Patent application number | Description | Published |
20080270231 | Methods And Systems For Tracking Customer Response To A Coupon - Methods, systems and computer readable medium storing computer executable programs for tracking customer response to a coupon are disclosed. A coupon is issued. A first determination is made regarding whether the coupon has been selected for viewing by a customer. A first state is assigned to the coupon based on the first determination. A second determination is made regarding whether the coupon has been redeemed by the customer. A second state is assigned to the coupon based on the second determination. | 10-30-2008 |
20090037363 | Methods And Systems For Managing A Data Mining Model - Methods, systems, and a computer readable medium storing a computer executable program for managing a data mining model are disclosed. A first notification associated with a data mining model is received at a business process system. A second notification associated with the data mining model is transmitted from the business process system responsive to the first notification. A determination is made regarding whether a first response operable to define an association between the data mining model and business data has been received at the business process system responsive to the second notification. A command is issued from the business process system to update model metadata associated with the data mining model based on the determination. | 02-05-2009 |
20100083153 | Managing Multimodal Annotations Of An Image - Methods and computer readable mediums storing computer executable programs for managing multimodal annotations of an image are disclosed. A first communication channel is established between a first machine and a mobile device. A first hierarchical data structure generated by the mobile device is received at the first machine. The first hierarchical data structure includes an image annotated with at least one multimodal annotation. A representation of the first hierarchical data structure is rendered at the first machine. At least one multimodal annotation modification associated with the image is received at the first machine. The at least one multimodal annotation modification is incorporated into the first hierarchical data structure thereby generating a second hierarchical data structure. | 04-01-2010 |
20100186067 | Methods for Secure Data Distribution - A method for secure distribution of data in an interchange network, comprises having a network in which data records stored on at least one computer; and including an authorization service, where the authorization service grants a contractor access to at least a portion of the data records; and a watermarking module that adds one or more artificial records to said portion. The artificial records cannot be distinguished from the data records by the contractor and are valid for processing in the same way as the data records. | 07-22-2010 |
20100205159 | SYSTEM AND METHOD FOR MANAGING DATA - A system and method for managing data are presented herein. The system includes a plurality of data sets, a plurality of data access policies, and a policy enforcer. The plurality of data sets can be stored in a data store on a server. The data access policies can each be associated with a single data set and can be captured in a workflow template and encapsulated with the data set. At least one of the data policies can use human evaluation. The policy enforcer can be configured to receive requests for data, to interpret the associated data policy, and to comply with the human evaluation of the data policies by spawning a child workflow defined in the data policy to initiate the human evaluation across a network. | 08-12-2010 |
20110055559 | DATA RETENTION MANAGEMENT - A file-based data retention management system is provided. A data source can store data files. An online backup file system can make a backup copy of the data files from the data source and store the backup copy of the data files on a backup server. A policy database can be maintained by the system, the policy database including data retention policies for the data files for retention management of the data files. A key management system can assign and manage encryption keys for the data files. The key management system can store the encryption keys on a separate system from the data files stored on the backup server. | 03-03-2011 |
20120023544 | DATA ASSURANCE - Data assurance capabilities are received that are related to at least one individual persistent object type in a plurality of persistent object types linked to persistent objects stored on the service provider server. In addition, data assurance specifications are received from a customer, the data assurance specifications being based on the data assurance capabilities. Computer-readable data assurance policies for the at least one persistent object type are generated based on the received data assurance specification. The computer-readable data assurance policies then are combined with a corresponding template of data assurance capabilities for the at least one individual persistent object type to generate an enforceable customer-specific data policy. | 01-26-2012 |
20120030120 | ENFORCEMENT OF SECURITY REQUIREMENTS FOR A BUSINESS MODEL - A functional model of a business process which is annotated with security requirements is provided. Platform-specific executable code and at least one configuration file for a given security enforcement component to enforce the security requirements of the model are then generated automatically. | 02-02-2012 |
20120243687 | ENCRYPTION KEY FRAGMENT DISTRIBUTION - An encryption key may be fragmented into n encryption key fragments such that k09-27-2012 | |
20120284331 | Processing Notifications - A method of processing notifications is provided herein. A plurality of notifications is generated for a plurality of subscribers to a plurality of topics. The plurality of notifications is generated based on a plurality of events comprising the plurality of topics. The plurality of notifications is sent for the plurality of subscribers. Sending the notifications is performed concurrently with generating a second plurality of notifications for a second plurality of subscribers to a second plurality of topics. The second plurality of notifications is generated based on a second plurality of events comprising the second plurality of topics. | 11-08-2012 |
20130010966 | ENCRYPTION KEY STORAGE - Systems, methods, and machine-readable and executable instructions are provided for encryption key storage. Encryption key storage may include associating each of a plurality of identifiers with a different one of a plurality of key fragment stores, determining a plurality of indexes, where each of the plurality of indexes is based upon a handle provided by a customer, an authorization token provided by the customer, and a different one of the plurality of identifiers, partitioning an encryption key provided by the customer into a number of encryption key fragments, and distributing the plurality of indexes and the number of encryption key fragments to the plurality of key fragment stores. | 01-10-2013 |
20130046979 | PROTECTING THE INFORMATION ENCODED IN A BLOOM FILTER USING ENCODED BITS OF DATA - Illustrated is a system and method that includes identifying data stored as an entry in a list. The system and method also includes truncating the entry to create a truncated entry. It further includes transforming the truncated entry into a hash, the hash used to set an index position value within a Bloom filter. The system and method also includes an interface module to transmit the Bloom filter. | 02-21-2013 |
20130177157 | ENCRYPTION KEY MANAGEMENT - An encryption key fragment is divided into a number of encryption key fragments. Requests to store different ones of the encryption key fragments are transmitted to different computer memory storage systems. An individual request to store an encryption key fragment includes one of the encryption key fragments and bears an access control hallmark for regulating access to the encryption key fragment. | 07-11-2013 |
20130346339 | CONFIGURING PROCESS VARIANTS FOR ON-BOARDING CUSTOMERS FOR INFORMATION TECHNOLOGY (IT) OUTSOURCING - Systems and methods of configuring process variants for on-boarding customers for information technology (IT) outsourcing are provided. An example method includes modeling roles, responsibilities, and business context for a standard process template. The method also includes developing cause-and-effect rules affecting outcome of the standard process template. The method also includes adjusting the standard process template for process variants across different customer on-boarding scenarios. | 12-26-2013 |
20140156557 | Providing a Simulation Service by a Cloud-Based Infrastructure - A cloud-based infrastructure provides a simulation service accessible by a plurality of different enterprises. The cloud-based infrastructure executes an operation simulation in response to access of the simulation service by a particular one of the plurality of enterprises, wherein the operation simulation is of a business process of the particular enterprise and uses information provided by the particular enterprise. | 06-05-2014 |
20140215279 | SCALABLE STRUCTURED DATA STORE OPERATIONS - Scalable structured data store operations can include logging a number of detected corrupted records within a scalable structured data store, repairing the number of corrupted records within a number of nodes of the scalable structured data store, and predicting hardware failure based on the logged number of corrupted records. | 07-31-2014 |
20140350990 | Simulated Print Demand - A computer readable memory ( | 11-27-2014 |