41st week of 2019 patent applcation highlights part 43 |
Patent application number | Title | Published |
20190311271 | DOCUMENT ANALYZER - Examples of analyzing documents are defined. In an example, a request to analyze a document may be received. A knowledge model corresponding to a guideline associated with the document may be obtained. The knowledge model may include at least one of a hypothetical question and a logical flow to determine an inference to the hypothetical question. The hypothetical question relates to an element of the guideline. Based on the knowledge model, data from the document may be extracted for analysis using an artificial intelligence (AI) component. The Ai component may be configured to extract and analyze data, based on the knowledge model. Based on the analysis, a report indicating whether the document falls within a purview of the guideline may be generated. | 2019-10-10 |
20190311272 | BEHAVIOR PREDICTION DEVICE - A behavior prediction device comprising: a moving object behavior detection unit configured to detect moving object behavior, a behavior prediction model database that stores a behavior prediction model, a behavior prediction calculation unit configured to calculate a behavior prediction of the moving object using the behavior prediction model, a prediction deviation determination unit configured to determine whether a prediction deviation occurs based on the behavior prediction and a detection result of the moving object behavior corresponding to the behavior prediction, a deviation occurrence reason estimation unit configured to estimate a deviation occurrence reason when determination is made that the prediction deviation occurs, and an update necessity determination unit configured to determine a necessity of an update of the behavior prediction model database based on the deviation occurrence reason when the determination is made that the prediction deviation occurs. | 2019-10-10 |
20190311273 | ESTIMATION OF CURRENT AND FUTURE MACHINE STATES - Disclosed is a computer-implemented method for generating a prediction model. The model can be for use in processing machine event data to predict behavior of a plurality of industrial machines under supervision. The prediction model can be configured to determine current and future states of the industrial machines. The method can include: extracting event features from event codes and structuring the event features into feature vectors; and generating the prediction model by clustering the feature vectors into a plurality of vector clusters, the vector clusters being assigned to respective machine states. The prediction model can be constructed based on event data from a first industrial machine and be applied to control an operating state of a second industrial machine. | 2019-10-10 |
20190311274 | Tracking Potentially Lost Items Without Beacon Tags - An approach is provided for performing an item tracking operation. The item tracking operation includes defining a knowledge model where the knowledge model correlates usage of an item away from a parked location with other locations visited by a user. The item tracking operation also includes tracking the item when the item is removed from the parked location where the tracking includes determining when the item is moved to a particular location. The item tracking operation also includes determining whether the item is returned to the parked location and notifying the user when the item was not returned to the parked location where the notifying calculates a probability that the item was left behind at the particular location. | 2019-10-10 |
20190311275 | METHOD AND APPARATUS FOR RECOMMENDING ENTITY - Embodiments of the present disclosure disclose a method and apparatus for recommending entity. A method for recommending entity includes: acquiring a candidate entity set associated with a to-be-searched entity, in response to receiving a user's search request for an entity; inputting the candidate entity set into a pre-trained ranking model to obtain a candidate entity sequence; and selecting a candidate entity from the candidate entity sequence and recommending the selected candidate entity to the user. The ranking model ranks the candidate entity set based on at least one of: a degree of correlation between each candidate entity in the candidate entity set and the to-be-searched entity; a degree of interest of the user in the each candidate entity in the candidate entity set; and a degree of expectation of the user for the each candidate entity in the candidate entity set. | 2019-10-10 |
20190311276 | Method for Performing a Cognitive Learning Lifecycle Operation - A cognitive learning method comprising: receiving data from a plurality of data sources; processing the data from the plurality of data sources to perform a cognitive learning operation, the processing being performed via a cognitive inference and learning system, the cognitive learning operation comprising a plurality of cognitive learning operation lifecycle phases, the cognitive learning operation applying a cognitive learning technique to generate a cognitive learning result; and, updating a destination based upon the cognitive learning result. | 2019-10-10 |
20190311277 | DYNAMIC CONDITIONING FOR ADVANCED MISAPPROPRIATION PROTECTION - Embodiments of the invention are directed to systems, methods, and computer program products for dynamic conditioning for advanced misappropriation protection. The system identifies new/emerging misappropriations and profiles them into synthetic data streams via distribution of the misappropriation into a separate channel and allowing processing. Processing the misappropriation allows for analytical data generation and synthetic misappropriation generation. The synthetic stream is injected into a matrix of learning engines for learning of the misappropriation. The learning engines monitor and report each other and are arranged in an architecture form for an implicit internal feedback loop and an explicit external feedback loop. | 2019-10-10 |
20190311278 | APPLICATION PERFORMANCE ANALYZER AND CORRESPONDING METHOD - An application performance analyzer adapted to analyze the performance of one or more applications running on IT infrastructure, comprises: a data collection engine collecting performance metrics for one or more applications running on the IT infrastructure; an anomaly detection engine analyzing the performance metrics and detecting anomalies, i.e. performance metrics whose values deviate from historic values with a deviation that exceeds a predefined threshold; a correlation engine detecting dependencies between plural anomalies, and generating anomaly clusters, each anomaly cluster consisting of anomalies that are correlated through one or more of the dependencies; a ranking engine ranking anomalies within an anomaly cluster; and a source detection engine pinpointing a problem source from the lowest ranked anomaly in an anomaly cluster. | 2019-10-10 |
20190311279 | MACHINE-LEARNING MODELS APPLIED TO INTERACTION DATA FOR FACILITATING EXPERIENCE-BASED MODIFICATIONS TO INTERFACE ELEMENTS IN ONLINE ENVIRONMENTS - In some embodiments, a computing system computes, with a state prediction model, probabilities of transitioning from a click state represented by interaction data to various predicted next states. The computing system computes an interface experience metric for the click with an experience valuation model. To do so, the computing system identifies base values for the click state and the predicted next states. The computing system computes value differentials for between the click state's base value and each predicted next state's base value. Value differentials indicate qualities of interface experience. The computing system determines the interface experience metric from a summation that includes the current click state's base value and the value differentials weighted with the predicted next states' probabilities. The computing system transmits the interface experience metric to an online platform, which can cause interface elements of the online platform to be modified based on the interface experience metric. | 2019-10-10 |
20190311280 | ENSEMBLE FORECAST STORM DAMAGE RESPONSE SYSTEM FOR CRITICAL INFRASTRUCTURE - A storm damage response system includes a storm ensemble database that stores ensemble forecast models associated with respective potential storm paths of a given storm across a geographic area and an inventory database that stores inventory data associated with location and characteristics of power-providing equipment and characteristics of a consumer population in the geographic area. A storm damage model algorithm generates a storm response plan comprising an operational procedure for repairing or maintaining power transmission and distribution electric systems to mitigate storm damage impact based on generating a probabilistic model for each of the ensemble forecast models based on the inventory data and calculating a statistical impact value associated with the probabilistic model based on an aggregate of iterative probabilistic simulations for the respective ensemble forecast model. The storm response plan can be generated based on the relative statistical impact value of the probabilistic model of each of the ensemble forecast models. | 2019-10-10 |
20190311281 | Analyzing Behavior in Light of Social Time - A relational event history is determined based on a data set, the relational event history including a set of relational events that occurred in time among a set of actors. Data is populated in a probability model based on the relational event history, where the probability model is formulated as a series of conditional probabilities that correspond to a set of sequential decisions by an actor for each relational event, where the probability model includes one or more statistical parameters and corresponding statistics. A baseline communications behavior for the relational event history is determined based on the populated probability model, and departures within the relational event history from the baseline communications behavior are determined. | 2019-10-10 |
20190311282 | Analyzing Behavior in Light of Social Time - A relational event history is determined based on a data set, the relational event history including a set of relational events that occurred in time among a set of actors. Data is populated in a probability model based on the relational event history, where the probability model is formulated as a series of conditional probabilities that correspond to a set of sequential decisions by an actor for each relational event, where the probability model includes one or more statistical parameters and corresponding statistics. A baseline communications behavior for the relational event history is determined based on the populated probability model, and departures within the relational event history from the baseline communications behavior are determined. | 2019-10-10 |
20190311283 | System And Method For Estimating Periodic Fuel Consumption for Cooling Of a Building With the Aid Of a Digital Computer - A system and method to determine building thermal performance parameters through empirical testing is described. The parameters can be formulaically applied to determine fuel consumption and indoor temperatures. To generalize the approach, the term used to represent furnace rating is replaced with HVAC system rating. As total heat change is based on the building's thermal mass, heat change is relabeled as thermal mass gain (or loss). This change creates a heat balance equation that is composed of heat gain (loss) from six sources, three of which contribute to heat gain only. No modifications are required for apply the empirical tests to summer since an attic's thermal conductivity cancels out and the attic's effective window area is directly combined with the existing effective window area. Since these tests are empirically based, the tests already account for the additional heat gain associated with the elevated attic temperature and other surface temperatures. | 2019-10-10 |
20190311284 | CONSTRUCTING AND PROGRAMMING QUANTUM HARDWARE FOR ROBUST QUANTUM ANNEALING PROCESSES - Among other things, an apparatus comprises quantum units; and couplers among the quantum units. Each coupler is configured to couple a pair of quantum units according to a quantum Hamiltonian characterization of the quantum by the coupler. | 2019-10-10 |
20190311285 | SYSTEM AND METHOD FOR IN-SITU CLASSIFIER RETRAINING FOR MALWARE IDENTIFICATION AND MODEL HETEROGENEITY - A system and method for batched, supervised, in-situ machine learning classifier retraining for malware identification and model heterogeneity. The method produces a parent classifier model in one location and providing it to one or more in-situ retraining system or systems in a different location or locations, adjudicates the class determination of the parent classifier over the plurality of the samples evaluated by the in-situ retraining system or systems, determines a minimum number of adjudicated samples required to initiate the in-situ retraining process, creates a new training and test set using samples from one or more in-situ systems, blends a feature vector representation of the in-situ training and test sets with a feature vector representation of the parent training and test sets, conducts machine learning over the blended training set, evaluates the new and parent models using the blended test set and additional unlabeled samples, and elects whether to replace the parent classifier with the retrained version. | 2019-10-10 |
20190311286 | ARTIFICIAL INTELLIGENCE MICROGRID AND DISTRIBUTED ENERGY RESOURCES PLANNING PLATFORM - The embodiments disclosed in this document are directed to an AI-enabled microgrid and DER planning platform that uses AI methods and takes into account cost calculations, emission calculations, technology investments and operation. In an embodiment, the computing platform is deployed on a network (cloud computing platform) that can be accessed by a variety of stakeholders (e.g., investors, technology vendors, energy providers, regulatory authorities). In an embodiment, the planning platform implements machine learning (e.g., neural networks) to estimate various planning parameters, where the neural networks are trained on observed data from real-world microgrid/minigrid and DER projects. | 2019-10-10 |
20190311287 | ASSESSING ACCURACY OF A MACHINE LEARNING MODEL - Balancing content distribution between a machine learning model and a statistical model provides a baseline assurance in combination with the benefits of a well-trained machine learning model for content selection. In some implementations, a server receiving requests for a content item assigns a first proportion of the received requests to a first group and assigns remaining requests to a second group. The server uses a machine learning model to select variations of the requested content item for responding to requests assigned to the first group and uses a statistical model to select content variations for requests assigned to the second group. The server obtains performance information, e.g., acceptance rates for the different variations, and compares performance of the different models used for content selection. Audience share assigned to the machine learning model is increased when it outperforms the statistical model and decreased when it underperforms the statistical model. | 2019-10-10 |
20190311288 | METHOD FOR MACHINE LEARNING, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING PROGRAM, APPARATUS FOR MACHINE LEARNING - A method for machine learning performed by a computer includes: (i) executing a first process that includes executing machine learning on weight values corresponding to multiple functions to be used to calculate similarities between items forming pairs and included in first and second data included in a teacher data item for each of the pairs of items based on the teacher data item stored in a memory; and (ii) executing a second process that includes identifying evaluation functions to be used to calculate the similarities between the items forming the pairs based on the multiple functions and the weight values corresponding to the multiple functions. | 2019-10-10 |
20190311289 | VEHICLE CLASSIFICATION BASED ON TELEMATICS DATA - Among other things, motion data is acquired from a device in a vehicle during a trip. The motion data is applied to a trained classifier to produce a commercial classification of the vehicle. | 2019-10-10 |
20190311290 | Deep Learning Based Test Compression Analyzer - One or more machine-learning models are trained and employed to predict test coverage and test data volume. Input features for the one or more machine-learning models comprise the test configuration features and the design complexity features. The training data are prepared by performing test pattern generation and circuit design analysis. The design complexity features may comprise testability, X-profiling, clock domains, power domains, design-rule-checking warnings, or any combination thereof. | 2019-10-10 |
20190311291 | ARTIFICIAL INTELLIGENT SYSTEM INCLUDING PRE-PROCESSING UNIT FOR SELECTING VALID DATA - Provided is an artificial intelligence system. The system includes a first sensor configured to generate a first sensing signal during a sensing time, a second sensor disposed adjacent to the first sensor and configured to generate a second sensing signal during the sensing time, a pre-processing unit configured to select valid data according to a magnitude of a differential signal generated based on a difference between the first sensing signal and the second sensing signal, and an artificial intelligence module configured to analyze the valid data to generate result data. | 2019-10-10 |
20190311292 | AUTOMATED TUNING OF A SERVICE CONFIGURATION - Methods and systems for automated tuning of a service configuration are disclosed. An optimal configuration for a test computer is selected by performing one or more load tests using the test computer for each of a plurality of test configurations. The performance of a plurality of additional test computers configured with the optimal configuration is automatically determined by performing additional load tests using the additional test computers. A plurality of production computers are automatically configured with the optimal configuration if the performance of the additional test computers is improved with the optimal configuration. | 2019-10-10 |
20190311293 | MACHINE LEARNING FOR DETERMINING CONFIDENCE FOR RECLAMATION OF STORAGE VOLUMES - A method, system and computer product for performing storage maintenance is described. A training set for storage volume reclamation is received. The training set for storage volume reclamation contains sets of storage parameters for storage volumes and corresponding user decisions whether the storage volumes are reclaimable. The training set is used to train a machine learning system to recognize reclaimable candidate storage volumes. The trained machine learning system is used to determine that a candidate storage volume for reclamation is likely a reclaimable storage volume. | 2019-10-10 |
20190311294 | SELF-ADAPTIVE, SELF-TRAINED COMPUTER ENGINES BASED ON MACHINE LEARNING AND METHODS OF USE THEREOF - In some embodiments, the present invention provides for a computer system which includes a content database storing initial content data and a vocabulary data set; a processor configured to applying a machine learning model to transform the initial content data into a N-dimensional vector space; self-training the machine learning model based on the vocabulary data set; applying a clustering technique to the N-dimensional vector space to generate a cluster model of clusters, where each cluster includes a plurality of word representations; associating each cluster with a cluster identifier; obtaining subsequent content data; associating each data element of the subsequent content data with each cluster to generate a content data cluster mapping model; continuously tracking, for each user, each respective cluster identifier of each respective cluster associated with each action performed by each user with each data element to continuously self-adapt each user-specific, time-specific dynamic cluster mapping model. | 2019-10-10 |
20190311295 | MINING EMAIL INBOXES FOR SUGGESTING ACTIONS - Embodiments are directed towards automatically learning user behavioral patterns when interacting with messages and based on the learned patterns, suggesting one or more predicted actions that a user might take in response to receiving subsequent message. One or more classifiers are trained and employed to predict one or more actions that a user might take in response to receiving the message. In one embodiment, the one or more predicted actions are provided suggested to the user as an action the user might take on the message. Messages may be rank ordered within a given suggested action based on a confidence level of the prediction. | 2019-10-10 |
20190311296 | Method of Integrating Qubits for Room-Temperature Quantum Computing - A method of qubits, a room temperature quantum computing and a system including a controller, a readout, a resistor and a storage are disclosed. The shape and area of each qubits and the pattern of qubit array may be defined by a pattern on a mask simultaneously to control correlations among qubits. The configuration of qubit correlation may be designed three-dimensionally by stacking layers including arrays of qubits. The external generator may be included in another layer stacked with the layers including the arrays of qubits. The qubit may comprise a band structure having a spin-less ground state and a first excited state with spin. The first excited state may not be split for a retention time even under the external field which can influence a spin. The configuration of qubit correlations may be tuned by considering this retention time and an error correction code in quantum computation. | 2019-10-10 |
20190311297 | ANOMALY DETECTION AND PROCESSING FOR SEASONAL DATA - Systems and devices for the evaluation and analysis of computing system data for anomaly detection and processing are disclosed. In an example, operations to detect anomalies include: obtaining a source event stream of data produced from operation of a computing system; converting the source event stream into a frequency signal; identifying an estimated seasonality from the frequency signal; scaling the estimated seasonality to a target event stream produced from operation of the computing system; identifying anomalies of a principal vector of the target event stream, based on deviation from the estimated seasonality; and causing the computing system to perform an action based on the identified anomalies. In a further example, the operations include scaling the estimated seasonality to a subset of the target event stream indicating minor vectors; and identifying anomalies of the minor vectors, based on deviation of the subset of data from the estimated seasonality. | 2019-10-10 |
20190311298 | ASYNCHRONOUS PARAMETER AGGREGATION FOR MACHINE LEARNING - Systems and methods are provided for training a machine learned model on a large number of devices, each device acquiring a local set of training data without sharing data sets across devices. The devices train the model on the respective device's set of training data. The devices communicate a parameter vector from the trained model asynchronously with a parameter server. The parameter server updates a master parameter vector and transmits the master parameter vector to the respective device. | 2019-10-10 |
20190311299 | Training Machine Learning Algorithms with Temporally Variant Personal Data, and Applications Thereof - To train models, training data is needed. As personal data changes over time, the training data can get stale, obviating its usefulness in training the model. Embodiments deal with this by developing a database with a running log specifying how each person's data changes at the time. When data is ingested, it may not he normalized. To deal with this, embodiments clean the data to ensure the ingested data fields are normalized. Finally, the various tasks needed to train the model and solve for accuracy of personal data can quickly become cumbersome to a computing device. They can conflict with one another and compete inefficiently for computing resources, such as processor power and memory capacity. To deal with these issues, a scheduler is employed to queue the various tasks involved. | 2019-10-10 |
20190311300 | Scheduling Machine Learning Tasks, and Applications Thereof - To train models, training data is needed. As personal data changes over time, the training data can get stale, obviating its usefulness in training the model. Embodiments deal with this by developing a database with a running log specifying how each person's data changes at the time. When data is ingested, it may not he normalized. To deal with this, embodiments clean the data to ensure the ingested data fields are normalized. Finally, the various tasks needed to train the model and solve for accuracy of personal data can quickly become cumbersome to a computing device. They can conflict with one another and compete inefficiently for computing resources, such as processor power and memory capacity. To deal with these issues, a scheduler is employed to queue the various tasks involved. | 2019-10-10 |
20190311301 | DYNAMICALLY GENERATED MACHINE LEARNING MODELS AND VISUALIZATION THEREOF - Systems and methods provide real-time machine learning modeling, evaluation, and visualization. A computing system can receive input values for attributes of a new item listing. Concurrently, the system can analyze previous related item listings. The system can process the attributes and associated values of the new listing and previous listings to extract features and associated values. The system can apply the features of previous listings to machine learning algorithms to generate a machine learning model directed towards a target objective, such as maximizing a selling price or a selling probability for the new listing. The system can determine a likely outcome of the new listing by applying user-input values to the model and alternative outcomes by substituting one or more user-input values. If the alternative outcomes represent better results, then the system can present suggestions to revise the new listing to replace one or more user-input values with substitute values. | 2019-10-10 |
20190311302 | ELECTRONIC APPARATUS AND CONTROL METHOD THEREOF - An electronic apparatus is provided. The electronic apparatus includes a first memory configured to store a first artificial intelligence (AI) model including a plurality of first elements and a processor configured to include a second memory. The second memory is configured to store a second AI model including a plurality of second elements. The processor is configured to acquire output data from input data based on the second AI model. The first AI model is trained through an AI algorithm. Each of the plurality of second elements includes at least one higher bit of a plurality of bits included in a respective one of the plurality of first elements. | 2019-10-10 |
20190311303 | SYSTEM AND METHOD FOR CREDENTIALING ACCESS TO RESTRICTED ROOMS - A method for credentialing access to a restricted area includes receiving a reservation request at a reservation server and extracting reservation information from the reservation request using the reservation server. The reservation information includes at least a set of authorized visitors from the reservation request, a timestamp of the reservation request, and a room identifier of the reservation request. The method passes the reservation information to a credentialing server, authenticates the reservation request by at least verifying a payment, and provides an access credential to each visitor in the set of authorized visitors. | 2019-10-10 |
20190311304 | RE-CREATING A SOUND PROFILE OF A STORED ACOUSTIC SPACE IN A SECOND ACOUSTIC SPACE UTILIZING AN ARRAY OF SPEAKERS - In embodiments of the present invention improved capabilities are described for a computer-based method for reproducing an acoustic environment including accessing a computer stored multi-dimensional sound profile of a first space, wherein the multi-dimensional sound profile of the first space includes at least one multi-dimensional sound signature, the at least one multi-dimensional sound signature comprising a time-based sound reflection sequence within the first space for at least two sound parameters; and modifying a characteristic of an array of speakers in a second space to change the multi-dimensional sound profile in the second space to resemble at least one characteristic of the computer stored multi-dimensional sound profile of the first space. | 2019-10-10 |
20190311305 | SYSTEM AND METHOD FOR AUTOMATED PROMOTION AND RESERVATION OF APPOINTMENT-BASED SERVICES - Provided is a system and method for automating the promotion and reservation of an appointment-based service. The system includes an appointment management database configured to store service schedules, customer information, and promotion history information; an automatic promotion and appointment processing server configured to select target customers who have a good possibility of using an idle resource and a promotion service item of the idle resource when the idle resource is recognized, and to provide the selected promotion service items to the target customers; and a customer terminal configured to present the promotion service item of the idle resource provided by the automatic promotion and appointment processing server, and to provide a request, a denial, or a change for an appointment through the Internet, a mobile communication network, or a communication network formed of a combination of heterogeneous communication networks. | 2019-10-10 |
20190311306 | FLEXIBLE VECTOR-PROCESSING ALGORITHMS FOR NUMERICALLY SOLVING EXTREME-SCALE, LINEAR AND NON-LINEAR, PREDICTIVE AND PRESCRIPTIVE, PROBLEMS IN SCIENCE AND ENGINEERING, ON PARALLEL-PROCESSING SUPER COMPUTERS - A computer-implemented method for numerical solution of a geometric programming problem is described, including the computer-implemented steps of: reformulating the geometric programming problem as an equivalent generalized geometric programming optimization problem with only linear constraints, and solving the equivalent generalized geometric programming optimization problem by vector processing, including determining by computer-implemented numerical computation a solution for an unconstrained objective function whose independent vector variable is the generalized geometric programming conjugate dual of a primal decision vector variable of the geometric programming problem, and includes a variable linear combination of fixed vectors enabling the vector processing. Also described are computer-readable storage devices, computer program products, and computer systems for such numerical solution methodology. | 2019-10-10 |
20190311307 | SYSTEMS AND METHODS FOR PLANNING TRANSPORTATION ROUTES - The present disclosure relates to systems and methods for planning transportation routes. In one implementation, a method for simulating vehicle ridesharing is provided. The method may include receiving a first input of a geographical area and accessing map information of roadways in the geographical area. The method may also include receiving a second input indicative of at least one scenario of ridesharing demand in the geographical area and receiving a third input indicative of virtual vehicles designated to transport virtual passengers associated with the scenario. The method may further include initiating a transportation simulation of scenario to simulate rides of the virtual vehicles transporting the virtual passengers along the roadways. The method may also include determining, based on the transportation simulation, a performance level associated with the virtual vehicles and providing an output representative of the determined performance level. | 2019-10-10 |
20190311308 | RESOURCE PROCESSING METHOD AND APPARATUS - A resource processing method and apparatus. The method is achieved by a computer configured to execute the following steps: generating a resource allocation chart based on a resource allocation request; processing the resource allocation chart and generating an access entrance of the resource allocation chart; opening the access entrance to enable at least one third party resource supplier to respond to the resource allocation request via the access entrance. The method further comprises: when the resources are not available or not suitable for allocation, receiving a resource allocation chart, wherein the resource allocation chart is based on the resource allocation request; generating an access entrance of the resource allocation chart; opening the access entrance to at least one third party resource supplier; and receiving the allocated resources from the at least one third party resource supplier by responding to the resource allocation request through the access entrance. | 2019-10-10 |
20190311309 | System and Method for Solving Large Scale Supply Chain Planning Problems with Integer Constraints - A system and method is disclosed for solving supply chain planning problems. The system includes a database that stores data representing a planning problem of a supply chain network and a computer that accesses the planning problem of the supply chain network stored in the database and models the planning problem as a network of nodes and edges. The computer further generates a hierarchical linear programming solution of the planning problem and applies advanced heuristics to the generated hierarchical linear programming solution. The computer still further formulates a mixed integer program to generate an optimized global hierarchical solution and stores the generated optimized global hierarchical solution in the database. | 2019-10-10 |
20190311310 | METHODS AND SYSTEMS FOR MANAGING RISK WITH RESPECT TO POTENTIAL CUSTOMERS - Embodiments for managing potential customers by one or more processors are described. An identification of a potential customer for a vendor is received. A risk level associated with the potential customer is determined based on customer data from at least one data source associated with the potential customer. A signal representative of the determined risk level associated with the potential customer is generated. | 2019-10-10 |
20190311311 | SEATING SPACE OPTIMIZATION IN A GROUPED SEATING ENVIRONMENT - Embodiments for optimizing seating space in a group seating arrangement by a processor. One or more seating preferences and constraints from a user may be received. An optimized seating arrangement in the group seating arrangement, having one or more adjustable seats, may be determined according to the one or more seating preferences and constraints. A user is enabled to select the optimized seating arrangement via a graphical user interface (GUI) such that the one or more adjustable seats in the group seating arrangement are dynamically adjusted according to the optimized seating arrangement and user selection. | 2019-10-10 |
20190311312 | METHODS AND SYSTEMS FOR GENERATING SUPPLY CHAIN REPRESENTATIONS - A computer implemented method for mining supply chain information to produce supply chain graphs includes receiving by a computer a set of data; identifying a supplier, a commodity, and a customer from the set of data; generating a query comprising the identified data; determining the absence of any of the supplier, the commodity, or the customer from the set of data; if any items are determined to be absent from the set of data, substituting a placeholder for the missing item from the data set; sending the query; receiving a set of supply chain graph information; generating a supply chain graph signal based upon the set of supply chain graph information; and transmitting the supply chain graph signal. A computing device or system includes a processor an electronic memory; and a program for mining supply chain information to produce supply chain graphs stored in the electronic memory. | 2019-10-10 |
20190311313 | METHOD FOR USE WITH A JOB, SYSTEM FOR CARRYING OUT THE METHOD AND USES - In the method, a predetermined group of demands, including demands that have associated parameters, are used, in respect of a shift of a job, in a process wherein, in respect of demands (i) that lack associated parameters, the amount of time that a worker, in the course of the shift, performs each demand, is derived; and (ii) that have associated parameters, each time such a demand is performed in the course of the shift, the duration, and associated parameters, is derived. The loads placed upon the muscles of the worker in the shift are calculated using, for each demand performed that is of the type that: (i) lacks associated parameters, the determined demand time and a predetermined group of load factors associated with said demand; and (ii) has associated parameters, the determined demand time, a predetermined group of load factors associated with said demand and said parameters. | 2019-10-10 |
20190311314 | DISPATCH SYSTEM HAVING CONTROL SHARED WITH DISPATCHED SERVICE PROVIDERS - Embodiments of the present invention are directed to a method for dispatching a person to a location in a casino to respond to a request for service at the location. A dispatched person may use his or her mobile computing device to indicate availability to assist with other calls and may create, join, or intercept a call while on one or more current calls. The dispatch system automatically assigns the same person to all calls generated at the same machine or at different machines that are each associated with the same identified player. The dispatched person may use his or her mobile computing device to selectively switch among the calls on which he or she is currently working. | 2019-10-10 |
20190311315 | SYSTEM FOR AFFILIATING PARCEL SERVICE TARGETING AT UNSPECIFIED INDIVIDUALS AND METHOD FOR DELIVERING ARTICLE BY USING THE SAME - Provided is a system for affiliating a parcel service targeting at unspecified individuals, wherein since unspecified individuals can participate as a courier and a carrier, a delivery requester is not interrupted by time and needs not pack an article, thereby achieving convenient delivery, a carrier can make money during leisure time or daily life, and a recipient can receive an article within a short time. The system includes: an administrator server; a delivery requester terminal configured to register an article delivery request of an unspecified person to the administrator server; and a carrier terminal configured to receive the delivery request registered in the administrator server and support pickup and transportation of the article by the unspecified person. | 2019-10-10 |
20190311316 | DISTRIBUTION AND INVENTORY SYSTEM AND METHODS OF USING THE SAME - The present disclosure is directed to a dispensing system including: a product loading unit; a receptacle configured to receive the product loading unit; a storage area configured to receive product; and a transfer unit for moving the product between the product loading unit and the storage area. The present disclosure is also directed to a dispensing system including: a product loading unit; a receptacle configured to receive the product loading unit; a storage area configured to receive product; a transfer unit for moving the product between the product loading unit and the storage area; and a remote system operable to send and/or receive product information from the dispensing system regarding an amount of product and a type of product within the receptacle. | 2019-10-10 |
20190311317 | INVENTORY MANAGEMENT SERVER, INVENTORY MANAGEMENT SYSTEM, INVENTORY MANAGEMENT PROGRAM, AND INVENTORY MANAGEMENT METHOD - To provide an inventory management server, an inventory management system, an inventory management program, and an inventory management method which are capable of carrying out inventory management such as warehousing processing and delivery processing easily and inexpensively by using an image for identifying merchandise together with an image of the merchandise. Provided is an inventory management server | 2019-10-10 |
20190311318 | System For Stock Management For On-board Catering For A Vehicle - A system for stock management for on-board catering for a vehicle, in particular for an aircraft, includes a galley which is provided with a control unit for controlling the galley, wherein the control unit is designed to make available stock management data of the galley; a service unit for transporting supplies within the vehicle, wherein the stock management data comprise a stock record of the supplies transported with the service unit; and at least one operator control element which is communicatively connected to the control unit of the galley via a wireless data connection and is designed to record removal of a supply item from the service unit and/or reception of a supply item into the service unit, and to bring about updating of the stock record of the transported supplies on the basis thereof. | 2019-10-10 |
20190311319 | COMPREHENSIVE NO-TOUCH INVENTORY MANAGEMENT SYSTEM - A system directed to inventory in an enclosure employs sensors and data processing to provide real time inventory management without requiring additonal user action. Adaptable to storage units such as refrigerators, cabinets and pantries, and particularly useful for tracking perishable items, object recognition rechnology generates time-stamped data identifying objects as they are placed in and removed from the enclosure, thereby enabling an associated database to maintain inventory of objects in the enclosure in real time. Embodiments further comprise sensors providing weight data for an object as it is placed in the enclosure, enabling the inventory database to track item weights. The system database enables software means to provide users actionable information such as expiration alerts, recipes, shopping lists, dietary recommendations and other information concerning food items in the enclosure. | 2019-10-10 |
20190311320 | Color Chip Dispenser - Systems and methods are provided and include a card shuffler device, an optical code reader, a robotic arm, a display area having display windows and light sources, and a controller. The controller receives a selected coating color, searches color chips for the selected coating color by controlling the card shuffler device and the optical code reader to identify a particular color chip that matches the selected coating color based on a machine-readable optical code displayed in an optical code area of the particular color chip, receives a light source selection, and controls the robotic arm to display the particular color chip in a display window that has an associated light source that corresponds to the received light source selection. | 2019-10-10 |
20190311321 | AUTOMATIC REGISTRATION OF ASSET TAGS BASED ON CROWD SOURCING ASSET CONTEXT - A server-implemented method for automatically registering an asset tag in a database is disclosed. One or more asset tag collision reports are received from at least one mobile device connected to the server, each report including a tag identifier of the asset tag that is wirelessly broadcast by the asset tag. A location of the asset tag is determined based on the one or more received asset tag collision reports. A first asset is selected from a set of unregistered assets that are identified as being deployed in the indoor facility based on determining that there is a match between the location of the asset tag and location information associated with the first asset. The asset tag is then registered in association with the first asset in the database. | 2019-10-10 |
20190311322 | COLD-CHAIN COMPLIANT ITEM STORAGE CART SYSTEM - Examples provide a system for cold-chain compliance of items on a smart storage cart. The smart storage cart includes a plurality of bins, a memory, a processor, and a data storage device storing a perpetual inventory (PI) of items on the cart. The cart automatically updates the PI in response to removal of items from the cart or addition of items to the cart. The smart storage cart activates bin restock indicators to identify bins for removal of items or addition of items to the cart. The cart monitors entrance into or exiting from geofence areas. A cold-chain compliance component calculates the smart storage cart's dwell-time outside temperature-controlled areas. The cart outputs an alert recommending return of the smart storage cart to a temperature-controlled area if the cart's dwell time approaches the maximum dwell-time and/or outputs an alert if the smart storage cart's dwell-time exceeds the maximum dwell-time. | 2019-10-10 |
20190311323 | SEAL DELIVERY TRACKING SYSTEM - Systems and devices are provided for tracking deliveries and confirming delivery information with seals attached to the delivery vessel. In certain embodiments the seal includes a hidden number or code that is only viewable once the seal is broken or cut. The seal includes data and information that matches that of a corresponding delivery. Mobile devices and other computing devices can track the information that is input by the delivery personnel during the delivery process. | 2019-10-10 |
20190311324 | AUTOMATED SCHEDULING AND VESSEL NAVIGATION SYSTEM FOR CONTAINER SHIPPING - A methodology and/or system to automatically generate an optimal collaborative agreement, according to which multiple vessel arrival time windows, start and end times for each time window, and multiple handling rates during each time window are offered by the marine container terminal operator to the liner shipping company at each port of the given liner shipping route. The vessel scheduling problem is formulated as a mixed integer nonlinear programming model, where the total liner shipping route service cost is minimized. A set of linearization techniques are applied to the original model, and the linearized model is solved using CPLEX. A number of computational experiments were performed for the Pacific Atlantic 1 liner shipping route, served by the NYK liner shipping company, with results showing effectiveness of the proposed collaborative agreement and the adopted solution methodology to improve liner shipping operations. | 2019-10-10 |
20190311325 | SYSTEMS AND METHODS FOR ITEM DELIVERY USING ANONYMIZED DELIVERY POINTS - Systems and methods for generating and implementing an anonymized delivery point processing system are disclosed. Anonymous addresses can be associated with actual physical delivery points. An item having an anonymous address thereon can be sorted and/or routed on item processing equipment based on the associated actual physical delivery point. | 2019-10-10 |
20190311326 | METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR IDENTIFYING DUPLICATE TRAVEL - An apparatus is provided for detecting duplicate travel. The apparatus may include at least one memory and at least one processor configured to detect a travel path of a vehicle based in part on received items of location data. The processor is also configured to determine whether the travel path is associated with a defined street segment including a plurality of location points corresponding to a street. The processor is further configured to determine whether the vehicle travels the street multiple times in a predefined time period. The processor is further configured to superimpose visible indicia on the defined street segment in response to detecting that the vehicle traveled the street multiple times during the predefined time period. Corresponding computer program products and methods are also provided. | 2019-10-10 |
20190311327 | ITEM DELIVERY TO AN UNATTENDED VEHICLE - A system for delivering items or packages to an unattended vehicle after receiving an order for delivery of an item or package to a vehicle is disclosed. The system determines identifying information for the vehicle, where the identifying information includes a wireless identifier of the vehicle. The system determines a delivery location of the vehicle. The system transmits a request to dispatch a delivery vehicle to deliver a package to the vehicle, wherein the request comprises the identifying information and the delivery location. | 2019-10-10 |
20190311328 | Method and Apparatus for Project Management - A computer system and method for project management provides an integrated platform for collaboration, monitoring progress and completion of project related tasks, and creation, modification, and management of project related application files across multiple application programs. | 2019-10-10 |
20190311329 | Decision Making Add-on System - A system, method and computer readable indexing and storage medium, for generating historical data, is provided which, based on historical accounts and records, assist in the decision making process as it relates to human resources and the management of the field supply and demand. The data collected by way of personal entries, provides a personalized experience for the recruitment navigational and the benefit assignment tools. The imported data portion accesses the central database records comprising of employee write-ups, awards, recommendations, pink slips, promotions, etc. Depending on the data attached to a specific profile, the system will rank the hiring potential of a job seeking applicant, the providers of opportunities and the eligibility of the pursuers of program benefits. The system will be designed to interact with all communication platforms (mobile, tablets, PCs, laptops etc.). Other methods and apparatuses are also described. | 2019-10-10 |
20190311330 | An Integrated Pre-Assessment Recruitment System and a Method Thereof - The present disclosure relates to the field of recruitment systems. The system comprises a memory, an input module, a talent reader, a repository, a talent pool creation module, and a pre-offer module. The candidates provide values corresponding to tags in a pre-defined resume format to generate a resume, read by the talent reader to extract the tag values and store in candidate repository. An assessment test for the candidate based on the pre-determined questionnaires and tag values is created, and responses of the test is assessed to generate a score for filtration of candidates. A recruiter sends a set of desired tag values which are extracted and mapped with the stored tag values to generate a mapped set of candidates for sending pre-offer letters. The system create a talent pool and reduces turnaround time of the selection process. | 2019-10-10 |
20190311331 | SYSTEM AND METHOD FOR INTERVIEW TRAINING WITH TIME-MATCHED FEEDBACK - The present disclosure generally relates to interview training and providing interview feedback. An exemplary method comprises: at an electronic device that is in communication with a display and one or more input devices: receiving, via the one or more input devices, media data corresponding to a user's responses to a plurality of prompts; analyzing the media data; and while displaying, on the display, a media representation of the media data, displaying a plurality of analysis representations overlaid on the media representation, wherein each of the plurality of analysis representations is associated with an analysis of content located at a given time in the media representation and is displayed in coordination with the given time in the media representation. | 2019-10-10 |
20190311332 | MODEL PREDICTIVE MAINTENANCE SYSTEM WITH INCENTIVE INCORPORATION - A model predictive maintenance system for building equipment including an equipment controller to operate the building equipment to affect a variable state or condition in a building. The system includes an operational cost predictor to predict a cost of operating the building equipment over a duration of an optimization period, a maintenance cost predictor to predict a cost of performing maintenance on the building equipment, and a cost incentive manager to determine whether any cost incentives are available and, in response to a determination that cost incentives are available, identify the cost incentives. The system includes an objective function optimizer to optimize an objective function to predict a total cost associated with the building equipment over the duration of the optimization period. The objective function includes the predicted cost of operating the building equipment, the predicted cost of performing maintenance on the building equipment, and, if available, the cost incentives. | 2019-10-10 |
20190311333 | SMART WASTE COLLECTION SYSTEM AND METHOD - A waste collection system includes waste containers for receiving waste, sensors associated with the waste containers, a server system for receiving signals from the sensors. The server system determines that a waste container needs to be collected, determines a location of the waste container and whether the waste container is in a waste collection vehicle accessible location. A notification is sent to an operator of the waste container if the waste container is not in a waste collection vehicle accessible location. When the waste container is moved to a waste collection vehicle accessible location, an optimal waste collection strategy for a waste collection vehicle to collect waste from the waste container at the waste collection vehicle accessible location is determined and the waste collection vehicle is routed to the location of the waste container. | 2019-10-10 |
20190311334 | Accelerated Check Processing - This disclosure includes devices systems, and methods for accelerating the processing of actual paper check documents by a payee. The Accelerated Check documents are in all respects duplicative of current paper checks in common use, and are processed through the banking system the same. All levels of security in common use by banks and check processors are likewise available to payees utilizing Accelerated Check Processing plus additional security measures that are unique to the current invention. Those security measures includes digital depositing data for Positive Pay at payer's bank and a paver supplied Security Device Interface with USB connectivity in payee's hardware, such device containing an serial circuit to generate a digital unique code used in the process of Positive Pay for each Accelerated Check. The unique code is composited from payee's machine key, the payer's server data and the serial circuit data. | 2019-10-10 |
20190311335 | SYSTEMS AND METHODS FOR IN-APPLICATION CONTENT MANAGEMENT - The disclosed implementations provide a process to streamline in-application purchasing of unlockable content. The disclosed implementations can determine an amount of resources with a virtual currency package on an application store, present a selectable option to purchase the package in real currency, and provide access to the unlockable content stored on a server associated with the developer of the application in response to selecting the package and payment of the real currency amount. | 2019-10-10 |
20190311336 | APPARATUS OF GENERATING CREDIT VIRTUAL CURRENCY AND APPARATUS OF MANAGING CREDIT VIRTUAL CURRENCY - Provided is a virtual currency generation apparatus including a blockchain generator configured to generate a blockchain including a virtual currency that is generated based on a credit limit of a consumer and to update the blockchain based on payment details; an account manager configured to manage multi-signatures of a plurality of accounts sharing the blockchain; and a transaction generator configured to store a transaction condition corresponding to each of the plurality of accounts and to proceed with a payment using the virtual currency based on the transaction condition. | 2019-10-10 |
20190311337 | Method and System for Exchange of Value or Tokens Between Blockchain Networks - A blockchain value transfer method comprising receiving from a client a transfer request to transfer value in a form of at least one of a cryptocurrency and a token, determining if the transfer request is intra-chain or inter-chain, intra-chain defining a combined sending and receiving blockchain network and inter-chain defining a sending blockchain network and a receiving blockchain network, transmitting to the client a response to the transfer request, the response comprising a raw transaction, receiving from the client a response to the raw transaction wherein a private key of a user is used to sign the raw transaction, defining a signed transaction, verifying a signature of the signed transaction and broadcasting the signed transaction to the combined sending and receiving blockchain network if the transaction request is intra-chain or to each of the sending blockchain network and the receiving blockchain network if the transaction request is inter-chain. | 2019-10-10 |
20190311338 | DATA PUSHING METHOD AND APPARATUS, STORAGE MEDIUM, AND ELECTRONIC APPARATUS - Embodiments of the present application disclose a data pushing method performed at a server. The server obtains a plurality of pieces of theme data that is to be selected when target push data is pushed, the theme data being used for displaying different theme pages of the target push data; selects, from the theme data, target theme data that is used when the target push data is pushed; and pushes the target push data to a second client and causes displaying, on a first client, a first target theme page that is obtained after the target push data is pushed when a first instruction of the first client is received to push the target push data to the second client, and causes displaying a second target theme page corresponding to the first target theme page on the second client after the second client receives the target push data. | 2019-10-10 |
20190311339 | PAYMENT METHOD AND ELECTRONIC DEVICE USING SAME - An electronic device for payment sharing processing, according to various examples, comprises: a communication unit for communicating with a first electronic device or a second electronic device; a database for storing at least one piece of payment information; and a processor, wherein the processor can be configured to: receive a group creation request and identification information of a user to be added to a group from the first electronic device, by using the communication unit; transmit a subscription request for the group to the second electronic device corresponding to the user identification information; determine the user corresponding to the second electronic device as a member of the group when a group subscription consent response is received from the second electronic device; receive at least one piece of payment information from the first electronic device and/or the second electronic device, and transmit integrated payment information including the received payment information to the first electronic device and the second electronic device; calculate individual payment amounts of money of respective users in the group and transmit the individual payment amounts of money to the first electronic device and the second electronic device, at least on the basis of the integrated payment information and payment consent responses when the payment consent responses are received from the first electronic device and the second electronic device; and perform a money transfer operation in which money is withdrawn from a payment service account of at least one user in the group and deposited into a payment service account of another user, when transfer consent responses based on the individual payment amounts of money are received from the first electronic device and the second electronic device. Additionally, other examples are possible. | 2019-10-10 |
20190311340 | SYSTEMS AND METHODS FOR PROVIDING CASH REDEMPTION TO A THIRD PARTY - A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method. Upon receiving a request to provide cash redemption to a third party from a provider client terminal, the system may allocate an amount of cash to a temporary financial account and generate a temporary access code that may be used to access the cash in the temporary financial account. The system may transmit the temporary access code to a recipient client terminal and upon an ATM terminal's receipt of the input access code, the system may authorize the withdrawal of the amount of cash. | 2019-10-10 |
20190311341 | SYSTEMS AND METHODS FOR ITEM ACQUISITION BY SELECTION OF A VIRTUAL OBJECT PLACED IN A DIGITAL ENVIRONMENT - Systems and methods for item acquisition by selection of a virtual object placed in digital environment are disclosed. According to an aspect, a system may include a display, a user interface, an image capture device, and at least one processor and memory. The processor(s) and memory may be configured to receive a coordinate for placement of a virtual object in a digital environment; control the display to display the virtual object when a position corresponding to the received coordinate is within a field of view of the image capture device; receive an input via the user interface for selecting the virtual object; and associate with a user a credit for acquisition of an item associated with the virtual object in response to receipt of the input. | 2019-10-10 |
20190311342 | COMMODITY SALES DATA PROCESSING APPARATUS AND METHOD FOR TAKING OVER PROCESSING BY THE SAME - In accordance with one embodiment, a commodity sales data processing apparatus comprises a stationary type docking station with a storage module, and a portable information terminal which is attached to and detached from the docking station freely. The information terminal receives an input of data relating to the sales of a commodity to process the received data, and stores the data required to take over the processing in the storage module of the docking station Then the information terminal successively executes, if the information terminal is attached to the docking station, the processing by referring to the data stored in the storage module of the docking station. | 2019-10-10 |
20190311343 | POINT OF SALE SYSTEM NETWORK WITH DISTRIBUTED OWNERSHIP RECORD DATABASE - Systems, apparatuses, and methods are provided herein for a rule-based electronic checkout system based on a distributed digital ledger. A point of sale system is configured to receive a transaction request for a selected product, receive a customer public key, index a disturbed digital ledger to determine the user's ledger unit count for a selected product, request and verify a ledger transfer, and authorize the transaction based on the ledger transfer. | 2019-10-10 |
20190311344 | SMART CARD NFC SECURE MONEY TRANSFER - A secure method of real time money transferring between account holders utilizes Near Field Communication (NFC) technologies, dynamic transaction cards, and a mobile application to facilitate a seamless mobile transfer of funds. The dynamic transaction card of the customer requesting to make the transfer of funds may be placed in contact with the second recipient dynamic transaction card of the customer receiving the funds transfer to establish an NFC connection. The dynamic transaction card requesting the transfer may receive, via the NFC antenna on the card, the recipient customer account information stored on a passive NFC tag. The dynamic transaction card requesting the transfer may transmit the recipient account information to a mobile application, which may transmit the recipient account information to an account provider system for facilitating the funds transfer. | 2019-10-10 |
20190311345 | REAL-TIME DATA STORAGE AND ANALYTICS SYSTEM - Systems and methods are provided for storing, sorting, and analyzing account transactions in a payment network, and for real-time data analytics. One embodiment of a real-time data storage and analytics system includes a payment network that collects and processes account transactions. The system also includes a first data cluster that includes a first data structure. The first data structure stores a set of the account transactions. Additionally, the system includes a second data cluster that in turn includes a second data structure. The second data structure stores account transactions for new account and account transactions for which there is insufficient space in the first data structure. Moreover, the system includes an application engine that generates a score for an account based on transaction data associated with the account transactions for the account. | 2019-10-10 |
20190311346 | ALERT CONTROLLER FOR LOSS PREVENTION - Item images and item information for an item identified as being associated with a potential theft during a transaction at a transaction terminal are sent in real time to an alert controller of a management terminal. The item images and item information with transaction details are presented on a display for resolution by a clerk operating the management terminal. A timer is also set and a confidence score calculated representing a confidence level that the item is the subject of theft. When the timer expires and there is still no resolution provided by the clerk a decision is made as to whether to interrupt the transaction processing on the transaction terminal for assistance or whether to permit the transaction to complete on the transaction terminal based on the calculated confidence score. | 2019-10-10 |
20190311347 | CREDIT CARD PAYMENT PROCESSING METHOD AND APPARATUS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for processing credit card payment are provided. One of the methods includes: receiving credit card information from a client; generating a payment token representing the credit card information and storing the payment token; sending the payment token to the client for the client to use the payment token for payment; receiving a payment request including the payment token; locating the credit card information based on the payment token; and processing the payment request based on the credit card information. | 2019-10-10 |
20190311348 | NETWORK FUND MANAGEMENT SYSTEM - The present invention is an object to provide fund management system which manages a network fund or capital by inheriting the Korean indigenous traditions, such as Pumashi, Dure or Gye, based on the co-existence, respect and consideration of others. | 2019-10-10 |
20190311349 | SECURING TRANSACTIONS - A method for securing a transaction between a terminal, in particular of a first user, and a device, in particular of a second user, via a server, in particular of a third-party entity. The method includes comparing: a first series of codes drawn from a private key and associated with the transaction device transmitted from the server to the transaction device, and a second series of codes received by the server from a terminal, in particular of the first user. The comparison triggers in case of a match between the two series of codes, associating the second terminal, the transaction device and the transaction, making it possible to issue an authorization to continue the transaction between the second terminal and the transaction device associated by the server. | 2019-10-10 |
20190311350 | AUTOMATICALLY DISPLAYING PAYMENT PAGES BASED ON PROXIMITY TO A PAYMENT DEVICE - Techniques for displaying a payment page based on the proximity of a payment device to a client computing device are described. One example method includes receiving, at a client computing device, a signal when the client computing device is within a predetermined range of a source of the signal; determining, by the client computing device, that the signal is a predetermined characteristic signal sent by an electronic device of a payee; and in response to determining that the received signal is the predetermined characteristic signal, displaying, by the client computing device, a payment page configured to be read by the electronic device of the payee to perform an electronic payment. | 2019-10-10 |
20190311351 | CROSS-ASSET TRADING WITHIN BLOCKCHAIN NETWORKS - Implementations are directed to cross-asset trading in blockchain networks, and include a first node providing transaction information based on a first value, a second value, and an exchange rate of a second node, receiving, from the second node, a first evidence set, a first range proof, and a digital signature of the second node, and submitting the transaction for verification based on the first range proof, a second range proof, the first evidence set, a second evidence set, a digital signature of the first node, and the digital signature of the second node, the transaction being executed to decrease a balance of the first node by the first value, increase a first balance of the second node by the first value, decrease a second balance of the second node by the second value, and increase a balance of the third node by the second value. | 2019-10-10 |
20190311352 | METHOD AND SYSTEM FOR CONDUCTING TRANSACTIONS ON CRYPTOCURRENCIES WITH UNDERLYING VALUE SUPPORTED BY INTELLECTUAL PROPERTIES AND INTANGIBLE ASSETS - A method for issuing and maintaining a cryptocurrency backed by backing assets comprising intellectual properties and intangible assets, the method comprising: receiving the ICO data, wherein the ICO data includes the identity of a fund-raising entity, fund-raising goal minimum and maximum, and subscription criteria; receiving backing asset data comprising identification, cost, income, and ownership data; verifying the backing assets; valuating the backing assets' economic value with input variable parameter values comprising R&D cost, past royalty received, future royalty expected, allotted operating income, and future income, projected market size and revenue generated, the backing assets' registration approval probability, the backing assets' regulatory approval probability and timing, commercialization probability, and precedent data of comparable assets; binding the backing asset's economic ownership to the cryptocurrency by effectuating an execution of a smart contract by the fund-raising entity vesting the backing asset's economic ownership in a holding entity; and executing a token pricing function. | 2019-10-10 |
20190311353 | BLOCKCHAIN PAYMENT SYSTEM - A method for converting cryptocurrency into real, spendable currency includes receiving, from a first electronic device, a peer-to-peer payment request including a payment amount and a unique identifier of a recipient, generating a cryptocurrency payment invoice in response to receiving the peer-to-peer payment request, generating an invitation in response to payment of the cryptocurrency payment invoice, the invitation to be transmitted wirelessly to the recipient using the unique identifier, receiving, from a second electronic device, an acceptance of the invitation and one or more items of new user information associated with the recipient, generating a digital payment card in the name of the recipient in response to receiving the acceptance and the new user information, the digital payment card including a card number pulled from a bank identification number (BIN) range, and, after said generating the digital payment card, crediting the payment amount to the recipient. | 2019-10-10 |
20190311354 | MODEL AND METHOD TO ADVANCED AUTHENTICATION AND AUTHORIZATION PROCESS FOR PAYMENT TRANSACTIONS IN A BANKING SYSTEM WITH NO CARDS ISSUED TO CUSTOMERS - In accordance with the teachings of the present disclosure, devices and methods for authenticating and authorizing a transaction without issuing a credit or debit card to a customer may include receiving an encrypted code from a mobile device participating in a transaction through a mobile application registered with a bank and decoding the encrypted code. The devices and methods may also include determining whether the decoded encrypted code has been validated by the bank and receiving a one-time access code, initiated by the bank in response to validation of the decoded encrypted code, from the mobile device. The devices and methods may further include authenticating the one-time access code and processing the transaction in response to authentication of the one-time access code. | 2019-10-10 |
20190311355 | MODEL AND METHOD TO ADVANCED AUTHENTICATION AND AUTHORIZATION PROCESS FOR PAYMENT TRANSACTIONS IN A BANKING SYSTEM WITH NO CARDS ISSUED TO CUSTOMERS - In accordance with the teachings of the present disclosure, devices and methods for authorizing a transaction may include steps of receiving a transaction initiation request from a user of a mobile application, generating a first encrypted code in response to receiving the transaction initiation request, and transmitting the first encrypted code to the mobile application. The steps also may include receiving a second encrypted code in response to transmission of the first encrypted code, determining whether the first encrypted code matches the second encrypted code. The steps may further include transmitting a one-time access code (OTAC), receiving a response to the OTAC, verifying the response to the OTAC, and authorizing the transaction in response to verifying the response to the OTAC. The steps may include receiving an acknowledgement message to apply to an account of the user for billing the transaction in response to authorizing the transaction. | 2019-10-10 |
20190311356 | APPARATUS AND METHOD FOR PROCESSING ELECTRONIC MESSAGES - A method for processing a plurality of electronic messages comprises, at a messaging hub comprising at least one processor and a memory device in communication with the at least one processor: receiving data relating to at least one rule to be satisfied by combining at least part of the content of respective messages; receiving one or more intent messages followed by one verification message; and, upon receiving a message: updating, in the memory device, intent message data or verification message data depending on the message content; determining from the intent message data and/or the verification message data if the at least one rule has been satisfied; providing a first indication when the at least one rule has been satisfied by the verification message data alone; and providing a second, different, indication when the at least one rule has been satisfied otherwise. | 2019-10-10 |
20190311357 | Method and System for Exchange of Value or Tokens Between Blockchain Networks - A blockchain value transfer method including receiving a plurality of transaction requests, performing a balance check procedure on each transaction request to determining if the transaction value in first in-network tokens is greater than the present permitted transaction amount of the sending user account address, adding the transaction request to an aggregate transaction record, determining a net transaction amount for each user account address for each transaction in the aggregate transaction record, with the transaction value for transactions including the user account address as the sending user account address as a debit and as the receiving user account address as a credit, and executing the net transaction amount for each user account address associated with the net transaction amount by transacting tokens to and from the user account addresses upon reaching an aggregation threshold. | 2019-10-10 |
20190311358 | Fork-Tolerant Consensus Protocol - A consensus network includes Messagenodes and Validators. The Messagenodes add transactions to pre-built blocks of a blockchain. The Validators validate the transactions added to the blocks by the Messagenodes. Validators individually sign blocks in a pre-commit phase and if a block receives a threshold number of signatures, the Validators verify the signatures in a counting phase and commit the block to the blockchain. When a block is committed, it is linked to the previous sealed block in the blockchain. | 2019-10-10 |
20190311359 | Method for Tokenization of Financial Contracts on Decentralized Computing Networks - Decentralized computing and blockchain technologies have brought digital assets to the world, as well as new methods of creating traditional financial assets. The present innovation is a method for creating tradable assets on a computer implemented financial derivative that uses automated programs (smart contracts) on decentralized networks to adjust value based on an underlying reference rate. The basics of the method include two parties depositing a digital asset (similar or different) into a smart contract with details of the contract (duration, reference rate and overarching notional) agreed upon. ‘Tokens’ or shares which represent a specific side of the contract (long or short the underlying reference rate) are then created. The payout or settlement of the contract is not to a specific party but rather to the owners of the individual tokens. | 2019-10-10 |
20190311360 | AUTHORIZATION PREPROCESSING SYSTEMS AND METHODS - A processor of a transaction server may receive an authorization request prior to the authorization request being processed by a payment authorization system. The processor may identify at least one alternative to the authorization request being processed by the payment authorization system. The processor may receive a command to process the authorization request by the payment authorization system or to apply the at least one alternative. The processor may process the authorization request according to the command. | 2019-10-10 |
20190311361 | ADDING SECURITY TO A TRANSACTION BY VERIFYING LOCATIONS - A method includes receiving a transaction authorization request for a transaction between a user and a transaction system. The method also determines the location of the transaction system based and receiving the location of an account holder device associated with the account. The method also determines whether an increased authorization level is required for the transaction based on the location of the transaction system and the location of the account holder device. If the increased authorization level is required for the transaction, the method includes transmitting an increased authorization inquiry to the transaction system and receiving a response to the increased authorization inquiry. The increased authorization inquiry may be associated with a predetermined response. The method determines whether to authorize the transaction based on the response by the user and the predetermined response to the increased authorization inquiry. | 2019-10-10 |
20190311362 | SECURE ELEMENTS BROKER (SEB) FOR APPLICATION COMMUNICATION CHANNEL SELECTOR OPTIMIZATION - Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader. | 2019-10-10 |
20190311363 | LEDGER UPDATE NETWORK AND METHOD OF UPDATING A LEDGER - A ledger update network includes a terminal and a server. The server includes or in communication with a database of ledgers each uniquely associated with an identifier. The terminal receives a primary value and one of the identifiers; generates a request message that includes the identifier and the primary value; and generates an update command by (i) selecting a rule from a database, and (ii) generating a secondary value from the selected rule. The update command includes the identifier and the secondary value. The terminal transmits the request message and the update command to the server. The server transmits to the terminal an authorization response that confirms authorization of a transaction characterized by the identifier and the primary value. Without referencing the database and without first responding to the update command, the server posts the secondary value to the ledger that is associated with the identifier. | 2019-10-10 |
20190311364 | Generation and Provisioning of Digital Tokens Based on Dynamically Obtained Contextual Data - The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, generate and provision digital tokens based on dynamically obtained contextual data. For example, an apparatus may receive first information that characterizes an exchange of data initiated by a first application program executed by the apparatus, and may generate and transmit a signal to a computing system through a programmatic interface associated with a second application program executed by the apparatus. In some instances, the first signal may include the first information and data that instructs the computing system to obtain a digital token representative of a data type available for use in the data exchange. The apparatus may also receive a second signal that includes the digital token and based on the digital token, perform operations that present second information characterizing the available data type on an interface. | 2019-10-10 |
20190311365 | SHARED AUTHENTICATION FOR LIMITED USE OF AN ASSOCIATED ACCOUNT BASED ON USER LOCATION AND CONNECTED DEVICES - There are provided systems and methods for shared authentication for limited use of an associated account based on user location and connected devices. A user may own a location where another user may visit or rent. The user may have a payment account that may be used with merchants to purchase items that are associated with the location or offered with use of the location. The user may set up the payment account to have a shared authentication mechanism with other users that utilize the location to allow the other users to pay for items using the payment account. The authentication mechanism may be a credential that may be pushed to a device of one or more of the other users when the other users are at or nearby the location or may be information of the other users that may be matched during transaction processing. | 2019-10-10 |
20190311366 | EFFICIENT PARALLELIZED COMPUTATION OF GLOBAL BEHAVIOR PROFILES IN REAL-TIME TRANSACTION SCORING SYSTEMS - Parallelized computation by a real-time transaction scoring system that incorporates global behavior profiling of transacting entities includes dividing a global profile computing component of a transaction scoring model of a real-time behavioral analytics transaction scoring system into a plurality of global profile component instances. The transaction scoring model uses a plurality of global profile variables, each of the plurality of global profile component instances using its own global profile partition that contains the estimate of global profile variables and being configured for update by a dedicated thread of execution of the real-time transaction scoring system, each dedicated thread being configured for receiving and scoring a portion of input transactions. The method further includes partitioning, based on one or more transaction routing shuffling algorithms, the input transactions for receipt across the plurality of global profile component instances, and updating each of the plurality of global profile partitions by the corresponding global profile component running in the dedicated thread according to the scoring algorithm. | 2019-10-10 |
20190311367 | SYSTEM AND METHOD FOR USING A DATA GENOME TO IDENTIFY SUSPICIOUS FINANCIAL TRANSACTIONS - A system and method for using a data genome to identify suspicious financial transactions. In one embodiment, the method comprises receiving a data set of financial activity data of multiple participants; configuring a deep neural network and thresholds, wherein the thresholds enable detection of what is within abnormal range of financial activity, patterns, and behavior over a period of time; converting the data set to a genome containing a node for each participant among the multiple participants; computing threat vectors for each node within a graphical representation of the genome that represents behavioral patterns of participants in financial activities, including determining when a key risk indicator (KRI) value computed for a particular threshold within the data set falls outside of a dynamically determined range bounded by thresholds, wherein the threat vectors automatically identify one or more of suspicious participants and suspicious activities in a provided financial activity pattern; and determining a particular edge in the network whose behavior falls outside the dynamically determined range associated with normal activity as a suspicious. | 2019-10-10 |
20190311368 | FACILITATING USER ENGAGEMENT IN OFFLINE TRANSACTIONS - Methods, systems, and media for facilitating user engagement in offline transactions are disclosed. In one example, a method includes listing items for sale, at online prices, in an online publication system. A real-world environment is provided that includes a display, at offline prices, of physically retrievable items corresponding to the items listed for sale in the online publication system. A proximity or location of a user device relative to the real-world environment is detected, and a reduction is applied to an offline price of an item based on the detected proximity or location of the user. The applied reduction reduces the offline price to a price lower than the online price for the corresponding online item listed for sale in the online publication system. The presence of the user device is detected within the real-world environment and a purchase transaction for the item is validated and completed. | 2019-10-10 |
20190311369 | USER AUTHENTICATION IN HYBRID ONLINE AND REAL-WORLD ENVIRONMENTS - Methods, systems, and media for user authentication in hybrid online and real-world environments are disclosed. In one example, a method comprises providing a real-world environment including a display of physically retrievable items available for purchase, detecting the presence of a user device associated with a user in the real-world environment, and storing identity data received from the user device. Interest data for one of the physically retrievable items is identified based on sensed biometric data of the user and an online offering for a comparable online item is automatically implemented without manual operation of the user device. A user identification associated with an online account is derived based on the stored identity data received from the user device and the online offering for the item comparable to the physically retrievable item is provided to the online account associated with the user identification. | 2019-10-10 |
20190311370 | INFORMATION PROCESSING SYSTEM, CUSTOMER IDENTIFICATION APPARATUS, AND INFORMATION PROCESSING METHOD - According to the present invention, there is provided an information processing system ( | 2019-10-10 |