06th week of 2015 patent applcation highlights part 61 |
Patent application number | Title | Published |
20150039495 | STORAGE BATTERY CONTROL METHOD AND STORAGE BATTERY CONTROL SYSTEM - A storage battery control method used by a control device controlling a storage battery prepared for a plurality of consumers, and involves detecting an amount of power used by each of the consumers per unit time, making a judgement regarding whether or not the amount of power used by one or more of the consumers exceeds a threshold determined in advance, and when the judgement finds that the amount of power used by the consumers exceeds the threshold, supplying electric power from the storage battery to a distribution system to which the one or more consumers belong. | 2015-02-05 |
20150039496 | DIGITAL CURRENCY DISTRIBUTION SYSTEM WITH ACOUSTIC TRIGGERS - A system and method are disclosed to determine an action to be taken for currency delivery to a client. The method provides for the triggering and delivery of digital currency from television sets and audio devices to mobile devices by way of acoustic triggers, which are inaudible and/or indiscernible to the human ear. The acoustic triggers use a method of encoding an identifying data sequence into digital information, convert the digital information into analog audio pattern, transmit the pattern with loud speakers, receive the audio pattern with a microphone, convert the analog audio pattern into digital information, decode the digital information back to an identifying data sequence. The identifying sequence is then authenticate and validated with a server which associates the sequence with currency that can be redeemed at retail point-of-sale terminals or online and used to purchase goods and services. The different frequency sets that are present in these inaudible tones can be assigned monetary values that can be transferred between any two devices so long as the emitting device has a speaker and the receiving device has a microphone. | 2015-02-05 |
20150039497 | BILLER-INITIATED ELECTRONIC BILLING ACTIVATION - This disclosure describes systems, methods, and computer-readable media related to biller-initiated electronic billing activation. A service provider system for electronic bill presentment and payment (EBPP) may receive an electronic billing activation request, wherein the electronic billing activation request comprises i) an identifier associated with a biller, ii) an identifier associated with a subscriber account at the EBPP service provider, and iii) an identifier associated with a biller account at the biller. The identifier associated with the subscriber account may not be an identifier used by an entity associated with the subscriber account to access the subscriber account at the EBPP service provider. The service provider system may process the electronic billing activation request to establish the biller as i) a payee associated with the subscriber account and ii) an electronic biller associated with the subscriber account in response to receiving the electronic billing activation request. | 2015-02-05 |
20150039498 | BILLER-INITIATED ELECTRONIC BILLING ACTIVATION - This disclosure describes systems, methods, and computer-readable media related to biller-initiated electronic billing activation. A biller system associated with a biller may receive entity information associated with an entity requesting to establish a biller account with the biller. The biller system may generate the biller account. The biller system may generate an electronic billing activation request. The biller system may transmit to a service provider system associated with an electronic bill presentment and payment (EBPP) service provider, the electronic billing activation request and receive a confirmation of processing of the electronic billing activation request. | 2015-02-05 |
20150039499 | SYSTEM AND METHOD FOR STAGING MONEY TRANSFERS BETWEEN USERS HAVING PROFILES - Various embodiments concern facilitating a money transfer by creating a first profile for a first user and a second profile for a second user. The first user can select the second profile from a plurality of profiles. The first user can enter a value designation for the transfer of money from the first user to the second user. A computing system can then stage the transfer of money based on previously saved profile information for the first user and the second user. The profile information can be used to set a plurality of terms of the money transfer without requiring either of the first user or the second user to reenter this information or otherwise affirmatively set the plurality of terms of the money transfer. | 2015-02-05 |
20150039500 | PROCESS FOR INVOICE AGENT COUPLING - A method for invoice agent coupling includes, among other things, receiving a service invoice generated by a primary service provider and receiving an authorization of payment of the service invoice. Additional steps include receiving a request for early payment authorization, and transmitting a services payment to the primary service provider. | 2015-02-05 |
20150039501 | Supplier Using A Buyer-Initiated Payment System To Provide Qualifying Information To Obtain An Interchange Rate - A supplier uses a Buyer-Initiated Payment (BIP) system, such as a Payer Direct Hub (PDH), to obtain a selected interchange rate to charge the supplier. The payer may use a Supplier-Initiated Payment (SIP) system or manual method to provide a commercial credit card number to a supplier. A supplier may log onto a BIP system and enter the number along with the payment amount. A BIP system determines whether the entered information includes the qualifying information to obtain the selected interchange rate for the supplier. The qualifying information for a selected interchange rate may include tax information or additional line item detail information. Substitute information to be used as the qualifying information needed for the selected interchange rate is retrieved. The BIP system combines the retrieved substitute information with the entered information and outputs credit card transaction information so that the supplier is paid using the selected interchange rate. | 2015-02-05 |
20150039502 | MISAPPROPRIATION PROTECTION BASED ON SHIPPING ADDRESS OR STORE INFO FROM E-RECEIPT - Embodiments of the invention are directed to a system, method, or computer program product for utilizing e-receipt data and other electronic communication data between a merchant and customer regarding a transaction to provide misappropriation protection based on address and/or merchant store information associated with the e-receipt or other e-communication. In one embodiment, a system is configured to: identify and retrieve electronic communications between a merchant and a customer associated with a transaction; determine address information or merchant store information from the electronic communication; and determine whether or not the address information or merchant store information triggers a notification or an alert to the customer based at least partially on one or more rules relating to a misappropriation of customer account information. | 2015-02-05 |
20150039503 | MOBILE REMITTANCES/PAYMENTS - A method and a system for mobile remittance and/or payment are provided. Example embodiments may include receiving a request, at a financial entity and from a first party, to remit an amount from an account, associated with the first party to a mobile phone number associated with a second party; notifying the second party of the amount to be remitted and an identity of the first party; receiving a personal identification component from the second party; accessing a mobile account associated with the mobile phone number based on the personal identification component; and depositing the amount into the mobile account. According to example embodiments, the system may include a communication module, a mobile remittance module, a payment processor, a mobile accounts module, an agent management module, and a mobile transfer module. | 2015-02-05 |
20150039504 | CHECK VERIFICATION AND REMOTE DEPOSIT CAPTURE - A remote deposit capture system is provides a remote deposit capture system that provides for physical manipulation of the financial instrument for deposit verification purposes. | 2015-02-05 |
20150039505 | DYNAMIC TRIAL SUBSCRIPTION MANAGEMENT - A network device receives a user's selection of a subscription to media content services that includes a designated trial period. The subscription includes access to both digital content and physical media content. The network device receives payment information, for the subscription, that includes a credit card number, a card security code, and a billing address. The network device grants, to a user account, a temporary entitlement for the digital content when the payment information is received and obtains verification of the payment information. The verification includes determining validity of the payment information and verifying that a minimum credit card balance is available on the credit card. The network device selects an updated trial period status from a group of options including terminating the temporary entitlement, extending the temporary entitlement for a first duration, extending the temporary entitlement for a second duration, and issuing credits for the physical media content. | 2015-02-05 |
20150039506 | METHODS AND SYSTEMS FOR PROVIDING 3-D SECURE SERVICE ON-BEHALF-OF MERCHANTS - Systems and methods for conducting 3-D Secure transactions on-behalf-of (OBO) merchants. In an embodiment, a payer authentication response (PARes) message indicating enrollment in the 3-D Secure OBO merchants authentication service is received from an access control server by a computer and stored. The computer later receives a purchase transaction authorization request message, determines that data of the purchase transaction authorization request message matches stored PARes message data, and then injects a UCAF into the purchase transaction authorization request message to generate an updated transaction authorization request message. The updated transaction request message is then transmitted to an issuer financial institution for 3-D Secure purchase transaction authorization processing. | 2015-02-05 |
20150039507 | Mobile device and authentication method for mobile payment system - A mobile device is utilized for a mobile payment system. The mobile device includes an identity module for storing an identity data; a communication module for communicating with a client and receiving a start signal to generate a notification signal; a processing module for executing an application program to obtain an authentication information according to the notification signal and determining whether the authentication information is legal according to a checking information to generate a switching signal; and a switching module for determining whether to connect the communication module and the identity module according to the switching signal; wherein the communication module reads the identity data stored in the identity module to obtain an identity result according to a conduction of the switching module, and transmits the identity result to the client. | 2015-02-05 |
20150039508 | EFFICIENT AUTHENTICATION OF A USER FOR CONDUCT OF A TRANSACTION INITIATED VIA MOBILE TELEPHONE - A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled telephone. The data-enabled telephone is capable of initiating telephone calls over a telephone network and of engaging in two-way data communication with a data server in a network and the server enables conduct of the transaction. Caller identification information is received at the server. The information is associated with a telephone call request initiated by the user via the data-enabled telephone to a service number. The caller identification provides basis for authentication of the user and the caller identification information received at the service number is used to address a message to the user. Included in such a message is a logon key for use by the user in accomplishing the transaction. Thus the user can use the logon key to enter into data communication with the server for conduct of the transaction. | 2015-02-05 |
20150039509 | PORTABLE DEVICE FOR ELECTRONIC PAYMENTS - “Portable device for electronic payments” or “Electronic wallet calculator for cashless transactions” refers to a combined system of conversion, calculation and transmission of processed data for immediate and presencial payments and revenues, through portable or fixed devices of close but contactless communication, which, in most models, is similar to a wallet calculator or a mobile phone, in which the basic functions of arithmetic operations designed to be subtraction (debit) or addition (credit) are only performed, whenever two similar or compatible devices establish a link of connectivity and synchronization of the processed, encoded and encrypted data between themselves, in a secure and off-line way, using infrared, radio frequency of short distance, or other forms of “contactless” transmission. | 2015-02-05 |
20150039510 | SYSTEMS AND METHODS OF DIRECT BANK TRANSFER - A financial institution and a payment initiator may exchange public keys to enable the secure exchange of data. A business wishing to collect payment can provide its account information to the payment initiator. A customer wishing to pay can instruct the payment initiator to encrypt the business's account information along with details for a particular invoice and transmit the information to the financial institution. The financial institution can decrypt the information and initiate a transfer of money from the customer to the business. The financial institution may present the information about the transaction to the customer for modification or confirmation before initiating the transfer. The information may be sent from the payment initiator to the financial institution via the customer. After the payment has been initiated by the financial institution, a confirmation may be sent to the customer, the payment initiator, the business, or any suitable combination thereof. | 2015-02-05 |
20150039511 | MOBILE COMPUTING DEVICE, A METHOD FOR PERFORMING A TRANSACTION, AND A COMPUTER-READABLE STORAGE MEDIUM - Various embodiments provide a mobile computing device comprising: a communication interface configured in use to wirelessly transmit and receive data; and a controller configured in use to cause the communication interface to transmit payment information to an external device to perform a transaction, the payment information including account information received by the communication interface from a server device, the account information specifying an account for use in performing the transaction. | 2015-02-05 |
20150039512 | REAL-TIME CROSS-CHANNEL FRAUD PROTECTION - An artificial intelligence cross-channel fraud management system comprises a parallel arrangement of single-channel, fully trained fraud models that each integrate several artificial intelligence classifiers like neural networks, case based reasoning, decision trees, genetic algorithms, fuzzy logic, and rules and constraints. These are further integrated by the expert programmers and development system with smart agents and associated real-time profiling, recursive profiles, and long-term profiles. The trainable general payment fraud models are trained into channel specialists with channel-filtered supervised and unsupervised data to produce each channels payment fraud model. This then is applied by a commercial client to process real-time cross-channel transactions and authorization requests for fraud scores. A detection of fraud in one channel is used to immediately sensitize all the other fraud channel models to the involved accountholder. Low level, but broad spectrum fraud can be used to trigger all the accounts of a compromised accountholder or merchant data breach. | 2015-02-05 |
20150039513 | USER DEVICE PROFILING IN TRANSACTION AUTHENTICATIONS - A real-time fraud prevention system enables merchants and commercial organizations on-line to assess and protect themselves from high-risk users. A centralized database is configured to build and store dossiers of user devices and behaviors collected from subscriber websites in real-time. Real, low-risk users have webpage click navigation behaviors that are assumed to be very different than those of fraudsters. Individual user devices are distinguished from others by hundreds of points of user-device configuration data each independently maintains. A client agent provokes user devices to volunteer configuration data when a user visits respective webpages at independent websites. A collection of comprehensive dossiers of user devices is organized by their identifying information, and used calculating a fraud score in real-time. Each corresponding website is thereby assisted in deciding whether to allow a proposed transaction to be concluded with the particular user and their device. | 2015-02-05 |
20150039514 | Method and Apparatus for Identification Verification and Purchase Validation - A computer implemented method includes receiving a request for payment-related information at a wireless device. The method also includes communicating between the wireless device and a paired vehicle computing system (VCS) to verify the presence of a known vehicle. Further, the method includes transmitting requested payment-related information, responsive to the verification of the presence of the known vehicle. | 2015-02-05 |
20150039515 | INTERACTIVE PRODUCT IMPROVEMENT THROUGH THE USE OF VARIANTS AND DATA GATHERING REPORTS IN A SYSTEM THAT CAN BE UPDATED ON THE FLY - Techniques for interactive product improvement through the use of variants and data gathering reports in a system that can be updated on the fly are disclosed. In some embodiments, interactive product improvement through the use of variants and data gathering reports in a system that can be updated on the fly includes processing a manifest to determine that a plug-in that includes a plurality of variants is available; randomly selecting a variant for the plug-in to automatically install on a device; and automatically installing the plug-in, in which the randomly selected variant is executed at run-time. | 2015-02-05 |
20150039516 | SYSTEM AND METHOD FOR DISTRIBUTING DIGITAL RIGHTS MANAGEMENT DIGITAL CONTENT IN A CONTROLLED NETWORK ENSURING DIGITAL RIGHTS - A system and method for managing digital rights. The method includes receiving a Universal Resource Identifier (URI). The URI is used to identify a location for a user selected digital media item. The digital media item is to be played in a local area network (LAN). The selected digital media item is retrieved from a content server over a network connection. If the selected digital media item is encrypted, a license to decrypt the selected media item is obtained. Access to the license is based on a plurality of access rules. The plurality of access rules are based on the terms of the license. The plurality of access rules may also include personal owner rules. If a request for the license adheres to the access rules, the license is received via a secure out of band transfer and the selected digital media item is decrypted for playback via one or more media rendering devices. | 2015-02-05 |
20150039517 | CLOUD ENTERTAINMENT PLATFORM - Embodiments are directed to purchasing content provided by a cloud-based entertainment platform and to accessing media content provided by a cloud-based entertainment platform. In one scenario, a computer system receives authentication credentials from a user. The computer system authenticates the user to the cloud-based entertainment platform using the received authentication credentials. The computer system then receives payment data from the authenticated user, where the payment data includes a tokenized QR code that contains an indication of the media items being purchased and embedded account information for both the provider of the selected media items and the user. The computer system also processes a payment transaction based on the indication of media items being purchased and the embedded account information in the tokenized QR code and, upon determining that the authenticated user has paid for a media item, transmits the purchased media item to the user. | 2015-02-05 |
20150039518 | PERSONALIZED MARKETING SYSTEM AND PERSONALIZED MARKETING METHOD - The present invention provides a personalized marketing system and a personalized marketing method. The personalized marketing system comprises: a display device, a detecting device, a database device, and a control device. The display device is utilized for displaying at least an information. The detecting device is utilized for detecting at least a viewer via at least a wireless signal that can identify the viewer. The database device is utilized for recording data of connections between the information and the detected viewer. The control device is utilized for controlling the display device to display a specific information according to the data recorded in the database device. | 2015-02-05 |
20150039519 | Tokenization in Mobile Environments - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 2015-02-05 |
20150039520 | PERSONAL SECURE INFORMATION DEVICE (PSID) - A secure data transmission device: employs a proprietary arrangement of individualized encodable micro-machined electromagnets embedded in a compact, plastic (or apt substrate) which insulates each electromagnet from one another. The electromagnets mimic the magnetic strip on a credit card, but have the capability to temporarily capture data, and then transmit said data to be read by a magstripe terminal. The electromagnetic device can receive, and momentarily capture a variety of data, depending on which digital data is chosen by user. It then converts that data it to an analog signal, and then by using such components as microphone amplifier, a digital-to-analog converter, and microprocessor in the mobile device, transmits that data to the secure information device, which can write that data to a magnetic card terminal. The secure transmission device can be rewritten over and over again each time the user has a separate transaction, using different transaction data. | 2015-02-05 |
20150039521 | RECIPIENT BEHAVIOR TRACKING FOR CUSTOMER SERVICE RESPONSES - Embodiments of the invention provide systems and methods for managing interactions with a customer in a customer relationship management system. Generally speaking, embodiments of the present invention provide the ability to track customer activity resulting from service related emails or other messages by capturing interaction with the message itself (views/clicks) and the subsequent interaction the user has with the website landing pages. This captured information can then be displayed in a format that allows the agent who sent the response to see the chronological order of various responses sent and the associated activity with each response all of which can be tracked by the individual email addresses associated with the contact. | 2015-02-05 |
20150039522 | SYSTEM AND METHOD OF PROVIDING A VEHICLE REPAIR STATUS - An instrument for compiling and monitoring a status of a vehicle repair process, wherein service repair personnel are able to modify the status of the vehicle repair process and a user is allowed to conveniently view the status of the vehicle repair process. | 2015-02-05 |
20150039523 | METHODS AND DEVICES FOR URBAN PLANNING - Methods and devices for quantitatively mapping urban time uses to land uses in an urban unit and methods and devices for classifying urban units are disclosed. In some aspects, for each activity an associated time to be spent for the activity in one urban unit is used to provide an activity allocation parameter to be used when planning a second urban unit. In other aspects, performance indicators compared to their respective activity allocation parameters are used to classify the urban units. In one example, urban units are classified as self-sufficient or non-self-sufficient based on activity allocation parameters. | 2015-02-05 |
20150039524 | Detecting And Responding To Sentiment-Based Communications About A Business On A Social Networking System - A social networking system identifies communications about an object associated with a brand owner. For each communication, the social networking system identifies users who were generated the communication, users who were exposed to the communication, and users who were not exposed to the communication. The social networking system determines a sentiment associated with a communication and may send a report based on the sentiment of the communications towards the brand owner. A request from a brand owner to present one or more response communications to users based on the users' relationship to a communication from a user about the object and the sentiment determined from the communication may be received by the social networking system. Based on the request, the social networking system presents a response communication to one or more users. | 2015-02-05 |
20150039525 | SELECTIVE COMMUNICATION OF JOB OPENINGS TO POTENTIAL REFERRERS - Embodiments are directed to constructing an employee referral network, selectively communicating job opportunities to potential job referrers and to facilitating incognito job referrals. In one scenario, a computer system imports professional contacts for an employee from at least one source of professional contacts. The computer system categorizes the imported professional contacts according to criteria provided by the employee's employer, then further constructs an employee referral network that includes the employee's professional contacts that have met the criteria provided by the employee's employer and selectively communicates the job opportunities through the constructed employee referral network to those professional contacts who meet the employer's criteria. | 2015-02-05 |
20150039526 | ONLINE MATCH-MAKING SYSTEM OR GAME, SUCH AS A WEB SITE, SMARTPHONE OR TABLET APPLICATION AND SUPPORTING NETWORK, AND CODE CONFIGURED TO PROVIDE SAME - An online match-making system, such as a smartphone or tablet application and supporting network, which is configured to promote contact between users when a mutual interest has been determined. Profiles are received from (and maintained in) a database. A user can view the different profiles, such as by viewing at least one picture associated with each profile. As the user views the different profiles or pictures, the user can indicate to the system whether or not he or she is interested in that person associated with the profile being viewed. The system keeps track of instances where a user indicates an interest in a given profile (i.e., interest in another person). When that other person logs onto the system, that other person is informed whether other users have indicated an interest, and is presented with profiles, wherein a proportion of the first plurality of profiles which are presented correspond to users who have previously indicated an interest in that person. Upon it being determined that two users have an interest in each other, the system promotes contact between the users such as by sending a message to one or preferably both of the users. | 2015-02-05 |
20150039527 | Method for Confirming the Identity of an Individual While Shielding that Individual's Personal Data - A method for confirming the identity of an individual while shielding that individual's personal data. At least one biometric such as the image of the iris of an individual is captured and stored in a database. A unique identification code is assigned to the biometric without reference to the first individual's personal information. A subsequent biometric data collect is compared with the contents of the database. If a match between the subsequent biometric is found with the original biometric, the system transmits the identification code corresponding to the matched biometric. In a second aspect of the invention, in order to protect the privacy of individuals, the unique identification code is encrypted such that only the individual to whom the biometric belongs holds the de-encryption key. In a third aspect of the invention also intended to protect the privacy of individuals, a non-unique group identification code is assigned to the biometric. Preferably, in the case where the biometric used is the iris, the system replaces enrollment and live iris images with iris templates and bases comparisons on these templates, rather than storing/comparing actual images. The system is adapted to assist in locating missing persons and in verifying transactions. If an individual is missing and a live iris template is matched to that person's stored template, the system automatically contacts another individual. | 2015-02-05 |
20150039528 | METHOD AND SYSTEM FOR SPECIALIZED HANDLING OF PACKAGES - Methods and systems for providing information relating to the specialized handling of a package, and articles contained within the package. Data relating to a package containing an article that requires specialized handling is associated with a unique identifier and stored in a database. The unique identifier is also included in a machine readable code affixed to the package. A recipient of the package scans the machine readable code using an application downloaded into a mobile device, which extracts the unique identifier from the machine readable code and transmits a request to the database. The database may then identify data stored in the database that relates to the article based on the unique identifier, and transmit the data to the mobile device for display to the recipient. The data may include instructions on how to unpack the package, and how to store or use articles contained within the package. | 2015-02-05 |
20150039529 | Network of Participants In a Shipment Cold-Chain - The invention relates to a network of participants connected through a website and thereby forming a virtual cold chain, and wherein the participants can make proposals and/or bids to shipment owners, shippers, receivers, and customers, to provide services or products to keep the shipment at desired conditions (especially, temperature conditions) during a period of the remaining shipment. The shipment can be monitored en route by agents acting for the website or by either the same participants making proposals, or other participants. | 2015-02-05 |
20150039530 | PCA-BASED PORTFOLIO MARGINING - A computer implemented method determines a margin requirement for a financial product portfolio. Market conditions for the financial product portfolio are characterized by a zero curve. The method includes producing a plurality of scenario curves, each scenario curve reflecting a principal component analysis (PCA) model of the zero curve with a respective PCA factor of a plurality of PCA factors of the PCA model offset from a corresponding base value for the zero curve, calculating a respective projected value of the financial product portfolio for each scenario curve of the plurality of scenario curves, calculating a loss risk amount for each PCA factor based on the respective projected value and a current value of the financial product portfolio, and determining the margin requirement based on a sum of the loss risk amounts for the plurality of PCA factors. | 2015-02-05 |
20150039531 | COMPUTER-BASED INVESTMENT AND FUND ANALYZER - A system and a method are disclosed including Graphical User Interface (GUI) components, and one or more software data gathering and analysis components that are used to automatically obtain financial data for company stock selected by a user, compute other intermediate financial parameters and scores for the selected stock, and generate an overall investment score for the particular company stock for support of investment decisions. In various embodiments, the Investment Recommendation and Analysis System (IRAS) generates the overall investment score in multiple intermediate stages based on fundamental financial data and corresponding intermediate scores. The stages may include Fundamentals, Technical, Analyst, and Management stages, each including one or more financial parameters obtained from external sources or calculated. Market conditions are also considered based on trading environment parameters to determine the investment recommendations. In a recommendation stage, detailed investment recommendations are provided based on the other stages. | 2015-02-05 |
20150039532 | VOLATILITY INDEX AND DERIVATIVE CONTRACTS BASED THEREON - An improved volatility index and related futures contracts are provided. An index in accordance with the principals of the present invention estimates expected volatility from the prices of stock index options in a wide range of strike prices, not just at-the-money strikes. Also, an index in accordance with the principals of the present invention is not calculated from the Black/Scholes or any other option pricing model: the index of the present invention uses a newly developed formula to derive expected volatility by averaging the weighted prices of out-of-the money put and call options. In accordance with another aspect of the present invention, derivative contracts such as futures and options based on the volatility index of the present invention are provided. | 2015-02-05 |
20150039533 | SYSTEM AND METHODS TO PROVIDE FOR AND COMMUNICATE ABOUT SAFER AND BETTER RETURNING ASSET-LIABILITY INVESTMENT PROGRAMS - A data processing system compiles information about account holders, holdings, and other investment-related information. A hypothetical portfolio is generated to provide for a specified payout stream over a defined period of time, statistically evaluated, and compared by means of scaling to determine the best fit scale of the portfolio to the defined criteria. The composition of this scaled portfolio in comparison with the composition of the available assets defines a series of trades. The composition of the level of payout that can be expected to be supported by the new composition of available assets defines a series of insurance trades. Insurance providers can impose limitations and requirements on the assets managed by limiting or stipulating certain settings that a given account can be allowed to have. | 2015-02-05 |
20150039534 | INVENTION PROTECTION AND DEVELOPMENT SYSTEMS - An embodiment of the invention relates to a crowd-sourcing invention development system (CIDS) and methods associated with the system to aid inventors, at no cost or at minimal cost, to develop their ideas and to file patent applications based on their ideas. According to embodiments of the invention, CIDS facilitates investment in an inventor's invention by exposing potential investors to inventions at preliminary stages of invention development, allowing investors to fund activities such as searching and patent application drafting and filing. Investors may continue to invest after patent application drafting. | 2015-02-05 |
20150039535 | GRASPING A BIAS OF INFORMATION FROM AN INTERNET MEDIUM FOR SUPPORTING A SURVEY - In one embodiment of the present invention, an apparatus may be used for supporting a survey based on information in an Internet medium. The apparatus comprises: a first acquisition hardware unit, wherein the first acquisition hardware unit acquires first evaluation information representing a degree of evaluation acquired by a survey of a real society pertaining to a prescribed target; a second acquisition hardware unit, wherein the second acquisition hardware unit acquires second evaluation information representing a degree of evaluation in the Internet medium pertaining to the prescribed target; and an estimator hardware unit, wherein the estimator hardware unit estimates a bias in information in the Internet medium based on a deviation of the second evaluation information from the first evaluation information. | 2015-02-05 |
20150039536 | Clarification of Submitted Questions in a Question and Answer System - Mechanisms for clarifying an input question are provided. A question is received for generation of an answer. A set of candidate answers is generated based on an analysis of a corpus of information. Each candidate answer has an evidence passage supporting the candidate answer. Based on the set of candidate answers, a determination is made as to whether clarification of the question is required. In response to a determination that clarification of the question is required, a request is sent for user input to clarify the question. User input is received from the computing device in response to the request and at least one candidate answer in the set of candidate answers is selected as an answer for the question based on the user input. | 2015-02-05 |
20150039537 | AUTOMATIC RECOGNITION AND INSIGHTS OF DATA - Automatic recognition and presentation of insights of data is provided through analysis of overall data to infer locations of a user's data. Statistical, heuristic, and comparable analysis on the user's data sets is used to determine insights such as trends, correlations, outliers, comparisons, and patterns. The insights are then presented to the user through automatically optimized visualizations (highlighting determined insights), emphasis on presented raw data, data formatting suggestions, and similar ones with the capability to explore further. | 2015-02-05 |
20150039538 | METHOD FOR PROCESSING A LARGE-SCALE DATA SET, AND ASSOCIATED APPARATUS - A method for processing at least part of a large-scale dataset, the method comprising: receiving a dataset including a plurality of data points; generating a hash value for at least some of the data points; sorting the generated hash values into a plurality of buckets of identical or substantially identical hash values; generating a similarity matrix for each of the buckets; and applying a machine learning algorithm to the similarity matrices. | 2015-02-05 |
20150039539 | Method and Apparatus For Propagating User Preference Information in a Communications Network - A method for propagating user preference information in a communications network, in which the user preference information may be available for a subset of users within the network. The method comprises generating individual user attribute vectors, based on user historical data and estimating user preference information. The method further comprises defining a community structure for the network and generating a stacked representation for users, the representation comprising the user attribute vector augmented with an aggregated vector of estimated user preferences of members of the user's community. The method further comprises learning a function relating the stacked representation to user preference, using the subset of users, and applying the learned function to users outside the subset. | 2015-02-05 |
20150039540 | METHOD AND APPARATUS FOR EVALUATING PREDICTIVE MODEL - In an approach for evaluating a predictive model, a computer identifies features of training samples in a set of training samples and selects at least one evaluation metric from a set of evaluation metrics as one or more available metrics based on the identified features. The computer applies a predictive model created based on the set of training samples to a set of test samples so as to calculate values of the one or more available metrics and evaluates the predictive model by using the one or more available metrics and the values of the available metrics. With the technical solutions described with respect to the embodiments of the present invention, one or more evaluation metrics that are applicable to specific training sample features may be determined from several evaluation metrics, so that users can precisely evaluate predictive models by using the determined evaluation metrics. | 2015-02-05 |
20150039541 | Feature Extraction and Machine Learning for Evaluation of Audio-Type, Media-Rich Coursework - Conventional techniques for automatically evaluating and grading assignments are generally ill-suited to evaluation of coursework submitted in media-rich form. For courses whose subject includes programming, signal processing or other functionally expressed designs that operate on, or are used to produce media content, conventional techniques are also ill-suited. It has been discovered that media-rich, indeed even expressive, content can be accommodated as, or as derivatives of, coursework submissions using feature extraction and machine learning techniques. Accordingly, in on-line course offerings, even large numbers of students and student submissions may be accommodated in a scalable and uniform grading or scoring scheme. Instructors or curriculum designers may adaptively refine assignments or testing based on classifier feedback. Using developed techniques, it is possible to administer courses and automatically grade submitted work that takes the form of media encodings of artistic expression, computer programming and even signal processing to be applied to media content. | 2015-02-05 |
20150039542 | IMAGE RANKING BASED ON ATTRIBUTE CORRELATION - Images are retrieved and ranked according to relevance to attributes of a multi-attribute query through training image attribute detectors for different attributes annotated in a training dataset. Pair-wise correlations are learned between pairs of the annotated attributes from the training dataset of images. Image datasets may are searched via the trained attribute detectors for images comprising attributes in a multi-attribute query. The retrieved images are ranked as a function of comprising attributes that are not within the query subset plurality of attributes but are paired to one of the query subset plurality of attributes by the pair-wise correlations, wherein the ranking is an order of likelihood that the different ones of the attributes will appear in an image with the paired one of the query subset plurality of attributes. | 2015-02-05 |
20150039543 | Feature Based Three Stage Neural Network Intrusion Detection - A system for detecting a network intrusion includes a first neural network for determining a first plurality of weight values corresponding to a plurality of vectors of an input data, a second neural network for updating the first plurality of weight values received from the first neural network to a second plurality of weight values based on the plurality of vectors of the input data, a third neural network for updating the second plurality of weight values received from the second neural network to a third plurality of weight values based on the plurality of vectors of the input data, and a classification module for classifying the plurality of vectors under at least one of a plurality of intrusions based on the third plurality of weight values received from the third neural network. | 2015-02-05 |
20150039544 | RESOURCE PRODUCTION FORECASTING - A method can include providing a trained neural network; providing a set of production values where the set includes, for example, a cumulative production value for an interval, an average production value for the interval, a first production value for the interval and a last production value for the interval; and predicting at least one production value for a subsequent interval based at least in part on the trained neural network and the provided set of production values. Various other apparatuses, systems, methods, etc., are also disclosed. | 2015-02-05 |
20150039545 | SYSTEMS, METHODS AND DEVICES FOR VECTOR CONTROL OF PERMANENT MAGNET SYNCHRONOUS MACHINES USING ARTIFICIAL NEURAL NETWORKS - An example method for controlling an AC electrical machine can include providing a PWM converter operably connected between an electrical power source and the AC electrical machine and providing a neural network vector control system operably connected to the PWM converter. The control system can include a current-loop neural network configured to receive a plurality of inputs. The current-loop neural network can be configured to optimize the compensating dq-control voltage. The inputs can be d- and q-axis currents, d- and q-axis error signals, predicted d- and q-axis current signals, and a feedback compensating dq-control voltage. The d- and q-axis error signals can be a difference between the d- and q-axis currents and reference d- and q-axis currents, respectively. The method can further include outputting a compensating dq-control voltage from the current-loop neural network and controlling the PWM converter using the compensating dq-control voltage. | 2015-02-05 |
20150039546 | DUAL DETERMINISTIC AND STOCHASTIC NEUROSYNAPTIC CORE CIRCUIT - One embodiment provides a system comprising a memory device for maintaining deterministic neural data relating to a digital neuron and a logic circuit for deterministic neural computation and stochastic neural computation. Deterministic neural computation comprises processing a neuronal state of the neuron based on the deterministic neural data maintained. Stochastic neural computation comprises generating stochastic neural data relating to the neuron and processing the neuronal state of the neuron based on the stochastic neural data generated. | 2015-02-05 |
20150039547 | NEUROMOPHIC SYSTEM AND CONFIGURATION METHOD THEREOF - A method of generating neuron spiking pulses in a neuromorphic system is provided which includes floating one or more selected bit lines connected to target cells, having a first state, from among a plurality of memory cells arranged at intersections of a plurality of word lines and a plurality of bit lines; and stepwisely increasing voltages applied to unselected word lines connected to unselected cells, having a second state, from among memory cells connected to the one or more selected bit lines other than the target cells having the first state. | 2015-02-05 |
20150039548 | COLLECTIVE EVALUATION OF ALTERNATIVES IN A COLLABORATIVE DECISION MAKING ENVIRONMENT - A system, method and computer program product for facilitating collaborative decision making may be provided. The system receives data representing individual postings of users associated with a deliberation to make a decision. The system further receives ratings associated with the individual postings in order to make the decision. The system represents the received data in a hierarchical data structure. The system aggregates, through the hierarchical data structure, the ratings associated with the individual postings to obtain strength values. The system facilitates the making of the decision based on the aggregated strength values. | 2015-02-05 |
20150039549 | SYSTEM AND METHOD FOR COMPUTERIZED RECOMMENDATION DELIVERY, TRACKING, AND PRIORITIZATION - A system and method for recommendation delivery and tracking is provided. Users may use a smartphone enabled recommendation system to select products or media such as movies to recommend to other users. In one embodiment, the user uses the recommendation system to select a movie and select a recipient and the recommended movie is transmitted to the recipient. At the recipient, received recommendations are prioritized based on factors including the identity of the sender including the sender's overall recommendation approval rating and/or the specific-recipient approval rating. The recipient then evaluates and rates the recommendation and the rating is used in future recommendation prioritization. | 2015-02-05 |
20150039550 | CONSTRUCTION ABORTION OF DFA BASED ON EXPRESSION - DFA construction may be aborted if the DFA will become too big for the computing device to handle or based on user preferences. A DFA may be constructed from an NFA, which is constructed from an expression. The expression may have a total number of operands and operators r. The determination to abort DFA construction may be based on the operands. If the number of DFA nodes constructed is more than a lower threshold and the number of DFA nodes constructed is greater than a function, f(r), the DFA construction may be aborted. If the number of DFA nodes is greater than a higher threshold, the DFA construction may be aborted. The lower threshold may be determined based on computing device capabilities and user preference. The higher threshold may be based on computing device capabilities. | 2015-02-05 |
20150039551 | METHOD AND COMPUTER PROGRAM FOR THE MAINTENANCE AID OF AIRCRAFT EQUIPMENT - According to a first aspect, the subject matter disclosed herein relates to a decision aid method for maintenance operations of aircraft equipment, the aircraft including a maintenance system arranged to make a record of equipment failure messages and of equipment failure warning messages emitted during a flight, the method comprising extracting at least one combination of failure messages corresponding to failure messages recorded by the maintenance system during a flight and a set of previous flights; determining, as a function of the at least one extracted combination, a probability of occurrence of at least one warning message possibly accompanied by one or more failure messages. | 2015-02-05 |
20150039552 | METHOD AND APPARATUS FOR OPTIMIZING PROFIT IN PREDICTIVE SYSTEMS - Techniques are disclosed for methods and apparatuses for forming for determining when to perform maintenance events. The technique comprises determining a first cost of false positives and a second cost of missed true positives. A Receive Operating Characteristic (ROC) of a prediction model is determined for the occurrence of an event. A survival function and prediction horizon is generated from the prediction model for the occurrence of an event. The operational area on the ROC is determined based on the first costs and second costs. A threshold is determined from the ROC and is applied to the survival function and prediction horizon. A maintenance event is triggered based on the threshold. | 2015-02-05 |
20150039553 | CONTROL METHOD AND CONTROL SYSTEM - A control method is disclosed for determining a quality indicator of medical technology recording results data from a tomography scan of an examination structure, which scan is supported by a contrast agent, by way of a tomography system. According to an embodiment of the invention, at least one control parameter value is automatically derived from the recording results data in respect of a contrast agent image region during and/or directly after the tomography scan, which value represents a quality of the recording results data in the contrast agent image region. A control system for such a determination is also disclosed. | 2015-02-05 |
20150039554 | TIME-SENSITIVE CUBE - A time-sensitive cube data system is disclosed in which time-sensitive and/or time-series data objects are output in response to a user's operations on a time-sensitive OLAP cube. The time-sensitive and/or time-series data objects output by the time-sensitive cube data system may be displayed to the user in any way that may be advantageous to the user's understanding. The time-series objects output by the time-sensitive cube data system are more helpful than a single snapshot, as a user is able to see data trends over time. | 2015-02-05 |
20150039555 | HEURISTICALLY MODIFYING DBMS ENVIRONMENTS USING PERFORMANCE ANALYTICS - Providing diagnostics for a database system including at least one database, with the database system. The diagnostics include the following steps (not necessarily in the following order): (i) determining a contribution to system workload for each contributor of a plurality of contributors; and (ii) selecting a remedial action based, at least in part, upon the contributions to system workload of the contributors. The plurality of contributors are selected as one of the following: the plurality of data-base-related operations, or the plurality of database-related transactions. | 2015-02-05 |
20150039556 | SCALABILITY IMPROVEMENT IN A SYSTEM WHICH INCREMENTALLY UPDATES CLIENTS WITH EVENTS THAT OCCURRED IN A CLOUD-BASED COLLABORATION PLATFORM - Techniques are disclosed for improving scalability in a system which incrementally updates remote clients with events that occurred in a cloud-enabled platform. In one embodiment, a method comprises, in response to an action from a user in the cloud-enabled platform, determining a list of events to update one or more collaborators of the user about the action. The method further comprises separating the list of events into a plurality of sub-lists of events such that each sub-list of events can be stored in a database within a designated amount of time, and further comprises storing the plurality of sub-lists of events into the database to be read by the one or more collaborators. Among other advantages, embodiments disclosed herein provide enhancement in scalability, robustness and availability for cloud-based collaboration platforms with large numbers of collaborators by incorporating mechanisms to divide-and-conquer the workload of event updates in such platforms. | 2015-02-05 |
20150039557 | STATE SCOPE DATA FILE SHARING - A method, computer system, and/or computer program product shares state scope data among client devices in a cloud-based file synchronization service, where the client devices are intermittently connected to the cloud-based file synchronization service. In response to a first client device requesting a current version of shared state scope data from a second client device, the cloud-based file synchronization service transmits a request to the second client device for the updated shared state scope data. The updated shared state scope data is stored in the cloud-based file synchronization service, and then transmitted to the first client device. | 2015-02-05 |
20150039558 | DATABASE MANAGEMENT METHOD, DATABASE SYSTEM AND MEDIUM - From a lower-level master node to a higher-level master node, a shadow copy expanded in its own memory, a heap tuple map, and a shadow index are sent as a write set, and the higher-level master node, upon reception of the write set, verifies whether an update has already been executed and sends a record of this update as a transaction log to the lower-level master node, enabling efficient database updating without a discrepancy, from the lower-level master node to the higher-level master node, as well as from the higher-level master node to the subordinate lower-level master node. | 2015-02-05 |
20150039559 | COMPRESSING A MULTI-VERSION DATABASE - Managing a multi-version database is provided. A logical record identifier to physical record row identifier indirection mapping table on a solid-state storage device is extended to include a plurality of delta blocks. A delta block within the plurality of delta blocks is maintained for each primary key in a plurality of primary keys associated with a data table on a magnetic hard disk storage device. | 2015-02-05 |
20150039560 | METHOD AND SYSTEM FOR PUSHING DATA TO SUBSCRIBERS IN AN ON-DEMAND SERVICE - In accordance with embodiments, there are provided mechanisms and methods for pushing data, which maybe associated with documents that are being tracked, in an on-demand service. These mechanisms and methods for pushing data in an on-demand service can enable subscriptions to elements associated with the documents being shared. As a result of the subscription the user may be notified that a document associated with the subscription has been changed (e.g., altered). In an embodiment, the subscription may be forced on a user. | 2015-02-05 |
20150039561 | MERGING DATA VOLUMES AND DERIVATIVE VERSIONS OF THE DATA VOLUMES - Disclosed are systems, methods, and software for performing version control. In a particular embodiment, a non-transitory computer readable medium is provided having stored therein program instructions that, when executed by a computer system, direct the computer system to perform a method of version control. The method includes executing a plurality of virtual machines from a plurality of derivative versions of an ancestor data volume, wherein the ancestor data volume and the plurality of derivative versions each comprise a plurality of files. The method further includes tracking modifications to the plurality of files in each of the plurality of derivative versions and merging the plurality of derivative versions with the ancestor data volume based on the modifications. | 2015-02-05 |
20150039562 | EFFICIENT BACKUP OF DATA - A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes taking a snapshot of a virtual machine, parsing the virtual machine to determine a header section and a file system, indexing the virtual machine based on the parsing, storing the index in a storage device, and storing the snapshot in a deduplicated data storage device. | 2015-02-05 |
20150039563 | UNOBTRUSIVE COPIES OF ACTIVELY USED COMPRESSED INDICES - Methods, devices and systems to make compressed backup copies of in-use compressed database indices are described. In general, an “oldest” time at which index pages in working memory had been updated is identified. Compressed index pages may be directly copied without the need to bring them into working memory or uncompressing them. The identified “oldest” time is then associated with the compressed backup copy. In some embodiments, an entire compressed backup copy may be associated with a single point in time (e.g., the identified “oldest” time). In other embodiments, a compressed backup copy may be associated with multiple points in time (e.g., one time for each portion of the compressed index that is being backed-up). Compressed indices copied in accordance with the invention may be used during restore operations to reconstruct database indices using the identified “oldest” time and database log files. | 2015-02-05 |
20150039564 | Reusing Snapshots in a Network Data Management Protocol Backup Operation - Mechanisms, in a data processing system, are provided for performing a data management operation. These mechanisms identify one or more defined groups of data elements that are a target of the data management operation. One or more previously generated snapshot files associated with the one or more defined groups are identified and a determination is made as to whether at least one previously generated snapshot file of the one or more previously generated snapshot files associated with the one or more defined groups is able to be reused when performing the data management operation. The data management operation is performed based on the determination of whether at least one previously generated snapshot file of the one or more previously generated snapshot files associated with the one or more defined groups is able to be reused when performing the data management operation. | 2015-02-05 |
20150039565 | UNIFIED CONTEXT-AWARE CONTENT ARCHIVE SYSTEM - A unified context-aware content archive system allows enterprises to manage, enforce, monitor, moderate, and review business records associated with a variety of communication modalities. The system may store an information infoset derived or inferred from one or more documents representing communications according to the variety of communication modalities as interaction transcripts. An interaction transcript represents interactions between participants through the documents rather than the documents themselves allowing for derivation or inference of communication events, chronologies, and mappings to be stored in a common data structure. In one aspect, events correlation is provided between participants of communications that can be established by general time series analysis for the purposes of extracting meaningful statistics and interaction contexts and other characteristics of data. In another aspect, chronological mappings are provided of conversations between an established start and end time frame. | 2015-02-05 |
20150039566 | UNDO SYSTEM - Systems and methods for undo mechanism are provided. Computer systems can have many different software elements, including application elements and file management elements. System elements can be used for user input, providing output, and manipulating data or files. In the course of using a computer system, the user may wish to return to a previous system state by undoing one or more events. In one aspect, an undo operation can be performed across multiple elements in the system (e.g., cross-application undo functionality). In another aspect, past information displayed on a display can be “recorded” so that it can later be rewound as part of a media player metaphor, and events associated with the rewound/displayed information can be undone. The media player and rewind metaphors assist users in recalling past events and/or finding actions to undo. | 2015-02-05 |
20150039567 | PROTECTING STORAGE DATA DURING SYSTEM MIGRATION - Provided are techniques for determining whether a character code point value of a first plurality of character code point values corresponds to a second character code point value from a second plurality of character code point values, first value associated with a first encoding version and the second value associated with a second encoding. In response to the first value does not corresponding to any of the second character code point values, a determination is made as to whether the value corresponds to a third character code point value of a third plurality of code point values stored in a character value record table (CVRT). In response the value corresponding to the third value, an entry in the CVRT that associates the character with the third value is made; and the character is stored in conjunction with an application associated with the second encoding using the third value. | 2015-02-05 |
20150039568 | Low-Overhead Enhancement of Reliability of Journaled File System Using Solid State Storage and De-Duplication - A mechanism is provided in a data processing system for reliable asynchronous solid-state device based de-duplication. Responsive to receiving a write request to write data to the file system, the mechanism sends the write request to the file system, and in parallel, computes a hash key for the write data. The mechanism looks up the hash key in a de-duplication table. The de-duplication table is stored in a memory or a solid-state storage device. Responsive to the hash key not existing in the de-duplication table, the mechanism writes the write data to a storage device, writes a journal transaction comprising the hash key, and updates the de-duplication table to reference the write data in the storage device. | 2015-02-05 |
20150039569 | PROTECTING STORAGE DATA DURING SYSTEM MIGRATION - Provided are techniques for determining whether a character code point value of a first plurality of character code point values corresponds to a second character code point value from a second plurality of character code point values, first value associated with a first encoding version and the second value associated with a second encoding. In response to the first value does not corresponding to any of the second character code point values, a determination is made as to whether the value corresponds to a third character code point value of a third plurality of code point values stored in a character value record table (CVRT). In response the value corresponding to the third value, an entry in the CVRT that associates the character with the third value is made; and the character is stored in conjunction with an application associated with the second encoding using the third value. | 2015-02-05 |
20150039570 | MANAGING REDUNDANT IMMUTABLE FILES USING DEDUPLICATION IN STORAGE CLOUDS - A method includes receiving a request to save a first file as immutable. The method also includes searching for a second file that is saved and is redundant to the first file. The method further includes determining the second file is one of mutable and immutable. When the second file is mutable, the method includes saving the first file as a master copy, and replacing the second file with a soft link pointing to the master copy. When the second file is immutable, the method includes determining which of the first and second files has a later expiration date and an earlier expiration date, saving the one of the first and second files with the later expiration date as a master copy, and replacing the one of the first and second files with the earlier expiration date with a soft link pointing to the master copy. | 2015-02-05 |
20150039571 | ACCELERATED DEDUPLICATION - Mechanisms are provided for accelerated data deduplication. A data stream is received an input interface and maintained in memory. Chunk boundaries are detected and chunk fingerprints are calculated using a deduplication accelerator while a processor maintains a state machine. A deduplication dictionary is accessed using a chunk fingerprint to determine if the associated data chunk has previously been written to persistent memory. If the data chunk has previously been written, reference counts may be updated but the data chunk need not be stored again. Otherwise, datastore suitcases, filemaps, and the deduplication dictionary may be updated to reflect storage of the data chunk. Direct memory access (DMA) addresses are provided to directly transfer a chunk to an output interface as needed. | 2015-02-05 |
20150039572 | SYSTEM AND METHOD FOR REMOVING OVERLAPPING RANGES FROM A FLAT SORTED DATA STRUCTURE - A system and method efficiently removes ranges of entries from a flat sorted data structure, such as a fingerprint database, of a storage system. The ranges of entries represent fingerprints that have become stale, i.e., are not representative of current states of corresponding blocks in the file system, due to various file system operations such as, e.g., deletion of a data block without overwriting its contents. A deduplication module of a file system executing on the storage system performs a fingerprint verification procedure to remove the stale fingerprints from the fingerprint database. As part of the fingerprint verification procedure, the deduplication module performs an attributes intersect range calculation (AIRC) procedure on the stale fingerprint data structure to compute a set of non-overlapping and latest consistency point (CP) ranges. During the AIRC procedure, an inode associated with a data container, e.g., a file, is selected and the FBN tuple of each deleted data block in the file is sorted in a predefined, e.g., increasing, FBN order. The AIRC procedure then identifies the most recent fingerprint associated with a deleted data block. The output from the AIRC procedure, i.e., the set of non-overlapping and latest CP ranges, is then used to remove stale fingerprints associated with that deleted block (as well as each other deleted data block) from the fingerprint database. Notably, only a single pass through the fingerprint database is required to identify the set of non-overlapping and latest CP ranges, thereby improving efficiency of the storage system. | 2015-02-05 |
20150039573 | COMPRESSING A MULTI-VERSION DATABASE - Managing a multi-version database is provided. A logical record identifier to physical record row identifier indirection mapping table on a solid-state storage device is extended to include a plurality of delta blocks. A delta block within the plurality of delta blocks is maintained for each primary key in a plurality of primary keys associated with a data table on a magnetic hard disk storage device. | 2015-02-05 |
20150039574 | MANAGEMENT OF DATA SEGMENTS FOR ANALYTICS QUERIES - The disclosed embodiments provide a method and system for processing data. During operation, the system obtains a set of records, wherein each of the records comprises one or more metrics and at least one dimension associated with the one or more metrics. Next, the system creates a data segment comprising at least one of a forward index and an inverted index for a column in the records. The system then stores the data segment in network-accessible storage and assigns the data segment to a partition. Finally, the system enables querying of the data segment through a query node associated with the partition. | 2015-02-05 |
20150039575 | MANAGING MULTIPLE LOCKS FOR DATA SET MEMBERS IN A DATA SET INDEX - Provided are a computer program product, system, and method for managing multiple locks for data set members in a data set index. The data set index has leaf nodes and internal nodes. In response to determining that a current lock is set at a locked node that prevents a grant to a requested lock, a determination is made as to whether there are different first and second descendant nodes from the locked node at a same level of the tree data structure linked to the requested data set member and the locked data set member, respectively. If so, the requested lock for the requested data set member is set at the first descendant node, the current lock is moved to the second descendant node for the locked data set member and the requested lock is granted. | 2015-02-05 |
20150039576 | Managing Transactional Data for High Use Databases - According to one embodiment of the present invention, a system compares database transactions to corresponding performance information to identify conforming database transactions with an acceptable deviation from the performance information and outlier database transactions beyond the acceptable deviation from the performance information. The system aggregates information from a threshold quantity of conforming database transactions into an aggregated record, wherein the threshold quantity is dynamically adjusted, and generates a record for each outlier database transaction, wherein conditions for identifying the outlier database transactions are dynamically adjusted. Embodiments of the present invention further include a method and computer program product for managing database transactions in substantially the same manners described above. | 2015-02-05 |
20150039577 | SYSTEMS AND METHODS FOR ATOMIC STORAGE OPERATIONS - An atomic storage module may be configured to implement atomic storage operation directed to a first set of identifiers in reference to a second, different set of identifiers. In response to completing the atomic storage operation, the atomic storage module may move the corresponding data to the first, target set of identifiers. The move operation may comprise modifying a logical interface of the data. The move operation may further include storing persistent metadata configured to bind the data to the first set of identifiers. | 2015-02-05 |
20150039578 | MANAGING TRANSACTIONAL DATA FOR HIGH USE DATABASES - According to one embodiment of the present invention, a system compares database transactions to corresponding performance information to identify conforming database transactions with an acceptable deviation from the performance information and outlier database transactions beyond the acceptable deviation from the performance information. The system aggregates information from a threshold quantity of conforming database transactions into an aggregated record, wherein the threshold quantity is dynamically adjusted, and generates a record for each outlier database transaction, wherein conditions for identifying the outlier database transactions are dynamically adjusted. Embodiments of the present invention further include a method and computer program product for managing database transactions in substantially the same manners described above. | 2015-02-05 |
20150039579 | SEARCH QUERY OBFUSCATION VIA BROADENED SUBQUERIES AND RECOMBINING - System, method, and computer program product to perform an operation to obfuscate search queries via broadened subqueries and recombining, by referencing an ontology to identify a set of generalized terms corresponding to at least one term of a received query, generating a plurality of subqueries based on the received query and the set of generalized terms, executing each of the plurality of subqueries to retrieve a result set for each respective subquery, and filtering the result sets using the received query to produce a result set responsive to the received query. | 2015-02-05 |
20150039580 | APP ANNOTATION AND FACILITATON OF USER SEARCH TASK AND USER ACTION - One or more techniques and/or systems are provided for annotating apps and/or for facilitating performance of a user search task. That is, app metadata associated with an app, exposed through an app store, may be evaluated to determine various identifying information for the app (e.g., an app subcategory, an action that may be performed by the app, a user segment/demographic that may find the app interesting or relevant, etc.). The app may be annotated with one or more annotations based upon the identifying information. When a search user submits a search query, a search intent (e.g., reserve a table for 2 at The Restaurant) may be determined and used to identify an app that may satisfy the search intent based upon the app comprising one or more annotations matching the search intent. In this way, the search user may efficiently perform a user search task/action using an appropriate app. | 2015-02-05 |
20150039581 | Semantic Search System Interface and Method - A method for semantic searching includes receiving a user input including seed data and a semantic input at a search system. The method further includes automatically generating a filter set based on the user input, where the filter set including a plurality of documents that correspond to the seed data, and includes providing the filter set and the semantic input to a semantic search engine. The method also includes receiving a set of semantic search results from the semantic search engine based on the filter set and the semantic input. The set of semantic search results corresponds to a sub-set of the filter set that is semantically similar to the semantic input. | 2015-02-05 |
20150039582 | PROVIDING INFORMATION IN ASSOCIATION WITH A SEARCH FIELD - A system and machine-implemented method for providing information in association with a search field are provided. Input is received from a user via a search field of an application, the input including at least partial entry of a search term. First information and second information are obtained in response to receiving the user input. The first information corresponds to contextual data for at least one of the user or the at least partial entry of the search term, and the second information corresponds to one or more search term predictions for the at least partial entry of the search term. The first information and the second information are displayed within the application, in association with the search field. | 2015-02-05 |
20150039583 | METHOD AND SYSTEM FOR SEARCHING IMAGES - Embodiments of the present application relate to a method for searching images, a system for searching images, and a computer program product for searching images. A method for searching images is provided. The method includes receiving an input query image, extracting visual features from the inputted query image; determining a similarity of the visual features of the query image and visual features of images in an image database; determining category information, descriptive information, or a combination thereof associated with the query image based on category information, descriptive information, or a combination thereof of business objects corresponding to images having a similarity to the query image that complies with a precondition; conducting searches of the images based on the query image and the category information, the descriptive information, or a combination thereof associated with the query image; and returning search results. | 2015-02-05 |
20150039584 | REAL-TIME SHARED WEB BROWSING AMONG SOCIAL NETWORK CONTACTS - A determination is made that each of at least two social network contacts involved in a social messaging interaction initiate a separate web search associated with the social messaging interaction. A separate set of web search results returned to each of the at least two social network contacts is captured in association with each initiated separate web search. A combined live search results view that includes each captured separate set of web search results is provided to each of the at least two social network contacts. The combined live search results view provides navigation to web content returned to other social network contacts. | 2015-02-05 |
20150039585 | Global Dictionary for Database Management Systems - A global dictionary is described that corresponds to a database or table stored across multiple partitions. The global dictionary can be used to identify which partitions of the database contain records that are relevant to a user's query on the database. The global dictionary is made up of variable tables. Each variable table corresponds to a column of the database. A given variable table includes value tables where each value table corresponds to a defined value that has been assigned to a record in the database. A value table can include a list of partitions that contain a record having the related defined value. | 2015-02-05 |
20150039586 | Local Versus Remote Optimization in Encrypted Query Processing - Methods, systems, and computer-readable storage media for optimizing query processing in encrypted databases. In some implementations, actions include receiving a query that is to be used to query an encrypted database, generating a plurality of query plans based on the query, each query plan including a local query and one or more remote queries, the local query being executable at a client-side and the one or more remote queries being executable at a server-side, selecting an optimal query plan from the plurality of query plans, providing one or more remote queries of the optimal query plan to the server-side for execution, receiving one or more remote results, and processing a local query of the optimal query plan and the one or more remote results to provide a final query result. | 2015-02-05 |
20150039587 | GENERIC SQL ENHANCEMENT TO QUERY ANY SEMI-STRUCTURED DATA AND TECHNIQUES TO EFFICIENTLY SUPPORT SUCH ENHANCEMENTS - The approaches described herein provide an efficient way for a database server to support storage and retrieval for any of a growing number of semi-structured data formats. In one embodiment, a set of generic semi-structured data operators are provided that enable users to query, update, and validate data stored in any of a number of semi-structured data formats. In this context, a “generic” semi-structured data operator means a data operator that may be configured to operate on any number of different semi-structured data formats. For example, according to one embodiment, the same set of generic semi-structured data operators may be used to operate on data stored according to the XML, JSON, or any number of other semi-structured data formats. | 2015-02-05 |
20150039588 | SPLIT PROCESSING PATHS FOR A DATABASE CALCULATION ENGINE - A dynamic split node defined within a calculation model can receive data being operated on by a calculation plan generated based on the calculation model. A partition specification can be applied to one or more reference columns in a table containing at least some of the received data. The applying can cause the table to be split such that a plurality of records in the table are partitioned according to the partition specification. A separate processing path can be set for each partition, and execution of the calculation plan can continue using the separate processing paths, each of which can be assigned to a processing node of a plurality of available processing nodes. | 2015-02-05 |
20150039589 | SELECTING CONTENT BASED ON ENTITIES PRESENT IN SEARCH RESULTS - Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium for providing content to a user. A method includes: receiving a query; receiving query results based on the query; determining for each of a predetermined number of top results entities associated therewith; using the determined entities to either augment or filter the query producing an enhanced query; and using the enhanced query to identify one or more sponsored content items for presentation to a user along with the query results. | 2015-02-05 |
20150039590 | TERMINAL AND METHOD FOR CONTROLLING THE SAME - A terminal including a display unit configured to display a search screen for entering a search keyword; and a controller configured to retrieve information associated with the entered search keyword, display a preset number of graphic images representing search result information extracted from the retrieved information on the display unit, display the search result information-of a corresponding graphic image on the display unit in response to a first input, and change the corresponding graphic image to another graphic image representing other search result information extracted from the retrieved information in response to a second inp | 2015-02-05 |
20150039591 | METHOD AND APPARATUS FOR PROLIFERATING TESTING DATA - Embodiments of the present invention provide information processing systems and methods for proliferating testing data based on sample testing data. In one embodiment, a difference is determined by comparing a desired query result to a query result acquired by executing a query statement on sample testing data. Sample testing data can then be proliferated based, at least in part, on the difference and data generation constraint conditions. | 2015-02-05 |
20150039592 | Apparatus and Method for Automatically Creating a Multimedia Presentation from Evaluated Content - A method executed by a processor under the control of instructions includes ingesting content including textual content and numeric content. Concepts associated with the textual content are mapped to images. Visualizations corresponding to the numeric content are created. A presentation of the content that includes the images and visualizations is supplied. | 2015-02-05 |
20150039593 | PRE-DELIVERY OF CONTENT TO A USER DEVICE - Systems and methods for delivering content to user devices before the content is selected or requested (e.g., a pre-delivery of content) are described. In some embodiments, the system and methods receive, from a content server, information associated with content items available for retrieval from the content server and associated with one or more applications resident on a user device, select a subset of content items from the content items available for retrieval to deliver to the user device based on content usage information associated with the user device, and cause the user device to retrieve at least a portion of the selected subset of content items from the content server. | 2015-02-05 |
20150039594 | METHOD AND APPARATUS FOR PHOTOGRAPH FINDING - Digital image data including discrete photographic images of a variety of different subjects, times, and so forth, are collected and analyzed to identify specific features in the photographs. In an embodiment of the invention, distinctive markers are distributed to aid in the identification of particular subject matter. Facial recognition may also be employed. The digital image data is maintained in a database and quarried in response to search requests. The search requests include criteria specifying any feature category or other identifying information, such as date, time, and location that each photograph was taken, associated with each photograph. Candidate images are provided for review by requesters, who may select desired images for purchase or downloading. | 2015-02-05 |