47th week of 2013 patent applcation highlights part 60 |
Patent application number | Title | Published |
20130311338 | APPROVAL SYSTEM FOR BUYER-INITIATED REQUISITION MODIFICATIONS - A method of modifying a requisition within approval and budgetary constraints by a procurement organization may include receiving the requisition from a requesting organization, where the requisition may comprise one or more lines, each having been approved by the requesting organization. The method may also include receiving a change to be applied to a first line associated with a first budget allocation, where the change may be received from a buyer in the procurement organization, and the change may be associated with a second budget allocation. The method may additionally include determining that the change violates a threshold, sending the change to the requesting organization for a second approval, receiving, from the requesting organization, an indication as to whether the second approval is granted, and creating a purchase order based on the indication as to whether the second approval is granted. | 2013-11-21 |
20130311339 | CHAT ENABLED ONLINE MARKETPLACE SYSTEMS AND METHODS - Embodiments of this disclosure relate to a computer-implemented method including the step of presenting on a graphical user interface reporting search results for a product, information for a plurality of potential vendors of the product. The method further includes presenting, on the graphical user interface, an option to interact with each of a subset of the potential vendors. The method also includes generating an interactive session between the user initiating the search and a selected vendor of the subset of the potential vendors. | 2013-11-21 |
20130311340 | SYSTEMS AND METHODS FOR DISPLAYING ITEMS - A method and a system for displaying items for sale is described. For example, plural icon size scaling values associated with plural items posted for sale on an e-commerce website may be determined. The plural icons corresponding to the plural items may be displayed on a display of a client machine, a size of each of the icons being scaled based on the icon size scaling value associated with the corresponding item. | 2013-11-21 |
20130311341 | Systems and Methods of Matching Purchase Requests with Consummated Sales - A sales matching system which may match sales of products or services with consummated sales by collecting selected leads from a group of lead suppliers, collecting a plurality of sales records from multiple sales sources, and matching at least some of the sales records to selected leads. The matches may be assigned a matching confidence, and may reach a threshold level of confidence to be considered a matched sale. The system may also generate invoices to selected sellers identifying invoice-able sales for which compensation may be obtained in exchange for providing leads giving rise thereto. | 2013-11-21 |
20130311342 | SYSTEM AND METHOD FOR OPTIMIZING DEBT COLLECTION IN BANKRUPTCY - A system and method for optimizing debt collection is described. The method includes establishing acceptable threshold amounts, receiving bankruptcy filing information via a computing network, determining if income and expense amounts exceed the acceptable threshold amounts, receiving credit reporting and transactional data from a financial network database, analyzing the credit reporting and transactional data to identify a pattern of consumption, identifying a geographic region associated with the bankruptcy filing information, receiving information regarding licensed attorneys from an attorney database, receiving a selection of an attorney, and transmitting bankruptcy filing information, the pattern of consumption, credit reporting data, and transactional data to the selected attorney. | 2013-11-21 |
20130311343 | Determining the Probability of Default for a Depository Institution - Systems and methods are provided for determining an indication that a depository institution (such as a bank) will default on its credit obligations to counterparties. In one embodiment, a method includes receiving information about the bank's financial performance and condition, bank structure information, bank closure information and other information about national and regional economic conditions; using this information to build a banking database; and then generating the indication representing the probability of default for each bank in the database. The analytical tool compares the historical characteristics of defaulting banks with those of non-defaulting banks during a training period, and generates an indication that can be interpreted as the probability of default for each individual bank during that period of time. An early-warning component of the system then generates an indication that can be interpreted as the expected probability of default for each surviving bank during a forward-looking forecast period. | 2013-11-21 |
20130311344 | ENGINE, SYSTEM AND METHOD OF PROVIDING THIRD PARTY BUSINESS VALUATION AND ASSOCIATED SERVICES - A computer-implemented engine, system and method for generating business valuations, scoring and/or flagging over a network, responsively to information input by a user remote from the engine, system and method. The invention may include a graphical user interface capable of locally querying a user to input the company information, at least one network port capable of remotely receiving the company information from the graphical user interface, and at least one engine communicatively connected to the at least one network port, which engine preferably includes a plurality of rules to generate, responsively to the input company information, at least one of a business valuation, a business score, and/or one or more business flags to be used as indicators in a network marketplace, for the company associated with the inputted company information. | 2013-11-21 |
20130311345 | Evaluating Energy Saving Improvements - A computer is used for obtaining information about a plural number of energy-saving measures. This can include information about costs of combinations of said energy-saving measures, said costs include first information about costs of making the measures, second information about rebates for the measures, and third information about energy-saving that will occur from the measures, where at least some of said third information will depend on said combinations of said energy-saving measures. An iterative algorithm is used which determines combinations and which determines which of the combinations produce maximum savings by combinations of the said first, second and third information. A report can be created. | 2013-11-21 |
20130311346 | COMPUTER-IMPLEMENTED MATCHING METHOD AND ENGINE - A computer implemented method and system for publishing best public limits and corresponding quantity and for matching an incoming outright order against price best match limits at corresponding quantities during the continuous trading phase is provided. An incoming outright order is entered in an incoming order book side. It is determined if the incoming outright order satisfies a matching condition by evaluating the sum of the incoming outright order limit and the best match limit of the outright order book side opposing to the incoming outright order book side wherein the best match limit of the outright order book side opposing to the incoming outright order book side also considers outright order book combinations resulting to the outright order book side opposing the incoming outright order book side. | 2013-11-21 |
20130311347 | GENERALIZED ORDER ALLOCATION SYSTEM AND METHOD - A computer-implemented method and system for allocating quantities of a plurality of orders stored in an order book side at a price level selected for execution is provided, wherein each order has a quantity and a entry time. A time sensitivity parameter is predefined, wherein the time sensitivity parameter is a non-negative real number representing a specific allocation scheme. The quantity to be allocated is received and is executable against the plurality of orders stored in the order book side at a price level selected for execution. A matched quantity is determined for each order of the plurality of orders stored in the order book side at the price level selected for execution. | 2013-11-21 |
20130311348 | Fitting digital currency into modern transactional ecosystems - This application described methods and means to construct a viable trading ecosystem for digital currency, gradually rising to local, and global prominence as the modern way to represent money. The application regards various media options to express the digital bit sequence which reflects the monetary value and the identity of the digital coin, including hard copies, and electronic variety. It Describes the ways to fuse a digital coin with any well defined terms of payments, and how to manage such coins as they are forwarded for redemption. The application describes various security means to insure the integrity of the digital mint. It also describes how to construct a hierarchy of authentication nodes such that each node has sufficient information to authenticate a digital coin, but not sufficient information to defraud a higher-up node. The application also describes how to inter-relate any number of independent digital mints so as to mutually honor each others' coins and thereby appear to the trader as a single mint. | 2013-11-21 |
20130311349 | Model-Based Selection Of Trade Execution Strategies - Effective selection of trade execution strategies using a multi-dimensional model is disclosed. A relationship exists between order difficulty and execution strategy. Execution strategy depends on order difficulty, and order difficulty has many dimensions. The multi-dimensional model classifies trade orders according to the dimensions, and then maps these classified trade orders into suitable execution strategies. For each trade order, one or more appropriate strategies are automatically selected and presented to the trader to assist the trader in making an informed and timely decision. | 2013-11-21 |
20130311350 | SYSTEMS AND METHODS FOR IMPLEMENTING POST-MATCHING TRADING - Systems and methods for implementing post-matching trading are provided. A financial instrument transaction system may include a database configured to store financial instrument information for reference entities; a memory for storing execution instructions; and a processor. The processor may execute the instructions. The processor may initiate a trading session for a predetermined duration. Prior to and during the trading session, the processor may receive from a plurality of trader clients trading instructions associated with the reference entity. The instructions may include either a buy or sell position and a price. At the end of the trading session, the processor may determine, based on predefined criteria, whether the trading session qualifies for a post-matching session. If the trading session qualifies for a post-matching session, the processor may provide a graphical user interface to a selected group of traders for trading in the post-matching session. | 2013-11-21 |
20130311351 | Systems and Methods for Determining Optimal Pricing and Risk Control Monitoring of Auctioned Assets Including the Automatic Computation of Bid Prices for Credit Default Swaps and the Like - Embodiments of the invention provide an innovative, fully-automated system that facilitates the buying and selling of debt-based derivatives and other assets. The techniques described herein eliminate opaqueness, inefficiencies, and lack of risk monitoring and provide an end-to-end, highly efficient reverse-auction platform that considers many aspects of risk control and other parameters. This is accomplished while computing a true CDS price by incorporating reference entity, primary and secondary insurance company default risks. Furthermore, the reference entity pricing model decouples the borrower from the entity issuing the debt and eliminates rating inflation due to digital discontinuity. | 2013-11-21 |
20130311352 | SECURITIES TRADING SIMULATION SYSTEM - According to one embodiment, a market information simulator delivers a simulation time faster than a real time to a market simulator. The market information simulator delivers historical market information including the same time as the simulation time to an algorithm processor. The algorithm processor orders and determines the historical market information, and sends, to the market simulator, order information in which a time in the historical market information is added to order contents. The market simulator creates market board information from the historical market information. The market simulator determines the market board information and the order information by agreement. | 2013-11-21 |
20130311353 | Foreign Exchange Trading System - Computer-implemented trading of financial products can include using a first communication channel to stream offering data for a plurality of different financial products from a server to a trading terminal. A second communication channel can be used to receive request for offers about ones of the financial products from the trading terminal. Such request can include user-specified parameters that modify or further specify characteristics of the desired products. Offers may then be determined for the product in accordance with the user-specified parameters and transmitted (over the second communication channel) back to the trading terminal. Each communication channel can be allocated a different priority and/or different level of system processing resources to optimize the allocation of system resources based on the criticality of data on each channel. | 2013-11-21 |
20130311354 | PRODUCT LEASING SYSTEM AND METHOD - A computerized system and method for leasing products includes defining a lease of an item, for example, an electronics product. The system includes a computer database that tracks product and service items, the cost for leasing of the items, and the cost to provide updates for product items. The bundled products and services are leased at a predetermined rate calculated using the database of the computerized system. At the option of the lessee, each product may be upgraded to a newer version of the original product in the same product class. The rate does not change over the course of the lease term. In the disclosed embodiment, the upgrade product is not identified in the lease because it is not available for sale or lease at the start of the lease term. | 2013-11-21 |
20130311355 | Financial Products with Consumer Protection Built-in for Future Time - Relationship banking and mobile banking are discussed and presented here. In Section 1, we present Pre-approval, Fulfillment, and Application Process. In Section 2, we present Financial Products for Protection of Consumers. In Section 3, we present Relationship-Based Score. In Section 4, we present Application of Credit Report for a “Binding” Pre-Approval for Lending Products. In Section 5, we present Deposit Slip Purchase. In Section 6, we present Reducing Frauds on Credit Cards. We also discuss the system and components, with different variations on system and method, or their designs. | 2013-11-21 |
20130311356 | Secure File Transfer with Electronic Payment Integration - A system for securely transferring an electronic package from one user to another includes a mechanism for requiring payment from the recipient of an electronic package before the recipient is permitted to receive the package. The sender of an electronic package may specify one or more files to be included in the package, one or more recipients of the package, and an amount of a required payment. Each recipient is notified of the electronic package and prompted to provide payment. The system permits each recipient to download the electronic package only if that recipient provides the required payment. The sender may specify a different payment amount for each recipient. The sender may add, delete, and modify files within the package over time. When a recipient downloads the package, the files that are within the package at that time are provided to the recipient. | 2013-11-21 |
20130311357 | METHODS FOR FACILITATING ONLINE TRANSACTIONS INVOLVING A PLURALITY OF UNIQUE CURRENCIES - The invention discloses methods for allowing a user to optimize online purchases of goods or services by providing real-time exchange data between a plurality of relevant currencies. Users may opt to put off a purchase or payment of a purchase based on currency exchange trajectories as presented at the time of “check out” from an Internet purchase. | 2013-11-21 |
20130311358 | DYNAMIC MANAGEMENT AND NETTING OF TRANSACTIONS USING EXECUTABLE RULES - Systems and methods for dynamically managing and netting transactions based on one or more sets of netting rules are disclosed. The present invention dynamically associates transactions with one or more collections based on the execution of netting rules to identify transactions that may be ideal for netting and to perform netting operations and calculations accordingly. The present invention may execute the netting rules according to the priority of the netting rule within a rule hierarchy and utilizes unique solutions allowing for the efficient processing of transactions even as netting rules are created, modified and removed from time-to-time. In addition, embodiments of the disclosed netting system utilize denormalized sets of data and maintain a complete audit trail for all operations. | 2013-11-21 |
20130311359 | TRIPLE-CLICK ACTIVATION OF A MONETIZING ACTION - A method and product for triple-click activation of a monetizing action. The method comprising: detecting, by a web browser displaying a web page, a triple-click action by a user; and in response to said detection performing a monetizing action, wherein the monetizing action is based upon a context of the triple-click action. A client-side script comprising computer readable medium retaining program instructions executable by a web browser, wherein the client-side script is configured to be associated with an object of a web document using an instruction; wherein the client-side script is configured to cause the web browser to invoke a monetizing action in response to a user performing a triple-click action on the object, wherein the monetizing action is based upon the object; and wherein the web document is a HyperText Markup Language (HTML) document or an Small Web Format (SWF) document. | 2013-11-21 |
20130311360 | PAYMENT MESSAGE ROUTING USING GEO-LOCATION - Methods and system for enabling safe and efficient money transfer between a sender and a beneficiary are provided. The method includes communicating with a beneficiary's mobile device to ascertain the beneficiary's current geo-location. Based on the geo-location and funds at hand, one or more receiving agents are selected to fulfill the transfer. The beneficiary is offered a choice of agents and the selected agent is provided with the money transfer details to complete the transfer. | 2013-11-21 |
20130311361 | SHARING VIRTUAL SPACE IN A VIRTUAL UNIVERSE - An approach that provides sharing of the same virtual space by a plurality of avatars in a virtual universe by grouping the avatars belonging to the virtual space and isolating each group. In one embodiment, there is an isolating tool, including a grouping component configured to group each of the plurality of avatars belonging to defined virtual space according to predefined grouping criteria. The isolating tool further includes an isolating component configured to isolate each group within each of the plurality of virtual spaces based on the grouping. | 2013-11-21 |
20130311362 | SYSTEMS AND METHODS FOR VERIFYING PAYEE INFORMATION IN ELECTRONIC PAYMENTS - A computer system including a processor, in communication with a database, programmed to identify a plurality of billers from the database, including biller information, and receive a payee file including payee information identifying a payee which issued a bill to a payor. The processor determines an approximate match score for each of the billers in a first set of billers of the plurality of billers by comparing payee information to biller information and identifies a candidate list of billers from the first set of billers having an approximate match score indicating a likelihood of matching the payee information. The processor adjusts the candidate list of billers by altering the match score of at least one candidate biller by comparing a payee account number of the payee information to an account mask associated with the candidate biller and generates an output file of candidate biller information from the adjusted candidate list. | 2013-11-21 |
20130311363 | DYNAMICALLY RE-PROGRAMMABLE TRANSACTION CARD - A dynamically re-programmable transaction card is capable of dynamically changing the information stored on various data tracks included on a magnetic strip(s) of the card. The information may be payment information associated with payment card, such as a credit card, debit card, gift card, etc., such that a user may select a payment type/card for a pending transaction and the data tracks may be dynamically programmed just prior to the pending transaction to allow for a transaction to processed using the user-selected payment information. During the period of time for which the transaction card is programmed, the card emulates the physical embodiment of the payment card selected. Additionally, the transaction card may be dynamically programmed with any other information needed to conduct a transaction that is typically stored on other convention magnetic stripe cards, such as loyalty card information, key code information (e.g., card-like hotel keys) and the like. | 2013-11-21 |
20130311364 | Managing Financial Accounts Associated with Residents of Controlled-Environment Facilities - Systems and methods for managing financial accounts associated with residents of controlled-environment facilities are disclosed. In some embodiments, a method may include receiving information corresponding to a pooled account (e.g., a trust account, etc.) held by a financial institution (e.g., a bank), at least in part, for the benefit of residents (e.g., work-release inmates, etc.) of a controlled-environment facility (e.g., a jail, prison, etc.). The method may also include allocating funds within the pooled account to corresponding residents. The method may further include designating a first portion of the funds allocated to a given resident as inaccessible to the resident and designating a second portion of funds allocated to the given resident as accessible to the resident. A magnetic card, near-field communications (NFC) device, or the like may be associated with the accessible portion of a resident's funds and used to complete transactions inside and/or outside of the controlled-environment facility. | 2013-11-21 |
20130311365 | BANKING SYSTEM CONTROLLED RESPONSIVE TO DATA BEARING RECORDS AND USER INPUT OF A PHONE RECIEVED SECURITY CODE - A banking system operates to cause financial transfers responsive to card data read from data bearing records by a card reader. The system includes at least one automated banking machine comprising a cash dispenser. The system is operative during a cash dispense transaction request to receive through an automated banking machine, machine user input of data corresponding to a mobile phone number. The system is operative to generate a security code for the requested cash dispense transaction. The system uses the phone number to send the generated security code to the mobile phone. The cash dispense transaction is allowed to proceed only if the system receives machine user input of the sent security code. | 2013-11-21 |
20130311366 | Medium Sensing Apparatus, Medium Handling Apparatus and Financial Device - Provided is a medium sensing apparatus. The medium sensing apparatus comprises a first frame having a hole in a side surface thereof, a second frame coupled to the first frame, a first sensor mounted on the first frame, a bracket connected to the first sensor, the bracket contacting the second frame, and a shaft disposed on the first sensor or the bracket to pass through the hole, the shaft being movable within the hole. | 2013-11-21 |
20130311367 | BIOMETRIC IDENTIFICATION AND AUTHENTICATION SYSTEM - Disclosed are methods, apparatus, and systems of biometric identification and authentication. In one embodiment, a method to authenticate a user at an automated teller machine is disclosed. In this embodiment, the method comprises: retrieving, by a processor of the automated teller machine, a numeric identification data inputted by the user; comparing, by the processor or by a processor of a remote sever, the numeric identification data against a stored set of numeric identification data in a user database stored in a memory communicatively coupled to the automated teller machine; and narrowing, by the processor or by the processor of the remote server, a user population to a first narrowed set of the user population based on the comparison of the numeric identification data against the stored set of numeric identification data. Multiple biometric identification techniques may then be used to authenticate the user at the automated teller machine. | 2013-11-21 |
20130311368 | AUTOMATIC AUTHENTICATION AND FUNDING METHOD - Embodiments of an automatic authentication and funding method include a location-based transaction method according to which an overseer partners with multiple providers of at least one of goods and services to sell the goods and services to authorized users of a payment device. A controller entity defines and identifies an authorized user, and the controller agrees to fund predefined purchases on behalf of the authorized user, and further agrees to fund a user account for the purchases. The overseer receives user data and provider data from the controller, and generates a payment device for the user. The overseer uses at least one location-based mechanism to place funds on the payment device from the user account under predefined circumstances such that the user is enabled to make the predefined purchases from the approved providers. | 2013-11-21 |
20130311369 | Card Payment Processing of Partial Authorizations Allowing for Partial Captures and Full Deposits - A payment processing system allows partial captures and full deposits after receiving a partial authorization result on a requested card transaction. When the partial amount authorized is less than the full transaction amount, but above a certain value (which can be merchant specified), the system can accept the partial amount (a partial deposit or partial capture) as payment for the transaction. When the partial amount authorized is less than the full transaction amount, and below a certain value (which can be merchant specified), the system can make a full deposit of the transaction amount. The system can use one or more factors, including historical information, in determining whether to attempt a full deposit. | 2013-11-21 |
20130311370 | MULTIPLE PARTY ON-LINE TRANSACTIONS - A role associated with one or more parties involved with a purchase transaction is received. A routing rule associated with the purchase transaction is also received, the routing rule defining how the purchase transaction is routed among the one or more parties. The purchase transaction is processed based on the role of each party and the routing rule. | 2013-11-21 |
20130311371 | METHOD, APPARATUS, AND SYSTEM FOR CONTROLLING ACCOUNT MANAGEMENT OPERATION - Embodiments of the present invention provide a method, an apparatus, and a system for controlling an account management operation, where the method includes: determining to perform an account management operation on an account of a user at a management terminal; acquiring user location information, where the user location information is used to indicate a location of the user; acquiring operation location information, where the operation location information is used to indicate a location of the management terminal; and according to the user location information and the operation location information, performing first control on the account management operation. Through the method, the apparatus, and the system for controlling the account management operation according to the embodiments of the present invention, the financial fraud can be prevented in advance. | 2013-11-21 |
20130311372 | SECURE DATA STORAGE AND TRANSACTION SYSTEM - Embodiments of the invention are directed to a system, method, or computer program product for a transaction apparatus for secure data storage and consolidation of data for easy implementation and utilization during a transaction. The transaction apparatus may be configured, in various embodiments, for receiving, storing, encrypting, decrypting, encoding, decoding, accessing, transferring, writing, and/or presenting transaction data including, but not limited to, financial data, authentication data, identification data, health care data, access data, personal data, and/or other data associated with a user. As such, the transaction apparatus may receive data from a user and store the data. The user may then provide authorization to access the data. The user may then select the data to be copied to an output device associated with the apparatus. The output devices may include, but are not limited to, a writable transaction card, an E-ink display, the mobile device, and the like. | 2013-11-21 |
20130311373 | APPARATUS AND METHOD FOR PAYING FOR A PRODUCT USING A NEAR FIELD COMMUNICATION DEVICE - An apparatus and a method perform paying for a product using a near field communication device. The method includes: when payment for a particular product is requested by a user, generating a payment request message for requesting payment for the particular product and transmitting the payment request message to a security element server; when a personal identification information request message for requesting personal identification information in response to the payment request message is received, receiving an input of personal identification information from the user; transmitting the input personal identification information to the security element server; and receiving a payment result message representing a result of the payment. | 2013-11-21 |
20130311374 | SYSTEMS AND METHODS FOR VERIFYING IDENTITIES - A method for verifying the identity of one party on behalf of another party is provided. The method includes providing a money-transfer system and a communication system that communicates with the money-transfer system; receiving at the money-transfer system from the first party certain verification criteria for confirming the identity of a second party; and storing the verification criteria in the host computer system of the money-transfer system. When an ID is received from the second party at a money-transfer location; the verification criteria is retrieved from the host computer system; and the acceptability of the ID is determined in accordance with the verification criteria. If the identification device is acceptable, identification information is obtained from the identification device; and the identification information is processed to verify the identity of the second party. In other embodiments, a method for pre-verifying the identity of a party and a system for performing the method of the invention are provided. | 2013-11-21 |
20130311375 | SYSTEMS AND METHODS FOR DYNAMIC TRANSACTION-PAYMENT ROUTING - A mobile payment transaction aggregator designed to identify, on a per transaction basis, a payment processor from a plurality of available payment processors with the lowest processing fee for the given transaction. Additionally, the aggregator may bundle multiple payment transactions of a single consumer across multiple merchants for additional savings. | 2013-11-21 |
20130311376 | MONEY TRANSFER TRANSACTIONS VIA PRE-PAID WIRELESS COMMUNICATION DEVICES - Systems and methods for performing money transfer transactions via a wireless communication device, such as a cellular phone, are provided. The wireless communication device may be associated with, or automatically linked to, at least one payment source account. The wireless communication device may be associated with at least one pre-paid payment source account. In one example, the wireless communication device is a pre-paid cellular phone and/or is associated with a pre-paid money transfer account. The wireless communication device may access a pre-directed phone number, e.g., *55, to access a money transfer service provider. Once connected to a money transfer service provider, a user may initiate a money transfer via the wireless device, which is optionally paid to a payee in-person at a money transfer service provider location. | 2013-11-21 |
20130311377 | SYSTEMS AND METHODS TO FACILITATE REPEATED PURCHASES - Systems and methods are provided to facilitate repeated purchase and payment transactions. In one aspect, a system includes an interchange and a data storage facility configured to store payment transaction records associated with phone numbers. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats and to communicate with the common format processor in a common format. The common format processor is configured to identify a prior payment transaction associated with a phone number in response to a message from a mobile phone having the phone number, communicate with a merchant to repeat a purchase according to the prior payment transaction, and transmit via one of the converters premium messages to the mobile phone to collect funds for a payment to repeat the purchase. | 2013-11-21 |
20130311378 | SYSTEMS AND METHODS TO FACILITATE REPEATED PURCHASES - Systems and methods are provided to facilitate repeated purchase and payment transactions. In one aspect, a system includes an interchange and a data storage facility configured to store payment transaction records associated with phone numbers. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats and to communicate with the common format processor in a common format. The common format processor is configured to identify a prior payment transaction associated with a phone number in response to a message from a mobile phone having the phone number, communicate with a merchant to repeat a purchase according to the prior payment transaction, and transmit via one of the converters premium messages to the mobile phone to collect funds for a payment to repeat the purchase. | 2013-11-21 |
20130311379 | SYSTEMS AND METHODS TO APPROVE ELECTRONIC PAYMENTS - Systems and methods are provided to facilitate online transactions via mobile communications. In one aspect, a system includes a data storage facility to store an account identifier of a user and a phone number of the user and an interchange coupled with the data storage facility. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the common format processor in a common format and to communicate with the controllers in different formats. The interchange uses the converters to communicate with the mobile phone of a user to confirm the identity of the user using a user terminal separate from the mobile phone for subsequent payment requests from the user terminal to be fulfilled using the account identifier. | 2013-11-21 |
20130311380 | NETWORK TRANSACTIONS - A system and method which enable online network participants to enter into transactions with each other are provided. Accounts are maintained for first and second network participants, and an authentication token is generated that is associated with the account of the first network participant. The first network participant may use the authentication token in a transaction request, and the transaction request can then be applied to the accounts of both participants. | 2013-11-21 |
20130311381 | LIMITING DATA EXPOSURE IN AUTHENTICATED MULTI-SYSTEM TRANSACTIONS - The limiting of data exposure in authenticated multi-system transactions is disclosed. A client system authenticates and requests secured data and unsecured data with an initial system. The initial system transmits to an external system a token request that corresponds to the request for the secured data. A token is generated and passed to the initial system, which relays the same to the client system. The client system uses the token to access the secured data on the external system, while also retrieving the unsecured data on the initial system. The initial system thus does not have access to the secured data, while the request therefor is known. | 2013-11-21 |
20130311382 | OBTAINING INFORMATION FOR A PAYMENT TRANSACTION - A computer-readable medium embodies a computer program for obtaining information for a payment transaction. The computer program comprises computer-readable program code for: generating a first message including an identifier and a request for the information, sending the first message via a first communication path, receiving a second message including the information and the identifier via a second path different from the first communication path, and processing the payment transaction using the information obtained in the second message. | 2013-11-21 |
20130311383 | GLOBAL SECURE SERVICE PROVIDER DIRECTORY - Systems and methods enable members of a secure transaction network to readily identify the appropriate trusted service manager (TSM) to support a particular transaction. A global directory of TSM providers is provided that a secure service provider can use for determining which TSM provider is the authorized manager of a security domain for the particular transaction. In aspect the directory of TSM providers may be stored within a mobile device secure element. In another aspect, the directory of TSM providers may be stored in a central TSM repository. In a further aspect, the directory of TSM providers may be distributed among a number of secondary TSM repositories. The appropriate TSM may be identified based upon a secure element identifier and an application identifier provided by a secure element as part of the transaction. Communication of the identifiers from mobile devices may be via cellular or near field communication links. | 2013-11-21 |
20130311384 | LEASE DEPOSIT EXEMPTION POLICY - A computerized method creates a deposit exemption policy between a lessor and a third party insurer, the policy obviating the need for a security deposit. The method includes the following steps: a) obtaining and processing information from a potential lessee, using a preprogrammed lease guaranty computer remote from the lessor, to carry out tasks of a lease control intermediary; b) storing with said lease control computer predetermined data regarding the potential lessee; c) requiring the lessor to follow a usual due diligence process for qualifying a lessee; d) optionally determining the specific amount based on payments from said lessee to said lessor; i) to be paid by the lease control intermediary to the lessor upon failure of said actual lessee to pay periodic lease payments; and ii) to be paid directly or indirectly by the lease control intermediary or a 3rd party insurer, upon injury on the property, to the injured party; and e) producing a physical manifestation of a certificate indicating a deposit exemption policy for a specific amount. | 2013-11-21 |
20130311385 | Third Party Security Monitoring & Audit - The technology disclosed in this specification includes a method and a system for monitoring external party (partner, supplier, subsidiary or similar organization) security events and monitoring compliance of third party security logs and configuration files within agreed upon rules. The embodiment a) integrates with system logging utilities to collect event information, b) identifies events that are relevant to an established set of rules, c) reports the events to the primary party, d) receives on the third party system audit requests from the primary party and executes the audit actions on the third party systems, e) performs the required verifications on the third party specified in the audit requests, f) sends the audit results back to the primary party. | 2013-11-21 |
20130311386 | SYSTEM AND METHOD FOR CREATING AND MANAGING ENCAPSULATED WORKFLOW PACKAGES - One example of the system and method described herein may be used to create and manage encapsulated workflow packages, which may include package identifiers specified with a universal endpoint address schema that can be used to route documents and manage document workflows. In particular, the encapsulated workflow packages may embed, among other things, full on-ramping requirements associated with documents captured therein, including any necessary workflow steps applicable to devices, entities, or other receiving destinations that may participate in on-ramping data further embedded therein. Accordingly, the encapsulated workflow packages may embed native business intelligence that can control governance, risk, and compliance across organizational boundaries. | 2013-11-21 |
20130311387 | PREDICTIVE METHOD AND APPARATUS TO DETECT COMPLIANCE RISK - A predictive model provides a detection system for the risk associated with organizational representatives of an organization not being in compliance with laws, regulations, and organizational policies. The system produces a score, which measures the likelihood of non-compliance for organizational representatives, larger organizational units, or the entire organization. The predictive model is part of a system that analyzes individual interactions between representatives and their counterparts outside the organization for scoring. The system stores data about these interactions in a database, which is used to derive variables for the predictive model, and processes the model outputs. | 2013-11-21 |
20130311388 | METHOD OF AND SYSTEM FOR FACT CHECKING FLAGGED COMMENTS - A fact checking system verifies the correctness of information and/or characterizes the information by comparing the information with one or more sources. The fact checking system automatically monitors, processes, fact checks information and indicates a status of the information. | 2013-11-21 |
20130311389 | BENEFIT MANAGEMENT - Methods, devices and systems are provided for benefit management. One system includes a server including an application interface and access to a data store having one or more client files. A client file can include a definable set of business rules for managing and administering benefits and can include fund use rules for accessing and applying funds to claims from one or more accounts. The system includes a program operable on the server to apply the definable set of business rules in connection with processing a claim. | 2013-11-21 |
20130311390 | Automatic data transmission in response to content of electronic forms satisfying criteria - Automatic transmission of information is generated when the content of a posted electronic form matches a predefined criteria. An interface allows the user to create a criterion template to specify the match criterion without requiring the user to have the skills of a professional programmer. The person to be notified and the form and content of the notification can also be defined by the user and can be dependent on the content of the posted form. In one application, individuals associated with an institution of higher learning are automatically notified when a student submits an electronic profile form showing that the student meets a pre-specified criteria. | 2013-11-21 |
20130311391 | METHOD OF MARKETING CHARITABLE DONATIONS - A method of generating charitable donations without incurring marketing costs for the charity including the steps of making a donation to the charity and recording the donation amount in a computer database, paying a monthly fee to a redistribution pool and recording the monthly fee amount in a computer database, sponsoring a second member, calculating a redistribution amount based on a percentage from a lookup table from the redistribution pool based on the number of times the member appears in the database wherein a processor determines the redistribution amount, and paying the redistribution amount to the member. The charity may operate the invention directly under a license agreement, or contract with a marketing company that operates the invention, the fundraising efforts, generating donations to the charity and managing marketing. The method and system permit the charity to raise funds for charity while incurring no marketing expenses related to the fundraising. | 2013-11-21 |
20130311392 | Systems and Methods for Classifying Goods for Export - This disclosure relates to systems and methods of classifying exports. These systems and methods are generally computer implemented methodologies, or software for implementing such methodologies on a computer or computer network, that serve to make it easier to determine the classification of an export and to generate a report associated with that classification. Through a series of user inputs of information about the export entered at the user's own personal computer, the classification software installed on the remote auxiliary computer generates a classification report associated with the export and transmits the report to the personal computer via the Internet. | 2013-11-21 |
20130311393 | Commodity Shipping Management - A method and electronic system is provided for managing a commodity shipment or container shipment. A Statement of Fact (SOF) is maintained on the electronic system; and electronic access is allowed to the SOF by one or more of a plurality of parties involved in the shipment using data communication. A contract for the commodity shipment may be formulated and electronically stored based on the received information from one of the parties. A laytime calculation may be made using information from the SOF and optionally from the contract. | 2013-11-21 |
20130311394 | PERSONAL MAIL PIECE TRACKING SYSTEM - A system and method for linking data objects and physical objects of various kinds to an identified user is described. The system provides to the identified user information relating to the delivery status of mail pieces directed to or sent by the user, and the user then tracks and traces the mail pieces. The system further provides to the identified user information relating to continued sessions through which the user provides to a postal service system information relating to mailing labels and postage. | 2013-11-21 |
20130311395 | METHOD AND SYSTEM FOR PROVIDING PERSONALIZED REVIEWS TO A USER - A method and system for providing personalized reviews to a user. The method includes identifying multiple reviews, provided by multiple reviewers, on an entity; generating multiple profiles corresponding to the multiple reviewers; classifying the reviewers into one or more groups, each of the one or more groups includes a corresponding list of similar reviewers; mapping the user to a group, of the one or more groups, corresponding to the entity; and displaying one or more reviews, provided by the list of similar reviewers, along with comments associated with the one or more reviews. The system includes an electronic device, a communication interface, a memory and a processor to identify multiple reviews, to generate multiple profiles, to classify the reviewers into one or more groups, to map the user to a group and to display one or more reviews along with comments associated with the one or more reviews. | 2013-11-21 |
20130311396 | JOB-BASED SUCCESSION PLANS AND A HIERARCHICAL VIEW OF THE SUCCESSION PLAN - A system and method for facilitating succession management in an organization, such as an enterprise. The example method includes displaying, at a first level of a hierarchy, a first representation of a position and any incumbent assigned to the position, and illustrating, at a second level of a hierarchy, one or more second representations of one or more candidate successors to the position. The one or more candidate successors are grouped according to an indication of readiness associated with each of the one or more candidate successors. In a specific embodiment, a user option enables changing an indication of readiness assigned to a candidate successor by repositioning the candidate successor into a different readiness group within the hierarchy. Displayed data supporting candidate-readiness determinations includes data pertaining to performance history, experience, qualifications, or talent rating associated with each candidate successor. | 2013-11-21 |
20130311397 | SYSTEMS AND METHODS FOR FINANCIAL STOCK SCREENING THAT INCORPORATES PATENT DATA - The present invention provides means for screening investments by correlating financial information and patent information using customized criteria. Specifically, the present invention provides a screening tool that identifies publicly traded companies based on financial criteria input by a user, and further filters the publicly traded companies based on patent criteria input by the user. | 2013-11-21 |
20130311398 | ESTIMATING RISK OF A PORTFOLIO OF FINANCIAL INVESTMENTS - An estimate of the effect of a market condition or conditions on a portfolio of financial investments is determined. Financial risk for a portfolio of financial investments is estimated for particular observed parameter values that affect the value of the portfolio. The financial risk is estimated based on previously calculated measurements of risk of the portfolio for a previously selected range of values of the parameters. | 2013-11-21 |
20130311399 | METHOD OF SECURITIZING A PORTFOLIO OF AT LEAST 30% DISTRESSED COMMERCIAL LOANS - A platform and a securitization methodology that provides lenders with an opportunity to maximize the returns on their distressed commercial credit facilities and overcomes the obstacles that have historically precluded the securitization of distressed commercial loans. The present invention is based upon an underlying portfolio of at least 30% distressed commercial loans for securitization that emulates the predictability and regularity of the cash flow and recovery characteristics of a portfolio of generally performing commercial loans, thus eliminating crucial historical barriers to securitization of such distressed commercial loans, such as the absence of predictable and regular cash flows and predictable recoveries. The methodology of the present invention takes a specific mix of distinct classifications of distressed commercial loans with specified characteristics in confluence with structural specifications, such as specific reserves and safeguards, to create a synthetic asset class that emulates the characteristics of a portfolio of performing loans. | 2013-11-21 |
20130311400 | SYSTEM FOR REAL TIME CONTINUOUS DATA PROCESSING FOR INVESTMENT PORTFOLIOS - A real time continuous data inputting, processing, scanning and displaying system for financial data and inputting variable boundaries of data for a variety of desired data characteristics. The process displays when the data characteristics fall outside their respective variable boundaries. Real time financial markets data and conventional data inputs are input into the system which is comprised of conventional and new computer processor enabled processes, clusters of central processing units, a report writer, terminal device, data disk, and interface. The data disks and real time financial market data and conventional data inputs and outputs are continuously referenced during the scanning process for exceptions to the boundaries of desired data characteristics. | 2013-11-21 |
20130311401 | METHOD OF ADVANCING FUNDING EXPENSES FOR CAPITAL PROJECTS - The present teachings relate to a method of financing a government authorized construction project in advance of government scheduled funding. The method may provide a closed loop financing structure for the bond investor. Specifically, a method of financing a construction project in advance of future scheduled funding is shown and described. The method may include the steps of advancing funds for the construction projection by issuing bonds that are non-recourse to a contractor and a public owner hiring the contractor to deliver the construction project, and receiving a performance guarantee for the construction project, where the performance guarantee ensures delivery of the construction project for the public owner upon the contractor's failure to complete the construction project. The method may also include the steps of advancing payment to the construction project as the contractor completes work, and directing payments to a trustee from the future scheduled funding. | 2013-11-21 |
20130311402 | METHOD TO FINANCE DATA CENTERS AND OTHER HIGH INFRASTRUCTURE FACILITIES - A method to finance data centers and other high infrastructure facilities provides suitable collateral to close real estate financing. The method has three portions: vetting of suitable projects upon a computer, assembly of select tax credits upon a computer, and formation of capital as collateral for financing. This invention finds a building that fits the criteria for a government preservation program. Then the invention obtains collateral for financing the building renovation or rehabilitation from governmental agencies in connection with the building. Next the invention finds a third party interested in the collateral that invests in a building project or ownership of the building in exchange for the collateral. The investment funds then provide a down payment for the financing. The collateral may have the form of a federal tax credit. The method promotes financing of structures that may otherwise not obtain financing for reconstruction into a new use. | 2013-11-21 |
20130311403 | CONTONE DOMAIN COLOR PIXEL COUNTING FOR COLOR AREA COVERAGE BASED BILLING - Disclosed herein are a method and a system implementing the method for billing using color pixel counting in documents or image in the contone domain. The method includes using the intensity or density levels (e.g., 0 to 255) for each color of each pixel of interest in the contone domain to calculate one or more probability values that one or more output colorants are provided at its location in the binary domain. The probabilities determined based on the contone color domain data are used to estimate an overall area coverage of color pixels in the document, which can be used to determine a billing structure or cost for outputting the document. | 2013-11-21 |
20130311404 | SYSTEM FOR MANAGING VEHICLE ENERGY, AND METHOD AND APPARATUS FOR SAME - The present invention relates to a method for managing vehicle energy, and particularly relates to a system for managing vehicle energy, and a method and apparatus for same, which can calculate the amount of electric power needed for operating a vehicle, can sell a surplus amount of electric power that is the current amount of battery power less the calculated amount of electric power, or adjust a number of received location information signals according to the current battery power. | 2013-11-21 |
20130311405 | System and Method for Situational Enablement of Context Aware Human Machine Interfaces - Data describing human-machine interfaces available to a user, facts relating to a circumstance of the user, a current human-machine interface being employed by the user, and an initial sentiment associated with the circumstance of the user is received. A target sentiment is computed based on the facts relating to a circumstance of the user. A navigation path to achieve the target sentiment based on the initial sentiment is determined. The next-best human-machine interface to be employed by the user is determined based on the navigation path, the one or more human-machine interfaces available to the user, and the current human-machine interface being employed by the user. | 2013-11-21 |
20130311406 | Automated Object Classification Using Temperature Profiles - Methods and apparatus are provided for automated object classification using temperature profiles. An object in an environment (such as an exemplary data center) is classified by obtaining a surface temperature profile of the object; and classifying the object as a particular type of equipment based on the obtained surface temperature profile. The surface temperature profile of the object can be compared to a plurality of predefined characteristic surface temperature profiles each associated with a given type of equipment. | 2013-11-21 |
20130311407 | Automated Object Classification Using Temperature Profiles - Methods and apparatus are provided for automated object classification using temperature profiles. An object in an environment (such as an exemplary data center) is classified by obtaining a surface temperature profile of the object; and classifying the object as a particular type of equipment based on the obtained surface temperature profile. The surface temperature profile of the object can be compared to a plurality of predefined characteristic surface temperature profiles each associated with a given type of equipment. | 2013-11-21 |
20130311408 | Determining and Predicting Popularity of Content - Processes and systems are described herein that may be used to predict which content (e.g., programs, series, movies, channels etc.) will be popular in the future. The processes and systems may use a model that is trained using historical data reflecting information about past showings of programs, such as rating information, viewer behaviors (e.g., channel changes and DVR recordings), online social activity (e.g., Facebook likes and relevant Twitter messages), and/or other data. Accordingly, it may be possible to provide predictive recommendations of popular content before, for example, the content is scheduled or otherwise planned to be distributed or made available to viewers. The results of such prediction may be integrated with, for example, a program guide available to viewers. | 2013-11-21 |
20130311409 | Web-Based Education System - A web-based education system enables instructors to prepare and present online education courses and enables students to locate and participate in available courses. A machine learning algorithm generates a topic-based representation of courses and generates a topic-based representation of user interests. The web-education system then enables users to find relevant courses using the topic-based representations. Recommended courses are ranked according to factors such as relevance to the user, popularity, and course rating. | 2013-11-21 |
20130311410 | Information Processing Apparatus, Information Processing Method, and Program - An information processing apparatus for generating a similarity determination algorithm determining a similarity between a pair of data. The apparatus includes: a feature-quantity-extraction expression list generation mechanism generating a feature quantity-extraction expression list including a plurality of feature-quantity-extraction expressions including a plurality of operators by updating the feature-quantity extraction expression list of a preceding generation; a calculation mechanism inputting first and second data given as teacher data into each of the feature-quantity-extraction expressions in the feature-quantity-extraction expression list to calculate a feature quantity corresponding to each of the first and the second data; an evaluation-value calculation mechanism calculating the evaluation value of each of the feature-quantity-extraction expressions using the calculated feature quantities and a similarity between the first and the second data; and a similarity-calculation expression estimation mechanism estimating a similarity calculation expression for calculating a similarity between the first and the second data. | 2013-11-21 |
20130311411 | Device, Method and System for Monitoring, Predicting, and Accelerating Interactions with a Computing Device - A device, method and system for monitoring, predicting, and accelerating interactions with a computing device includes determining a current interaction context at a computing device based on interactions occurring at the computing device, predicting a number of potential subsequent interactions, speculatively executing at least some of the potential subsequent interactions, and presenting interactive representations of the speculatively-executed interactions at the computing device. | 2013-11-21 |
20130311412 | ENCODING AND DECODING MACHINE WITH RECURRENT NEURAL NETWORKS - Techniques for reconstructing a signal encoded with a time encoding machine (TEM) using a recurrent neural network including receiving a TEM-encoded signal, processing the TEM-encoded signal, and reconstructing the TEM-encoded signal with a recurrent neural network. | 2013-11-21 |
20130311413 | Electronic charge sharing CMOS-memristor neural circuit - CMOS-memristor circuit is constructed to behave as a trainable artificial synapse for neuromorphic hardware systems. The invention relies on the memristance of a memristor at the input side of the device to act as a reconfigurable weight that is adjusted to realize a desired function. The invention relies on charge sharing at the output to enable the summation of signals from multiple synapses at the input node of a neuron circuit, implemented using a CMOS amplifier circuit. The combination of several memristive synapses and a neuron circuit constitute a neuromorphic circuit capable of learning and implementing a multitude of possible functionalities. | 2013-11-21 |
20130311414 | LEARNING METHOD OF NEURAL NETWORK CIRCUIT - A neuron circuit in a neural network circuit element includes a waveform generating circuit for generating a predetermined pulse voltage, and a first input signal has a waveform of the predetermined pulse voltage. For a period having a predetermined duration of the predetermined pulse voltage generated within the neural network circuit element including the variable resistance element which is applied with the first input signal from another neural network circuit element, the first input signal is permitted to be input to the control electrode of the variable resistance element, to change the resistance value of the variable resistance element due to an electric potential difference generated between the first electrode and the control electrode which occurs depending on an input timing of the first input signal with respect to the period during which the first input signal is permitted to be input to the control electrode. | 2013-11-21 |
20130311415 | LEARNING METHOD OF NEURAL NETWORK CIRCUIT - A neuron circuit in a neural network circuit element includes a waveform generating circuit for generating a bipolar sawtooth pulse voltage, and a first input signal has a bipolar sawtooth pulse waveform. For a period during which the first input signal is permitted to be input to a first electrode of a variable resistance element, the bipolar sawtooth pulse voltage generated within the neural network circuit element including the variable resistance element which is applied with the first input signal from another neural network circuit element is input to a control electrode of the variable resistance element. The resistance value of the variable resistance element changes due to an electric potential difference between the first electrode and the control electrode, the electric potential difference being generated depending on an input timing difference between a voltage applied to the first electrode and the voltage applied to the control electrode. | 2013-11-21 |
20130311416 | RECOMMENDING TRAINING PROGRAMS - A method, a system, and a computer program product for recommending one or more training programs to a user. The method includes determining a first set of skills associated with a user profile. One or more jobs are identified based on the user profile and the first set of skills. Thereafter, a second set of skills associated with the one or more jobs is determined. Subsequently, a third set of skills representing a gap between the first set of skills and the second set of skills is determined. Based on the third set of skills the one or more training programs are recommended to the user. | 2013-11-21 |
20130311417 | OPERATING DEVICE FOR IN-VEHICLE INFORMATION EQUIPMENT - In an operating device for restricting the operation while driving, for in-vehicle information equipment, it has load detection units for detecting a driving load on an operator, an operation extraction unit (an operable range-determining unit) for extracting an operation which can be completed under the circumstances of the detected driving load, and a control unit for making only the extracted operation operable. | 2013-11-21 |
20130311418 | METHOD FOR PLANNING TRIPS TO TRANSPORT PASSENGERS - A method for planning trips to transport passengers on the basis of a preferably statistical predictive model, in particular to plan capacities, optimize the utilization of vehicle fleets, determine the routes to be taken, etc., preferably in short-distance passenger traffic, wherein the predictive model takes into account, using parameters, characteristic passenger patterns over the course of a day, week, and/or year, is characterized in that the predictive model additionally uses weather-specific parameters. | 2013-11-21 |
20130311419 | Incremental Reasoning Under Data Source Availability Constraints - A method executed by a computer system for generating a high level inferred conclusion from raw data collected from a plurality of data sources by application of an ontology reasoning system, the method comprising the steps of determining availability of intermediate results received from a plurality of shallow reasoners, the intermediate results generated by the plurality of shallow reasoners based on the plurality of data sources; propagating the intermediate results to nodes of an ontology graph; executing incremental ontology reasoning over the ontology graph to generate inferred conclusions; and persisting inferred conclusions in an ontology database. | 2013-11-21 |
20130311420 | SYSTEM AND METHOD FOR PROVIDING A UNIVERSAL ENDPOINT ADDRESS SCHEMA TO ROUTE DOCUMENTS AND MANAGE DOCUMENT WORKFLOWS - One example of the system and method described herein may provide a universal endpoint address schema to route documents and manage document workflows, which may include one or more encapsulated workflow packages. In particular, a globally unique endpoint address may be specified using the universal endpoint address schema to route documents to any addressable destination and link the documents to workflow steps, processing rules, and business intelligence that can enforce business constraints. Furthermore, the globally unique endpoint address may be specified using the universal endpoint address schema may be linked to tickets that request documents or document-related services from third-parties in cloud or virtualized data centers, whereby the universal endpoint address schema may extend the abilities that different organizations have to collaborate with one another. | 2013-11-21 |
20130311421 | Logical Representation of Distributed Database Table Updates in an Append-Only Log File - A method implemented by a computer network includes receiving a database table update to a distributed database. The database table update is loaded into a database table partition on a node of a computer network executing the distributed database. The database table update is added to an append-only log file corresponding to the database table partition. The added update represents data associated with the database table update in a logical representation that is independent of the physical representation of the data at the node. This facilitates transferring the database table partition to other nodes within the computer network. | 2013-11-21 |
20130311422 | ENHANCED PERFORMANCE FOR LARGE VERSIONED DATABASES - In accordance with the disclosed subject matter, systems and methods are provided for improving performance of a versioned database. Embodiments include systems and methods for improving performance of versioned databases by selectively loading portions of database files on disk into memory. Embodiments also include systems and methods for capturing and consolidating or condensing transaction logs into database files for loading. | 2013-11-21 |
20130311423 | DATA SELECTION AND IDENTIFICATION - Target data compatible with a target computing application is generated from source data compatible with a source computing application as part of a migration from a source computing application to a target computing application. At least a first portion of the source data is selected and a variable is assigned to the first portion of the source data to enable the first portion of the source data to be referred to using the variable by one or more computer processors in a subsequent generation of further target data from the source data. | 2013-11-21 |
20130311424 | DISTRIBUTED DATABASE - A method of operating a database node of a distributed database is provided. The distributed database includes a plurality of database nodes each storing a set of data. A latency that occurs when the database node contacts a further database node in order to respond to one or more data requests that relate to a subset of data that is one of stored and intended to stored at the further database node is measured. An average latency value for communicating with each of the database nodes in the distributed database is calculated. Notifications reporting the average latency values to data distribution optimization functions in the distributed database are sent. A latency measure is reported to a further node of the distributed database. | 2013-11-21 |
20130311425 | DATABASE UPDATE NOTIFICATION METHOD - An information processing device includes an access requesting unit, an access type determination unit, a notified party information acquisition unit, and a notifying unit. The information processing device is able to access a notified party information storage unit that stores information of a notified party in association with location information of particular data stored in a database server. The access type determination unit determines whether or not an access request issued by the access requesting unit is an access request relating to updating. If the issued access request is an access request relating to updating, the notified party information acquisition unit acquires information of a notified party corresponding to location information of data to be updated by the access request, from the notified party information storage unit. The notifying unit gives notice to a notified party specified in the acquired information of the notified party. | 2013-11-21 |
20130311426 | Distributed Database with Mappings Between Append-Only Files and Repartitioned Files - A method implemented by a computer network includes storing a database table in a distributed database resident on the computer network. The database table is represented with append-only files, where each append-only file stores data in a logical representation that is independent of the physical representation of the data at a node of the computer network. Data in the append-only files are repartitioned across nodes in the computer network to form repartitioned files. Information about a mapping between the append-only files and the repartitioned files is maintained. | 2013-11-21 |
20130311427 | CLUSTERING FOR HIGH AVAILABILITY AND DISASTER RECOVERY - Embodiments are directed towards managing within a cluster environment having a plurality of indexers for data storage using redundancy the data being managed using a generation identifier, such that a primary indexer is designated for a given generation of data. When a master device for the cluster fails, data may continue to be stored using redundancy, and data searches performed may still be performed. | 2013-11-21 |
20130311428 | CLUSTERING FOR HIGH AVAILABILITY AND DISASTER RECOVERY - Embodiments are directed towards managing within a cluster environment having a plurality of indexers for data storage using redundancy the data being managed using a generation identifier, such that a primary indexer is designated for a given generation of data. When a master device for the cluster fails, data may continue to be stored using redundancy, and data searches performed may still be performed. | 2013-11-21 |
20130311429 | METHOD FOR CONTROLLING BACKUP AND RESTORATION, AND STORAGE SYSTEM USING THE SAME - According to the prior art virtual file backup method, backup is performed without saving a file configuration information, so that the backup file cannot be restored as a virtual file during restoration, and the usage capacity of the disk is increased. According to the present invention, an actual data managed by a virtual file, an actual data managed by one or more element files and a configuration information of the virtual file are respectively stored during backup, wherein during restoration, the virtual file is restored based on the configuration information of the virtual file. | 2013-11-21 |
20130311430 | COMPUTER, DATA STORAGE METHOD, AND INFORMATION PROCESSING SYSTEM - A computer includes a memory that stores a program and received data; and a processor that executes an operation by executing the program stored in the memory, the operation including storing the received data into a first database having a first data structure in which reading is performed in a random access manner and writing is performed in a sequential access manner, when the received data is received from a second apparatus is as same as data stored in a first apparatus which has a failure, and copying the received data stored in the first database to a second database having a second data structure in which reading is performed in a sequential access manner and writing is performed in a random access manner. | 2013-11-21 |
20130311431 | System and Method for Recovering Electronic Mail Messages Deleted From an Information Handling System - An information handling system detects that a first electronic mail message has been permanently deleted from a local memory of a first information handling system, generates a second electronic mail message to request a recovery of the first electronic mail message, attaches a file to the second electronic mail message, and sends the second electronic mail message to a plurality of second information handling systems. | 2013-11-21 |
20130311432 | CONTEXT SENSITIVE REUSABLE INLINE DATA DEDUPLICATION - A computer identifies a relationship among a subset of a set of data blocks, a basis of the relationship forming a context shared by the subset of data blocks. The computer selects a code data structure from a set of code data structures using the context. The context is associated with the code data structure, and the code data structure includes a set of codes. The computer computes, for a first data block in the subset of data blocks, a first code corresponding to a content of the first data block. The computer determines whether the first code matches a stored code in the code data structure. The computer replaces, responsive to the first code matching the stored code, the first data block with a reference to an instance of the first data block. The computer causes the reference to be stored in a target data processing system. | 2013-11-21 |
20130311433 | Stream-based data deduplication in a multi-tenant shared infrastructure using asynchronous data dictionaries - Stream-based data deduplication is provided in a multi-tenant shared infrastructure but without requiring “paired” endpoints having synchronized data dictionaries. In this approach, data objects processed by the dedupe functionality are treated as objects that can be fetched as needed. Because the compressed objects are treated as just objects, a decoding peer does not need to maintain a symmetric library for the origin. Rather, if the peer does not have the chunks in cache that it needs, it follows a conventional content delivery network (CDN) procedure to retrieve them. In this way, if dictionaries between pairs of sending and receiving peers are out-of-sync, relevant sections are the re-synchronized on-demand. The approach does not require that libraries maintained at a particular pair of sender and receiving peers are the same. Rather, the technique enables a peer, in effect, to “backfill” its dictionary on-the-fly. | 2013-11-21 |
20130311434 | METHOD, APPARATUS AND SYSTEM FOR DATA DEDUPLICATION - Techniques and mechanisms for limiting storage of duplicate data in a storage back-end. In an embodiment, a storage device of the storage back-end receives from a storage front-end a write command specifying a write of data to the storage back-end. In another embodiment, the storage device calculates and provides to the storage front-end a data signature for data which is the subject of the write command. Based on the data signature provided by the storage device, a deduplication engine of the storage front-end determines whether a deduplication operation is to be performed. | 2013-11-21 |
20130311435 | MINIMIZATION OF SURPRISAL DATA THROUGH APPLICATION OF HIERARCHY FILTER PATTERN - A method, computer product, and computer system of minimizing surprisal data comprising: at a source, reading and identifying characteristics of a genetic sequence of an organism; receiving an input of rank of at least two identified characteristics of the genetic sequence of the organism; generating a hierarchy of ranked, identified characteristics based on the rank of the at least two identified characteristics of the genetic sequence of the organism; comparing the hierarchy of ranked, identified characteristics to a repository of reference genomes; and if at least one reference genome from the repository matches the hierarchy of ranked, identified characteristics, breaking the matched reference genomes into pieces, combining pieces associated with the identified characteristics from at least one matched reference genome to form a filter pattern to be compared to the nucleotides of the genetic sequence of the organism, to obtain differences and create surprisal data. | 2013-11-21 |
20130311436 | COMPUTER INTERFACE SYSTEM - An improved computer system may include a controller including a computer processor. The system may also include a selector apparatus in communication with the controller to choose a table having a higher collision quality index than other tables under consideration by the selector apparatus. The system may further include an exchanger apparatus to configure a standby table that replaces the table chosen by the selector apparatus. The system may additionally include a switch that changes a hash function based upon the exchanger apparatus' replacement of the chosen table to enable the controller to reduce insertion times and/or collisions when interfacing with new components introduced to the controller. | 2013-11-21 |
20130311437 | SYSTEM AND METHOD FOR PERFORMANCE MONITORING OF A POPULATION OF EQUIPMENT - A system and method obtain a database stored on a storage device containing information on multiple assets, the information including measurements taken from devices monitoring each asset, and context information corresponding to the environment the items are subjected to. The system and method groups assets via a computer system into a homogenous group as a function of selected context information and performs analytics via the computer system on the grouped assets to manage the assets. | 2013-11-21 |