource attributes is determined to exist when all of the valid names in the set of valid names do not match an existing name in a matching entry. The detected resource is determined to be a new resource or an existing resource based on a priority of the naming rules used to create the valid names. | 2014-05-22 |
20140143212 | AGGREGATING IDENTIFIERS FOR MEDIA ITEMS - A server device may receive multiple provider identifiers for a media item from multiple client devices. The multiple provider identifiers may each be associated with different media providers and may each be associated with the same media item. The server device may aggregate the multiple provider identifiers into entries in a data store. The server device may also analyze the entries in the data store and may request missing provider identifiers, merge entries that have duplicate information, and may indicate whether a media item is playable. | 2014-05-22 |
20140143213 | DEDUPLICATION IN A STORAGE SYSTEM - A IO handler receives a write command including write data that is associated with a LBA. The IO handler reserves a deduplication ID according to the LBA with which the write data is associated, within the scope of each LBA, each deduplication ID is unique. The IO handler computes a hash value for the write data. In case a deduplication database does not include an entry which is associated with the hash value, the IO handler: provides a reference key which is a combination of the LBA and the deduplication ID; adds to the deduplication database an entry which is uniquely associated with the hash value and references the reference key; and adds to a virtual address database an entry, including: the reference key; a reference indicator indicating if there is an entry that is associated with the present entry; and a pointer to where the write data is stored. | 2014-05-22 |
20140143214 | MAINTAINING ACCESS CONTROL LISTS IN NON-IDENTITY-PRESERVING REPLICATED DATA REPOSITORIES - Managing access control lists (ACLs) across replicated data repositories can include selecting, from a first data processing system, a controlled object and an ACL object bound to the controlled object, wherein the first data processing system is associated with a first user identity space, and creating, using a processor, a replicated version of the controlled object within a second data processing system associated with a second user identity space, wherein the second user identity space is different from the first user identity space. Managing ACLs further includes, creating, using the processor, a replicated version of the ACL object within the second data processing system and substituting, within the replicated version of the ACL object, an identity from the first user identity space with a selected identity from the second user identity space. | 2014-05-22 |
20140143215 | ASSURED FEDERATED RECORDS MANAGEMENT - A record is managed by obtaining from an external system on which a stored object comprising the record is stored a property of the stored object as stored on the external system. A stored property associated with the record is compared with the obtained property of the stored object. In the event the comparison does not match, responsive action is taken. | 2014-05-22 |
20140143216 | SYSTEMS AND METHODS FOR MATCHING, SELECTING, NARROWCASTING, AND/OR CLASSIFYING BASED ON RIGHTS MANAGEMENT AND/OR OTHER INFORMATION - Rights management information is used at least in part in a matching, narrowcasting, classifying and/or selecting process. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting. The matching and classification utility system may match, narrowcast, classify and/or select people and/or things, non-limiting examples of which include software objects. The Matching and Classification Utility system may use any pre-existing classification schemes, including at least some rights management information and/or other qualitative and/or parameter data indicating and/or defining classes, classification systems, class hierarchies, category schemes, class assignments, category assignments, and/or class membership. The Matching and Classification Utility may also use at least some rights management information together with any artificial intelligence, expert system, statistical, computational, manual, or any other means to define new classes, class hierarchies, classification systems, category schemes, and/or assign persons, things, and/or groups of persons and/or things to at least one class. | 2014-05-22 |
20140143217 | SYSTEM AND METHOD FOR MANAGING DATA POLICIES ON APPLICATION OBJECTS - Described herein are systems and methods for providing data policy management over application objects in a storage system environment. An application object may comprise non-virtual or virtual objects (e.g., non-virtual-based applications, virtual-based applications, or virtual storage components). An application object manager may represent application objects by producing mapping graphs and/or application object data that represent application objects in a standardized manner. A mapping graph for an application object may describe a mapping between the application object and its underlying storage objects on a storage system. Application object data may describe a mapping graph in a standardized format. Application object data representing application objects may be received by an application policy manager that manages data policies on the application objects (including virtual applications and virtual storage components) based on the received application object data. Data policies may include policies for backup, service level objectives, recovery, monitoring and/or reporting. | 2014-05-22 |