06th week of 2014 patent applcation highlights part 68 |
Patent application number | Title | Published |
20140040109 | High Speed Processing of Financial Information Using FPGA Devices - A high speed apparatus and method for processing a plurality of financial market data messages are disclosed. With respect to an exemplary embodiment, a reconfigurable logic device is employed to generate a plurality of financial market data messages from a plurality of the data fields, each generated message having a specified message format. | 2014-02-06 |
20140040110 | System and Method for Using Order Modifiers in Relation to Trading Strategies - A quantity modifier and a price modifier are provided for a spread trading strategy having a desired spread price and a desired spread quantity. According to an example embodiment, a quantity modifier divides the desired spread quantity into a plurality of disclosed spread quantities. Once the disclosed quantities are determined, a plurality of disclosed spread orders having the disclosed spread quantities are sequentially submitted to the market until the full desired spread order quantity is executed or until a predefined condition is detected. A price modifier determines a price level for each disclosed spread quantity, such that each disclosed spread order may be submitted at a different price level. | 2014-02-06 |
20140040111 | SYSTEMS AND METHODS FOR ANALYZING LOAN ACQUISITIONS - Various embodiments provide for systems and methods for analyzing loan acquisitions by: receiving a loan closing dataset relating to a loan (e.g., through an industry HUD-1 data portal); generating a set of interim analysis results from the loan closing dataset by extracting information from the loan closing dataset (e.g., the HUD-1 form associated with the loan); generating a set of analysis results by evaluating the set of interim analysis results according to a set of analysis rules (e.g., lender or investor rules); and generating a set of scores for the loan based on the set of analysis results. According to some embodiments, the set of analysis rules are configured to evaluate a transfer of interest in the loan (e.g., from a lender originating the loan to a party investing in the loan) for a set of investment risks, and the set of scores represent the set of investment risks. | 2014-02-06 |
20140040112 | Pre-Validation of Orders - Technology is presented that more efficiently calculates a worst case margin requirement for a particular order. The calculated worst case margin requirement is compared to pledged collateral for a particular order to determine if the margin is above the pledged collateral amount. If the calculated worst case margin requirement exceeds the pledged collateral, then the order is not processed (i.e., matched). In determining the worst case margin requirement, several factors may be taken into account including, but not limited to, a scanning risk, an intermonth spread charge, and/or a delivery month spread charge. | 2014-02-06 |
20140040113 | Methods And Systems For Online Credit Offers - Provided are methods and systems for coordinating a loan between a lender and a borrower. The methods and systems can provide enhanced offers by way of a Best Offer Strategy and Standardized Presentation of offers to borrowers. Also provided is a computerized business-to-business operations management system (a “portal”) centered around business performance analytics, wherein the selection criteria and business rules used to connect borrowers to lenders can be refined based upon the business performance analytics. | 2014-02-06 |
20140040114 | Systems and Methods for Optimizing the Routing of Debit Transactions - Embodiments of the disclosure provide for methods for obtaining, by a service provider system comprising one or more computers, information associated with a plurality of payment transactions processed via a plurality of transaction networks; generating, by the service provider system based at least in part upon the information, one or more graphical user interfaces associated with the distribution of payment transactions among the plurality of transaction networks; receiving, by the service provider system via the one or more graphical user interfaces, user input associated with the distribution of payment transactions; and generating, by the service provider system based upon the received user input, one of a recommendation or updated distribution information. | 2014-02-06 |
20140040115 | Closure for A Compartment - The invention provides a closures ( | 2014-02-06 |
20140040116 | TECHNIQUE FOR PERFORMING A FINANCIAL TRANSACTION - During a financial technique, an instance of an application executing on an initiating electronic device initiates the financial transaction by communicating information with a receiving electronic device. Then, the application selects a financial account that provides funds for the financial transaction. This financial account may be one of multiple different types of financial accounts that are associated with different providers. Moreover, the application conducts the financial transaction by providing a message to the receiving electronic device, where the message includes an amount of funds transferred in the financial transaction. After receiving the message, an instance of the application executing on the receiving electronic device selects another financial account that receives the funds for the financial transaction, where the other financial account is one of multiple different types of financial accounts that are associated with different providers. | 2014-02-06 |
20140040117 | EXECUTING TRANSACTIONS SECURED USER CREDENTIALS - In some implementations, a method includes interfacing a mobile device including a GUI. User credentials used to execute transactions with contactless devices are securely stored and associated with one or more enterprises. The secure memory includes master credentials and a master security framework that enables enterprises to store or update user credentials and associated security frameworks. Displays associated with the user credentials are dynamically generated and presented through the GUI of the mobile device. Wireless transactions are executed with contactless devices using the selectable user credentials. | 2014-02-06 |
20140040118 | DUAL-ACTIVATION FINANCIAL PRODUCTS - A system operating in conjunction with a financial account permits joint activation of a virtual card associated with the financial account. An event-detection module detects an event related to the virtual card and an authorization component for permitting certain individuals to use the virtual card. A messaging module generates account-related messages and transmitting these messages to individuals associated with the financial account. | 2014-02-06 |
20140040119 | Methods for Online Collaborative Composition - Systems and methods for creating and editing collaborative music compositions via a computer network, including remote uploading tracks by musicians, and for creating and joining a band, wherein the system and methods provide for at least one musician to join a virtual group of at least one other musician for the purpose of virtual collaborative creating and/or editing music tracks remotely, via an online network and interactive website therefor. | 2014-02-06 |
20140040120 | MOBILE TERMINAL AND METHOD OF PERFORMING NFC PAYMENT USING THE MOBILE TERMINAL - Provided is a mobile terminal that has a function of changing a payment credit card at the time of near field communication (NFC) payment in a low battery state, and a method of performing the NFC payment using the mobile terminal. In the mobile terminal according to the present invention, unlike in a mobile terminal in the related art in which payment is simply performed with a default credit card, if the NFC payment is requested in the low battery state where the mobile terminal is powered off, a payment application based on a light operating system, which is executed on an embedded Linux, is displayed, and the NFC payment with a credit card selected from the payment application based on the corresponding light operating system is performed. Therefore, a credit card payment can be effectively performed in a low battery state as well. | 2014-02-06 |
20140040121 | APPARATUS FOR AND METHOD OF HANDLING TRANSACTIONS - Transaction handling apparatus for effecting a transaction between a group of purchasers and a vendor. The transaction handling apparatus includes vendor apparatus running a vendor process which displays at least one user operable component associated with a product or service on offer. The transaction handling apparatus also includes server apparatus which stores purchase data comprising identification data identifying each of plural purchasers. The transaction handling apparatus also includes plural client processes and payment processing apparatus which receives payment in respect of each of the client processes and conveys the payments to the vendor in dependence on operation of the client processes. A payment received in respect of a client process forms a part of the price of the product or service. Operation by a user of the user operable component stores product data relating to the product or service, the stored product data being comprised in the purchase data. | 2014-02-06 |
20140040122 | Content Sharing System and Content Sharing Method - A content sharing system and a content sharing method of sharing contents following a free will of a user through belonging to a plurality of groups are disclosed. Identification information on each of one or more groups to which respective users belong is stored while associating it with identification information on the users. A download history of a content via user terminals by respective users is stored while associating it with the identification information on the users. A group or groups to which a user accessing via a user terminal belongs is/are determined. Whether a content already primarily downloaded by another user belonging to the determined group(s) exists is determined based on the download history and identification information. If the content already primarily downloaded by the another user exists, secondary download to the user terminal accessing the above-mentioned content is permitted. | 2014-02-06 |
20140040123 | METHODS AND APPARATUS FOR FUNDS REMITTANCES TO NON-PAYMENT CARD ACCOUNTS USING PAYMENT CARD SYSTEM - Apparatus and methods for funds remittances to non-payment card accounts are described. An embodiment includes a processor receiving a funds transfer request specifying a transaction amount, a destination bank account and a source account, and determining that the destination account is not a payment card account. The processor then initiates a payment transaction routed from the source account via a payment card system network to a payment card system settlement account that has been established in an agent bank in the same country as the destination bank account. The processor stores an instruction file of transfer instructions for the agent bank to transfer the transaction amount from the payment card system settlement account to the destination bank account, and later transmits the instruction file to the agent bank. | 2014-02-06 |
20140040124 | PHYSICAL-QUANTITY RECEIVING DEVICE, PHYSICAL-QUANTITY SUPPLYING DEVICE, PHYSICAL-QUANTITY RECEIVING METHOD, PHYSICAL-QUANTITY SUPPLYING METHOD, STORAGE MEDIUM HAVING PHYSICAL-QUANTITY RECEIVING PROGRAM, AND STORAGE MEDIUM HAVING PHYSICAL-QUANTITY SUPPLYING PROGRAM - A physical-quantity receiving method includes: providing, during receipt of a physical quantity, a user with a notification that the user is under obligation to make payment for the received physical quantity, and providing the user with an inquiry about whether to continue receiving the physical quantity; and making payment for the physical quantity per a unit time by electronic money after a lapse of the unit time, or making payment for a unit physical quantity by electronic money after receipt of the unit physical quantity, when continuing receipt of the physical quantity. | 2014-02-06 |
20140040125 | DISPLAYING PAYMENT INSTRUMENT ART - Displaying payment instrument art in a proxy card transaction includes a proxy card system that employs a server configured for receiving a plurality of electronic image files for financial payment instruments; receiving information identifying guidelines for determining which of the plurality of electronic image files is appropriate for the corresponding plurality of financial payment instruments; receiving a request to associate a payment instrument with a proxy card account maintained by the one or more computing devices, the request comprising information identifying the payment instrument, the payment instrument being associated with a payment instrument account maintained by a payment instrument system; determining a particular one of the electronic image files associated with the status of the payment instrument account; receiving a verification of the particular one of the electronic image files; and displaying the verified particular one of the electronic image files with the payment instrument on the user computing device. | 2014-02-06 |
20140040126 | MANAGING DEVICES ASSOCIATED WITH A DIGITAL WALLET ACCOUNT - Managing user devices associated with a digital wallet account comprises associating, using one or more computing devices, one or more user computing devices with a digital wallet account of a user, each of the associated one or more user computing devices being activated to conduct financial transactions with a merchant utilizing the digital wallet account; presenting the associated user computing devices in a list of associated user computing devices; receiving a request to deactivate a particular user computing device from the list of associated user computing devices; deactivating the particular user computing device, the deactivation being sufficient to prevent the user computing device from conducting transactions with a merchant utilizing the digital wallet account; and presenting a deactivated status of the particular user computing device. | 2014-02-06 |
20140040127 | Virtual Wallet Card Selection Apparatuses, Methods and Systems - The VIRTUAL WALLET CARD SELECTION APPARATUSES, METHODS AND SYSTEMS (“VWCS”) transform virtual wallet card selections by users utilizing mobile devices via VWCS components into virtual wallet card-based transaction purchase notifications. In one implementation, the VWCS obtains a user authentication request for a purchase transaction, and extracts a universal card account number from it. Upon querying a database, the VWCS determines that the user has access to a virtual wallet and obtains virtual wallet card selection options for the user from the database. The VWCS provides the virtual wallet card selection options to a user mobile device, and obtains a user selection of an account included among the options. The VWCS initiates a purchase transaction using the user selection. Also, upon completion of authorization of the purchase transaction, the VWCS provides a purchase receipt to the user mobile device. | 2014-02-06 |
20140040128 | TOUCH BASED ASSET TRANSACTION - In one example embodiment, an end device includes a touch screen configured to: display a plurality of icons that are respectively associated with a plurality of asset transaction entities, and receive a touch input with respect to at least two icons among the plurality of icons; a processor configured to translate the touch input into an asset transaction request that initiates execution of an asset transaction between at least two asset transaction entities among the plurality of asset transaction entities; and a transmitter configured to transmit the asset transaction request to a service provider. | 2014-02-06 |
20140040129 | Electronic Payment Restriction - Methods and systems are provided for facilitating control of a child's purchasing of products from a merchant using a credit card, debit card, gift card, secure token, mobile device, or the like. A payment provider, such as Paypal, Inc., can authorized the purchase of a product from the merchant if both the child and the parent are checked in with the same merchant via one or more social networks (thereby indicating that the child and the parent are in or near the same store). This requirement for proximity between the child and the parent can provide the parent with an opportunity to more closely monitor purchases made by the child. | 2014-02-06 |
20140040130 | MERCHANT CATEGORY CODES IN A PROXY CARD TRANSACTION - Transmitting category codes to payment instruments in proxy card transactions comprises receiving a first payment request to authorize a proxy card transaction, the first payment request identifying a proxy account of a user for payment of the transaction and a merchant category code associated with the merchant; selecting a financial account associated with the proxy account to fund the transaction; communicating a second payment request to authorize the transaction to a financial account system associated with the selected financial account, the second payment request comprising the merchant category code associated with the merchant; receiving an authorization for the transaction from the financial account system to fund the transaction using the selected financial account; and communicating an authorization for the transaction to the merchant computing device in response to receiving the authorization for the transaction from the financial account system to fund the transaction using the selected financial account. | 2014-02-06 |
20140040131 | MATCHING REFUNDS TO PAYMENT INSTRUMENTS EMPLOYED IN A PROXY CARD TRANSACTION - Matching refunds to the appropriate payment instrument employed in a proxy card transaction comprises receiving a first payment authorization request for a transaction between a merchant and a user, the payment authorization request comprising an identification of an account of the user and an identifier for the transaction, the user account having associated therewith a plurality of payment instruments available for conducting payment transactions; determining a particular payment instrument with which to conduct the transaction; associating the transaction identifier with the particular payment instruments utilized in the transaction; receiving a first refund instruction to refund all or a portion of a payment amount of the transaction, the first refund instruction comprising the transaction identifier; determining the particular payment instrument associated with the transaction identifier provided in the first refund instruction; and initiating the refund to the particular payment instrument determined to be associated with the transaction identifier. | 2014-02-06 |
20140040132 | MOBILE DEVICE PAY METHOD - The present invention relates to a micropayment transaction technology, more particularly, the present invention relates to a mobile device payment method, which is able to control consumption and enhance transaction security for buyer. The present invention is able to process payment by letting the buyer register personal account number in a transaction platform in advance via a mobile device and generating a numbered account after verification for later prepay consumption. Thus, the numbered account and the mobile device are applied for user's personal identification. Thus the user is able to control consumption efficiently, and the prepayment or the consumption both need identification to prevent credit card from been stolen or leaked out and fraud financial transaction, and the transaction security is highly increased. | 2014-02-06 |
20140040133 | TEMPORARILY GRANTING PAYMENT AUTHORITY - In at least one example embodiment, an end device includes an input unit configured to receive an input of information regarding an original payment source and an identifier of an authorized device; a transmitter configured to transmit, to a server, a request to grant temporary payment authority for the authorized device, the request including the information regarding the original payment source and the identifier for the authorized device; and a receiver configured to receive a notification that the temporary payment authority has been granted from the server. | 2014-02-06 |
20140040134 | SYSTEMS AND METHODS TO PROTECT USER PRIVACY - A computing apparatus includes: a data warehouse storing first data representing a personal privacy policy of a user; a portal coupled between merchant systems and points of interaction of users; and a transaction handler coupled between acquirer processors and issuer processors. The portal and the transaction handler are configured to shield user data, such as address, account information, etc., from the merchant systems in accordance with the personal privacy policy of the user. | 2014-02-06 |
20140040135 | SYSTEMS AND METHODS TO DIGITALLY SIGN TRANSACTIONS - A computing apparatus is configured to collect data about the account presentation device used to initiate a transaction on a transaction terminal, data about the user using the account presentation device at the transaction terminal, and/or data about the details of the transaction. The computing apparatus combine the collected data to generate a code as a substitute of the signature of the user. | 2014-02-06 |
20140040136 | Government wide commercial transportation shipping debit card and smart phone application - A method for monitoring government Transportation Account Codes funding by providing mechanisms to verify shippers identity, schedule shipments of different types, schedule other TAC usages, approve and disapprove shipment funding according to the TAC funding availability. The system includes a Demilitarized zone for external access to the system while keeping the system protected internally. The system allows for an extensive reporting mechanism of all TAC activities. The system uses smart devices to implement control even when arranging shipments off-premises. The system allows Carriers to interact with the environment to confirm shipment pick up. The system allows for Internal and external tasking. The system allows a Fund Manager to add funding as necessary to facilitate government activities. The system results in saving the government wasted funding while providing efficiency and control. | 2014-02-06 |
20140040137 | SECURE CHECKOUT AND CHALLENGE SYSTEMS AND METHODS - A method for correlating information received directly from an access device operated by a user, and information from a merchant server is disclosed. The method includes receiving, at a server of a merchant entity from an access device used by a consumer, a checkout request to initiate a transaction, providing, from the merchant server to a server of a non-merchant entity, transaction information associated with said transaction, wherein the transaction information comprises a merchant ID, and receiving, at the merchant server from the non-merchant server, a response message regarding the transaction, wherein the response message is based on a correlation between the transaction information and device information specifically associated with the access device and provided directly from the access device to the non-merchant server, and is based on additional processing associated with the transaction information and the device information, performed by the non-merchant server. | 2014-02-06 |
20140040138 | METHOD AND APPARATUS FOR DISTRIBUTION OF MONEY TRANSFERS - A method for performing transactions comprises receiving registration information and money transfer transaction specifications, generating a distribution profile based on the registration information, and storing the money transfer transaction specifications in the distribution profile. The distribution profile is identified based on an initiation instruction and associated user authentication data, and one of the money transfer transaction specifications in the distribution profile is identified based on the initiation instruction. Payment source status is verified according to the identified money transfer transaction specification, and a staged send transaction is initiated, based on the payment source status at the time the send transaction is initiated. | 2014-02-06 |
20140040139 | SYSTEM AND METHOD FOR DYNAMIC TEMPORARY PAYMENT AUTHORIZATION IN A PORTABLE COMMUNICATION DEVICE - A system for issuing a dynamic temporary credential to a portable communication device for use in a transaction with an electronic control point. The system receives the current geo-location of the portable communication device and transmits a dynamic temporary credential to the portable communication device from the centralized computer. The system further scores the risk in authorizing a transaction associated with an electronic control point using the dynamic temporary credential it issued. The system may prevent the transmission of the dynamic temporary credential until the end user has been authenticated, which may include verifying one or more of a manually input passcode, the unique digital signature of the portable communication device, and know your customer queries. The system may further include a validation mapping gateway operably connected to one or more issuers that substitutes legacy payment data for the dynamic temporary credential in a payment transaction before sending the payment transaction along with the risk score to the issuer associated with the legacy payment data. | 2014-02-06 |
20140040140 | AUTHENTICATION OF AN END USER - A method, system, and computer program product for authenticating an end user. A login field is generated and sent to an end user, and a set of nodes is subsequently received from the end user. The login field includes first colored nodes having multiple colors distributed in a first random pattern. A transparent credit card controlled by the end user includes second colored nodes having multiple colors distributed in a second random pattern. An authenticity status of the end user is determined, and then sent to the end user, by determining whether each node of the set of nodes (i) corresponds to a unique node of the first colored nodes and (ii) has a same color determined by a function of a static integer and a dynamic integer D, wherein S and D are known only to the end user and the provider of the transparent credit card. | 2014-02-06 |
20140040141 | USE OF CHECK-FACE META-DATA FOR ENHANCED TRANSACTION PROCESSING - A computer-readable media storing computer-executable instructions for using a check deposit device to process a check is provided. The method derives meta-data from the check. The check deposit device may use an image receiver device to obtain a check image from the check. The method may use the processor to define a plurality of check segments within the check image. The processor device may obtain content from each of the plurality of check segments. The processor device may be store the content of each of the check segments in a machine readable memory and may utilize a transmitter to transmit the content from the plurality of check segments to a check-clearance engine. The check deposit device may receive from the check-clearance engine, in response to the transmission of the portion of the content from the plurality of check segments, an indication of the sufficiency of funds in an account. | 2014-02-06 |
20140040142 | DATA COPYRIGHT MANAGEMENT SYSTEM - A data copyright management system in one embodiment includes a database for storing original data, a key control center for managing crypt keys, copyright management center for managing data copyrights, and a communication network for connecting these sections. Data supplied from the database to users is encrypted and distributed. The user decrypts the encrypted data by crypt keys obtained from the key control center or copyright management center. When a user stores, copies, or transfers data, the data is encrypted by a different crypt key. This disclosure can be applied to a data copyright management system for using not only single data but also a plurality of data supplied from a single database or a plurality of data supplied from a plurality of databases. | 2014-02-06 |
20140040143 | METHOD AND DEVICE FOR CONTROLLING DISTRIBUTION AND USE OF DIGITAL WORKS - A method and device for controlling distribution and use of a digital work stored together with an attached usage right information on a record carrier. The attached usage right information, which may be unencrypted, is verified by using a hidden information which is changed at every change of the usage right information. The hidden information may be a checksum of a data block containing the usage right information, or other encoding that may detect a change to the stored data block. Thus, a “copy and restore attack” is not successful, since it will lead to a mismatch between the hidden information and the restored usage right information. | 2014-02-06 |
20140040144 | Systems and Methods for Multi-Merchant Tokenization - Systems and methods for multi-merchant tokenization may include receiving a transaction from a point of sale terminal of a merchant, validating the merchant ID against merchant logs, and generating a token for the transaction. The token includes a primary account number, expiration, and a group ID. Additionally, the system provides the primary account number to a payment system and receives a response back. The response is then output back to the merchant along with the token. In subsequent transactions, the system may receive the token from a one point of sale terminal of the merchant. The system validates the merchant ID against merchant logs and ensures the merchant is configured for tokenization. The token is decrypted and the group ID is compared to the merchant ID in the merchant logs. When they match, the primary account number is provided to the payment system for approval. | 2014-02-06 |
20140040145 | SYSTEMS AND METHODS FOR DISTRIBUTED ENHANCED PAYMENT PROCESSING - A distributed enhanced payment processing system includes a merchant point of sale (POS) terminal system and a remote payment management system. The POS terminal system initiates a transaction that includes receiving a payment amount, a purchaser account identifier, a virtual electronic payment indicator, and a merchant ID via a payment client. Subsequently, the POS terminal system outputs the transaction to the remote payment management system which generates a token for the transaction. The payment management system then provides the purchaser account identifier, a merchant account identifier, and the payment amount to a remote virtual electronic payment (VEP) entity system. Upon receiving a VEP entity system response, the payment management system outputs the response and token to the POS terminal system. | 2014-02-06 |
20140040146 | PAYMENT SYSTEM FOR AUTHORIZING A TRANSACTION BETWEEN A USER DEVICE AND A TERMINAL - Methods, apparatus and computer software are provided for authorizing an EMV transaction between a user device and a point of sale terminal, particularly, but not exclusively, in situations where a secure element is not made available for the deployment of a payment application on the user device. The payment application is instead deployed to a processing environment that is outside of any secure element on the user device. The payment application is associated with a certificate and a corresponding hash. The hash is adapted to be generated on the basis of an application expiration date parameter, which is adapted to comprise data indicative of an expiration date of day level granularity associated with the certificate. During processing of the EMV transaction, the point-of-sale terminal verifies the hash, thereby establishing the authenticity of the application expiration date, and hence the validity of the certificate. | 2014-02-06 |
20140040147 | SECURE AND CONVENIENT MOBILE AUTHENTICATION TECHNIQUES - Security and convenience are provided by a system, apparatus, method, and computer program product that stores two or more encryption keys that correspond to two or more levels of authentication. The encryption keys may be encrypted and decrypted utilizing an endorsement key and trusted computing techniques. Or the encryption keys may be stored in a secure manner utilizing key protection techniques, such as cryptographic camouflaging. A first encryption key is recovered automatically for the first level of authentication. And input is requested to recover the second encryption key for the second level of authentication. | 2014-02-06 |
20140040148 | SYSTEMS AND METHODS FOR ARBITRAGED ENHANCED PAYMENT PROCESSING - An arbitraged enhanced payment processing system in association with a distributed enhanced payment processing system includes a merchant point of sale (POS) terminal system and a remote payment management system. The POS terminal system initiates a transaction that includes receiving a payment amount, a purchaser account identifier, a virtual electronic payment indicator, and a merchant ID via a payment client. Subsequently, the POS terminal system outputs the transaction to the remote payment management system which generates a token for the transaction. The payment management system then provides the purchaser account identifier, a merchant account identifier, and the payment amount to a payment processing servicer. Upon receiving a payment processing servicer response, the payment management system outputs the response and token to the POS terminal system. | 2014-02-06 |
20140040149 | PAYMENT SYSTEM - Methods, apparatus and computer software are provided for authorizing an EMV transaction between a user device and a point of sale terminal, particularly, but not exclusively, in situations where a secure element is not made available for the deployment of a payment application on the user device. The payment application is instead deployed to a processing environment that is outside of any secure element on the user device. An ICC Master Key corresponding to the payment application is held by a trusted authority, such as the issuing bank. The trusted authority is adapted generate time-limited session keys on the basis of the ICC Master Key and distribute session keys to the payment application. Receipt of a session key by the payment application enables the payment application to conduct an EMV payment transaction. The session key is used to authorize a single EMV payment transaction. | 2014-02-06 |
20140040150 | LOG-IN METHOD FOR PRODUCT AND APPLICATION PROGRAM THEREOF - A log-in method for a product and an application program thereof applies to a mobile device in order to execute the application program, the application program connects with a community website and executes a check-in procedure on the community website. When the check-in procedure is being executed, the application program obtains the product information and the sales information both related to the product and automatically fills out the information in an executing page having a check-in function. Hence, a sales end server defines check-in information, including a check-in landmark, check-in contents, a check-in time, a check-in name, etc., as the log-in information of the product, so as to execute the log-in activity of the product. | 2014-02-06 |
20140040151 | Mobile assay facility and method of using same to procure and assay precious metals - A self contained, mobile assay facility built in a modified armored truck is completely equipped to smelt and assay precious metals, particularly gold and silver. An induction furnace melts the metal that is then poured into an ingot. The ingot is weighed and analyzed using an XRF alloy analyzer and the percentage of gold and/or other metals recorded. The value of the gold at current market prices is calculated and the assay and the value of the ingot is printed and given to the seller. The seller may opt to receive the ingot and pay the assayer an assay fee. Alternately, the seller may ask to be paid cash or by wire transfer that may be initiated and confirmed from within the mobile assay facility. The ingots may be safely stored or shipped directly from the mobile facility to a wholesaler for further processing. | 2014-02-06 |
20140040152 | METHODS AND SYSTEMS FOR FAKE ACCOUNT DETECTION BY CLUSTERING - Techniques to determine fake accounts of a social networking system. In one embodiment, a magnitude of a cluster of accounts is calculated. The social networking system determines the accounts are fake when the magnitude of the cluster is less than a threshold value. The accounts are not determined to be fake, or determined to be not fake, when the magnitude of the cluster is equal to or greater than the threshold value. The accounts may be associated with at least one resource. A mapping of the accounts may be created based on features associated with the accounts. A radius of the cluster is compared with the threshold value. The accounts are determined to be fake when the radius is less than the threshold value. | 2014-02-06 |
20140040153 | System and Method for Providing a Configurable Web Portal Builder Interfacing with a Customer Relationship Management System - A system and method for a web portal builder that is user-configurable, enables improved customization of a web portal, and provides a highly collaborative environment to various interested entities is described. The web portal builder may generate interfaces such as web portals that expose functionality and data of the backend Consumer Relationship Management (“CRM”) system as well as extend CRM functions and data capabilities. The web portal builder may build interfaces for use by entities such as governments, agencies of governments, businesses and others who deal with consumers. The entities may use the interfaces to view and manage consumers, leveraging information stored by or in association with the CRM system. For example, a government social services case manager may use the interfaces to manage information related to consumers (in this case, individuals applying for or receiving various social benefits). | 2014-02-06 |
20140040154 | Defamation Avoiding System and Process to Identify Pattern Crimes - A system and process performed by the system for identifying and tracking perpetrators of any of various types of crimes, including bullying, child pornography, sexual assault and rape, in reports which are anonymously reported to the system. The perpetrators can be of various categories, such as formally convicted, and/or formally charged and not convicted, and/or never been charged or not yet been caught, and therefore are without prior convictions or criminal records and are thereby not on law enforcement's radar. The system and process relies upon the reporting by a victim or a witness of information pertinent to an alleged criminal event. The identity of each reporting victim is never known to the system, unless the victim or witness goes to the police. The system uses a “double blind” method to protect the victim and certain details of the reported incident. | 2014-02-06 |
20140040155 | SYSTEM AND METHOD FOR MOBILE IDENTITY PROTECTION OF A USER OF MULTIPLE COMPUTER APPLICATIONS, NETWORKS OR DEVICES USING A WIRELESS DEVICE - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed. | 2014-02-06 |
20140040156 | Computer System for Financial Aid Packaging for Students - A computerized system and method for determining and mitigating risk associated with student lending. The computer system determines a student quality index score, which provides an assessment of how likely the student, such as a student candidate or current student, is to succeed during school and after graduation. Then, based on the student quality index scores of the students, the computer system determines how to structure the financial aid award packages for each individual student to maximize the financial aid provided to the students and enable the academic institutions to be within the mandated lending regulations. | 2014-02-06 |
20140040157 | Offer Presentation for Crowdfunding - Offers are presented to one or more users of a crowdfunding platform based upon information gathered from multiple users' activities across one or more campaigns. An offer may be provided to the fundraiser based on a campaign category, a campaign keyword, a campaign profile, offer profile or user activity history. A user profile may be used to determine an offer by comparing the profile to attributes of one or more offers. The selected offer can be presented to users such as funders, fundraisers and others. | 2014-02-06 |
20140040158 | SYSTEMS AND METHODS FOR MANAGING ARRESTED PERSONS - The disclosure relates to systems and methods of arrestee management. An arrestee management system may comprise a document arrest module configured to manage an arrest process, a document departure module configured to manage a process of preparing a transport vehicle for departure and help verify that all arrestees are on the transport vehicle prior to departure, and a document arrival module configured to manage a process of removing an arrestee from the transport vehicle at a destination of the transport vehicle and help verify that all arrestees on the transport vehicle prior to transport are on the transport vehicle at the destination. | 2014-02-06 |
20140040159 | COMMON DOCUMENT HEADER FOR A BUSINESS MANAGEMENT PLATFORM - Systems and methods of implementing a common document header for a business management platform are disclosed. An example method includes receiving data via a plurality of separate data entry points to a business management platform, the data describing at least some financial information and some operational information for a business. The method also includes generating a common document header (CDH) to organize and uniformly handle the data by the business management platform. The method also includes maintaining a current status of the data in the CDH. The method also includes driving a business action by the business management platform based on the current status of the data organized in the CDH. Other examples of implementing a common document header for a business management platform are also disclosed. | 2014-02-06 |
20140040160 | SYSTEM AND METHOD OF RATING A PRODUCT - For a system having a network-enabled device in communication with a computing network, a method of rating a product includes receiving a product identifier of a product from the network-enabled device, determining a product price, determining a brand entity, and defining a geographic perimeter of interest. One or more brand entity economic values attributed to the product are determined, such as a revenue received amount, a wages paid amount, a taxes paid amount, and/or a charitable contribution amount. Economic impact values are determined for the product and relate the product price to the brand entity economic value for the perimeter of interest. The method determines and outputs an economic impact rating to a user of the network-enabled device based the one or more economic impact values. | 2014-02-06 |
20140040161 | METHOD AND SYSTEM FOR MANAGING BUSINESS FEEDBACK ONLINE - A method and system for a business to manage negative feedback reviews submitted on a public review webpage by a customer. The method includes registering with a review management service, assigning a unique identifier and a profile page to the business, encouraging a customer to submit a review of the business using the unique identifier, and providing, to the business, information from the review management service which enables the business to counter or manage negative reviews. Thereby, a business can be notified when a negative feedback review is submitted by a customer prior to the negative feedback review being submitted to a public review webpage. The method also includes enabling businesses to receive notification of feedback for individual employees to take appropriate corrective action. Further, the business can provide customers with rewards as an incentive or encouragement to complete reviews with the goal of obtaining positive reviews from satisfied customers. | 2014-02-06 |
20140040162 | METHOD AND SYSTEM FOR PROVIDING INFORMATION FROM A CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM - A method for providing information relating to revenue of an enterprise is disclosed. The method embodiment includes receiving, by a server computer, a request from a user for information relating to an enterprise's revenue, and identifying a plurality of business contacts of the user. The business contacts are affiliated with a company with which the enterprise is conducting business to produce revenue. An impact score is determined for each of the business contacts based on impact factors relating to at least an attribute of the business contact, an attribute of a company affiliated with the business contact, and to the business contact's role in completed and pending business transactions between the company and the enterprise. At least one business contact is selected based on its impact score, and a response including information identifying the selected business contact(s) is transmitted by the server to the user. | 2014-02-06 |
20140040163 | System and Method for Managing Derivative Instruments - The present invention is a system and method for providing improved functionality for management of derivative instruments. The improved system includes functionality implementing single interest rate sale sessions initiated either as a result of market conditions or a user request, risk adjustment sales to allow users to balance portfolio risks, consolidated sweeps to more efficiently allow a user to manage an investment swap portfolio, and credit limit clearance functionality to improve the management of credit limits associated with users and clearance facilities. | 2014-02-06 |
20140040164 | Methods and Systems for Creating a Government Bond Volatility Index and Trading Derivative Products Based Thereon - A computer system for calculating a government bond volatility index comprising memory configured to store at least one program; and at least one processor communicatively coupled to the memory, in which the at least one program, when executed by the at least one processor, causes the at least one processor to receive data regarding options on government bond derivatives; calculate, using the data regarding options on government bond derivatives, the government bond volatility index; and transmit data regarding the government bond volatility index. | 2014-02-06 |
20140040165 | Waste recycling systems, processes, and methods - The present invention refers to a system, process, and method of collecting, handling and processing paperboard based fast food service items for the production of pulp suitable for reuse into paper or paperboard and the contemporaneous recovery of the waterproofing film for the production of energy. | 2014-02-06 |
20140040166 | MODELING OF INCIDENTS AFFECTING QUALITY OF SERVICE OF A TRANSPORTATION SYSTEM - A method and a device for predicting a future occurrence of a transportation system incident are disclosed. The method includes receiving transportation incident data comprising information collected during and related to operation of at least one transportation vehicle, the information comprising at least a time stamp, constructing at least one count regression model based upon the transportation incident data, producing a results set based upon the at least one count regression model, predicting at least one future occurrence of an incident based upon the results set, and presenting the at least one predicted future occurrence. The device includes at least a processing device and computer readable medium containing a set of instructions configured to cause the device to perform the method. | 2014-02-06 |
20140040167 | Contextual Decision Logic Elicitation - The present invention is a method of creating decision logic. A first set of rules for the decision logic is received. The user is queried for data and this data is stored in a memory. A first decision is generated for a user based at least in part on the data. Input is received from the user for editing the first set of rules to create a new set of rules for the decision logic in the context of data. A final decision is generated derived at least in part from the data using the new set of rules. | 2014-02-06 |
20140040168 | EVOLUTION OF A USER INTERFACE BASED ON LEARNED IDIOSYNCRASIES AND COLLECTED DATA OF A USER - A user interface evolves based on learned idiosyncrasies and collected data of a user. Learned idiosyncrasies and collected data of the user can be stored in a knowledge base. Information from the surrounding environment of the user can be obtained during learning of idiosyncrasies or collection of data. Thought-based statements can be generated based at least in part on the knowledge base and the information from the environment surrounding the user during learning of idiosyncrasies or collection of data. The thought-based statements serve to invoke or respond to subsequent actions of the user. The user interface can be presented so as to allow for interaction with the user based at least in part on the thought-based statements. Furthermore, personality nuances of the user interface can be developed that affect the interaction between the user and the user interface. | 2014-02-06 |
20140040169 | ACTIVE LEARNING WITH PER-CASE SYMMETRICAL IMPORTANCE SCORES - A method for classifying cases includes receiving a pool of unlabeled cases with associated per-case symmetrical importance scores, applying a selection algorithm with a classifier to a training set and the pool, but without the per-case symmetrical importance scores, to determine selection scores for the unlabeled case, and combining the selection scores and the corresponding per-case symmetrical importance scores to form combined scores for the unlabeled cases. The method further includes providing a high scoring unlabeled case to an oracle to label, receiving a labeled case back from the oracle and augmenting the training set with the labeled case, training the classifier with the augmented training set, and applying the classifier to an additional unlabeled case. | 2014-02-06 |
20140040170 | SYSTEM AND METHOD FOR IDENTIFYING ABUSIVE ACCOUNT REGISTRATION - Disclosed is a system and method for processing account registration by identifying account candidates attempting to open an account as abusive. That is, the present disclosure discusses identifying, and challenging and marking abusive account registration. The present disclosure takes into account users' behaviors on a network and the impact to the cost and/or revenue of the network. The present disclosure is proactive as it allows for actions to be taken at the earliest possible time in the registration process before an account is created. This prevents abusive activity from taking place within the network and effecting services and privileges available to legitimate users. Additionally, the effects of the disclosed systems and methods minimize the negative impacts of abusive activity on normal user accounts. | 2014-02-06 |
20140040171 | CONTENT-BASED DEMOGRAPHIC ESTIMATION OF USERS OF MOBILE DEVICES AND USAGE THEREOF - Method, apparatus and product for content-based demographic estimation of users of mobile devices and usage thereof. One method comprising: obtaining a list of applications that are installed on a mobile device; and estimating, based on the list of applications, one or more demographic parameter of a user of the mobile device. Another method, that is performed by a mobile device, comprising: obtaining a list of applications that are installed on said mobile device, wherein based on the list of applications, one or more demographic parameters of a user of said mobile device are determined; and performing a user engagement based on the estimated one or more demographic parameters. | 2014-02-06 |
20140040172 | Privacy-Preserving Aggregated Data Mining - An apparatus, system and method are introduced for preserving privacy of data in a dataset in a database with a number n of entries. In one embodiment, the apparatus includes memory including computer program code configured to, with a processor, cause the apparatus to form a random matrix of dimension m by n, wherein m is less than n, operate on the dataset with the random matrix to produce a compressed dataset, form a pseudoinverse of the random matrix, and operate on the dataset with the pseudoinverse of the random matrix to produce a decompressed dataset. | 2014-02-06 |
20140040173 | SYSTEM AND METHOD FOR DETECTION OF A CHARACTERISTIC IN SAMPLES OF A SAMPLE SET - A computer-implemented method for detecting a characteristic in a sample of a set of samples is described. The method may include receiving from a user an indication for each sample of said set of samples that the user determines to include the characteristic. The method may also include defining samples of said set of samples that were not indicated by the user to include the characteristic as not including the characteristic. The method may further include iteratively applying by a processing unit, a detection algorithm on a first subset of the set of samples, said detection algorithm using a set of detection criteria that includes one or a plurality of detection criteria, evaluating a detection performance of the detection algorithm and modifying the detection algorithm by making changes in the set of detection criteria to enhance detection performance of the learning algorithm. The method may still further include, upon reaching a desired level of detection performance for the modified detection algorithm, performing validation by testing the modified detection algorithm on a second subset of the set of samples. | 2014-02-06 |
20140040174 | ANOMALY DETECTION FOR CLOUD MONITORING - Technologies are presented for anomaly detection in a cloud environment using a sparsity measure. In some examples, cloud metric data may be gathered and processed into a dictionary base. Linear transform coefficients for a test sample may then be calculated from the dictionary base using l | 2014-02-06 |
20140040175 | LOCATION DETERMINATION USING GENERALIZED FINGERPRINTING - An RF fingerprinting methodology is generalized to include non-RF related factors. For each fingerprinted tile, there is an associated distance function between two fingerprints (the training fingerprint and the test fingerprint) from within that tile which may be a linear or non-linear combination of the deltas between multiple factors of the two fingerprints. The distance function for each tile is derived from a training dataset corresponding to that specific tile, and optimized to minimize the total difference between real distances and predicted distances. Upon receipt of an inference request, a result is derived from a combination of the fingerprints from the training dataset having the least distance per application of the distance function. Likely error for the tile is also determined to ascertain whether to rely on other location methods. | 2014-02-06 |
20140040176 | Adaptive Pairwise Preferences in Recommenders - Methods, systems, and products adapt recommender systems with pairwise feedback. A pairwise question is posed to a user. A response is received that selects a preference for a pair of items in the pairwise question. A latent factor model is adapted to incorporate the response, and an item is recommended to the user based on the response. | 2014-02-06 |
20140040177 | RUNTIME ADAPTATION IN DYNAMIC WORKSPACES - The disclosure generally describes computer-implemented methods, software, and systems for search-, context-, and rule-based creation and runtime adaptation in dynamic workspaces. One computer-implemented method includes receiving an access request for an enterprise workspace from a requestor, determining properties of the requestor, determining at least one rule associated with the requestor, determining a context of the determined requestor, generating, by operation of at least one computer, the requested enterprise workspace, and modifying the generated enterprise workspace by executing the determined at least one rule for the determined context. | 2014-02-06 |
20140040178 | RULE-BASED CREATION IN DYNAMIC WORKSPACES - The disclosure generally describes computer-implemented methods, software, and systems for search-, context-, and rule-based creation and runtime adaptation in dynamic workspaces. One computer-implemented method includes receiving a request for an enterprise workspace page, determining properties associated with the requestor of the enterprise workspace page, determining a profile of the requestor, determining appropriate content to associate with the requested enterprise workspace page, filtering the determined appropriate content, and generating, by operation of at least one computer, the requested enterprise workspace page. | 2014-02-06 |
20140040179 | IDENTIFYING GEOSPATIAL PATTERNS FROM DEVICE DATA - Determining geospatial patterns from device data collected from a plurality of computing devices. The devices represent, for example, a plurality of sources providing the device data. The device data describes the computing devices and/or environments thereof. Some embodiments present the determined patterns to users for editing, update maps with the edited patterns, and distribute the maps to the users. The maps are stored to create a searchable map library. | 2014-02-06 |
20140040180 | METHOD AND SYSTEM FOR DETECTING ANOMALIES IN WEB ANALYTICS DATA - A server system stores web analytics data for a web page in a device. The web analytics data comprises a plurality of prior time-value pairs, each pair including a value of an attribute associated with the web page and a time associated with the value. For a particular attribute, the server system collects a new time-value pair including a new value associated with the web page and a new time indicating when the value was determined. The server system estimates a predicted value for the attribute and an associated error-variance at the new time by applying a forecasting model to the prior time-value pairs in respective subsets of the web analytics data. The collected new time-value pair is tagged if its value is outside the error variance of the predicted value for the particular attribute. | 2014-02-06 |
20140040181 | AUTOMATIC FAQ GENERATION - Generally described is auto generation of an FAQ based on partly textual content. A network service can receive at least partly textual content. A FAQ can be generated based on the content. Questions within the FAQ can be ranked based on popularity, usefulness, etc. When a question in the FAQ is selected, a link can be generated to the portions of the content where the question and answer were derived from. | 2014-02-06 |
20140040182 | SYSTEMS AND METHODS FOR COLLECTION AND CONSOLIDATION OF HETEROGENEOUS REMOTE BUSINESS DATA USING DYNAMIC DATA HANDLING - Remote data collection systems and methods retrieve data including financial, sales, marketing, operational and the like data from a plurality of databases and database types remotely over a network in an automated, platform-agnostic manner. An Extract Transform and Load (ETL) data replication method for Chart of Account (COA) standardization includes receiving a request for remote data collection to extract data from a data source; extracting data in a non-intrusive manner from the data source, wherein the data comprises non-standard COA data; and transforming one of an entire set or a subset of the extracted data based on the request based on a template or a standardized form desired for comparisons. | 2014-02-06 |
20140040183 | INTENT BASED AUTOMATION OF DATA MANAGEMENT OPERATIONS BY A DATA MANAGEMENT ENGINE - Provided are a method, computer program product, and system for processing a data management request. User intent that defines properties of target data is determined. Policies and constraints for the data management request are determined. An abstract data management request that identifies source data, the target data, and the polices and constraints is created. A technology to use to process the data management request based on the user intent, policies, and constraints is determined. | 2014-02-06 |
20140040184 | AUTOMATED RELATIONSHIP ADVICE - A computerized system provides automatic generation and sending of advice to a first predetermined individual to help that person's relationship with a second predetermined individual. The advice content is composed and tailored from pre-written text based on the answers to survey questions from those individuals. Also, a gift suggestion system provides gift recommendations to the first predetermined individual to give to the second predetermined individual. One or more distinct invited groups of friends, relatives, provide the recommendations. | 2014-02-06 |
20140040185 | INTENT BASED AUTOMATION OF DATA MANAGEMENT OPERATIONS BY A DATA MANAGEMENT ENGINE - Provided are a method, computer program product, and system for processing a data management request. User intent that defines properties of target data is determined. Policies and constraints for the data management request are determined. An abstract data management request that identifies source data, the target data, and the polices and constraints is created. A technology to use to process the data management request based on the user intent, policies, and constraints is determined. | 2014-02-06 |
20140040186 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS AND METHOD FOR UPDATING DATA - An information processing system comprises a plurality of information processing apparatus and a dictionary server (server). Each of the scanners includes a local storage device, a determination module and a local update module. The server includes a master storage device, a master update module and a master transmitting module. The determination module determines the commodity category to which a commodity belongs by comparing the feature amount extracted from the image showing the appearance of the commodity with the feature amount described in a local dictionary data stored in the local storage device. The master update module updates a master dictionary data stored in the master storage device. The master transmitting module transmits the master dictionary data updated by the master update module to the scanners. The local update module updates the local dictionary data according to the master dictionary data transmitted by the transmitting module. | 2014-02-06 |
20140040187 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - An information processing apparatus includes a storage unit configured to store a face dictionary for performing face authentication, and a processing unit configured to update the face dictionary stored in the storage unit, wherein the processing unit controls updating of the face dictionary based on the number of images from among stored images corresponding to a person registered with the face dictionary. | 2014-02-06 |
20140040188 | METHOD AND APPARATUS FOR UPDATING PERSONAL INFORMATION IN COMMUNICATION SYSTEM - A method and an apparatus for updating personal information in a communication system supporting a Converged Address Book (CAB) service are provided. The apparatus and method includes importing external personal profile information from a non-CAB system, and updating personal information in accordance with a user preference-based synchronization method using the external personal profile information. | 2014-02-06 |
20140040189 | SYSTEM AND METHOD FOR ASSISTIVE CAPTION, VIDEO DESCRIPTION, AND AUDIO DISTRIBUTION - Systems and methods are disclosed herein to a computer-implemented method for providing assistive technology, the method comprising receiving, by a computing device, a media file comprising an assistive media component configured to assist a user with viewing or hearing a particular content file being screened at a venue; receiving, by a computing device, an audio portion of the content file using an audio receiving device; determining, by a computing device, a time signature of the audio portion of the content file by performing sound processing on the received audio portion of the content file; synchronizing, by a computing device, the media file with the content file by matching a time synchrony track of the media file with the determined time signature of the content file; and outputting, by a computing device, the assistive media component included in the media file in synchronization with the content file. | 2014-02-06 |
20140040190 | DYNAMIC DATA ACCESS AND STORAGE - A master dynamic configuration directory can store connection strings and data adapters for data entities based on a routing identifier and a business entity identifier. The information can be stored in multiple data stores, each of which can have a different data type. A data request from a requesting entity comprises a routing identifier and a business entity identifier. A system application can receive a data request and can access the local instance of the dynamic configuration directory to determine the corresponding connection string and data adapter based on the routing identifier and business entity identifier in the data request. The system sub-application creates a data access instance based on the connection string and data adapter. The system application loads the data access instance to access the data entity at the appropriate location and to perform a data function according to the data request. | 2014-02-06 |
20140040191 | INVENTORYING AND COPYING FILE SYSTEM FOLDERS AND FILES - Described is a system and method that facilitates fast and reliable discovery, enumeration, and processing of network shared resources. A file system processing subsystem (date engine) operates in a combined discovery, enumeration, and processing manner to provide access and operation as directed by the client to effect data collection and copying. The discovery, enumeration, and action operations use parallel operation and I/O (input/outputA) pipelining. Multiple threads are used during this process to enumerate each object's children, and enqueues each child to be handled by a new thread. For each network object discovered, the subsystem creates an object embodying operation and context information, and queues that object as a self-contained, asynchronous work item for a process thread pool to handle. | 2014-02-06 |
20140040192 | SEEDING REPLICATION - Seeding replication is disclosed. One or more but not all files stored on a deduplicated storage system are selected to be replicated. One or more segments referred to by the selected one or more but not all files are determined. A data structure is created that is used to indicate that at least the one or more segments are to be replicated. In the event that an indication based at least in part on the data structure indicates that a candidate segment stored on the deduplicating storage system is to be replicated, the candidate segment is replicated. | 2014-02-06 |
20140040193 | COMPUTER AND NETWORK PROCESSING OF SECURITY SPREAD DATA - Computers, computer systems, and methods can be configured to receive selection of a security data record set, receive selection of an input date, determine for the input date a benchmark yield spread of the security data record set with reference to a benchmark security, and determine for a date of last trade a last trade yield spread of the security data record set with reference to the benchmark security. This may be performed over one or more networks using one or more servers or client computers, which may be provided with a value line, or other user-interface control, to select the input date and a display element to display the benchmark yield spread and the last trade yield spread. | 2014-02-06 |
20140040194 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SEQUENCING ASYNCHRONOUS MESSAGES IN A DISTRIBUTED AND PARALLEL ENVIRONMENT - System and method of sequencing distributed asynchronous messages. An inbound handler receives an incoming message with a sequence correlation value that identifies a sequence comprising the incoming message, and checks for a sequence status of the sequence. If the sequence status indicates that none of multiple outbound handlers is currently processing a message for the sequence and if the incoming message is the next message to be processed for the sequence, then the incoming message is forwarded to a queue storage and subsequently forwarded to an available outbound handler. If the sequence status indicates that at least one of the outbound handlers is currently processing a message of the sequence, if the queue storage already comprises a message to be processed for the sequence, or if the incoming message is not the next message to be processed for the sequence, then the incoming message is stored in overflow storage. | 2014-02-06 |
20140040195 | Offline Web Application System - The present invention provides a method and system for providing offline functionality for a web-based application. The client, data broker and remote server process read requests and create, delete or update commands they receive according to logic and network hierarchy. Periodic caching of data structures needed in the future further improves the offline functionality. | 2014-02-06 |
20140040196 | System and Method for Event-Based Synchronization of Remote and Local File Systems - A method for synchronizing a file system (FS) and a remote file system (RFS) includes monitoring the FS for FS events, generating FS event records, receiving RFS event records of RFS events, generating file system operations (FSOs) based on the FS and RFS event records, and communicating the FSOs to the FS and RFS to synchronize them. A method for generating the FSOs includes accessing a plurality of FS and/or RFS event records, processing the accessed records to generate processed event records, generating the FSOs based on the processed event records, and outputting the FSOs to cause synchronization of the FS and RFS. Systems are also described. The invention facilitates event-based, steady-state synchronization of local and remote file systems. | 2014-02-06 |
20140040197 | System and Method for Event-Based Synchronization of Remote and Local File Systems - A method for synchronizing a file system (FS) and a remote file system (RFS) includes monitoring the FS for FS events, generating FS event records, receiving RFS event records of RFS events, generating file system operations (FSOs) based on the FS and RFS event records, and communicating the FSOs to the FS and RFS to synchronize them. A method for generating the FSOs includes accessing a plurality of FS and/or RFS event records, processing the accessed records to generate processed event records, generating the FSOs based on the processed event records, and outputting the FSOs to cause synchronization of the FS and RFS. Systems are also described. The invention facilitates event-based, steady-state synchronization of local and remote file systems. | 2014-02-06 |
20140040198 | MASS CHANGE OF MASTER DATA VIA TEMPLATES - A data entry template can be associated with each of a plurality of data records that are distributed across a plurality of heterogeneous or homogeneous data sources which can optionally be data bases. The data entry template can be modified to reflect a change to a business process that was previously represented by the template. The change to the business process can be propagated to at least part of the plurality of data records associated with the template. Related systems, apparatus, methods, and/or articles are also described. | 2014-02-06 |
20140040199 | Data Management Using Writeable Snapshots in Multi-Versioned Distributed B-Trees - A method for managing data using writeable snapshots in a multi-versioned, distributed B-tree comprising nodes distributed over a plurality of servers, includes receiving a transaction request specifying a transaction type, the transaction having a transaction snapshot id, and determining the transaction type. If the transaction type is an update transaction, the method includes determining a node to update, which is defined by a node snapshot id, and if the transaction snapshot id is greater that the node snapshot id, the method copies the node and updates the copy to create a writeable snapshot, assigns the transaction snapshot id as a node snapshot id of the copy, and places a pointer from the node to the copy. | 2014-02-06 |
20140040200 | MEDIATION OBJECTS FOR COMPLEX REPLICATIONS - A method includes receiving, at a mediation object in a target system, one or more replication requests from a source system, where the replication requests include requests to replicate data on the target system from one or more source objects located at the source system. The mediation object collects and stores data from the source objects of the source system as part of the replication requests. The mediation object determines when data from the source objects of the source system are complete and processes completed data from the source objects of the source system by distributing the data to one or more target objects in the target system. | 2014-02-06 |
20140040201 | Transfer of Digital Media Objects Via Migration - The invention provides in some aspects an improved method for transfer of digital media objects that includes storing a digital file on a first digital data device and migrating that digital file to a second digital data device by repeating a plurality of times the steps of: (i) transferring to a second digital data a respective piece of the digital file, (ii) storing that respective piece of the digital file on the second digital data device. The foregoing are effected so that no respective piece of the digital file is concurrently stored on the first and second digital data devices and/or, more generally, so that any same portion of the digital file that is concurrently stored on the first and second digital data devices comprises not more than an insubstantial amount of the digital data file. Methods and apparatus according to the invention can be used for the (re)sale, lending, streaming or other transfer of digital music, digital books and other digital media objects. | 2014-02-06 |
20140040202 | AUTOMATIC SYNCHRONIZATION CONFLICT RESOLUTION - A determination is made at a first computing device of whether there is a synchronization conflict between a change to a first synchronized item at the first computing device and a change to a second synchronized item at a second computing device. If a synchronization conflict exists, rule-based conflict resolution is performed to automatically resolve the synchronization conflict. The rule-based conflict resolution is based at least in part on a type of the change made to the first synchronized item, a type of the change made to the second synchronized item, and a set of multiple rules. A notification of the resolution is then sent to the second computing device. | 2014-02-06 |
20140040203 | STATEMENT-LEVEL AND PROCEDURAL-LEVEL REPLICATION - Techniques for replicating data in database systems are described. In an example embodiment, a set of changes is received at a destination database, where the set of changes has been applied at a source database and is being replicated from the source database to the destination database. The set of changes is analyzed and it is determined that the set of changes includes two or more of: a subset of row-level changes, a subset of statement-level changes, and a subset of procedure-level changes. A set of dependencies is determined at least between the changes that are included in the subsets of changes. The changes, in the subsets of changes, are assigned to two or more processing elements. The set of changes is applied to the destination database by executing the two or more processing elements in parallel to each other and based on the set of dependencies. | 2014-02-06 |
20140040204 | AUTOMATIC OFFLINE SYNCHRONIZATION OF BROWSER DOCUMENTS - In an embodiment, a method for synchronizing browser documents is described. The method may include losing a connection to a version control server at a client device having first and second instances of a document open in first and second browser windows of a browser. The method may also include storing a first branch corresponding to the first instance of the document in local storage associated with the first browser. The first branch may indicate whether the first instance of the document is open or abandoned and one or more first changes. The method may also include the second browser window automatically determining that the first instance of the document is abandoned. The method may also include the second browser window automatically merging the one or more first changes into the second instance of the document in response to determining that the first instance of the document is abandoned. | 2014-02-06 |
20140040205 | System and Methods for Implementing a Server-Based Hierarchical Mass Storage System - Setting up and supporting the computer infrastructure for a remote satellite office is a difficult task for any information technology department. To simplify the task, an integrated server system with a hierarchical storage system is proposed. The hierarchical storage system includes the ability to store data at an off-site cloud storage service. The server system is remotely configurable and thus allows the server to be configured and populated with data from a remote location. | 2014-02-06 |
20140040206 | PIPELINED DATA REPLICATION FOR DISASTER RECOVERY - Pipelined data replication for disaster recovery is disclosed. An example pipelined data replication method for disaster recovery disclosed herein comprises sending replicated first data from a primary processing environment to a secondary processing environment for backup by the secondary processing environment, the replicated first data being a replica of first data in the primary processing environment, processing the first data in the primary processing environment prior to the backup of the replicated first data by the secondary processing environment being confirmed, and preventing a result of the processing of the first data from being released by the primary processing environment until the backup of the replicated first data by the secondary processing environment is confirmed. | 2014-02-06 |
20140040207 | Method for a cloning process to enable cloning a larger System drive to a smaller system - System and method for automatically discarding sets of pre specified files or divert sets of pre specified files from the files that would normally be sent to a storage device during a backup or cloning operation as the backup device becomes full. The embodiments are used to allow a backup of a storage device onto a smaller capacity storage device with as many files as possible. The embodiments uses one or more lists of files to discard which are used to filter files as the target drive become full. | 2014-02-06 |
20140040208 | EARLY RELEASE OF TRANSACTION LOCKS BASED ON TAGS - A computing system is associated with a first transaction and a second transaction. The first transaction is associated with an update to data and a release of at least one lock on the data prior to the first transaction being durable. The at least one lock is associated with and/or replaced with at least one tag. The computing system is to identify that the second transaction is to acquire the at least one tag based on a read of the data, determine whether the first transaction is durable based on the at least one tag, and delay a transaction commit for the second transaction until the first transaction is durable. | 2014-02-06 |