INTUIT INC. Patent applications |
Patent application number | Title | Published |
20160140410 | IMAGE ACQUISITION USING A LEVEL-INDICATION ICON - During an information-extraction technique, visual suitability indicators may be displayed to a user of the electronic device to assist the user in acquiring an image of a document that is suitable for subsequent extraction of textual information. For example, an imaging application executed by the electronic device may display, in a window associated with the imaging application, a visual suitability indicator of a tilt orientation of the electronic device relative to a plane of the document. When the tilt orientation falls within a predefined range, the electronic device may modify the visual suitability indicators to provide visual feedback to the user. Then, the electronic device may acquire the image of the document using an imaging device, which is integrated into the electronic device. Next, the electronic device may extract the textual information from the image of the document using optical character recognition. | 05-19-2016 |
20160125551 | METHOD AND SYSTEM FOR PUBLIC AND PRIVATE TEMPLATE SHARING - A method for sharing templates for use with a financial management application (FMA) includes receiving, from each of multiple financial professionals, a company profile including a chart of accounts for a business operating within a commercial industry and at a geographic location, generating profile templates including, for each profile, a template including the commercial industry, the geographic location, and a redacted chart of accounts of the profile, receiving, from each of the financial professionals, a request to publicly share the template corresponding to the profile, receiving, from a small business representative, a profile creation request specifying a first commercial industry and a first geographic location, identifying a first template, and providing, in response to the profile creation request, the first template to the representative, where the representative uses the first template to create a first profile for the business. | 05-05-2016 |
20160124604 | METHOD AND SYSTEM FOR SELECTING CONTINUOUSLY CONNECTED DISPLAY ELEMENTS FROM A USER INTERFACE DISPLAY USING A SINGLE CONTINUOUS SWEEPING MOTION - Display elements are displayed in a corresponding display region of a multi-display element interface display with continuously connected data display elements so that each display element is shown as connected to at least one other display element in a continuous manner. A user is provided the capability to make contact with two or more continuously connected data display regions of the display regions in the multi-display element interface display with continuously connected data display elements through a single continuous contact with multi-display element interface display on the display screen of the computing system. For each display region contacted by the user's single continuous contact with the display screen, the display element corresponding to the contacted display region is transformed into a selected display element. | 05-05-2016 |
20160117647 | MANAGING MONEY MOVEMENT METHODS INVOLVING A PAYMENT SERVICE SYSTEM - A method to send a payment to satisfy an obligation. The method includes receiving, by a payment service, a target time request to complete the payment, wherein the target time request comprises a first target time for completing at least a first portion of the payment, comparing, in response to receiving the target time request, a current time and the first target time to determine a first available payment processing time, selecting a first electronic funds transfer (EFT) network from a plurality of EFT networks based on matching the first available payment processing time to a first estimated payment processing time of the first EFT network, and initiating, in response to selecting the first EFT network, processing of the first portion of the payment using the first EFT network. | 04-28-2016 |
20160112457 | METHOD AND SYSTEM FOR DYNAMIC AND COMPREHENSIVE VULNERABILITY MANAGEMENT - One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken. | 04-21-2016 |
20160112447 | METHOD AND SYSTEM FOR PROVIDING SECURITY AWARE APPLICATIONS - Instructions for monitoring and detecting one or more trigger events in assets used to implement an application are generated. Instructions for implementing at least one responsive action associated with each of the one or more trigger events is generated. At least part of instructions for monitoring and detecting the one or more trigger events is provided to an asset used to implement the application. The at least part of the instructions for monitoring and detecting the one or more trigger events are used by the asset to detect a trigger event. The instructions for implementing the at least one responsive action associated with each of the one or more trigger events is then used to automatically implement the at least one responsive action associated with the detected trigger event. | 04-21-2016 |
20160098804 | METHOD AND SYSTEM FOR USING INTERCHANGEABLE ANALYTICS MODULES TO PROVIDE TAX RETURN PREPARATION SYSTEMS - A method and system for providing a tax return preparation system with interchangeable analytics modules includes providing one or more interchangeable analytics modules. Each of the interchangeable analytics modules includes one or more analytics algorithms used to select user experience elements to be included in a tax return preparation interview process presented to a user through one or more tax return preparation systems. The one or more interchangeable analytics modules are distinct and independent analytical components provided to the tax return preparation system that can be interchanged, overwritten, and interfaced with individually, and without otherwise changing and/or modifying the tax return preparation system. Consequently, a tax return preparation system can provide a tax return preparation interview process capable of dynamically evolving to meet the specific needs of a given user. | 04-07-2016 |
20160098340 | METHOD AND SYSTEM FOR COMPARING DIFFERENT VERSIONS OF A CLOUD BASED APPLICATION IN A PRODUCTION ENVIRONMENT USING SEGREGATED BACKEND SYSTEMS - An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment. | 04-07-2016 |
20160063545 | REAL-TIME FINANCIAL SYSTEM ADS SHARING SYSTEM - A method, system, and computer readable medium for automatically selecting target consumers and delivering business-initiated messages to the selected target consumers, as well as automatically selecting target businesses and delivering consumer-initiated messages to the selected target businesses. In particular, financial management applications used by the businesses and consumers are employed in targeting and delivering the business-initiated messages and consumer-initiated messages. | 03-03-2016 |
20160063494 | BEFORE-THE-FACT BUDGETING - A method, system, and computer readable medium to improve spending budget control based on purchase characteristic dependent payment rules. In one or more embodiments, the payment rules are implemented by a payment service that uses payment credentials specified in the payment rules to complete a purchase transaction while meeting the spending budget specified by the consumer. | 03-03-2016 |
20160055258 | COMMON DECLARATION REPRESENTATION OF APPLICATION CONTENT AND USER INTERACTION CONTENT PROCESSED BY A USER EXPERIENCE PLAYER - A method for providing application content including obtaining, by a declarative content engine executing on a computer processor, an initial application content from a content repository and expressing the initial application content in a declarative programming language to obtain declarative content and transmitting the declarative content to a user experience player (UXP). The UXP processes the declarative content to obtain the initial application content, binds the initial application content to first platform-specific templates and first platform-specific navigation patterns, and renders the initial application content in a first platform-specific user display format. Additionally, the method includes receiving a user action from the UXP in response to the transmission of the declarative content, storing the user action associated with the declarative content in a user data instance repository, determining, using an interaction module and the received user action, a next application content, and obtaining the next application content from the content repository. | 02-25-2016 |
20160036835 | METHOD AND SYSTEM FOR CORRELATING SELF-REPORTING VIRTUAL ASSET DATA WITH EXTERNAL EVENTS TO GENERATE AN EXTERNAL EVENT IDENTIFICATION DATABASE - A method and system for correlating patterns of operating virtual assets with external events includes receiving an identification of one of the external events, from one or more electronic sources, and receiving first patterns from one or more first virtual assets, according to one embodiment. The method and system include populating a database with the first patterns and the identification of the one of the external events to map the one of the external events to the first patterns, according to one embodiment. The method and system include receiving second patterns from one or more second virtual assets, and comparing the second patterns to the first patterns, according to one embodiment. The method and system include distributing the identification of the one of the external events to the one or more second virtual assets, if the second patterns are similar to the first patterns, according to one embodiment. | 02-04-2016 |
20160036795 | METHOD AND SYSTEM FOR PROVIDING A VIRTUAL ASSET PERIMETER - A system and method provides a virtual perimeter by maintaining a data structure for identifying a first plurality of assets, according to one embodiment. The system and method provides services to a second of the first plurality of assets, at least partially based on identifiers for the first plurality of assets and at least partially based on a first role assigned to a first of the first plurality of assets, according to one embodiment. The system and method include admitting one of a second plurality of assets into the virtual perimeter if characteristics of the one of the second plurality of assets satisfy criteria for admission to the virtual perimeter, according to on embodiment. | 02-04-2016 |
20160034359 | METHOD AND SYSTEM FOR PROVIDING AUTOMATED SELF-HEALING VIRTUAL ASSETS - A method and system for performing self-monitoring and self-healing operations from a virtual asset include receiving a first operating policy from an asset management computing environment, according to one embodiment. The method and system includes receiving a library of repairs from the asset management computing environment, according to one embodiment. The method and system includes detecting events, with the virtual asset, at least partially based on operational characteristics of the virtual asset exceeding at least one of the thresholds, according to one embodiment. The method and system includes repairing the virtual asset, with the virtual asset, using the library of repairs to return the virtual asset to the pre-determined state of operation. | 02-04-2016 |
20150381651 | METHOD AND SYSTEM FOR SECURE DELIVERY OF INFORMATION TO COMPUTING ENVIRONMENTS - A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and system include creating a new virtual asset with the virtual asset agent and decommissioning the current virtual asset, according to one embodiment. The system and method receiving, with the new virtual asset, secrets that are associated with the current virtual asset to enable the new virtual asset to continue operations of the current virtual asset, according to one embodiment. | 12-31-2015 |
20150381641 | METHOD AND SYSTEM FOR EFFICIENT MANAGEMENT OF SECURITY THREATS IN A DISTRIBUTED COMPUTING ENVIRONMENT - A method and system for distributing security threat management of an instance of an application that is hosted from multiple geographic locations, according to one embodiment. The method and system include monitoring first operational characteristics of the instance of the application, and establishing an average for the first operational characteristics based at least partially on the first operational characteristics, according to one embodiment. The method and system include identifying a deviation from the average for the first operational characteristics that is more than a predetermined amount, according to one embodiment. The method and system include retrieving second operational characteristics for at least one other instance of the application and comparing the first operational characteristics to the second operational characteristics, according to one embodiment. The system and method include reporting an identification of a potential security threat, according to one embodiment. | 12-31-2015 |
20150379505 | USING LIMITED LIFE TOKENS TO ENSURE PCI COMPLIANCE - A method comprises receiving, by a payment service from a point of sale (POS) system, a payment request having sale data and a card data token, generating a detokenize and erase request including the card data token, sending the detokenize and erase request to a token service, receiving, by the payment service, card data from the token service in response to the sending the detokenize and erase request, generating a payment process request comprising the sale data and the card data, sending the payment process request to a payment authorization service, receiving a payment response from the payment authorization service in response to the sending the payment process request, and sending the payment response to the POS system. | 12-31-2015 |
20150363892 | SYSTEMS METHODS AND COMPUTER PROGRAM PRODUCTS FOR ENCODING AND DECODING TAX RETURN DATA - Tax data, e.g., Form W2 data, is encoded as a two-dimensional machine readable representation, such as a QR CODE. Certain tax data is encoded as segments of a QR CODE, and a tax form generated by an employer or payroll processing service and provided to an employee or user includes the QR CODE representing certain W-2 or other tax data. An image of the QR CODE is acquired using a camera of a mobile communication device or computer or other image capture device. When using a Smartphone, a tax preparation application executing on the Smartphone decodes the QR CODE image to determine the tax data, and populates fields of an electronic tax return with decoded data, thus allowing a consumer to prepare an electronic tax return using a mobile communication device. | 12-17-2015 |
20150347773 | METHOD AND SYSTEM FOR IMPLEMENTING DATA SECURITY POLICIES USING DATABASE CLASSIFICATION - Access to a database is obtained, the database containing data that is potentially of one or more data types and/or data security classifications. The data in the database is scanned to determine the types and/or data security classifications of the data in the database. Then based, at least in part, on the determined types and/or data security classifications of the data in the database a database security classification is associated with the entire database and used to select one or more security measures to be applied to the entire database, at the database level, in accordance with defined data security policies. | 12-03-2015 |
20150347759 | METHOD AND APPARATUS FOR AUTOMATING THE BUILDING OF THREAT MODELS FOR THE PUBLIC CLOUD - A method and system for automating threat model generation for an application includes identifying components of an application, receiving security information that identifies whether security measures were implemented within the application to secure the application against security threats, determining whether the security measures sufficiently address security risks associated with the security threats, and providing a threat model that includes a report that identifies components of the application that have been sufficiently (or insufficiently) secured from the security threats, according to one embodiment. In one embodiment, determining whether the security measures sufficiently address the security risks can include transmitting first queries, receiving responses to the first queries, and transmitting subsequent queries based at least in part on the responses to the first queries. | 12-03-2015 |
20150347750 | METHOD AND APPARATUS FOR A SCORING SERVICE FOR SECURITY THREAT MANAGEMENT - A method and system for providing a security threat scoring service to identify and prioritize potential security threats to an online service. The method and system include determining security threat patterns, comparing traffic to the online system with the security threat patterns, and identifying portions of the traffic as a potential security threat. The method and system include assigning a threat score to the potential security threat, and providing the threat score to the online service to enable the online service to secure against the potential security threat. | 12-03-2015 |
20150341357 | METHOD AND SYSTEM FOR ACCESS CONTROL MANAGEMENT USING REPUTATION SCORES - Security reputation data associated with a party is obtained and/or monitored. The security reputation data associated with the party is then analyzed to assign a security reputation score to the party. The security reputation score assigned to the party is then used to determine access permissions to be provided to the party. It is then either recommended that the determined access permissions be provided to the party, or the determined access permissions are automatically provided to the party. | 11-26-2015 |
20150331878 | RANKING AUTOCOMPLETE RESULTS BASED ON A BUSINESS COHORT - During this autocomplete technique, autocomplete results for data-entry information from a user are ranked based on financial-transaction histories of a group of entities and the user, where the group of entities and the user belong to a common business cohort. In particular, the business cohort may include entities that: are located proximate to the user, have a similar size as a business associated with the user (such as a similar number of employees and/or similar revenue), and/or occur frequently in a financial-transaction history of the user (and don't occur frequently in the financial-transaction histories of the group of entities). The ranking may be used to increase the accuracy or relevance of the autocomplete results to the user. For example, the ranking may give preference in the autocomplete results to entities in the group of entities (relative to other entities, such as those in different business cohorts). | 11-19-2015 |
20150319192 | METHOD AND APPARATUS FOR MULTI-TENANCY SECRETS MANAGEMENT - A service provider computing environment includes a service provider secrets policy. A service provider computing device receives tenant secrets policies from tenants. The tenants are tenants of multi-tenant assets of a service provider. The service provider computing environment determines of the tenant secrets policies satisfy the requirements of the service provider secrets policy. If the tenant secrets policies satisfy the requirements of the service provider secrets policy, the service provider computing environment allows the tenant secrets policies to be applied to tenant data or information in the multi-tenant assets. | 11-05-2015 |
20150319186 | METHOD AND SYSTEM FOR DETECTING IRREGULARITIES AND VULNERABILITIES IN DEDICATED HOSTING ENVIRONMENTS - A dedicated hosting environment is provided and a requirement is imposed that each virtual asset deployed in the dedicated hosting environment include one or more required virtual asset characteristics. Each virtual asset deployed in the dedicated hosting environment is then provided virtual asset characteristic certification data indicating that the virtual asset includes the one or more required virtual asset characteristics. A virtual asset monitoring system then monitors each virtual asset deployed in the dedicated hosting environment to ensure that each virtual asset in the dedicated hosting environment includes the required virtual asset characteristic certification data. If a virtual asset is identified in the dedicated hosting environment that does not include the required virtual asset characteristic certification data, an alert is provided to one or more entities of the non-compliant virtual asset. | 11-05-2015 |
20150319177 | METHOD AND SYSTEM FOR PROVIDING REFERENCE ARCHITECTURE PATTERN-BASED PERMISSIONS MANAGEMENT - Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development, and/or deployment, and/or operation of an application is generated. Reference architecture pattern tier data representing reference architecture pattern tiers used to create, and/or deploy, and/or operate an application using the reference architecture pattern is generated. For each reference architecture pattern role at least one access and/or operational permission is associated with each reference architecture pattern tier. At least one entity is assigned one of the reference architecture pattern roles and for each reference architecture pattern tier, the at least one entity is automatically provided the at least one access and/or operational permission associated with the reference architecture pattern role assigned to the entity. | 11-05-2015 |
20150317626 | SECURE PROXIMITY EXCHANGE OF PAYMENT INFORMATION BETWEEN MOBILE WALLET AND POINT-OF-SALE - A method for processing payment is disclosed. The method includes obtaining, by a point-of-sale (POS) device from a certification authority, a certificate data item that identifies the POS device for completing a purchase by a consumer, generating a payment request containing the certificate data item, broadcasting the payment request via a wireless signal within a pre-determined range of the POS device for receiving by a mobile device of the consumer, where the mobile device stores payment credential of the consumer, receiving, by the POS device, an encrypted payment credential from the mobile device, where the encrypted payment credential is generated by the mobile device encrypting the payment credential based on the certificate data item, and decrypting the encrypted payment credential based on the certificate data item to retrieve the payment credential for processing the payment. | 11-05-2015 |
20150312274 | METHOD AND SYSTEM FOR ENSURING AN APPLICATION CONFORMS WITH SECURITY AND REGULATORY CONTROLS PRIOR TO DEPLOYMENT - Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application is created and used in compliance with asset security policies and the application deployment security compliance data is used to ensure that each asset used to implement the application is deployed in compliance with the application deployment security policies. | 10-29-2015 |
20150310221 | METHOD AND APPARATUS TO ROTATE DATA ENCRYPTION KEYS IN DATABASES WITH NO DOWN TIME - A database includes a first instance and a second instance. The first and second instances of the database are encrypted with a first encryption key and have content that is synchronized. Database queries from a user computing device are directed to the first instance of the database. A third instance of the database is created from one of the existing two instances of the database. The third instance is decrypted from the first encryption key and is encrypted with a second encryption key. Database queries from the user computing device are redirected from the first instance of the database to the third instance of the database without interrupting service to the user computing device. The process is repeated by creating additional instances of the database, encrypting the additional instances with new encryption keys, and by redirecting database queries to the additional instances of the database. | 10-29-2015 |
20150304343 | METHOD AND SYSTEM FOR PROVIDING SELF-MONITORING, SELF-REPORTING, AND SELF-REPAIRING VIRTUAL ASSETS IN A CLOUD COMPUTING ENVIRONMENT - Self-monitoring, self-reporting, and self-repairing virtual assets are provided that include virtual asset self-monitoring logic for detecting one or more trigger events within the self-monitoring, self-reporting, and self-repairing virtual assets, virtual asset self-reporting logic representing instructions for generating trigger event reporting data from the self-monitoring, self-reporting, and self-repairing virtual assets, and virtual asset self-reporting communications channel creation logic for opening a self-reporting communications channel between the self-monitoring, self-reporting, and self-repairing virtual assets and a virtual asset monitoring system. | 10-22-2015 |
20150294447 | IMAGE ACQUISITION USING A LEVEL-INDICATION ICON - During an information-extraction technique, visual suitability indicators may be displayed to a user of the electronic device to assist the user in acquiring an image of a document that is suitable for subsequent extraction of textual information. For example, an imaging application executed by the electronic device may display, in a window associated with the imaging application, a visual suitability indicator of a tilt orientation of the electronic device relative to a plane of the document. When the tilt orientation falls within a predefined range, the electronic device may modify the visual suitability indicators to provide visual feedback to the user. Then, the electronic device may acquire the image of the document using an imaging device, which is integrated into the electronic device. Next, the electronic device may extract the textual information from the image of the document using optical character recognition. | 10-15-2015 |
20150288708 | METHOD AND SYSTEM FOR PROVIDING SECURITY AWARE APPLICATIONS - Instructions for monitoring and detecting one or more trigger events in assets used to implement an application are generated. Instructions for implementing at least one responsive action associated with each of the one or more trigger events is generated. At least part of instructions for monitoring and detecting the one or more trigger events is provided to an asset used to implement the application. The at least part of the instructions for monitoring and detecting the one or more trigger events are used by the asset to detect a trigger event. The instructions for implementing the at least one responsive action associated with each of the one or more trigger events is then used to automatically implement the at least one responsive action associated with the detected trigger event. | 10-08-2015 |
20150278523 | METHOD AND SYSTEM FOR TESTING CLOUD BASED APPLICATIONS AND SERVICES IN A PRODUCTION ENVIRONMENT USING SEGREGATED BACKEND SYSTEMS - An application is implemented in the production environment in which the application will be used. Two or more backend systems are provided. Actual user data is received. The actual user data is routed and processed in the production environment using a first backend system of the two or more backend systems. Fabricated user data is generated, routed, and also processed in the production environment but using a second backend system of the two or more backend systems. Results data from the processing of the fabricated user data is then analyzed to evaluate the production environment and/or operation of the application in the production environment. | 10-01-2015 |
20150278517 | METHOD AND SYSTEM FOR COMPARING DIFFERENT VERSIONS OF A CLOUD BASED APPLICATION IN A PRODUCTION ENVIRONMENT USING SEGREGATED BACKEND SYSTEMS - An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more backend systems. A second portion of the actual user data is also routed and processed in the production environment but using a second version of the application and a second backend system of the two or more backend systems. The results data is then analyzed to evaluate the various versions of the application in the production environment. | 10-01-2015 |
20150271195 | METHOD AND SYSTEM FOR PROVIDING TEMPORARY SECURE ACCESS ENABLED VIRTUAL ASSETS - Temporary secure access enabled virtual assets are provided that include a temporary secure access communications door. Upon receipt of temporary access authentication data from a source outside the temporary secure access enabled virtual asset, the temporary secure access communications door temporarily allows operational instruction code to be transferred into the temporary secure access enabled virtual asset from a source outside temporary secure access enabled virtual asset. | 09-24-2015 |
20150269064 | METHOD AND SYSTEM FOR TESTING CLOUD BASED APPLICATIONS IN A PRODUCTION ENVIRONMENT USING FABRICATED USER DATA - An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated user results data is then analyzed to evaluate the production environment and/or operation of the application in the production environment. | 09-24-2015 |
20150263859 | METHOD AND SYSTEM FOR ACCOMMODATING COMMUNICATIONS CHANNELS USING DIFFERENT SECURE COMMUNICATIONS PROTOCOLS - A communications protocol is selected to be used to transfer message data between a source computing entity and a destination computing entity. Encryption code data identifying the selected communications protocol is generated and associated with the message data. One or more communications endpoint proxy systems are provided that include an encryption code identification module and a communications protocol processing module for obtaining communications protocol processing data associated with first communications protocol identified by encryption code data. The message data is transferred to the communications endpoint proxy and the communications protocol processing data associated with communications protocol identified by encryption code data is obtained and used to process the message data which is then transferred to the destination computing entity. | 09-17-2015 |
20150261836 | EXTRACTING DATA FROM COMMUNICATIONS RELATED TO DOCUMENTS - The disclosed embodiments provide a system that processes data. During operation, the system obtains a communication associated with a document and extracts data associated with the document from the communication. Next, the system uses the extracted data from the communication and document data from the document to build a context associated with the document. The system then uses the context to facilitate use of the document by a user associated with the communication. | 09-17-2015 |
20150254750 | PERFORMING COMMERCE QUERIES USING A COMMERCE GRAPH - During a search technique, results for a commerce query associated with a desired financial transaction are determined using information in a data structure that specifies a commerce graph. This commerce graph may include nodes and branches indicating financial interrelationships among a set of entities (such as individuals or businesses), and the financial interrelationships may include: inputs to the set of entities, outputs from the set of entities, and previous financial transactions among the set of entities. | 09-10-2015 |
20150242634 | METHOD AND SYSTEM FOR PROVIDING AN EFFICIENT VULNERABILITY MANAGEMENT AND VERIFICATION SERVICE - A virtual asset creation template associated with a class of virtual assets is identified and analyzed to identify any vulnerabilities in the virtual asset creation template. If one or more vulnerabilities are identified in the virtual asset creation template, an appropriate remedy for each identified vulnerability identified in the virtual asset creation template is applied. If no vulnerability is identified in the virtual asset creation template, or once each vulnerability identified in the virtual asset creation template is remedied, each virtual asset of the virtual asset class generated using the virtual asset creation template is assigned an initial status of verified virtual asset. | 08-27-2015 |
20150242631 | METHOD AND SYSTEM FOR PROVIDING A ROBUST AND EFFICIENT VIRTUAL ASSET VULNERABILITY MANAGEMENT AND VERIFICATION SERVICE - A virtual asset testing environment is provided that is distinct from a production computing environment. A virtual asset creation template associated with a class of virtual assets to be verified is identified, each virtual asset of the class of virtual assets being created using the virtual asset creation template. A designated test virtual asset is generated using the virtual asset creation template that is deployed in the virtual asset testing environment. The designated test virtual asset is then analyzed in the virtual asset testing environment to identify any vulnerabilities in the designated test virtual asset. If a vulnerability is identified in the designated test virtual asset, a remedy to the vulnerability is applied to the virtual asset creation template, and/or virtual assets created by the virtual asset creation template deployed in the production environment. | 08-27-2015 |
20150222653 | METHOD AND SYSTEM FOR EXTRUSION AND INTRUSION DETECTION IN A CLOUD COMPUTING ENVIRONMENT - A traffic router proxy including an analysis trigger monitoring system is provided. One or more analysis trigger parameters are defined and analysis trigger data representing the analysis trigger parameters is generated. The analysis trigger data is then provided to the analysis trigger monitoring system and at least a portion of the message traffic sent to, or sent from, virtual assets in the cloud computing environment and relayed by the traffic router proxy through a first communication channel is monitored to detect one or more of the one or more analysis trigger parameters. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis. | 08-06-2015 |
20150222647 | METHOD AND SYSTEM FOR VIRTUAL ASSET ASSISTED EXTRUSION AND INTRUSION DETECTION IN A CLOUD COMPUTING ENVIRONMENT - An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters are defined and analysis trigger data is generated. The analysis trigger monitoring systems are used to monitor at least a portion of the message traffic sent to, or sent from, the one or more virtual assets to detect any message including one or more of the one or more analysis trigger parameters. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis using a second communication channel. | 08-06-2015 |
20150221043 | METHOD AND SYSTEM FOR PROVIDING GLOBAL READY FINANCIAL APPLICATIONS - Global ready financial applications are provided that are dynamically composed using application independent global ready financial assets so that a single global ready financial application, once created, can be operationally and functionally optimized for multiple supported regions to be used by any party, in any, or all, of the multiple supported regions. | 08-06-2015 |
20150215327 | METHOD AND SYSTEM FOR EXTRUSION AND INTRUSION DETECTION IN A CLOUD COMPUTING ENVIRONMENT USING NETWORK COMMUNICATIONS DEVICES - An analysis trigger monitoring system is provided in a network communications device associated with a cloud computing environment. One or more analysis trigger parameters are defined and analysis trigger data representing the analysis trigger parameters is generated. The analysis trigger data is then provided to the analysis trigger monitoring system and the analysis trigger monitoring system is used to monitor at least a portion of the message traffic sent to, or sent from, virtual assets in the cloud computing environment and relayed by the network communications device through a network communication channel to detect any message including one or more of the one or more analysis trigger parameters. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis using a second communication channel that is separate from the network communication channel. | 07-30-2015 |
20150186641 | METHOD AND SYSTEM FOR INTRUSION AND EXTRUSION DETECTION - A hypervisor includes an analysis trigger monitoring system. One or more analysis trigger parameters are defined and analysis trigger data representing the analysis trigger parameters is generated. The analysis trigger data is then provided to the analysis trigger monitoring system and the analysis trigger monitoring system is used to monitor at least a portion of the message traffic sent to, and/or sent from, a virtual asset controlled by the hypervisor to detect any message including one or more of the one or more analysis trigger parameters. A copy of at least a portion of any detected message including one or more of the one or more analysis trigger parameters is then transferred to one or more analysis systems for further analysis. | 07-02-2015 |
20150135305 | METHOD AND SYSTEM FOR DYNAMICALLY AND AUTOMATICALLY MANAGING RESOURCE ACCESS PERMISSIONS - Employment role data, trust data, and special permissions data, associated with a party is automatically obtained and/or monitored. The employment role data associated with the party, the trust data associated with the party, and the special permissions data associated with the party, is then analyzed to determine a set of allowed access permissions data to be associated with the party, the set of allowed access permissions data providing the party access to one or more resources. It is then either recommended that the set of allowed access permissions data be provided to the party, or the set of allowed access permissions data is automatically provided to the party. | 05-14-2015 |
20150128295 | METHOD AND SYSTEM FOR VALIDATING A VIRTUAL ASSET - Virtual asset creation data used to create a virtual asset is generated through a virtual asset creation system that includes primary virtual asset data. Secondary authentication data is also generated. When the virtual asset is launched, the secondary authentication data is passed to the virtual asset from the virtual asset creation system. The primary virtual asset data and secondary authentication data from the virtual asset creation system and the virtual asset, and/or one or more other sources associated with the virtual asset, are then sent to a virtual asset validation system through different communication channels. If the primary virtual asset data and secondary authentication data from the two sources match, or have a defined threshold level of similarity, the status of the virtual asset is transformed to the status of validated virtual asset eligible to receive sensitive data. | 05-07-2015 |
20150128207 | METHOD AND SYSTEM FOR AUTOMATICALLY MANAGING SECRETS IN MULTIPLE DATA SECURITY JURISDICTION ZONES - Data security jurisdiction zones are identified and data security policy data for the data security jurisdiction zones is obtained. The data security policy data for the data security jurisdiction zones is then automatically analyzed to determine allowed secrets data with respect to each of the identified data security jurisdiction zones. The allowed secrets data with respect to each of the data security jurisdiction zones is then automatically obtained and provided to resources in the respective data security jurisdiction zones, either from a central secrets data store or from an allowed secrets data store associated with each data security jurisdiction zone. | 05-07-2015 |
20150128204 | METHOD AND SYSTEM FOR AUTOMATICALLY MANAGING SECURE COMMUNICATIONS IN MULTIPLE COMMUNICATIONS JURISDICTION ZONES - Communications and data security policy data for two or more communications jurisdiction zones is obtained that includes data indicating allowed protocols for the respective communications jurisdiction zones. Data indicating a desired exchange of data between a first resource in a first communications jurisdiction zone and a second resource in a second communications jurisdiction zone is received/obtained. The first communications jurisdiction zone communications and data security policy data and the second communications jurisdiction zone policy data is automatically obtained and analyzed to determine an allowed type of secure communications security level for the desired exchange of data that complies with both the first communications jurisdiction zone communications and data security policy data and the second communications jurisdiction zone policy data. A communications channel, including the allowed type of secure communications security level, is automatically establishing between the first resource and the second resource. | 05-07-2015 |
20150128130 | METHOD AND SYSTEM FOR PROVIDING AND DYNAMICALLY DEPLOYING HARDENED TASK SPECIFIC VIRTUAL HOSTS - Virtual host creation data used to instantiate a hardened task specific virtual host in a first computing environment is generated including hardening logic for providing enhanced security and trust for the hardened task specific virtual host and internal task specific logic for directing and/or allowing the hardened task specific virtual host to perform a specific function assigned to the hardened task specific virtual host. When task data is received indicating a task to be performed in the first computing environment requires the performance of the specific function assigned to the hardened task specific virtual host, the hardened task specific virtual host is automatically instantiated and/or deployed in the first computing environment. | 05-07-2015 |
20150128061 | REMOTE CONTROL OF A DESKTOP APPLICATION VIA A MOBILE DEVICE - One embodiment of the present invention provides a system for using a mobile device to remotely control a desktop application that was configured for use with a pointing device. During operation, the system receives at a mobile device, from a user, a connection request to connect to a desktop application executing on a remote device. In response to the connection request, the system establishes a remote control session between the mobile device and the remote device. Next, the system receives, at the mobile device, a video stream from a first camera coupled to the mobile device. The system then analyzes the video stream, at the mobile device, to identify a gesture made by the user. Next, the system identifies, at the mobile device, a pointing device command corresponding to the gesture. Finally, the system sends the pointing device command to the desktop application executing on the remote device. | 05-07-2015 |
20150127659 | METHOD AND SYSTEM FOR DOCUMENT DATA EXTRACTION TEMPLATE MANAGEMENT - User acceptance of a given data extraction template and the number of data fields that the data extraction template can extract accurately is used to calculate data extraction template ranking, or a ranking score, to be associated with the data extraction template. Then the data extraction template having the highest data extraction template ranking score is used in a first attempt to extract data from a source documents of the source document type associated with the data extraction templates. As more data extraction templates associated with a given source document type are received, data extraction template ranking scores are updated/modified, and, in one example, the data extraction templates having the lowest data extraction template ranking scores are detected/eliminated. | 05-07-2015 |
20150106939 | METHOD AND SYSTEM FOR DYNAMIC AND COMPREHENSIVE VULNERABILITY MANAGEMENT - One or more relevant scanners used to identify asset vulnerabilities are identified, obtained, and logically arranged for deployment on an asset in accordance with a vulnerability management policy and a scanner deployment policy such that the relevant scanners are deployed at, or before, a determined ideal time to minimize the resources necessary to correct the vulnerabilities, if found. The relevant scanners are then automatically deployed in accordance with the scanner deployment policy and, if a vulnerability is identified, one or more associated remedies or remedy procedures are applied to the asset. At least one of the one or more relevant scanners are then re-deployed on the asset to determine if the identified vulnerability has been corrected and, if the vulnerability is not corrected at, or before, a defined time, protective measures are automatically taken. | 04-16-2015 |
20150106869 | METHOD AND SYSTEM FOR DISTRIBUTING SECRETS - Secrets data representing one or more secrets required to access associated resources is provided along with secrets distribution policy data representing one or more secrets distribution factors used to control the distribution of the secrets. When a requesting virtual asset submits secrets request data, virtual asset profile data associated with the requesting virtual asset is obtained. The requesting virtual asset profile data is then analyzed using at least one of the secrets distribution factors to authenticate the requesting virtual asset. The requesting virtual asset profile data is then analyzed using one or more of secrets distribution factors to determine what secrets the requesting virtual asset legitimately needs. Authorized secrets data for the requesting virtual asset representing one or more authorized secrets is then generated. The requesting virtual asset is then provided access to the authorized secrets data. | 04-16-2015 |
20150106620 | METHOD AND SYSTEM FOR PROVIDING A SECURE SECRETS PROXY - A secure secrets proxy is instantiated in a first computing environment and includes secure secrets proxy authentication data for identifying itself to a secrets distribution management system in a second computing environment as a trusted virtual asset to receive and cache secrets data in a secure secrets cache outside the second computing environment. The secure secrets proxy requests one or more secrets to be cached and is then provided data representing the requested secrets in the secure secrets cache. The secure secrets proxy then receives secrets application request data from a second virtual asset instantiated in the first computing environment requesting one or more secrets be applied to second virtual asset data. The secure secrets proxy then obtains the required secrets from the secure secrets cache and coordinates the application of the secrets to the second virtual asset data. | 04-16-2015 |
20150106216 | METHODS SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR VERIFYING CONSUMER IDENTITY DURING TRANSACTION - Computerized methods, systems and computer program products for determining how an identity of a consumer can be verified during a transaction involving the consumer and a merchant. Embodiments access and analyze data of an account the consumer has with an online social network to derive a challenge question response options. The social-network based challenge question and response options are presented to the consumer, and the consumer's selection of certain response options is used to confirm that the consumer is the person named on a credit card or other payment instrument or that other identification or verification information should be requested by the merchant before completing the transaction. | 04-16-2015 |
20150099489 | SENDING AN ONLINE SOCIAL NETWORK MESSAGE USING A TEXTSITE APPLICATION VIA A TEXT MESSAGE - A method for delivering an online social network (OSN) message. The method includes obtaining delivery status and content of the OSN message, wherein the OSN message is sent by a first user using an OSN application to a second user, generating, by a computer processor, a text message comprising the content of the OSN message, and sending, by the computer processor and in response to the delivery status meeting a pre-determined criteria, the text message using a text messaging service (TMS) to the second user, wherein the OSN application is used by the first user to exchange social interaction messages with OSN friends of the first user, and wherein the second user is not able to view the OSN message using the OSN application. | 04-09-2015 |
20150067074 | PERSONALIZED BOOKMARKING OF TEXTSITE APPLICATIONS VIA A TEXT MESSAGE - A method for using a bookmark to access content from a global textsite platform (GTP). The method includes obtaining a bookmark creating text message, wherein the bookmark creating text message is based on a text messaging service (TMS) and sent by a user to create the bookmark, extracting, by a computer processor from the bookmark creating text message and based on a pre-determined syntax, a user ID representing the user, a first bookmark ID representing the bookmark, and a first registered unique keyword used to access a first textsite from the GTP based on the TMS, and storing, as a bookmark entry in a bookmark list of the GTP, the user ID, the first bookmark ID, and the first registered unique keyword, wherein the first bookmark ID is used by the user to access the first textsite from the GTP. | 03-05-2015 |
20150066805 | LOCATION-BASED ADAPTATION OF FINANCIAL MANAGEMENT SYSTEM - Location-based adaptation of financial management system. Crowdsourced feedback regarding financial management system content is tagged with location data such as an IP address and/or geographic location data. Location-specific counters track feedback received from different locations and may involve different languages, dialects, phrases or other manners of expression associated with different countries, states or regions thereof. When pre-determined criteria is satisfied, e.g., a threshold number of counts associated with a particular location, associated location-based feedback is analyzed and identified feedback patterns are used to selectively modify previously presented financial management system content and adapt the financial management system is adapted to different locations by presenting first modified content based at least in part upon a first identified pattern to users at a first location and second modified content based at least in part upon a second identified pattern to users at a different, second location. | 03-05-2015 |
20150066741 | METHOD AND SYSTEM FOR PAYMENT DISTRIBUTION FOR CONSIGNED ITEMS - A method for distributing payment for a consigned item includes receiving a notification of a purchase of the consigned item, identifying a consignor of the consigned item purchased, obtaining a sales fee agreement of the consigned item, calculating, using the sales fee agreement by a computer processor, a consignor fee from the purchase using the sales fee agreement, calculating, using the sales fee agreement by the computer processor, a consignee fee from the purchase, crediting a consignor financial account for the purchase with the consignor fee, and crediting a consignee financial account for the purchase with the consignee fee. | 03-05-2015 |
20150063653 | METHOD AND SYSTEM FOR PROVIDING EFFICIENT FEEDBACK REGARDING CAPTURED OPTICAL IMAGE QUALITY - An optical image of a source document is captured. Two or more source document image test regions are then defined/determined. An optical image scan is performed on each source document image test region to determine if there are identifiable alpha-numeric characters or symbols present. If one or more of the source document image test regions are determined not to contain identifiable alpha-numeric characters, the captured optical image of the source document is determined to be of insufficient quality to identify and extract individual characters and symbols and it is recommended that optical images of source documents determined to be of insufficient quality to identify and extract individual characters and symbols be re-captured using an image capture device. | 03-05-2015 |
20150058774 | GESTURE-BASED VISUALIZATION OF FINANCIAL DATA - The disclosed embodiments provide a system that processes financial data. During operation, the system provides a user interface for displaying the financial data to a user. Upon detecting a gesture provided by the user through the user interface, the system identifies a context associated with the gesture. Next, the system displays a visualization of the financial data within the user interface based on the context. | 02-26-2015 |
20150058387 | METHOD AND SYSTEM FOR PROVIDING A TABLET SWIPING CALCULATOR FUNCTION - A listing of data is displayed in a tablet swiping calculator function display with the listing of data including two or more numerical data entries. A capability to select at least one mathematical operation is provided through the tablet swiping calculator function display along with the capability to select at least two of the two or more numerical data entries through the tablet swiping calculator function display. When the at least two of the two or more numerical data entries are selected, the selected mathematical operation is automatically performed on the selected numerical data entries and the results are displayed on the tablet swiping calculator function display. | 02-26-2015 |
20150039431 | METHOD AND SYSTEM FOR CLUSTERING SIMILAR ITEMS - A method and system for selecting a product to advertise. The method includes receiving an advertisement request from an application, generating a plurality of nodes corresponding to a plurality of user-entered text strings received from a user by the application, sending, to a marketplace system, a plurality of search queries for the plurality of user-entered text strings, and receiving a plurality of product identifier in response to the plurality of search queries. The method further includes determining a plurality of edges corresponding to the plurality of product identifiers, generating a cluster using the plurality of nodes and the plurality of edges, selecting a product identifier of the plurality of product identifiers to obtain a selected product identifier, and providing, to the application, the selected product identifier, wherein the application displays, to the user, an advertisement for the product identified by the product identifier. | 02-05-2015 |
20150038130 | METHOD AND SYSTEM FOR OBTAINING A CONFIGURATION PROFILE - A method for obtaining a configuration profile, including obtaining test results for customer-tested configuration profiles, including operable configuration profiles, from customer mobile devices. A shared data repository is populated with the test results and the customer-tested configuration profiles. The customer-tested configuration profiles are related to customer mobile device profiles of the customer mobile devices. A target mobile device profile, describing mobile device properties, is received from a target mobile device. A subset of the customer mobile device profiles having a threshold degree of similarity to the target mobile device profile are selected from the shared data repository. For each of the operable configuration profiles in the subset, a probability of compatibility is calculated, and the operable configuration profiles in the subset are tested on the target mobile device in an order defined by the probability of compatibility. The shared data repository is updated with the modified test result. | 02-05-2015 |
20150030241 | METHOD AND SYSTEM FOR DATA IDENTIFICATION AND EXTRACTION USING PICTORIAL REPRESENTATIONS IN A SOURCE DOCUMENT - Data extraction templates are created and associated with source documents from a specific source document source. One or more known pictorial representations associated with one or more source document sources are then identified and key data is generated for the known pictorial representations. Source document data is then obtained and analyzed to identify potential pictorial representation data. Key data associated with the potential pictorial representation data is then generated and compared with the key data associated with one or more known pictorial representations and if the key data matches, the data extraction template associated with the matched known pictorial representations is obtained and used for identifying and extracting data from the source document data. | 01-29-2015 |
20140372980 | AUTOMATIC CUSTOMIZATION OF A SOFTWARE APPLICATION - A method for configuring a software application. The method includes obtaining user profiles each containing attribute values corresponding to a portion of an attribute list, identifying a user subset having same attribute values for a particular portion of the attribute list and forming an attribute signature, analyzing the configuration setting used by each user in the user subset to generate a statistical measure representing the user subset configuring the software application, matching a new user profile to the attribute signature of the user subset, presenting, to the new user and in response to the matching, the statistical measure representing the user subset configuring the software application, and receiving, in response to presenting the statistical measure, an approval from the new user to customize the software application, where the software application is automatically customized based on the statistical measure representing the user subset configuring the software application. | 12-18-2014 |
20140348396 | EXTRACTING DATA FROM SEMI-STRUCTURED ELECTRONIC DOCUMENTS - The disclosed embodiments provide a system that processes data. During operation, the system obtains a first electronic document associated with a user. Next, the system obtains one or more locations of data elements in the first electronic document from the user and uses the one or more locations to extract a first set of data from the first electronic document. Finally, the system enables, for the user, use of the first set of data with an application without requiring manual input of the first set of data into the application. | 11-27-2014 |
20140344085 | METHOD AND SYSTEM FOR PRESENCE BASED MOBILE PAYMENT - A method for presence based mobile payment comprises receiving, from a user, a request for registration with a mobile payment service, registering, by the mobile payment service, the user based on the request, broadcasting, by a point of sale (PoS) system and through an advertising channel, an identification of a transaction, wherein the transaction comprises an item, wherein the advertising channel is used for discovery of available devices, and wherein the user is purchasing the item at the PoS system, receiving, from a mobile device of the user, a payment authorization for the transaction, and facilitating, by the mobile payment service, payment for the transaction. | 11-20-2014 |
20140297762 | METHOD AND SYSTEM FOR TIMEZONE AWARE APPLICATION PROGRAMMING INTERFACE - A method for sending a message using a platform comprises: receiving, by the platform, a request comprising at least one target, a time, and a content, the time is identifying when the message will be delivered. The method further comprises identifying a time zone of the target, calculating, by the processor, when the time will occur in the time zone of the target to determine a delay, storing the request and the delay, determining that the delay has expired, generating the message for the at least one target wherein a payload in the message is based on the content, and sending, in response to determining, the message to the target. | 10-02-2014 |
20140244456 | TAX DOCUMENT IMAGING AND PROCESSING - Methods, systems and articles of manufacture for allowing taxpayers to utilize mobile communication or communication devices such as smartphones and tablet devices to upload tax document images and process tax document images such that resulting recognized tax data is incorporated into an electronic tax return. Authentication data is generated and provided to the taxpayer to establishing a connection with an image processor, which provides recognized tax data to the on-line tax preparation application for incorporation into the electronic tax return. Authentication data may be embodied within a URL address to the image processor that is transmitted as a SMS message to the mobile communication or computing device or encoded within a QR code such that the mobile communication or computing device can be used to take an image of and decode the QR code to determine the URL address and authentication data to establish a connection with the image processor. | 08-28-2014 |
20140244455 | PRESENTATION OF IMAGE OF SOURCE OF TAX DATA THROUGH TAX PREPARATION APPLICATION - Methods, systems and articles of manufacture for generating interface elements of an electronic tax preparation application to allow a taxpayer or user to view a portion of an image of a tax document that is a source of data for a field of a screen generated by the electronic tax application. The image portion displayed may be a particular box or field of a tax document for a corresponding particular field of the screen generated by the electronic tax preparation or a bounding region including one or more adjacent or surrounding boxes or fields. Embodiments allow taxpayers to view an image of a source document while viewing the data that was entered in the field from within the tax preparation application without having to consult paper copies of the tax documents. | 08-28-2014 |
20140244237 | GLOBAL PRODUCT-SURVEY - During a survey technique, a product survey in an original language is translated into a target language, and any errors in the translation are identified and corrected. Words in the translation that do not translate well or clearly may be reverted back to the original language based on transliteration instructions. This may allow customers to answer the translated product survey in the target language using a user interface (such as a keyboard) based on the original language. After receiving answers from the users to questions in the translated product survey, the answers may be analyzed to determine results of the product survey in the target language. Then, the results may be translated back into the original language. After translation into the original language, the results across multiple target languages can be consolidated and presented. | 08-28-2014 |
20140241631 | SYSTEMS AND METHODS FOR TAX DATA CAPTURE AND USE - A computer-implemented method of acquiring tax data for use in tax preparation application includes acquiring an image of at least one document containing tax data therein with an imaging device. A computer extracts one or more features from the acquired image of the at least one document and compares the extracted one or more features to a database containing a plurality of different tax forms. The database may include a textual database and/or geometric database. The computer identifies a tax form corresponding to the at least one document from the plurality of different tax forms based at least in part on a confidence level associated with the comparison of the extracted one or more features to the database. At least a portion of the tax data from the acquired image is transferred into corresponding fields of the tax preparation application. | 08-28-2014 |
20140214705 | DATA-PRIVACY MANAGEMENT TECHNIQUE - A technique for controlling release of data associated with an account is described. During this data-privacy management technique, a computer system provides at least a subset of data associated with an account to a third party based on a first consent (which may be received from a user of the account). This subset may have a first classification based on a predefined taxonomy. Subsequently, the third party may notify the computer system that additional data has been derived from the data. In response, the computer system may determine a second classification of the additional data based on a predefined taxonomy. If this second classification is other than a subset of the first classification, the computer system may request a second consent (for example, from the user). | 07-31-2014 |
20140149842 | METHOD AND SYSTEM FOR PROVIDING A NET EFFECT PLATFORM FOR DEVELOPING AND CORRECTING SCREEN SCRAPING PARSER SCRIPTS - Individuals using a data management system are provided the capability to make corrections to default values presented in a simulation of at least part of a webpage including default data indicating the layout of the webpage, and/or one or more identified data fields determined by heuristic analysis and/or from data collected from other individuals/users. These contributing individual corrections are then transformed into contributing individual originated parser scripts associated with the webpage. The contributing individual originated parser scripts are then implemented and/or applied to the webpage for all individuals, including the contributing individual. | 05-29-2014 |
20140129398 | METHOD AND SYSTEM FOR PROVIDING A PAYROLL PREPARATION PLATFORM WITH USER CONTRIBUTION-BASED PLUG-INS - Customizations and regional optimizations made to a payroll preparation and management system by one or more contributing users are transformed into payroll optimization plug-ins. The payroll optimization plug-ins are then aggregated into payroll optimization plug-in sets that, when implemented, optimize the payroll configurations used by the payroll preparation and management system for a given region and/or type of business within the region. The payroll optimization plug-in sets for a given region and/or activity are then requested and/or selected by other individuals using the payroll preparation and management system and imported to the requestor's implementation of the payroll preparation and management system to optimize the requestor's implementation of the payroll preparation and management system for the requested region, and/or type of business within the requested region. | 05-08-2014 |
20140129209 | STACK-BASED ADAPTIVE LOCALIZATION AND INTERNATIONALIZATION OF APPLICATIONS - The disclosed embodiments provide a system that facilitates use of an application. During operation, the system obtains a language stack containing an ordered set of preferred languages for a user of the application. Next, for each user-interface component from a set of user-interface components in the application, the system obtains content for the user-interface component based on an order of languages in the language stack. The system then includes the content in the user-interface component during use of the application on an electronic device by the user. | 05-08-2014 |
20140114823 | DETERMINING LOCAL REGULATORY FILING WORKFLOW THROUGH USER CONTRIBUTION - A method to generate a regulatory filing workflow for a geographical region. The method includes displaying a regulatory filing form to a user in the geographical region, displaying a user attribute list identifying user attributes from the BMAs used by the user, receiving, from the user and in response to displaying the regulatory filing form and the user attribute list, a user input that specifies a rule for determining input data of the regulatory filing form based at least on user attributes, and generating, based at least on the user input, regulatory filing report metadata including a specification for generating a regulatory filing report by completing the regulatory filing form based at least on the rule, where the regulatory filing workflow includes generating and filing the regulatory filing report to satisfy the regulatory requirement specific to the geographical region. | 04-24-2014 |
20140114822 | METHOD AND SYSTEM FOR CREATING TAX CONFIGURATION TEMPLATES - Individuals implementing/using a financial management system are provided the capability to share their customized and regionally optimized tax configurations with other individuals utilizing the financial management system. The customized and regionally optimized tax configurations are provided to other individuals in the form of tax configuration templates optimized and identified for a given region and/or type of business within the identified region. In various embodiments, the tax configuration templates for a given region can then be viewed, selected, and adopted by other individuals using the financial management system. | 04-24-2014 |
20140090037 | SINGLE SIGN-ON IN MULTI-TENANT ENVIRONMENTS - The disclosed embodiments provide a system that authenticates a user. During operation, the system identifies a first tenant associated with a first request for a first resource from the user and obtains an authentication policy for the first tenant. Next, the system uses an authentication mechanism associated with the authentication policy to authenticate the user. Upon authenticating the user, the system provides a first security token for enabling access to the first resource by the user. | 03-27-2014 |
20140089387 | SESSION-SERVER AFFINITY FOR CLIENTS THAT LACK SESSION IDENTIFIERS - The disclosed embodiments provide a system that facilitates interaction between a client and a web application. During operation, the system identifies a request that lacks a session identifier from the client to the web application. Next, the system obtains a client identifier associated with the client from the request. If a cached session identifier is found for the client identifier, the system adds the cached session identifier to the request. Finally, the system forwards the request to the web application. | 03-27-2014 |
20140089186 | MOBILE PAYMENT SERVICE FOR SMALL FINANCIAL INSTITUTIONS - During operation of the system, a user of a portable electronic device provides a request to enroll in a financial service associated with a provider. For example, the financial service may facilitate financial transactions via a financial application that executes on the portable electronic device. Then, an electronic device determines that the user is an existing customer of at least one of a set of financial institutions that have a business relationship with the provider, where the provider is other than one of the financial institutions. Next, the electronic device enrolls the user in the financial service without requesting additional information from the user. By leveraging the business relationship between the user and one of the financial institutions in the set of financial institutions, the user can avoid having to perform a complicated enrollment process in order to start using the financial service. | 03-27-2014 |
20140080525 | SYSTEM AND METHOD FOR ELECTRONIC TEXT COMMUNICATION - A system and method for electronic text communication in an environment in which SMS (Short Messaging Service) messages, MMS (Multimedia Messaging Service) messages and/or other messages are delivered with a non-actionable reply-to field. Illustratively, a regulation may require the field to be alphabetic or alphanumeric, thereby preventing it from simply being a telephone number to which a response can be transmitted. Therefore, when an organization generates a message, it includes its address in the body of the message (e.g., at the top and/or bottom). Although the user cannot respond directly to the reply-to field, he easily finds a telephone number to which a reply can be sent. A user may be advised of terms of service of a text-based service, and may be given a summary of the terms, before being deemed to have opted in to the service. | 03-20-2014 |
20140061298 | METHOD AND SYSTEM FOR REDUCING PERSONAL IDENTIFICATION NUMBER (PIN) FRAUD IN POINT OF SALE TRANSACTIONS - A method for personal identification number (PIN) fraud prevention, comprising: receiving, a request for a card-based financial transaction; prompting a customer for a PIN; receiving, from a scroll wheel corresponding to a plurality of digits, a first digit of the PIN, wherein the customer selects the first digit of the PIN by touching a touch sensitive region associated with the scroll wheel; receiving from the scroll wheel, a second digit of the PIN, wherein the customer selects the second digit of the PIN by touching the touch sensitive region, wherein the second digit is different than the first digit, and wherein touching the touch sensitive region to select the first digit and the second digit prevents fraud based on tracking PIN entry; and completing the card-based financial transaction. | 03-06-2014 |
20140040116 | TECHNIQUE FOR PERFORMING A FINANCIAL TRANSACTION - During a financial technique, an instance of an application executing on an initiating electronic device initiates the financial transaction by communicating information with a receiving electronic device. Then, the application selects a financial account that provides funds for the financial transaction. This financial account may be one of multiple different types of financial accounts that are associated with different providers. Moreover, the application conducts the financial transaction by providing a message to the receiving electronic device, where the message includes an amount of funds transferred in the financial transaction. After receiving the message, an instance of the application executing on the receiving electronic device selects another financial account that receives the funds for the financial transaction, where the other financial account is one of multiple different types of financial accounts that are associated with different providers. | 02-06-2014 |
20130346527 | METHOD AND SYSTEM FOR MAINTAINING TEXTSITES ON A GLOBAL TEXTSITE PLATFORM - A method for accessing content using a global textsite platform including registering a unique keyword received from a publisher, receiving content from the publisher for creating a textsite associated with the unique keyword, creating the textsite on behalf of the publisher, receiving, from a user, a request to access the textsite, processing the request from the user, and providing access to the textsite by sending the content of the textsite, via a text messaging service (TMS), to a user mobile device. | 12-26-2013 |
20130346320 | REGULATION COMPLIANT DATA INTEGRATION FOR FINANCIAL INSTITUTIONS - A method to access financial data. The method includes redirecting, by a computer processor and based on an input of a user, the user to a website of a financial institution (FI), wherein the user submits a request via the website to access the financial data, obtaining, in response to the user submitting the request, a token identifying the request, identifying, by the computer processor, a financial data structure in a remote repository based on the token, wherein the FI stores a financial data record in the financial data structure in response to the request, and retrieving, without user intervention, the financial data record from the financial data structure, wherein the financial data record is used by a financial management application to prepare a financial management report for the user. | 12-26-2013 |
20130346222 | MOBILE PAYMENT SYSTEM - During a financial transaction, a customer provides an identifier to a peripheral device (which may be a barcode scanner, a wireless receiver or a keyboard) coupled to the point-of-sale terminal. This identifier corresponds to a one-time payment credential token that includes financial information of the customer. Then, a service object executing on the point-of-sale terminal, which acts as a driver for the peripheral device, performs one or more operations based on at least the identifier to obtain the financial information. After providing the financial information and transaction information associated with the financial transaction to a financial institution specified in the financial information, the point-of-sale terminal receives a confirmation from the financial institution that the financial transaction has been completed. | 12-26-2013 |
20130339870 | SOFTWARE LOCALIZATION THROUGH USER CONTRIBUTION - A method to adapt a software application for a geographical region. The invention includes receiving, by a computer processor and from at least one of a plurality of users of the software application, a first translation of a localizable item in a user interface (UI) menu of the software application, wherein the first translation is based on a language of the geographical region, generating, by the computer processor, a tally of the first translation from the plurality of users, presenting, to the plurality of users via a plurality of instantiations of the UI menu in response to the tally exceeding a pre-determined count, the localizable item using the first translation, receiving, from the plurality of users via the plurality of instantiations of the UI menu, feedback regarding the accuracy of the first translation, and classifying, based on the feedback, the first translation as an approved translation of the localizable item. | 12-19-2013 |
20130332293 | MOBILE PAYMENT VIA A VIRTUAL PERIPHERAL DEVICE - During a financial transaction, a customer provides a token that identifies the customer to a peripheral device (which is other than a credit-authorization terminal or a magnetic-stripe reader) coupled to the point-of-sale terminal. Then, a unified point-of-sale service object executing on the point-of-sale terminal, which is a driver for a virtual peripheral device, performs one or more operations based on at least the token to obtain financial information associated with the customer. After providing the financial information and transaction information associated with the financial transaction to a financial institution specified in the financial information, the point-of-sale terminal receives a confirmation from the financial institution that the financial transaction has been completed. For example, the confirmation may be received via a credit-authorization-terminal service object that is a driver for the credit-authorization terminal. | 12-12-2013 |
20130290169 | MANAGING FINANCIAL TRANSACTIONS USING TRANSACTION DATA FROM SMS NOTIFICATIONS - The disclosed embodiments provide a system that facilitates management of a financial transaction. During operation, the system obtains transaction data for the financial transaction between a user and an organization from a Short Message Service (SMS) notification on an electronic device of the user. Next, the system determines a category of the financial transaction based on the transaction data. The system also displays the transaction data and the category on the electronic device. Finally, the system uses the displayed transaction data and the displayed category to enable, for the user, management of the financial transaction without accessing the transaction data at the organization. | 10-31-2013 |
20130262307 | PRE-ALLOCATING MERCHANT ID IN A CREDIT CARD PROCESSOR ENTITY SYSTEM BY A MASTER MERCHANT - A method to process credit card transactions, including obtaining available merchant account IDs allocated to a master merchant account at a credit card processor entity of a credit card transaction network, where the master merchant is authorized to set up merchant accounts based on the master merchant account and assumes merchant-side financial risks of the merchant accounts, receiving, after obtaining the available merchant account IDs, a request from a merchant to set up a merchant account, and assigning, in response to credit approval of the merchant, a merchant account ID selected from the available merchant account IDs to the merchant for setting up the merchant account, where a credit card transaction of the merchant is submitted, subsequent to assigning the merchant account ID, to the credit card processor entity for authorization based on the master merchant account, where the credit card transaction is tagged with the merchant account ID. | 10-03-2013 |
20130250368 | ACCURATELY EXTRACTING INFORMATION BASED ON ORTHOGONAL IMAGES - During an information-extraction technique, a user of an electronic device may be instructed by an application executed by the electronic device (such as a software application) to acquire images, with different orientations (which are known to the user), of a target location on a document using an imaging sensor, which is integrated into the electronic device. After the user has taken a first image and before the user takes a second image in a different orientation of the electronic device (and, thus, the imaging sensor), the electronic device captures multiple images of the document. Then, the electronic device stores the images with associated timestamps. Moreover, after the user has taken the second image, the electronic device analyzes one or more of the first image, the second image and at least a subset of the images to extract information proximate to the target location on the document. | 09-26-2013 |
20130238477 | SYSTEM FOR DYNAMICALLY GENERATING FINANCIAL OBJECTS - During a financial transaction, information related to a financial history of a user is collected. This information includes financial data of the user over time, and the information specifies a behavioral pattern of the user. Then, a functional representation that specifies a financial output value based on input values and the behavioral pattern is generated, where the input values include at least a portion of the financial data. Moreover, based on the financial data, the financial output value is calculated using the functional representation and input values in the information, and one or more additional financial output values are calculated using one or more additional functional representations and the input values. Next, a financial analysis is performed for the user by comparing the financial output value and the one or more additional financial output values. | 09-12-2013 |
20130238476 | COUNTERFACTUAL TESTING OF FINANCES USING FINANCIAL OBJECTS - During a financial transaction, a functional representation of a financial history of a user is accessed. This functional representation specifies a financial output value based on input values and a behavioral pattern, and the behavioral pattern specifies a relationship between at least a pair of the variables associated with a dimension in the financial history. Then, the functional representation is modified based on a financial circumstance that is different than financial circumstances in the financial history. Moreover, the financial output value is calculated using the functional representation and the input values, and a modified financial output value is calculated using the modified functional representation and the input values. Next, the financial output value and the modified financial output value are compared. Based on the comparison and a testing metric, the electronic device determines a result of the counterfactual testing. | 09-12-2013 |
20130238475 | GENERALIZED FINANCIAL OBJECTS - During a financial transaction, a financial history of the user is accessed. This financial history may include financial data of the user over time, and the financial data may include multiple variables in a multidimensional space. Then, a behavioral pattern of the user is identified by determining a relationship between at least a pair of the variables along a dimension in the multidimensional space. Moreover, the functional representation is generated. This functional representation specifies a financial output value based on input values and the identified behavioral pattern, where the input values include financial data for at least one of the variables. The user may use the functional representation to facilitate financial decision-making | 09-12-2013 |
20130238460 | DETERMINING SHOPPING INTENT BASED ON FINANCIAL OBJECTS - During a financial transaction, a functional representation of a financial history of the user is accessed. The functional representation specifies a financial output value based on input values and a behavioral pattern, and the behavioral pattern specifies a relationship between at least a pair of the variables associated with a dimension in the financial history. Then, information about actions and activities of the user is collected, where the information corresponds to the behavioral pattern. For example, the actions may include financial transactions of the user and/or the activities may include locations of the user. Moreover, the shopping intent of the user is determined based on the information and the functional representation, where the shopping intent indicates a probability that the user intends to purchase an item (such as a product or a service) within a subsequent time interval. | 09-12-2013 |
20130238434 | FINANCIAL OUTCOME BASED ON SHARED FINANCIAL OBJECTS - During a financial transaction, functional representations of financial histories of users are exchanged between electronic devices, where a given functional representation specifies one or more output values based on input values. Then, one of the electronic devices identifies a subset of the group of functional representations having at least a common characteristic. For example, the characteristic may include a wide variety of attributes, such as a mathematical feature in the functional representations, a financial performance metric associated with the functional representations, a behavior relationship specified by the functional relationships, and/or a range of the one or more output values specified by the functional representations. This electronic device may provide information associated with the subset of the group of functional representations (such as an average functional representation of the subset) to the other electronic devices. | 09-12-2013 |
20130212003 | MOBILE MONEY ORDER - A method to track a money order transaction, including receiving, from a mobile device, a request to send the money order to a recipient, initiating, by a computer server in response to the request, a first transaction to transfer a money order amount from a funding account of the payer to a third party account held at a bank, initiating, in response to completing the first transaction, a second transaction to generate the money order by the bank, receiving, from the bank, an indication that the money order amount is paid out by the bank as a result of the recipient cashing the money order, and sending, in response to the indication, a message alerting the payer that the recipient has cashed the money order. | 08-15-2013 |
20130198518 | SECURE PEER DISCOVERY AND AUTHENTICATION USING A SHARED SECRET - During a security technique, an electronic device determines a name by a applying a function to a shared secret, which is shared between a user and another user. This name is advertised in a network. After discovery by another electronic device (which is associated with the other user), the electronic device generates a first encrypted message from an unencrypted message using a cryptographic key. The electronic device provides the first encrypted message to the other electronic device, and receives a second encrypted message from the other electronic device. Using the cryptographic key, the electronic device decrypts the second encrypted message. Moreover, the electronic device receives confirmation that the other electronic device was able to decrypt the first encrypted message, thereby authenticating that the secure connection has been established. | 08-01-2013 |
20130198067 | REMOTE CONFIGURATION OF EMV TERMINALS - During a device programming technique, a merchant provides account information associated with a smart-card terminal to a portable electronic device (such as a cellular telephone), which is coupled to the smart-card terminal. In response, the portable electronic device provides the account information to a computer remotely located relative to the portable electronic device. Then, the computer provides a merchant identifier and a terminal identifier to the portable electronic device. Next, the portable electronic device provides the merchant identifier and the terminal identifier to the smart-card terminal, thereby facilitating programming of the smart-card terminal. | 08-01-2013 |
20130189961 | LINKING A NAME TO A PHONE NUMBER IN A TEXT MESSAGE BASED ON A CONTACT LIST IN A MOBILE DEVICE - A method to initiate a phone call to a contact. The method includes analyzing a text message to identify a first attribute of the contact, and selecting one or more entries from a contact list stored in the mobile device by matching the first attribute of the contact to a portion of each of the one or more entries. The method also includes identifying a second attribute of the contact from the one or more entries based on a first pre-determined criterion, and modifying the text message to generate a displayed text message comprising a modified attribute that is modified from the first attribute based on the second attribute. The method also includes receiving a user selection as a first input indicating a user selected the modified attribute in response to viewing the displayed text message, and initiating the phone call to the contact based on the phone number. | 07-25-2013 |
20130179561 | RULE-BASED CLASSIFICATION OF ELECTRONIC DEVICES - The disclosed embodiments provide a system that facilitates interaction between an electronic device and a content provider. During operation, the system obtains a device profile containing a set of properties for the electronic device and a set of classification rules associated with the content provider. Next, the system identifies a device class of the electronic device based on the device profile and the classification rules. Finally, the system provides the device class to the content provider, wherein the content provider selects content to transmit to the electronic device based on the device class. | 07-11-2013 |
20130179353 | SECURE FINANCIAL TRANSACTIONS USING MULTIPLE COMMUNICATION TECHNOLOGIES - During a financial technique, electronic devices may exchange, using a first communication technique, information with each other to establish a secure connection between the electronic devices when they are proximate to each other. After the secure connection is established, the electronic devices may hand off communication with each other from the first communication technique to a second communication technique that supports communication at a higher data rate and over longer distances than the first communication technique. Moreover, the electronic devices may communicate, using the second communication technique and the secure connection, additional information associated with the financial transaction with each other to facilitate completion of the financial transaction. | 07-11-2013 |
20130176108 | AUTOMATED MECHANISM TO SWITCH USER DATA SETS IN A TOUCH-BASED DEVICE - A method to use a single touch-based device for a set of users involves analyzing a biometric signal of a user, obtained using a biometric sensor of the single touch-based device, to generate a biometric data item; determining an identity of the user by comparing the biometric data item to a set of biometric data items stored in the single touch-based device; activating, in response solely to the biometric signal and based on the identity of the user, a user data set residing on the single touch-based device, where the user data set belongs to the user; and performing, in response to a touch input from the user and activation of the user data set, a task on the single touch-based device using the user data set. | 07-11-2013 |
20130173425 | CONSUMER-INITIATED FINANCIAL TRANSACTION BASED ON SALES-SIDE INFORMATION - During a financial transaction, an electronic device associated with a consumer receives an electronic package from a counterparty in the financial transaction. This electronic package includes sales-side information associated with the financial transaction. Then, the electronic device analyzes the electronic package to extract the sales-side information. Moreover, the electronic device provides the sales-side information and payment information to a third party that completes the financial transaction, thereby allowing the consumer to initiate the payment process. Next, the electronic device receives confirmation from the third party when the financial transaction has been completed. | 07-04-2013 |
20130117859 | DISTINGUISHING LEGITIMATE HARDWARE UPGRADES FROM UNAUTHORIZED INSTALLATIONS OF SOFTWARE ON ADDITIONAL COMPUTERS - A client transmits requests to access features of a software program to a server. The requests include an identifier for a hardware profile of the computer on which the user is attempting to run the software. The client receives a response from the server that indicates whether the client is licensed to access the software and/or a feature of the software. The client creates a current identifier for the hardware configuration of the computer and compares the current identifier to the received identifier to determine whether the client is licensed to access the software and/or the feature. | 05-09-2013 |
20130036347 | INTERACTIVE TECHNIQUE FOR COLLECTING INFORMATION - In a collection technique, a user (such as a taxpayer) provides information (such as income-tax information) by submitting an image of a document, such as an income-tax summary or form. In particular, the user may provide a description of the document. In response, the user is prompted for the information associated with the field in the document. Then, the user provides the image of a region in the document that includes the field. Based on the image, the information is extracted, and the field in the form is populated using the extracted information. The prompting, receiving, extracting and populating operations may be repeated for one or more additional fields in the document. | 02-07-2013 |
20130024105 | LOCATION-BASED EMPLOYMENT SEARCH USING EMPLOYER AND CANDIDATE MOBILE COMMUNICATION DEVICES - Computer-implemented methods, systems and computer program products or applications for location-based, mobile-to-mobile connection of employers and candidates, while providing employers and candidates the ability to search for matching profiles and coordinate with each other in real time while utilizing their mobile communication devices to meet each other immediately or at a later time. Search results also indicate a distance between current locations of employer and candidates as determined from location data of their mobile communication devices and/or a distance between a candidate's residence and job location. Such location data enables employers and candidates to assess the ability to meet now or at a later time given their current locations and the ability of a candidate to travel to a job location given the candidate's residence location. | 01-24-2013 |
20120324559 | ESTABLISHING A SECURE CONNECTION BASED ON A JOINT GESTURE - During a transaction, an electronic device (such as a cellular telephone) captures a gesture performed by a user of the electronic device. This gesture is analyzed to determine salient features, such as accelerations of the electronic device during the gesture and associated time intervals. Then, the electronic device generates a token based on the salient features, and provides the token to a server. When a second token, associated with the token, is received by the server from a second electronic device, the server establishes a secure connection between the electronic device and the second electronic device. | 12-20-2012 |
20120311523 | DEPENDENCY-BASED IMPACT ANALYSIS USING MULTIDIMENSIONAL MODELS OF SOFTWARE OFFERINGS - The disclosed embodiments provide a system that facilitates the maintenance and execution of a software offering. During operation, the system obtains model data associated with a multidimensional model of the software offering. Next, the system uses the model data to calculate a set of dependency scores representing levels of dependency among a set of service components and a set of resources used by the software offering. Finally, the system uses the dependency scores to facilitate management of the software offering. | 12-06-2012 |
20120290376 | PROCESSING ELECTRONIC PAYMENT INVOLVING MOBILE COMMUNICATION DEVICE - Mobile payments and processing data related to electronic transactions. A near field communication connection is established between a mobile communication device of a consumer that serves as a mobile wallet and an electronic payment device of a merchant. Authorization data is shared between the mobile communication device and the electronic payment device without providing electronic payment instrument (e.g. credit card) data to the merchant. Authorization data is transmitted from the mobile communication device to a cloud computer or resource that serves as a cloud wallet and hosts respective data of respective electronic payment instruments of respective consumers, and from the electronic payment device a payment processor computer. The payment processor computer presents the authorization data to the cloud wallet, and in response, the cloud wallet transmits the credit card data to the payment processor computer, which processes the transaction. | 11-15-2012 |
20120284067 | REVENUE-BASED IMPACT ANALYSIS USING MULTIDIMENSIONAL MODELS OF SOFTWARE OFFERINGS - The disclosed embodiments provide a system that facilitates the maintenance and execution of a software offering. During operation, the system obtains a total revenue associated with the software offering and a set of weight vectors associated with a multidimensional model of the software offering, wherein each of the weight vectors comprises a set of revenue weights. Next, the system calculates a set of component revenues associated with a set of service components and a set of resources used by the software offering by applying the total revenue and the weight vectors to the multidimensional model. Finally, the system uses the component revenues to facilitate management of the software offering. | 11-08-2012 |
20120278365 | GRAPH DATABASES FOR STORING MULTIDIMENSIONAL MODELS OF SOFTWQARE OFFERINGS - The disclosed embodiments provide a system that facilitates the maintenance and execution of a software offering. During operation, the system obtains model data associated with a multidimensional model of the software offering. Next, the system stores the model data in a graph database. Finally, the system uses the graph database to facilitate management of the software offering. | 11-01-2012 |
20120222037 | DYNAMIC REPROVISIONING OF RESOURCES TO SOFTWARE OFFERINGS - The disclosed embodiments provide a system that facilitates the maintenance and execution of a software offering. During operation, the system obtains a policy change associated with a service definition of the software offering. Next, the system updates one or more requirements associated with the software offering based on the policy change. Finally, the system uses the updated requirements to dynamically reprovision one or more resources for use by the software offering during execution of the software offering. | 08-30-2012 |
20120222004 | PUBLISHING AND UPDATING OF MULTIDIMENSIONAL MODELS USING ORCHESTRATION TOOLS FOR SOFTWARE OFFERINGS - The disclosed embodiments provide a system that facilitates the maintenance and execution of a software offering. During operation, the system obtains model data associated with a multidimensional model of the software offering. Next, the system publishes the model data in a set of orchestration tools for the software offering, wherein the model data enables use of the multidimensional model in managing the execution of the software offering from the orchestration tools. | 08-30-2012 |
20120219175 | ASSOCIATING AN OBJECT IN AN IMAGE WITH AN ASSET IN A FINANCIAL APPLICATION - The invention relates to a method for associating an object in an image with an asset of a number of assets in a financial application. The method includes receiving the image of the object comprising global positioning system (GPS) data, where the image is captured using an image-taking device with GPS functionality and processing the image to generate processed GPS data. The method further includes determining, using the processed GPS data, a geographic location of the object in the image, and identifying, using the geographic location, the object by performing a recognition analysis of the image. The method further includes associating, based on the recognition analysis, the object in the image with the asset of the assets of an owner in the financial application, and storing, in the financial application, the image of the object associated with the asset of the assets of the owner. | 08-30-2012 |
20120215919 | MULTIDIMENSIONAL MODELING OF SOFTWARE OFFERINGS - The disclosed embodiments provide a system that facilitates the deployment and execution of a software offering. During operation, the system obtains a service definition of the software offering and a resource definition of resources available for use by the software offering. Next, the system creates a multidimensional model of the software offering by mapping a first set of elements from the service definition to a second set of elements from the resource definition. Finally, the system uses the multidimensional model to manage the deployment and execution of the software offering without requiring manual configuration of the resources by a user. | 08-23-2012 |
20120215907 | SYSTEMS AND METHODS FOR SELF-ADJUSTING LOGGING OF LOG MESSAGES - Systems, methods and articles of manufacture for logging computer generated log messages utilizing a computerized feedback signal. A logging server logs computer generated log messages from a log source at a logging server at a first detail level. The detail level of logging is the amount of information or data logged for a given activity. A log analyzer analyzes the log messages being logged by the logging server at a first detail level. Then, in response to a computerized feedback signal based upon the analysis of the log messages by the log analyzer, the detail level of logging at the logging server is automatically modified to a second detail level which is different than the first detail level. | 08-23-2012 |
20120215709 | METHODS AND SYSTEMS FOR COMPUTERIZED EMPLOYMENT RECRUITING - Methods, systems and articles of manufacture for computerized employment recruiting are provided. The system accesses a candidate database of candidate data for a plurality of candidates and a job posting database. The system compares the qualifications of the candidates to the job criteria for the job postings and determines a match between the qualifications and the job criteria. The system also identifies a inferred links between the candidates and the employer for the job postings to provide an added reliability factor to the referred candidates. The system ranks the matched candidates based, at least in part, using the inferred links and provides the ranked candidates to the employer. The system may use ontology based, and semantic matching based, algorithms for matching candidates to job postings, and also for identifying inferred links between candidates and employers. | 08-23-2012 |
20120215669 | SYSTEMS METHODS AND COMPUTER PROGRAM PRODUCTS FOR ENCODING AND DECODING TAX RETURN DATA - Tax data, e.g., Form W2 data, is encoded as a two-dimensional machine readable representation, such as a QR CODE. Certain tax data is encoded as segments of a QR CODE, and a tax form generated by an employer or payroll processing service and provided to an employee or user includes the QR CODE representing certain W-2 or other tax data. An image of the QR CODE is acquired using a camera of a mobile communication device or computer or other image capture device. When using a Smartphone, a tax preparation application executing on the Smartphone decodes the QR CODE image to determine the tax data, and populates fields of an electronic tax return with decoded data, thus allowing a consumer to prepare an electronic tax return using a mobile communication device. | 08-23-2012 |
20120211561 | SYSTEMS METHODS AND COMPUTER PROGRAM PRODUCTS FOR ENCODING AND DECODING TRANSACTION DATA - Tax data, e.g., Form W2 data, is encoded as a two-dimensional machine readable representation, such as a QR CODE. Certain tax data is encoded as segments of a QR CODE, and a tax form generated by an employer or payroll processing service and provided to an employee or user includes the QR CODE representing certain W-2 or other tax data. An image of the QR CODE is acquired using a camera of a mobile communication device or computer or other image capture device. When using a Smartphone, a tax preparation application executing on the Smartphone decodes the QR CODE image to determine the tax data, and populates fields of an electronic tax return with decoded data, thus allowing a consumer to prepare an electronic tax return using a mobile communication device. | 08-23-2012 |
20120208569 | FACILITATING A TEXT MESSAGE CONVERSATION USING TELE-LINKS - One embodiment of the present invention provides a system for facilitating a text message conversation using tele-links. During operation, the system receives a text message from a service at a mobile device, wherein the text message includes a tele-link, wherein the tele-link is comprised of a phone number. Next, the system receives a selection of the tele-link from a user at the mobile device. In response to the selection, the system then automatically initiates a call from the mobile device to a number indicated by the tele-link, wherein the act of calling the number results in the service sending a second text message to the mobile device. Finally, the system receives the second text message from the service at the mobile device. | 08-16-2012 |
20120198234 | METHOD AND APPARATUS FOR ENSURING THE INTEGRITY OF A DOWNLOADED DATA SET - The disclosed embodiments provide a system that ensures the integrity of a downloaded data set. During operation, a browser application executing on a computing device receives a data set that was signed using the private key of a host computer. The browser application stores this signed data set in a browser data store. Subsequently, the browser application also receives a public key from the host computer (e.g., while accessing a web page associated with the signed data set). The browser application ensures the integrity of the data set by executing scripted program code that: uses the public key to decode the signature for the data set; calculates a hash value for the signed data set; and compares the decoded signature with the hash value to validate the data set. | 08-02-2012 |
20120197805 | METHOD AND APPARATUS FOR CAPTURING FINANCIAL DATA USING A CAMERA-EQUIPPED COMPUTING DEVICE - The disclosed embodiments provide a system that captures financial data using a camera. During operation, the system uses the camera to scan a barcode that is associated with a financial document. The system decodes the barcode to generate a financial data set that is then input into a financial application. Allowing data to be input by capturing and decoding a scanned barcode reduces errors and generally improves the user data entry experience. | 08-02-2012 |
20120197726 | METHOD AND SYSTEM FOR SUGGESTING SERVICES TO A USER - A method for presenting a vendor selection to a user of a mobile device, including receiving a notification that a first telephone call is initiated by the user of the mobile device to a telephone number for a vendor; while the first telephone call is active and prior to placing an order with the vendor: extracting a set of matching data for the vendor using the telephone number for the vendor, selecting at least one suggested vendor associated with an offer using a set of matching parameters and the set of matching data, generating a message comprising the vendor and the at least one suggested vendor with the offer; and presenting the message to the user of the mobile device, terminating, prior to placing the order, the first telephone call to the vendor, and initiating a second telephone call to the at least one suggested vendor based on the offer. | 08-02-2012 |
20120191580 | METHODS SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR GENERATING FINANCIAL STATEMENT COMPLYING WITH ACCOUNTING STANDARD - Requirements, principles or guidelines of an accounting standard such as Generally Accepted Accounting Principles (GAAP) are transformed or codified into rules that specify how form, content and/or style of a certain portion of a financial statement, such as a header, should be configured while complying with the accounting standard. A rule engine compares attributes related to a financial statement and rules to determine which rule applies, and a selected rule specifies a header configuration. Relevant data received or retrieved from a source is used to generate or populate the header such that the header is automatically generated while complying with the accounting standard. | 07-26-2012 |
20120191565 | SYSTEMS METHODS AND COMPUTER PROGRAM PRODUCTS FOR DIRECTING CONSUMER FROM DIGITAL RECEIPT TO SOURCE OF SPECIFIC ITEM FOR REPEAT ITEM PURCHASE - Systems, computer-implemented methods and computer program products for directing a consumer to a source offering for sale a specific item previously purchased by the consumer. Electronic receipt data generated for a consumer purchase of a specifically identified item is generated by a merchant transaction processing device, and an electronic representation of a receipt is generated based on that data. The electronic representation identifies the specific item and includes an input element or button that can be selected, clicked on, executed or activated by a consumer to allow the consumer to be directed to a website of a merchant who offers the same item for sale and from which the consumer can buy the same item again. | 07-26-2012 |
20120191529 | METHODS AND SYSTEMS FOR A PREDICTIVE ADVERTISING TOOL - Systems, methods and articles of manufacture for a computerized advertising analysis tool for identifying and/or predicting the effect of future external events on the viewership and effectiveness of an advertising campaign. The system access and analyzes data regarding past events and viewership data to determine the past effect on viewership. The system then accesses analyzes future events to predict and estimate the effect of the future events on the advertising campaign based on the analysis of past events and viewership data. An advertiser may then use this information to evaluate the advertising campaign, allowing the advertiser to modify or negotiate the proper pricing for the advertising campaign. | 07-26-2012 |
20120191514 | SYSTEMS METHODS AND COMPUTER PROGRAM PRODUCTS FOR OPTING INTO MERCHANT ADVERTISING USING MOBILE COMMUNICATION DEVICE - Requesting and distributing electronic advertisements including electronic coupons and sales advertisements. A user of a mobile communication device such as a Smartphone views a current electronic advertisement of a merchant on a screen of the mobile communication device. After viewing the current electronic advertisement, the user wants to opt in to receive more electronic advertisements from the merchant and launches an application on the mobile communication device or accesses a software program. The application or program generates a request to receive additional electronic advertisements from that particular merchant. In response, additional electronic advertisements are provided to the user, e.g., through an intermediate computer and interfaces with a merchant computer or other source of electronic advertisements of the merchant. In this manner, merchant advertisements receive interested and targeted consumers who are able to receive electronic advertisements from a selected merchant without registering or providing personal information to the selected merchant. | 07-26-2012 |
20120190301 | MOTION-BASED INTERACTION BETWEEN A PORTABLE ELECTRONIC DEVICE AND A STATIONARY COMPUTING DEVICE - The disclosed embodiments provide a system for interacting with a stationary computing device. During operation, the system detects a proximity of a user of the portable electronic device to a stationary computing device. Next, the system uses the proximity to obtain identity data associated with at least one of the user and the portable electronic device. The system then uses the identity data to establish a connection with the portable electronic device. Finally, the system performs one or more tasks for the user on the stationary computing device based on a set of motion-based commands from the portable electronic device. | 07-26-2012 |
20120180036 | CUSTOMIZATION OF MOBILE-APPLICATION DELIVERY - A technique for facilitating customization of a software application is described. During this customization technique, an indicator, which indicates that a software application for an electronic device has been discovered by a user, is provided to a publisher of the software application. In response to the indicator, the publisher provides a token to the user. This token identifies a customized application-delivery service for the software application and/or a user-specific customization of the software application. Note that the customized application-delivery service and the user-specific customization are based on information about the user associated with the user's pre-existing or just-established relationship with the publisher. Next, the token is provided to an application-delivery service, and the application-delivery service provides the customized software application to the electronic device or a computer, for example, using the customized application-delivery service. | 07-12-2012 |
20120144364 | APPLICATION USER INTERFACE FOR NETWORKED-COMPUTING ENVIRONMENTS - A technique for using an application user interface that executes on a system is described. During operation of the system, a user specifies a design topology and configuration of an application that executes in a networked-computing environment through the application user interface. Then, the system provisions the application by bringing up associated hardware and/or software based on the design specified through the application user interface. Moreover, the application user interface monitors the application status during execution of the application so that application managers, application developers and application operators have access to the same information at different levels of an organizational hierarchy in the networked-computing environment. | 06-07-2012 |
20120136764 | ON-LINE TAX PREPARATION APPLICATION SCREEN NAVIGATION USING URL BOOKMARKS - Bookmarking interview screens of an electronic tax return prepared using an on-line tax preparation application. A widget or other element is executed by a user to request a URL bookmark of a screen. A bookmark program of or associated with the on-line tax preparation application dynamically generates a URL bookmark based at least in part upon context data of the screen identifying a path to the screen within hierarchical structure of screens. The URL bookmark is provided to the user and may be utilized to jump to the bookmarked screen without having retracing prior navigation steps through multiple screens before the subject screen. Embodiments may be utilized by technical support persons assisting end users, e.g., by requesting a URL bookmark in the form of a hypertext link and sending the link to a screen to an end user who may click on the link to jump to the bookmarked screen. | 05-31-2012 |
20120128154 | ESTABLISHING A SECURE PROXIMITY PAIRING BETWEEN ELECTRONIC DEVICES - A technique for establishing a common encrypted link between a first electronic device and a second electronic device in physical proximity in a system is described. During operation of the system, a user of a first electronic device in the system provides a notification that initiates secure device pairing. In response to the notification, the first electronic device conducts a first key exchange in an audible audio spectrum to the second electronic device in the system using a first zero-knowledge protocol. After the first key is received by the second electronic device, the second electronic device conducts a second key exchange in the audible audio spectrum to the first electronic device using a second zero-knowledge protocol, thereby establishing the common encrypted link between the first electronic device and the second electronic device. | 05-24-2012 |
20120110565 | CHAINED DATA PROCESSING AND APPLICATION UTILIZATION - The disclosed embodiments provide a system that facilitates application usage. During operation, the system obtains a user context associated with a first user, wherein the user context includes at least one of a location of the first user, profile data for the first user, device data associated with a computing device for the first user, and data types associated with existing applications on the computing device. Next, the system obtains a first set of new applications matching the user context. Finally, the system provides the first set of new applications to the first user for installation and use by the first user. | 05-03-2012 |
20120110564 | UPDATE WORKFLOW IN A PORTABLE DEVICE BASED ON METADATA - During an update technique, an update to a software application is received from a provider of a software application. Then, update information is either received from the provider or is generated. This update information, which is other than an application identifier and a version number associated with the update, specifies an update relationship between the update and at least a previous version of the software application. Subsequently, configuration information (such as whether the previous version of the software application is currently installed on a portable electronic device) is received from the portable electronic device. In response to the received configuration information, the update is provided to the portable electronic device along with update information. Using the update information, an application management system or the operating system installed on the portable electronic device determines whether an update workflow is executed. | 05-03-2012 |
20120110563 | DYNAMIC APPLICATION IDENTIFIER FOR USE IN AN UPDATE WORKFLOW - During an update technique, an update for the software application is received from a provider of the software application. Then, update information is either received from the provider or is generated. This update information specifies an update relationship between the update and at least a previous version of the software application. Next, inventory information associated with a portable electronic device is accessed (such as whether the previous version of the software application is currently installed on the portable electronic device). In response to the accessed inventory information, an identifier associated with the update is dynamically generated, and the update and the dynamically generated identifier are provided to the portable electronic device. Using the dynamically generated identifier, an application management system or the operating system installed on the portable electronic device determines whether an update workflow is executed. | 05-03-2012 |
20120109854 | CHECK FRAUD PROTECTION SYSTEMS AND METHODS - Check fraud protection method in which a customer is automatically enrolled in a check fraud protection service without separately subscribing to the service. In the event of fraudulent activity, the customer requests reimbursement from the financial institution and retains the exclusive right of recovery from a financial institution. The check fraud service provider serves as an advisor to the customer who retains exclusive right of recovery at all times. If customer is not fully compensated by the financial institution, the difference is paid to the customer by the check fraud protection service provider or insurer thereof, and new checks for a new checking account are provided to the customer free of charge. | 05-03-2012 |
20120109792 | INSTANT TAX RETURN PREPARATION - A method involves generating a partially completed tax return based on basic user information without needing to obtain other user inputs through an extensive user interview. A list of simple and concise interview questions are generated or selected from an interview question collection based on the partially completed tax return to finalize the tax return. The method further involves using an inference engine to allow data collection at any time and in any order via specific, personalized questions geared toward completion of the tax return. Therefore the taxpayer spends time reviewing rather than preparing his or her tax documents. | 05-03-2012 |
20120109691 | CHECK FRAUD PROTECTION SYSTEMS AND METHODS - Check fraud protection method in which customer is automatically enrolled in check fraud protection service without separately subscribing to the service. In the event of fraudulent activity, customer requests compensation from financial institution and retains the exclusive right of recovery from financial institution. If customer is not fully compensated by financial institution, the difference is paid to customer by service provider or an insurer thereof, and new checks for a new checking account are provided to customer free of charge. A custody indicator may also be used to determine chain of custody data that can be used to track the source of fraudulent activity if the fraud was perpetrated by someone involved in the check printing or delivery process, and for this purpose, a check order or individual checks may have respective indicators such as sequential serial numbers. | 05-03-2012 |
20120084119 | METHOD AND SYSTEM FOR EXCESS INVENTORY MANAGEMENT - A method for managing excess inventory includes receiving a physical shipment of goods and submitting a description and expiration date of each inventory item in the physical shipment of goods to an inventory management application. The inventory management application tracks number of units of each inventory item at the merchant. The method further includes, at a predefined timeframe prior to the expiration date, receiving a notification when a forecast of the number of unit of an inventory item remaining in the inventory at the expiration date is greater than a pre-defined threshold, selecting a buyer network of a plurality of buyer networks for selling the inventory item to generate a selected buyer network, and selling the inventory item via the selected buyer network. | 04-05-2012 |
20120082377 | RECOGNIZING A FEATURE OF AN IMAGE INDEPENDENTLY OF THE ORIENTATION OR SCALE OF THE IMAGE - One embodiment of the present invention provides a system for recognizing a feature of an image independently of the orientation or scale of the image. During operation, the system receives an image. Next, the system identifies a feature within the image. The system then performs a principal component analysis (PCA) operation on the feature to determine an orientation of a primary component of the feature and a secondary component of the feature, wherein the PCA operation is performed while source data for the image is retained. Finally, the system recognizes the feature by analyzing the primary component of the feature and the secondary component of the feature. | 04-05-2012 |
20120047250 | SCALABILITY BREAKPOINT CALCULATOR FOR A SOFTWARE PRODUCT - During a technique for estimating a scalability breakpoint of a software product, performance load tests of the software product are performed with different numbers of simulated concurrent users. For a given number of simulated concurrent users, a performance load test may include an associated set of transactions that are executed by the software product. Furthermore, during the performance load tests performance metrics for the transactions in the associated sets of transactions are measured. Then estimated total performance metrics for the transactions in the associated sets of transactions for the different numbers of simulated concurrent users are determined based on the measured performance metrics and the associated sets of transactions. Next, using the determined estimated total performance metrics, the estimated scalability breakpoint is calculated. | 02-23-2012 |
20120042021 | METHOD AND SYSTEM FOR PROVIDING A STATEFUL EXPERIENCE WHILE ACCESSING CONTENT USING A GLOBAL TEXTSITE PLATFORM - A method for providing access to content using a global textsite platform (GTP), including receiving, from a user device associated with a device identifier, a first user message including a first navigation state identifier of a sequential plurality of navigation state identifiers, identifying a first text page of the textsite associated with the first navigation state identifier, and identifying a second text page associated with a first navigating keyword, where the second text page is navigable from the first text page. The method also includes determining a second navigation state identifier sequentially after the first navigation state identifier, associating the second text page with the second navigation state identifier, and storing the association. The method also includes generating a GTP message of the first text page, including the first navigating keyword modified by the second navigation state identifier, and sending the GTP message for display on the user device. | 02-16-2012 |
20120029919 | USING LINGUISTICALLY-AWARE VARIABLES IN COMPUTER-GENERATED TEXT - One embodiment of the present invention provides a system for placing linguistically-aware variables in computer-generated text. During operation, the system receives a sentence at a computer system, wherein the sentence comprises two or more words. Next, the system analyzes the sentence to identify a first variable, wherein the first variable is a place-holder for a first word. The system then receives the first word. After that, the system automatically determines a gender of the first word. Next, the system analyzes the sentence to identify a first dependent word that is dependent on the first word, wherein a spelling of the first dependent word is dependent on the gender of the first word. The system then determines the spelling of the first dependent word that corresponds to the gender of the first word. Next, the system replaces the first variable in the sentence with the first word. If necessary, the system modifies the spelling of the first dependent word in the sentence to match the gender of the first word. Finally, the system outputs the sentence. | 02-02-2012 |
20120027246 | TECHNIQUE FOR COLLECTING INCOME-TAX INFORMATION - A technique for collecting income-tax information is described. This collection technique allows a user (such as a taxpayer) to provide income-tax information by submitting an image of a document, such as an income-tax summary or form. After receiving the image, the income-tax information is extracted from the document, and a subset of the income-tax information that is relevant to the user is determined. This subset of the income-tax information is then provided to the user for validation, and the user subsequently provides feedback about the subset of the income-tax information, such as acceptance of the subset or correction of any errors. Furthermore, after receiving the user feedback, fields in an income-tax return of the user may be populated using the subset of the income-tax information. | 02-02-2012 |
20120020532 | PROVIDING FEEDBACK ABOUT AN IMAGE OF A FINANCIAL DOCUMENT - A technique for providing feedback about an image of a financial document to a user is described. During this feedback technique, the user provides the image of a financial document, such as W-2 form. For example, the user may take a picture of or may scan the financial document. This image may be analyzed using predefined information in a set of financial documents (such as different types of income-tax documents), and a quality metric for the image may be determined using the analysis. Moreover, the feedback, which is based on the determined quality metric, may be provided to the user. For example, the user may be instructed to retake the image, and the instructions may include an image of the desired orientation and content. In this way, the user may be advised as to how to improve the quality metric in the revised image. | 01-26-2012 |
20110320424 | ASSESSING AND ADAPTING COMPONENT PARAMETERS - A parameter-selection technique that allows preferred permutations to be rapidly identified based on real-world user behavior is described. In particular, a set of web pages that include different permutations of the set of parameters are generated. Then, at least a subset of these web pages is provided to the users in response to their requests. For example, the requests may be associated with user selections of search results, which are associated with search queries provided by the users to a search engine. While the users interact with the subset of the set of web pages, their actions and the associated context (with respect to the different permutations) are tracked. Next, the tracked user actions are used to identify the web pages associated with the preferred permutations of the set of parameters. | 12-29-2011 |
20110319063 | METHODS SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR MASKING PHONE NUMBERS OF COMMUNICATION DEVICES - Communications involving mobile communication devices and an intermediate compute of a trusted third party host such that people can communicate with each other through the intermediate computer while not disclosing their phone numbers and/or other contact information to each other. Users register with the intermediate computer using a first form of communication that may involve non-voice communications such as text messages. After registration, users may communicate with each other through the intermediate computer using the same or different form of communication. For example, after registering with the intermediate computer via text messages, users may communicate with each other through a voice connection established through the intermediate computer. | 12-29-2011 |
20110314034 | CONCEPT-BASED DATA PROCESSING - The present embodiments provide a system that processes data. During operation, the system obtains, from a set of technical users, a set of concept definitions comprising filters against data in a data domain. Next, the system provides the concept definitions to a set of end users of the data. Finally, the system facilitates, for the end users, processing of the data by applying the concept definitions to the data. | 12-22-2011 |
20110294479 | SYSTEM AND METHOD FOR ASSIGNING A SENDERID - A method for sending Short Message Service (SMS) messages includes receiving a request to generate a senderID, determining senderIDs based on a business name, and receiving a selected senderID from the senderIDs. The method further includes receiving a request to send an SMS message using the selected senderID, and sending a request to an SMS server to send the SMS message using the senderID. | 12-01-2011 |
20110282909 | SECREGATING ANONYMOUS ACCESS TO DYNAMIC CONTENT ON A WEB SERVER, WITH CACHED LOGONS - A system and method are provided for segregating access to dynamic content on multiple websites hosted by a web server. When a request is received for dynamic content from a website, a UserRetriever module identifies a path to the content and retrieves a username and password corresponding to the website, from a database that is separate from the web server and used for other purposes (e.g., billing). A UserImpersonator module requests a logon handle for that username from a logon cache manager. The logon handle is used to associate the request with the impersonated user account instead of the default anonymous user account with which the request was initially associated. The dynamic content is retrieved and served under the context of the restricted impersonated user account session, after which the applied logon handle is stripped off and the request is re-associated with the default anonymous user account. | 11-17-2011 |
20110281560 | METHOD AND APPARATUS FOR FACILITATING COST-OPTIMIZED MOBILE MESSAGING - One embodiment of the present invention provides a system for facilitating cost-optimized mobile messaging. During operation, the system receives an encoded text message at a mobile device. Next, the system replaces a sub-string in the encoded text message with a corresponding sub-string from a data-dictionary to create a decoded text message. Finally, the system displays the decoded text message on the mobile device. Note that this helps to reduce costs since small sub-strings in the encoded text message can be replaced with large sub-strings in the decoded text message, thereby allowing a larger message to be sent via the SMS protocol without sending as many characters. | 11-17-2011 |
20110271108 | METHOD AND SYSTEM FOR SECURE EXCHANGE AND USE OF ELECTRONIC BUSINESS CARDS - Some embodiments provide a system that facilitates the use of an electronic business card. During operation, the system obtains one or more permissions for the electronic business card. Next, the system manages use of the electronic business card by a recipient of the electronic business card based on the permissions. | 11-03-2011 |
20110246277 | MULTI-FACTOR PROMOTIONAL OFFER SUGGESTION - The invention relates to a method to send a promotional offer from a business entity. The method steps include obtaining a profile of the business entity from a financial management application (FMA) executing on a central processing unit (CPU) and configured to manage operations of the business entity, analyzing a plurality of messages from a message source based on a pre-determined criterion to identify a keyword, qualifying the keyword to generate a qualified keyword with a keyword rating, wherein the keyword rating represents how relevant the keyword is to the business entity based on the profile of the business entity, searching for the qualified keyword in the promotional offer among a plurality of promotional offers in a library to generate a match between the qualified keyword and the promotional offer, adjusting a score of the promotional offer, in response to generating the match, based on the keyword rating, and sending the promotional offer to a consumer based on the score. | 10-06-2011 |
20110230214 | ACCESSING TEXTSITES USING TEXT MESSAGING SERVICE - A method for providing access to content using a global textsite platform (GTP) including receiving a user message identifying a registered unique keyword maintained by the GTP, wherein the registered unique keyword is registered with the GTP by a publisher for accessing a textsite comprising a plurality of text pages published by the publisher and indexed based on a plurality of navigating keywords defined by the publisher, retrieving authored content associated with the textsite based on the registered unique keyword, accessing the textsite based on the authored content to retrieve a navigating keyword indexing a text page, and sending a GTP message comprising the navigating keyword for the user to access the text page, wherein the user message and the GTP message comprise a text message transmitted using a text messaging service (TMS). | 09-22-2011 |
20110230213 | METHOD AND SYSTEM FOR MAINTAINING TEXTSITES ON A GLOBAL TEXTSITE PLATFORM - A method for accessing content using a global textsite platform including registering a unique keyword received from a publisher, receiving content from the publisher for creating a textsite associated with the unique keyword, creating the textsite on behalf of the publisher, receiving, from a user, a request to access the textsite, processing the request from the user, and providing access to the textsite by sending the content of the textsite, via a text messaging service (TMS), to a user mobile device. | 09-22-2011 |
20110225648 | METHOD AND APPARATUS FOR REDUCING THE USE OF INSECURE PASSWORDS - One embodiment of the present invention provides a system for reducing the use of insecure passwords. During operation, the system receives a login request at a computer system, wherein the login request includes a username and a password. Next, the system saves the password to an attempted password list, wherein the attempted password list includes passwords that have been attempted during login. The system then receives a password change request, wherein the password change request includes a username and a new password. Next, the system determines whether the new password is a member of the attempted password list. If so, the system rejects the password change request. However, if not, the system processes the password change request. | 09-15-2011 |
20110213723 | AUDIO AGREEMENT - A method for providing a product use agreement. The method includes sending, to a user in response to a request for a product, a message that includes an address for accessing the product use agreement. The method further includes receiving, from the user, a call at the address and audibly playing, to the user, a pre-recorded product use agreement recording. The pre-recorded product use agreement recording includes a legal agreement for using the product between the user and a business entity providing the product. The method further includes receiving, from the user, acceptance of the product use agreement based on the pre-recorded product use agreement recording, and providing access to the product based on acceptance of the product use agreement. | 09-01-2011 |
20110208636 | MATCHING PARTIES TO A TRANSACTION FOR AN AGRICULTURAL COMMODITY - In general, in one aspect, the invention relates to a method for matching parties to a transaction of an agricultural commodity. The method involves receiving buyer criteria (e.g., purchase quantity, buyer price, transaction location at which to buy the agricultural commodity) sent from a mobile device used by a primary and secondary buyer. The method further involves receiving seller criteria sent from a seller mobile device. The method further involves matching, within a predetermined period of time after receiving the buyer criteria and the seller criteria, the primary and secondary buyer with the seller based on determining that a yield is sufficient to meet the purchase quantity and a transaction location at which to buy the agricultural commodity falls within a number of locations common the primary/secondary buyers and the seller. The method further involves sending the buyer criteria to the seller mobile device using short message service (SMS) format. | 08-25-2011 |
20110196734 | TECHNIQUE FOR RECOMMENDING ADVERTISING MESSAGES - A technique for identifying a recommended type of advertising message is described. In this technique, information about advertising messages directed from businesses to consumers and associated acceptance rates of the advertising messages by the consumers is received or accessed. Note that the advertising messages include different types of advertising messages for different types of businesses. Then, the recommended type of advertising message for a given business is identified based on an associated type of business and the received information. By leveraging the results obtained by other similar businesses, this technique may allow the given business to improve the effectiveness of a subsequent advertising campaign. | 08-11-2011 |
20110173124 | AUTHENTICATION OF TRANSACTIONS IN A NETWORK - A technique for conducting a transaction via a network is described. In this technique, in response to receiving transaction information associated with the transaction via the network from a network browser in a computer, a computer system provides an encrypted version of the received transaction information via the network to an application that executes in the computer, which facilitates a comparison of the received transaction information with original transaction information provided by a user to the computer. Note that this application is separate from the network browser, and the communication with the application via the network is independent of the network browser. Moreover, if the received transaction information matches the original transaction information, the computer system receives approval for the transaction from the computer via the network. | 07-14-2011 |
20110106701 | METHOD AND APPARATUS FOR PERFORMING VOICE-BASED CREDIT CARD PROCESSING - One embodiment of the present invention provides a system for performing voice-based credit card processing. During operation, the system receives voice input from a merchant at a computer via a telephone to initiate a credit card transaction. Next, the system authenticates the merchant. After authenticating the merchant, the system prompts the merchant for a credit card number. Next, the system authenticates a consumer associated with the credit card. Note that the system can authenticate the consumer with pre-registered information that is associated with the credit card. Once the consumer is authenticated, the system prompts the merchant for a transaction amount. Next, the system receives the transaction amount from the merchant. The system then authorizes the credit card transaction for the transaction amount. Finally, the system reports the result of the authorization to the merchant. Note that embodiments of the present invention enable the merchant to process credit card transactions at reduced cost without the need for any equipment other than a telephone, thus providing the ability to have instant credit card enabled merchants on demand. | 05-05-2011 |
20100332581 | CREATING A COMPOSITE PROGRAM MODULE IN A COMPUTING ECOSYSTEM - Methods are provided for creating a composite program module within a computing ecosystem. The ecosystem comprises physical and/or virtual computing resources of a company, department or other organization. When a user discovers a grouping of modules that is useful to him, the ecosystem or his workspace allows him to create a composite module that comprises the group of modules. He can then access their combined functionality by activating just the composite module, in which case all the modules are automatically opened, without having to activate each one individually. Further, the ecosystem may suggest complementary program modules to a user based on his pattern of activity with one or more other modules. A composite program module may be created to include a suggested complementary module, or just modules discovered independently by the user. | 12-30-2010 |
20100174647 | METHOD AND APPARATUS FOR INITIATING A FUNDS TRANSFER USING A MOBILE DEVICE - The invention is directed to a method and apparatus for initiating an electronic funds transfer. The system includes a first mobile device, a payment engine, and a payment repository. The first mobile device includes functionality to display a notification of a sales transaction, obtain an authorization from the consumer to the electronic funds transfer based on the notification, instantiate a transfer entry form to obtain a transfer entry package, where the transfer entry package comprises the notification, a verification of the authorization, and consumer financial account information. The payment engine is operatively connected to the first mobile device and includes functionality to transmit the notification to the consumer of a sales transaction, generate the transfer entry form based on the authorization, and transmit the transfer entry package to a depository financial institution. The payment repository is operatively connected to the payment engine and includes functionality to store a record of the transfer entry package and the authorization. | 07-08-2010 |
20100161494 | TECHNIQUE FOR PERFORMING FINANCIAL TRANSACTIONS OVER A NETWORK - Embodiments of a system (such as a computer system), a method, and a computer-program product (e.g., software) for use with the computer system are described. These embodiments may be used to perform financial transactions over a network. In particular, the system allows customers to use personal PIN pads when conducting financial transactions (such as debit-card transactions) with multiple merchants and their associated acquirer processors (which assist the merchants in processing financial transactions), even though different groups of merchants and acquirer processors may use different encryption techniques. For a given financial transaction, this capability may be implemented by decrypting financial information associated with a personal PIN pad from a customer and re-encrypting it using a separate encryption technique of a merchant and the associated acquirer processor. | 06-24-2010 |
20100107227 | SEGREGATING ANONYMOUS ACCESS TO DYNAMIC CONTENT ON A WEB SERVER, WITH CACHED LOGONS - A system and method are provided for segregating access to dynamic content on multiple websites hosted by a web server. When a request is received for dynamic content from a website, a UserRetriever module identifies a path to the content and retrieves a username and password corresponding to the website, from a database that is separate from the web server and used for other purposes (e.g., billing). A UserImpersonator module requests a logon handle for that username from a logon cache manager. The logon handle is used to associate the request with the impersonated user account instead of the default anonymous user account with which the request was initially associated. The dynamic content is retrieved and served under the context of the restricted impersonated user account session, after which the applied logon handle is stripped off and the request is re-associated with the default anonymous user account. | 04-29-2010 |
20100100463 | SYSTEM AND METHOD FOR TIME TRACKING ON A MOBILE COMPUTING DEVICE - The invention relates to a method for tracking time using a mobile computing device. The method steps include providing a first event manager on the mobile computing device for managing a plurality of event records corresponding to a plurality of events, wherein each event record of the plurality of event records is synchronized via an exchange server to a corresponding event record managed by a second event manager on a client machine, generating a time tracking record comprising time entry information, wherein the time tracking record is generated based on input from a user of the mobile computing device, wherein the time tracking record is added to the plurality of event records as a surrogate event record, transmitting the surrogate event record via the exchange server to the second event manager, wherein the second event manager is operatively coupled to a client application on the client machine, extracting the time entry information from the surrogate event record using the client application for tracking time, and generating estimated time entry information automatically based on the event record, wherein the time entry information from the estimated time entry information is generated based on user review. | 04-22-2010 |
20100095311 | METHOD AND APPARATUS FOR FACILITATING A PERSISTENCE APPLICATION PROGRAMMING INTERFACE - One embodiment of the present invention provides a system for implementing a persistence application programming interface (API) that is platform independent and can make up-calls to business logic. During operation, the system receives a request at the API to execute a command at a persistence tier of an n-tier distributed application. In response to the request, the system determines an entity type for an entity affected by the command. Next, the system identifies a function at a middle tier of the n-tier distributed application that is associated with the entity type and the command, wherein the middle tier includes the business logic. The system then sends an instruction to the middle tier to execute the function. Finally, upon receiving a confirmation at the API that the function executed, the system executes the command at the persistence tier. | 04-15-2010 |
20100082461 | ASSOCIATING A FOREIGN CURRENCY WITH AN ACCOUNTING OBJECT - Some embodiments of the present invention provide a system that automatically associates a foreign currency with an accounting object. First, a name is received from a user. Next, an association between the name and the foreign currency is determined, wherein the foreign currency is different from a home currency. Then, the accounting object is automatically associated with the foreign currency associated with the name. | 04-01-2010 |
20100076998 | METHOD AND SYSTEM FOR GENERATING A DYNAMIC HELP DOCUMENT - A method for generating a dynamic help document involves obtaining question-answer pairs associated with a client-server application, determining rankings of the question-answer pairs based on user feedback about the question-answer pairs, and determining a first preferred question-answer pair based on rankings of question-answer pairs. The method further involves generating the dynamic help document using the first preferred question-answer pair, updating rankings of the question-answer pairs based on additional user feedback about the question-answer pairs, determining a second preferred question-answer pair based on updated rankings of the question-answer pairs, and updating the dynamic help document by replacing the first preferred question-answer pair with the second preferred question-answer pair. | 03-25-2010 |
20100074509 | TECHNIQUE FOR CORRECTING CHARACTER-RECOGNITION ERRORS - Embodiments of a computer system, a method, and a computer-program product (e.g., software) for use with the computer system are described. These embodiments may be used to identify and correct errors in financial information that was extracted using character-recognition software, such as optical character recognition software and/or intelligent character recognition software. In particular, potential errors may be identified by comparing the financial information for a current financial transaction of a user with expected financial information from one or more previous financial transactions of the user. Error metrics for these potential errors may be determined and used to correct at least some of the potential errors. For example, values of the Levenshtein edit distance may be determined based on the comparison, and one or more potential errors associated with one or more minimum values of the Levenshtein edit distance may be corrected. | 03-25-2010 |
20090282370 | GRAPHICAL USER INTERFACE FOR DATA ENTRY - A graphical user interface is provided for facilitating entry of data into a telephone, personal digital assistant or other computing device having a touch-sensitive input component (e.g., a touch screen). The interface includes multiple initial contact areas associated with different input (e.g., characters, numerical values, commands), a home area and spokes positioned between the initial contact areas and the home area. The interface is manipulated using gestures. A data input gesture begins by touching in or near an initial contact area and moving to or toward the home area, generally in proximity to the corresponding spoke. Other illustrative gestures include tracing directly from one initial contact area to another (e.g., to add the corresponding data values), performing a “throwing” gesture out of the home area (e.g., to delete the last input), gesturing backward/forward in the home area (e.g., to move backward/forward through a series of fields), etc. | 11-12-2009 |
20090276761 | WEIGHTED PERFORMANCE METRICS FOR FINANCIAL SOFTWARE - Embodiments of a computer system that determines a performance metric are described. During operation, the computer system determines the performance metric for tasks performed by financial software during a time interval. This performance metric is based on a weighted summation of contributions from the tasks, and a given weight associated with a given task is based on a frequency of occurrence of the given task. Then, the computer system performs a remedial action to improve the determined performance metric during a subsequent time interval. | 11-05-2009 |
20090276346 | SYSTEM AND METHOD FOR CLASSIFYING A FINANCIAL TRANSACTION AS A RECURRING FINANCIAL TRANSACTION - A system that automatically classifies a financial transaction as a recurring financial transaction based on classification data obtained from a set of users is presented. The system can also determine the frequency at which the recurring financial transaction repeats. If the financial transaction is classified as a recurring financial transaction, the system can mark the financial transaction as a recurring financial transaction. Alternatively, the system can notify the user that the classification data indicates that the financial transaction can be classified as a recurring financial transaction. | 11-05-2009 |
20090265387 | METHOD AND SYSTEM FOR ENTERING ITEMS INTO A GIFT REGISTRY - Some embodiments of the present invention provide a system that enters items into a gift registry. During operation, the system photographically captures images of items at stores containing the items. Moreover, the images include a set of barcodes identifying the items. Next, the system obtains a set of product codes for the one or more items from the barcodes in the images. Finally, the system enters the one or more items in the gift registry using the product codes. | 10-22-2009 |
20090265261 | DETERMINING TIME HISTORIES FOR FINANCIAL INFORMATION - Embodiments of a computer system that determines a time history are described. During operation, the computer system receives a single command which accesses information associated with the time history, wherein the command is received from a user, and the information is to be used by financial software. Then, the computer system generates multiple queries corresponding to the time history, where the multiple queries access multiple data sources. Next, the computer system executes the multiple queries to obtain the time history. | 10-22-2009 |
20090265253 | METHOD AND SYSTEM FOR PROVIDING GIFT REGISTRY SERVICES THROUGH A GIFT REGISTRY NETWORK - Some embodiments of the present invention provide a system that provides gift registry services to a user. During operation, the system enrolls a business with a registry system and identifies a first set of items offered for sale by the business. Next, the system populates the registry system with the first set of items. Finally, the system presents the first set of items to the user for inclusion in a gift registry associated with the user. | 10-22-2009 |
20090254878 | EXECUTABLE CODE GENERATED FROM COMMON SOURCE CODE - A computer system generates first executable code in a first programming language based on common source code, where the first executable code is configured to execute at a server in the client-server environment. Then, the computer system executes the first executable to produce relational objects that constitute a tree hierarchy, where a given relational object defines a relationship between nodes and end points in the common source code. Next, the computer system generates second executable code in a second programming language based on the tree hierarchy, where the second executable code is configured to execute at a client in the client-server environment, and where the second executable code implements a subset of the common source code associated with the relational objects which is based on a user context. | 10-08-2009 |
20090254387 | TECHNIQUE FOR PERFORMING TRIPLE BOTTOM-LINE ASSESSMENTS - Embodiments of a computer system for determining a social responsibility metric are described. During operation, the computer system aggregates information associated with financial transactions of a user to determine the social responsibility metric. Note that the financial transactions may be included in a data structure associated with financial software, and the data structure may be stored in a computer-readable medium. Next, the computer system may provide the social responsibility metric to the user. | 10-08-2009 |
20090254343 | IDENTIFYING AUDIO CONTENT USING DISTORTED TARGET PATTERNS - Embodiments of a system for identifying audio content are described. During operation, the system receives a data stream from an electronic device via a communication network. Then, the system distorts a set of target patterns which are used to identify the audio content based on characteristics of the electronic device and/or the communication network. Next, the system identifies the audio content in the data stream based on the set of distorted target patterns. | 10-08-2009 |
20090253494 | EXCHANGING ASSETS BETWEEN ON-LINE VIRTUAL WORLDS - Some embodiments of the present invention provide a system that facilitates exchanging assets between online virtual worlds. During operation, the system receives a first asset from a representative of a first player who controls the first asset in a first virtual world, and receives a second asset from a representative of a second player who controls the second asset in the second virtual world. Next, the system provides the first asset to a representative of the second player in the first virtual world, and provides the second asset to a representative of the first player in the second virtual world. | 10-08-2009 |
20090252314 | ESTABLISHING AND RECOVERING CONTEXT RELATED TO AN ON-GOING SEQUENCE OF COMMUNICATIONS - Apparatus, methods, and computer program products are disclosed that teach methods for establishing context of a subsequent electronic real-time communication. One method detects a connection attempt that is initiated by an instigator-identifiable for a subsequent electronic real-time communication that is directed to a target-identifiable. The instigator-identifiable is associated with a first identification characteristic and the target-identifiable is associated with a second identification characteristic. This method subsequently retrieves a reminder reference that is responsive to the first identification characteristic and the second identification characteristic and presents the reminder reference to the target-identifiable. The method also establishes the subsequent electronic real-time communication between the instigator-identifiable and the target-identifiable. The disclosed technology also includes apparatus that perform the methods and program products that contain computer instructions that cause a computer to perform the methods when the computer executes the instructions. | 10-08-2009 |
20090248789 | LEARNING AND COMMUNITY-BASED WEB AGGREGATION TECHNIQUES - Some embodiments of the present invention provide a system that facilitates access to a website from an application. During operation, the system obtains community data associated with interactions between a set of users and the website and examines the community data to identify an interactivity request made by the website to users of the website. Next, the system obtains user-specific data from a new user of the application, which includes a response to the interactivity request from the new user. Finally, the system uses the user-specific data to automate access to the website for the new user. | 10-01-2009 |
20090248594 | METHOD AND SYSTEM FOR DYNAMIC ADAPTATION OF USER EXPERIENCE IN AN APPLICATION - Some embodiments of the present invention provide a system that executes an application. During operation, the system physiologically monitors a user of the application with a set of sensors as the application executes. Next, the system assesses a mental state of the user based on physiological data collected from the sensors. Finally, the system changes the behavior of the application based on the assessed mental state to facilitate use of the application by the user. | 10-01-2009 |
20090240605 | SYSTEM AND METHOD FOR AUTOMATED TRANSACTION SPLITTING - A system and method are provided for automated transaction splitting. A central repository gathers details of multi-category transactions between a first payee (e.g., merchant, investment firm) and one or more users. Each category's proportionate share of the total of the transactions is calculated and used to configure an average or model transaction. When a new transaction is received, it is automatically split among the categories based on the model transaction. Multiple types or tiers of model transactions may be applied. For example, a user-specific model transaction may reflect one specific user's history of transactions with the payee. A community model transaction may reflect multiple users' transactions. Similarly, one type of model transaction may reflect transactions with a single payee, while another type may reflect transactions with related payees (e.g., payees having similar businesses). | 09-24-2009 |
20090234761 | USER INTERFACE FOR RAPID ENTRY OF TIMESHEET DATA - A user interface for receiving time entries in a timesheet is described. This user interface includes a user-interface element in the form of a calendar, where the calendar contains one or more time entries associated with at least a financial activity. Moreover, a given time entry, which is associated with a corresponding block of time, is graphically represented as an adjustable region in the calendar. Additionally, a user can change one or more temporal parameters associated with the time entry by using a pointing device to select and modify one or more geometric properties of the adjustable region. | 09-17-2009 |
20090228560 | METHOD AND APPARATUS FOR CLASSIFYING ELECTRONIC MAIL MESSAGES - A system for classifying an electronic mail message is presented. During operation of the system, type tags are included in an electronic mail message, wherein the type tag can be used to classify the electronic mail message. Furthermore, specified actions can be performed based on the type tags included in the electronic mail message. | 09-10-2009 |
20090199264 | DYNAMIC TRUST MODEL FOR AUTHENTICATING A USER - A system that that dynamically authenticates one or more users is described. During operation, the computer system determines a trust level for a user, where the trust level is a function of elapsed time since the user previously provided authentication information. Next, the computer system calculates a transaction risk level based on a type of user transaction performed by the user. Then, the computer system requests additional authentication information from the user based on the trust level and the transaction risk level. | 08-06-2009 |
20090198708 | METHOD AND APPARATUS FOR MANAGING METADATA ASSOCIATED WITH ENTITIES IN A COMPUTING SYSTEM - One embodiment of the present invention provides a system that facilitates managing metadata associated with entities and entity types in a computing system. During operation, the system initializes a global static metadata cache containing global static metadata at the computing system. Next, the system initializes a global dynamic metadata cache containing global dynamic metadata at the computing system. The system then receives a command to initialize a session at the computing system. In response to the command, the system determines a realm for the session, wherein the realm is a virtual private partition of the computing system. The system then initializes a realm-scoped dynamic metadata cache containing realm-scoped dynamic metadata associated with the realm at the computing system. Finally, the system executes operations on the computing system in compliance with the global static metadata, the global dynamic metadata, and the realm-scoped dynamic metadata. | 08-06-2009 |
20090198669 | CONFIGURATION-BASED SEARCH - A system that tunes search results is presented. During operation, the system receives content to be searched. The system then iteratively performs the following operations until search results meet specified criteria. The system generates an index of the content based on a set of configuration parameters. Next, the system performs a search against the index to produce the search results. The system then determines whether the search results meet the specified criteria. If the search results do not meet the specified criteria, the system modifies one or more of: the set of configuration parameters; and the content. If the search results meet the specified criteria, the system saves the set of configuration parameters into a configuration file which can be used to generate the index for the content. | 08-06-2009 |
20090198602 | RANKING COMMERCIAL OFFERS BASED ON USER FINANCIAL DATA - One embodiment of the present invention provides a system that ranks commercial offers for a user in a set of users. During operation, the system receives financial data for the set of users, wherein the financial data includes spending data for the set of users across a set of categories. Next, for a given user, the system computes an individual-strength vector based on financial data specific to the given user, wherein each entry in the individual-strength vector represents an amount of spending in a respective category for the given user. The system additionally computes a relative-strength vector for the given user based on the financial data for the set of users, wherein the relative-strength vector represents a relative-spending strength across the set of categories for the given user relative to the set of users. The system then ranks the commercial offers for a user based on both the set of individual-strength vectors and the set of relative-strength vectors for the set of users. | 08-06-2009 |
20090198557 | TIMING COMMERCIAL OFFERS BASED ON LONG-TERM USER DATA - One embodiment of the present invention provides a system that times commercial offers made to a user. During operation, the system starts by receiving financial history data for the user, wherein the financial history data includes purchase records for a set of purchases. The system then identifies a subset of purchases in the set of purchases, wherein the subset of purchases are semantically linked to a set of predetermined subjects. Next, the system identifies timing patterns in the subset of purchases based on timing information associated with the subset of purchases. The system then presents one or more commercial offers to the user at specific times based on the identified timing patterns. | 08-06-2009 |
20090193397 | METHOD AND APPARATUS FOR FACILITATING DIAGNOSTIC LOGGING FOR SOFTWARE COMPONENTS - One embodiment of the present invention provides a system that facilitates diagnostic logging for software components. During operation, the system receives program code for a software component that was generated from an object model, where a key attribute has been specified for the object model. During execution of the program code, the system detects when an instance of the key attribute for the object model is accessed, and attaches state associated with the instance to a thread context in the runtime environment. The system then appends this state to a log during a logging operation to facilitate discovering and analyzing program faults. | 07-30-2009 |
20090193391 | MODEL-BASED TESTING USING BRANCHES, DECISIONS , AND OPTIONS - Some embodiments of the present invention provide a system that tests a software program. During operation, the system creates a behavioral model of the software program using branches, decisions, and options. Next, the system generates a test case from the behavioral model and executes the test case on the software program. Finally, the system analyzes an output of the executed test case to determine a validity of the software program. | 07-30-2009 |
20090193389 | REALTIME CREATION OF DATASETS IN MODEL BASED TESTING - Some embodiments of the present invention provide a system that tests a software program. During operation, the system creates a behavioral model of the software program using branches, decisions, and options. Next, the system applies a weight assignment technique to the behavioral model to create a set of global identifiers (IDs), which correspond to test cases of the behavioral model. The system then generates a test case from the behavioral model and executes the test case on the software program. Finally, the system analyzes an output of the executed test case to determine a validity of the software program. | 07-30-2009 |
20090193358 | METHOD AND APPARATUS FOR FACILITATING INFORMATION ACCESS DURING A MODAL OPERATION - One embodiment of the present invention provides a system that facilitates accessing information during a modal operation. The system operates by presenting an initial window for an application to a user in a display. The system then presents a subsequent window in the display for another function related to the application. During this process, the system presents these two windows in proximity to each other, and ensures that this proximity is maintained, even across user changes to one or both windows. At a later point, during operation, the system receives an input from the user that results in a modal operation for the application that restricts user changes to and/or user control of the initial window during the modal operation. Despite this modal operation, the system remains able to receive a subsequent input for the subsequent window from the user and, in response, update information displayed in the subsequent window during the modal operation. This allows the user to continue to access application information despite the modal operation. | 07-30-2009 |