11th week of 2015 patent applcation highlights part 61 |
Patent application number | Title | Published |
20150073952 | SYSTEMS AND METHODS FOR DAILY RECOMMENDED SPEND - To address the challenges of managing the cash flow of an individual, the present solution provides for an efficient and automated Recommended Spend Evaluator tool. In an industrialized market where individuals make numerous purchases on a daily bases, while simultaneously incurring and managing dozens of bills and expenses, the systems and methods of the Recommended Spend Evaluator of the present solution enables individuals to seamlessly and efficiently plan their budget, monitor their progress, and enforce their expense budget. | 2015-03-12 |
20150073953 | IN-CARD ACCESS CONTROL AND MONOTONIC COUNTERS FOR OFFLINE PAYMENT PROCESSING SYSTEM - Preventing fraud during an offline transaction by encoding a randomly-generated card verification code onto a smart card. The verification code is transmitted to a contactless device during each transaction, wherein it is cross-referenced with the account number to ensure presence of the card. Also, every transaction record is signed by an access key resident on the contactless device and certified by a signing key resident on a remote system. Funds may be deposited onto the card when the contactless device creates a deposit request, signs the request using an access key and transmits it to the remote system, which in turn processes the request and certifies it with a signing key. Funds may be withdrawn when the contactless device creates a withdrawal record and signs it using an access key. The remote system verifies the signatures and certifies the records using a signing key when the records are later transmitted. | 2015-03-12 |
20150073954 | System and Method for Data Analytics - The invention relates to a system and method for providing anonymized, filtered data from a financial institution having cardholders to a business client. The method may include the steps of storing data in at least one database. The data may include credit card transaction data and debit card transaction data maintained by the financial institution, cardholder demographic data maintained by the financial institution, and other data maintained by the business client. The method may also implement a heuristic process to clean the data. Further, the method may comprise providing an interface for the business client to allow the business client to filter and display the data. The interface can anonymize the data to safeguard the privacy of the cardholders, receive input from the business client as to desired filtering criteria, wherein the filtering criteria include time period, geographic region, type of merchant, and cardholder demographic data, and present the anonymized, filtered data to the business client. The invention can thus enable improved decision making by the business client in various promotions, investments and other transactions. | 2015-03-12 |
20150073955 | MANAGEMENT INTERFACE FOR BUSINESS MANAGEMENT APPLICATIONS - According to some aspects, a method of providing access to and presenting information from a third-party business management software system, the third-party business management software system comprising a database storing customer data for a plurality of customers is provided. The method comprises providing an interface for display on a user computer, the interface accessible via an internet browser coupled to a network, receiving input from a user via the interface identifying a customer from the plurality of customers, responsive to the input from the user, accessing the third-party business management software system to obtain customer data associated with the identified customer, and presenting the customer data to the user via the interface in a single view. Some aspects include a system comprising at least one application computer for performing the above method. | 2015-03-12 |
20150073956 | MODEL RISK RATING - Apparatus and methods for model risk rating are provided. Model risk rating may include rating models on a scale of low potential risk, medium potential risk, high or critical potential risk. Model risk rating may include performing an assessment of model-application pairs. The assessment may include evaluating model complexity, application complexity, materiality of model use and model limitations and uncertainties. The model limitations and uncertainties may be weighted by severity. Mitigations to a model limitation may be taken into account. Apparatus and methods allow for aggregating model risk scores. A ranking of models may be determined based on the model risk scores. Scoring thresholds may be defined based on criteria of inherent potential risk, potential risk of financial losses and severity of model limitations. Based on these thresholds, each model may be classified as low potential risk, medium potential risk, high or critical potential risk. | 2015-03-12 |
20150073957 | EXTENDED RANGE MODEL RISK RATING - Apparatus and methods for model risk rating are provided. Model risk rating may include rating models on a scale of low potential risk, medium potential risk, high or critical potential risk. Model risk rating may include performing an assessment of model-application pairs. The assessment may include evaluating model complexity, application complexity, materiality of model use and model limitations and uncertainties. The model limitations and uncertainties may be weighted by severity. Mitigations to a model limitation may be taken into account. Apparatus and methods allow for aggregating model risk scores. A ranking of models may be determined based on the model risk scores. Scoring thresholds may be defined based on criteria of inherent potential risk, potential risk of financial losses and severity of model limitations. Based on these thresholds, each model may be classified as low potential risk, medium potential risk, high or critical potential risk. | 2015-03-12 |
20150073958 | RESEARCH REPORT RECOMMENDATION ENGINE ("R+hu 3 +lE") - A processor for providing a plurality of research reports to a pre-determined entity. The processor may rank a plurality of research reports based, at least in part, on the magnitude of times the research reports have been read by a group of peers of the pre-determined entity. The processor may assign a first score (r) to each of the research reports based on the ranking. The processor may also rank the plurality of research reports using multi-dimensional clustering and assign a second score based thereon (i). The processor may also rank the plurality of research reports using a trending metric and assign a third score (p) based thereon. The trending metric may be based on the amount of times the research reports were read in a pre-determined period. The processor may calculate a final report score for each research report according to the following equation: | 2015-03-12 |
20150073959 | Collaborative Financial Management - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for collaborative financial management, including instructions to display in a first region of a display of the device a name of a currently selected financial collaboration group out of multiple financial collaboration groups to which a user of the device is a member. Instructions to receive data representing events associated with the currently selected financial collaboration group, each event of the being one of a multiple of types. Instructions to display in a second region of the display of the device an ordered list of the events, wherein each item in the ordered list includes a visual indicia of an event type for the event corresponding to the item. Instructions to select a different financial collaboration group in response to a touch input in the first region of the display of the device. | 2015-03-12 |
20150073960 | INTEGRATED CLOUD SERVICE BROKERAGE (CSB) PLATFORM FUNCTIONALITY MODULES - An apparatus comprises a plurality of cloud computing systems each including cloud resources configurable to embody a plurality of virtual machines and a cloud services brokerage platform (CSB) having coupled thereto each one of the cloud computing systems. The CSB platform enables a plurality of cloud service consumers to selectively procure access to a respective portion of said cloud resources of a least one of the cloud computing systems and to configure said procured cloud resources to embody one or more virtual machines thereof. The CSB platform implements apportioning of cloud services charges for said procured cloud resources of a particular one of the cloud service consumers to respective cloud service entities thereof. | 2015-03-12 |
20150073961 | SYSTEM AND METHOD FOR INTERACTIVE VISUAL ANALYTICS OF MULTI-DIMENSIONAL TEMPORAL DATA - Multi-dimensional temporal data can provide insight into patterns, trends and correlations. Traditional 2D-charts are widely used to support domain analysts' work, but are limited to present large-scale complicated data intuitively and do not allow further exploration to gain insight. A visual analytics system and method which supports interactive analysis of multi-dimensional temporal data, incorporating the idea of a novel visualization method is provided. The system extends the ability of mapping techniques by visualizing domain data based on a 3D geometry enhanced by color, motion and sound. It allows a compact universal overview of large-scale data and drilling down for further exploration. By customizable visualization, it can be adapted to different data models and applied to multiple domains. It helps analysts interact directly with large-scale data, gain insight into the data, and make better decisions. | 2015-03-12 |
20150073962 | Boundary Constraint-Based Settlement in Spread Markets - A computer implemented method determines a settlement price for a constituent contract of a plurality of spread instruments. The method includes obtaining market data indicative of bid-offer values for the plurality of spread instruments, generating synthetic market data for the constituent contract based on the bid-offer values and based on a respective settlement price for an active contract of each spread instrument of the plurality of spread instruments, determining boundary constraints on the settlement price for the constituent contract based on the synthetic market data, and computing the settlement price for the constituent contract based on the boundary constraints. | 2015-03-12 |
20150073963 | Matching with Level Residual Allocation - The disclosed embodiments relate to systems and methods which match/allocate an incoming order to trade with “resting,” i.e. previously received but not yet matched, orders. A primary volume of the aggressor order is allocated to a first subset of orders of the set of previously received orders based on a first matching procedure in partial satisfaction of the aggressor order. A residual volume of the aggressor order remaining after the partial satisfaction of the aggressor order is computed. Unfilled orders of the set of previously received orders are arranged in a ranking based on a second matching procedure independent of order size. A predetermined, level quantity of the aggressor order is allocated to each order in a second subset of the set of previously received orders in accordance with the ranking until the residual volume is exhausted. | 2015-03-12 |
20150073964 | MARKET DATA HANDLING BASED ON DERIVATIVE CONTRACT SPECIFICATIONS - In an example embodiment a market data management system allows users to track information regarding commodities. A representative market data management system comprises physical commodity objects including a plurality of fields that describe a real world commodity, market identifier objects including market identifier codes, and contract specification objects including a plurality of fields that describe a derivative contract specification for a particular commodity traded at a particular commodity market. In the data model, a one to many relationship may exist for a physical commodity object and contract specification objects (e.g., a given commodity may be traded according to different derivative contract specifications). The data model may also allow a many to many relationship between contract specification objects and market identifier objects (e.g., a given market may have multiple derivative contract specifications and/or a given derivative contract specification may have the same terms at different markets). | 2015-03-12 |
20150073965 | COMPLIANCE DATA MANAGEMENT SYSTEMS AND METHODS - A method and system for detecting potentially manipulative order patterns and assisting compliance professionals with analyzing and determining whether remedial actions are required with respect to such patterns to comply with governing regulations. The method includes receiving market-wide data from different sources of marketplace data, receiving local order data and accounts corresponding to local trading activity, applying a compliance event detection module to the local order data and market-wide data, integrating a portion of the market-wide and the local order data into a combined stream, comparing the state of one account's local order book to the state of the market-wide order book, identifying a concentration of the local order book on one side, identifying a compliance-related event, generating a score associated with a compliance-related event, and providing a user-interactive interface that displays the state of the local market order book, the market-wide order book, and a compliance related event. | 2015-03-12 |
20150073966 | Method And Apparatus For Processing And Routing Transactions - Option orders are processed by receiving an option order, the option order including information identifying a customer, and information identifying a desired option. One of a plurality of option exchanges is selected to complete the option order, the selecting based on information identifying the customer and the desired option. In some embodiments, a routing rule is selected based on the information identifying a customer. | 2015-03-12 |
20150073967 | TRANSMISSION LATENCY LEVELING APPARATUSES, METHODS AND SYSTEMS - Embodiments of the transmission latency leveling apparatuses, methods and systems provide an electronic bidding order management infrastructure, such as a “point-of-presence,” which receives and routes electronic trading orders from different trading entities at a server via a transmission medium to create a certain amount of transmission latency before the trading orders could arrive at and be executed at electronic exchanges to reduce latency arbitrage and/or order book arbitrage that may be experienced by high frequency trading participants. A similar transmission latency may be applied to the egress transmission of market data updates issued by an electronic exchange. Other techniques for facilitating electronic trading are also disclosed. | 2015-03-12 |
20150073968 | FLOWBOOK ALTERNATIVE TRADING SYSTEM - An alternative trading system or platform for allowing a liquidity remover to place an order for the purchase or sale of a security or other commodity to be fulfilled by one or more liquidity providers. The platform may contain a rating module to allow members to create ratings of one another based on their own criteria; an indexor which utilizes the ratings to generate a list of liquidity providers offering a security of interest to a liquidity remover; a provider selector for determining which provider or providers to join in a transaction with the remover; and a price calculator for determining an execution price for the current transaction between a remover and a provider based on ratings and payment/price improvement configurations. | 2015-03-12 |
20150073969 | TRANSCATIONALLY BASED BENCHMARK FOR MARKET TRANSACTIONS IN SHORT TERM SECURITIES - The present invention provides systems, methods, apparatus, and computer program products related to calculating and distributing objective benchmarks configured to provide insight to various portions of the securities market. In various embodiments, a method for providing a short term security intraday benchmark is provided. The method may comprise collecting transactional data for a short term security. The transactional data may be parsed from transactions associated with the short term security within a predetermined time period. The method may further comprise calculating a benchmark based at least in part on the transactional data and execution of a predetermined algorithm; and providing the benchmark in a digital format. | 2015-03-12 |
20150073970 | METHOD AND APPARATUS FOR ORDER ENTRY IN AN ELECTRONIC TRADING SYSTEM - Orders received by an electronic trading system are processed in batches based on the instrument to which an order relates. An incoming order is assigned to a queue of a queue set that makes up the batch according to a random process. Where orders are received from related trading parties they are assigned to the same queue set according to their time of receipt. The batch has a random duration within defined minimum and maximum durations and at the end of the batch, the orders held in the queues are transferred to a matching thread of the trading system sequentially with one order being removed from each queue and a number of passes of the queues completed until orders have been removed. | 2015-03-12 |
20150073971 | METHOD OF COMPUTERIZED MONITORING OF INVESTMENT TRADING AND ASSOCIATED SYSTEM - A method of computerized monitoring of investment trading includes providing historic trading data for a specific trader, selecting a plurality of trading parameters for the specific trader and obtaining current information regarding the selected parameters, and/or providing historic trading data and applying rules to the current information and/or historic trading data to determine if a rules violation has occurred. The system may be employed to monitor whether market timing of mutual fund investments has occurred. A corresponding computerized system is disclosed. | 2015-03-12 |
20150073972 | SYSTEMS AND METHODS FOR TRADES PRICED RELATIVE TO A REFERENCE BENCHMARK VALUE ASSOCIATED WITH AN UNDERLYING INDEX FUTURE - According to some embodiments, an indication of a trade priced relative to a reference benchmark value (e.g., a trade at index close transaction) associated with an underlying index future may be received when a basis of the trade is agreed to by parties of the trade. Moreover, the indication may be received at least one day prior to a determination of a final price and quantity of the trade. The trade might create, according to some embodiments, any derivative, such as a future, an option, or a combination of put and call options. The trade may be reported and cleared, and it may then be arranged for the trade to physically settle into the underlying index future. | 2015-03-12 |
20150073973 | CONTROLLING PRICE CASCADE MOVEMENTS IN AN ELECTRONIC TRADING SYSTEM - A disclosed system, method and computer readable storage medium includes mechanism for controlling cascade price movements in an electronic trading system. Price limits control the prices at which traders can place orders. An upper price limit prevents traders from placing orders above the upper limit and a lower price limit prevents traders from placing orders below the lower limit. The gap between the upper limit and the indicative market price as well as the gap between lower limit and the indicative market price is controlled so as to cause a breaking effect on very rapidly changing market price. | 2015-03-12 |
20150073974 | AUCTIONING MECHANISMS FOR DARK ORDER BLOCK TRADING - Auctioning mechanisms adapted to improve the integrity of dark order block trading is provided. | 2015-03-12 |
20150073975 | METHOD AND SYSTEM FOR THE ISSUANCE OF INSTANT CREDIT - A method and system for the issuance of Instant Credit has an Instant Credit engine that performs instantaneous analyses. The method and system can operate along side existing “batch” processes. In addition, the method and system offer various channels of distribution for the Instant Credit products. With the present invention, Instant Credit and other Instant services (e.g., instant account balance transfers, etc.) can be obtained via, Internet, point-of-sale and other distribution channels. The present system also enables highly dynamic product offerings, which can be generated “instantaneously” based on a variety of factors, such as, for example, the channels of distribution (e.g., telephone or Internet), the product sought and/or even the particular individual and/or entity that is applying for a line of credit. | 2015-03-12 |
20150073976 | Correcting Errors in Mortgage Applications - Methods, systems, and products determine a cost to correct mortgage applications. When electronic data is submitted in an electronic mortgage application form, the electronic data is checked for errors. If an error is determined, a cost to resolve the error is also determined. | 2015-03-12 |
20150073977 | MERCHANT TRACKING AND ANALYSIS TOOL - Transaction data is processed using a store number that is associated with a merchant. By analyzing sales of a merchant by store, a financial institution can better assess the financial health of a merchant. The financial institution can subsequently evaluate different value propositions that may be offered to the merchant or a consumer. The store numbers are extracted from the transaction entries so that a performance metric can be determined by store locations of the merchant. Consequently, the financial institution can determine the financial health of the merchant based on individual stores rather than on the total sales of the merchant. Different value propositions can be offered by the financial institution to a merchant or a consumer of the merchant based on an analysis of the transaction data. Transaction data for different merchants and different geographic areas can be compared to identify potential customers for the financial institution. | 2015-03-12 |
20150073978 | PROCESSING LOAN TRANSACTIONS - A method includes receiving, from a client, a request for service associated with a loan transaction and determining, by a processor, whether the client is authorized to complete the request. If the client is authorized to complete the request, the request is processed. If the client is not authorized to complete the request, the request is communicated to an administrator, wherein the administrator validates the determined authorization of the request. | 2015-03-12 |
20150073979 | MULTIPLE-ENTITY TRANSACTION SYSTEMS AND METHODS - Methods and systems are provided for performing a funds transfer. The method may include determining which of a plurality of different funds-transfer companies is able to complete the funds transfer in accordance with defined parameters. The method may also include determining a default service fee charged for the funds transfer by a funds-transfer company of a subset of the plurality of different funds-transfer companies. The method may additionally include transmitting to at least one funds-transfer company of the subset of the plurality of different funds-transfer companies details of the funds transfer, where the details of the funds-transfer comprises the default service fee. The method may furthermore include transmitting an identification of the subset of the plurality of different funds-transfer companies, each of which is capable of completing the funds transfer in accordance with the defined parameters, the subset including at least two of the plurality of different funds-transfer companies. | 2015-03-12 |
20150073980 | BLUETOOTH LOW ENERGY (BLE) PRE-CHECK IN - One or more Bluetooth® low energy (BLE) beacons in communication with a remote server that provides check in capabilities and payment capabilities may be installed at a location. The BLE beacons may connect with a user's mobile device when the user enters the location and allow the user to check in to the location and authorize payments to be made at the location. Once the user is checked in to the location, the user may be provided with additional functionality, benefits, offers, and applications related to the location and facilitated by the check in. Further, the user may be pre-checked in into a next location when the user is at a current location. | 2015-03-12 |
20150073981 | DATA BREACH DETECTION - A merchant data breach process comprises processing daily payment transaction data with a risk and compliance platform to obtain a fraud score for each constituent transaction. Constituent transactions with high risk fraud scores are sorted into a table according to the transaction date, cardholder, and merchant. The table data is scored according to suspected card visits, highly probable visits, and all card visits. The scores are normalized according to merchant size grouping through the use of multipliers. The normalized scores are summed together day-by-day into a final score. A timely warning of an underlying and expanding security rupture caused by a merchant data breach is issued for damage control and law enforcement. | 2015-03-12 |
20150073982 | ELECTRONIC WALLET FUND TRANSFER SYSTEM - Systems and methods for transferring funds to an user account include a payment service provider device receiving a request for fund transfer information for an user account from a payer device that is associated with a payer. The payment service provider device then provides a routing number that is associated with the payment service provider and a virtual account number that is associated with the user account to the payer device. The payment service provider device then receives information from a financial institution about a funds transfer to a payment service provider account that is provided to a payment service provider by the financial institution. The information about the funds transfer includes a funding amount and the virtual account number, and the payment service provider device allocates the funding amount to the user account using the virtual account number. | 2015-03-12 |
20150073983 | VIRTUAL WALLET - One variation of a method for controlling a reprogrammable payment card includes: at the payment card, establishing a wireless connection with a mobile computing device; receiving, over the wireless connection, a first magnetic sequence command corresponding to a first payment method, a first digital transaction credential corresponding to the first payment method, and a second magnetic sequence command corresponding to a second payment method; initiating a first mode; in the first mode, arming a controller within the payment card to drive a magnetic stripe emulator within the payment card according to the first magnetic sequence command; in the first mode, activating an integrated circuit within the payment card to broadcast the first digital transaction credential; and in the first mode, disabling operation of the magnetic stripe emulator and the integrated circuit in response to failure of a wireless connection with the mobile computing device. | 2015-03-12 |
20150073984 | ATM PROVIDED PAYMENT PROCESS - System, method, and computer program product are provided for a user to send and receive P2P payments using an ATM machine. Through the use of an ATM, a user may access accounts the user has at a financial institution and direct payments to other individuals or entities from the ATM using those accounts. In this way, the user may ensure a secure payment to a third-party through the network associated with the financial institution and ATM. The payments may be directed to individuals the user may input into the system or to pre-established entities. This invention allows a user to receive and provide payments for any type of transaction utilizing the security, accuracy, and convenience provided to the user by an ATM. | 2015-03-12 |
20150073985 | Selectively Using Degree Confidence for Image Validation to Authorize Transactions - An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold. | 2015-03-12 |
20150073986 | ELECTRONIC CHECK-BASED PAYMENT SYSTEM AND METHODS FOR ISSUING, TRANSFERRING, PAYING AND VERIFYING ELECTRONIC CHECKS - The invention relates to the sphere of information technologies, in particular, to electronic systems and monetary-fund circulation methods and can be used for solving problems of mutual settlements between participants of the electronic payment system in real-time mode. In doing so, the analogue of monetary funds in the invention presented are electronic bank bearer checks complying with bank regulations and the requirements of applicable legislation. The client application units are rendered as grouped into modules by categories corresponding to the user status determined by the unit of authorization of the client and server applications, with provision of the possibility of pre-setting a group of check circulation parameters for each category. The issue of checks is accompanied by the creation of legally-valid documents and reflection of transactions in the check register. | 2015-03-12 |
20150073987 | FRAUD DETECTION SYSTEM, METHOD, AND DEVICE - The present invention provides a method of authenticating a transaction, the method having: responsive to receiving a request for authenticating a transaction involving a first device and including first device information defining at least one first device characteristic of the first device, obtaining second device information defining at least one second device characteristic of a second device associated with the transaction; determining a level of correlation between the first device information and the second device information; and authenticating the transaction based on the level of correlation between the first device information and the second device information, wherein the transaction is authenticated when the level of correlation between the first device information and the second device information is above a pre-determined threshold. | 2015-03-12 |
20150073988 | Methods and Systems of Facilitating Payments on a Payment Card Network - Methods and systems are provided for processing a transaction requesting payment of a first amount to a recipient. An exemplary method is performed at a network node of the system and comprises: identifying at least one payment parameter associated with the transaction; determining, in accordance with the at least one payment parameter, a plurality of account numbers associated with the transaction; and for each of the determined account numbers: determining a respective payment amount and a respective payment provider associated with the account number; and transmitting, to the determined payment provider, a subsequent request for payment of the determined payment amount. | 2015-03-12 |
20150073989 | SYSTEMS AND METHODS TO TRANSMIT CONSUMER INFORMATION IN CONNECTION WITH PAYMENT TRANSACTIONS - A computing apparatus includes: a portal configured to provide a user interface to a user to specify a privacy policy of the user and to receive consumer data of the user; a data warehouse coupled with the portal to store the privacy policy in connection with account information identifying a payment account of the user; a payment processor of a payment processing network configured to process payment transactions made using payment accounts and store in the data warehouse transaction data recording the payment transactions processed by the payment processor; and a rule engine coupled with the payment processor and the data warehouse to determine, in response to a payment transaction made using the account information for a payment to a merchant on behalf of the user, whether or not to transmit the consumer data of the user to the merchant in accordance with the privacy policy of the user. | 2015-03-12 |
20150073990 | ELECTRONIC TRANSACTION METHOD - Disclosed herein is a method of transferring information in an electronic transaction between a first entity and a second entity. The method comprises: sending, by a first system | 2015-03-12 |
20150073991 | TRANSFERRING FUNDS BETWEEN FINANCIAL ACCOUNTS OF TWO ACCOUNTHOLDERS - A facility for initiating a funds transfer operation is described. The facility displays on a mobile device identity verification information for other people each associated with another mobile device within a maximum distance. For example, the displayed identity verification information may be a picture of the person. The user may select one of these in order to initiate a funds transfer operation to the selected person. | 2015-03-12 |
20150073992 | SYSTEM AND METHOD FOR SECURE TRANSACTION PROCESS VIA MOBILE DEVICE - A system providing enhanced security for device based transactions, constituted of:
| 2015-03-12 |
20150073993 | SAVINGS SWEEP PROGRAM - Embodiments of the invention provide systems, methods, and computer program products for distributing money between a first account, such as a checking account, and a second account, such as a savings account. Embodiments generally involve determining an upper limit and lower limit associated with the first account, and sweeping funds from the second account into the first account when funds in the first account equal or fall below the lower limit. Funds are swept from the second account into the first account until the funds in the first account are above the lower limit and below or equal to the upper limit. In one embodiment, a target balance is determined between the lower and upper limits, and sweeping funds from the second account into the first account comprises sweeping funds until the funds in the first account equal the target balance. The upper limit, lower limit, and target balance may be defined by the account owner. | 2015-03-12 |
20150073994 | PAYMENT PROCESSING SYSTEM, PAYMENT TERMINAL, COMMUNICATION DEVICE, PAYMENT SERVER AND PAYMENT PROCESSING METHOD - Provided is a payment processing system for executing payment processing by transmitting and receiving payment data between a payment terminal and a payment server via a communication device, the payment terminal not including a dedicated network device for communication with the payment server, the payment data including at least payment amount information and service information to which a payment is to be executed. The payment terminal includes a payment data generation section configured to generate first payment data in which the payment amount information is encrypted, and a terminal communication unit configured to transmit the generated first payment data to the communication device by short range communication | 2015-03-12 |
20150073995 | SYSTEM AND METHOD FOR AUTHORIZING A FINANCIAL TRANSACTION - A method of authorizing a financial transaction involves a payment terminal receiving, from a payment card interfaced with the payment terminal, application data in response to a predetermined authorization amount provided to the payment card by the payment terminal. The application data comprises an account number uniquely associated with the payment card. The payment terminal generates an adjusted authorization amount based on the account number and from a preliminary authorization amount received at the payment terminal, provides the payment card with the adjusted authorization amount, receives a cryptogram from the payment card in response, and provides notification of authorization of a financial transaction for the adjusted authorization amount in accordance with a confirmation that the cryptogram received at the payment terminal from the payment card was generated by the payment card from the adjusted authorization amount and from a cryptographic key uniquely associated with the payment card. | 2015-03-12 |
20150073996 | Mobile Payment Application Provisioning And Personalization on a Mobile Device - Embodiments of the present invention are directed to systems and methods for providing a central entity that can provision mobile payment applications on mobile communication devices and personalize the mobile payment applications with consumer and account information. The personalization of the mobile payment application on the mobile communication device may include provisioning a payment account on the mobile payment application. The central entity may provision the account on the mobile payment application without interacting with the issuer during the provisioning of the account. The central entity may provision the account on the mobile communication device by decrypting, using a secure element key, encrypted payment account information received from the mobile communication device. The payment account information may be encrypted by a secure element of the mobile communication device using the same secure element key. | 2015-03-12 |
20150073997 | SECURING A TRANSACTION BETWEEN A TRANSPONDER AND A READER - A transponder-reader payment system includes a fob including a transponder, and a RFID reader for interrogating the transponder. The system may further include a personalization system for populating onto the fob and RFID reader identifying information and security and authentication keys which may be used during mutual authentication of the fob and the reader and for completing a transaction. In exemplary operation, the fob and RFID reader may be personalized, the fob may be presented to the RFID reader for interrogation, the fob and reader may engage in mutual authentication, and fob identifying information may be provided to the reader for transaction completion. In another exemplary embodiment, operation of the transponder-reader payment system may be controlled by an activation circuit. Further, the fob may be responsive to multiple interrogation signals. | 2015-03-12 |
20150073998 | Use of a Biometric Image in Online Commerce - An online store can transmit an online account token to an electronic device or to a biometric sensing device after a user successfully enters his or her account password. The electronic device or the biometric sensing device can countersign the online account token when the one or more biometric images match reference biometric images and the account password matches user identifier data stored in the electronic device or in the biometric sensing device. The countersigned online account token can then be transmitted to the online store. The user can then make one or more purchases after the online store receives the countersigned online account token. | 2015-03-12 |
20150073999 | METHOD AND SYSTEM FOR CONDUCTING A PAYMENT TRANSACTION AND CORRESPONDING DEVICES - A method includes generating a token at a server device and transmitting the token from the server device to a payer device, the token corresponding to a payment account; receiving the token at the payer device and transmitting the token from the payer device to a payee device via a short-range wireless communication protocol; receiving the token at the payee device and transmitting the token with transaction data from the payee device to the server device, the transaction data corresponding to the payment transaction; and receiving the token with the transaction data at the server device and conducting the payment transaction at the server device using the transaction data and the payment account corresponding to the token. | 2015-03-12 |
20150074000 | SYSTEM, METHOD, AND COMPUTER PROGRAM FOR NEGOTIATING ONLINE TRANSACTIONS - The present invention provides a system, method and computer program for negotiating online transactions. The method includes obtaining a price for an item from one or more sellers. A buyer can make possibly dissimilar offers for one or more of the items. If all offers are less than all the prices for those items, the offer is rejected and a seller can negotiate the price for reoffer to the buyer. If the offer is at least as high as one of the prices, a transaction is processed between the buyer and a seller. If the offer meets the price of more than one seller, the seller to transact with may be determined based on a prioritized list from the buyer. | 2015-03-12 |
20150074001 | Method for Crowdsourcing and Creating a Collaborative Multimedia Project and Product - The current method and system utilize crowdsourcing for content generation and production of multimedia through online collaboration. The current method not only creates a platform for online content providers to gain exposure and get feedback, it uses these broad powers of the crowd to select, refine and produce media that enables broader production and reward of partial contributions and serves a larger audience with self-selected interests. | 2015-03-12 |
20150074002 | LAND VALUE DETERMINATION - In one example, a method includes receiving, by a parcel value analyzer and score generator (PVASG) executing on a computing device, data for a region of interest that includes a parcel of land. The data for the region of interest includes at least one of parcel data and logistics data. The method further includes determining, by the PVASG and based on the received data for the region of interest, a land value for the parcel of land included in the region of interest. The method further includes outputting, by the PVASG and in response to determining the land value for the parcel of land included in the region of interest, at least one report that includes an indication of the determined land value for the parcel of land. | 2015-03-12 |
20150074003 | SYNCHRONIZING PASSENGER CHECK-IN WITH THE LOCAL CACHING OF CLOUD-BASED MEDIA ON A VEHICLE - Cloud-based media can be locally cached at a vehicle in which a user will travel. The media may be accessed by an authorized user during an authorized period that can be based upon vehicle status, such as vehicle speed or altitude. When the authorized period expires, the media stored at the vehicle can be deleted. | 2015-03-12 |
20150074004 | BICYCLE RENTAL SYSTEM AND METHOD - Disclosed herein are a bicycle rental system and method. The bicycle rental system includes a public bicycle, a bicycle holder, a bicycle management server which transmits rental approval information and return confirmation information to the outside, and a user terminal which is provided to be capable of performing wireless communicate with the public bicycle, is linked to the bicycle management server via a network, is provided with identification information of the public bicycle, creates rental approval request information during rental of the public bicycle to transmit the rental approval request information to the bicycle management server, creates return request information during return of the public bicycle to transmit the return request information to the bicycle management server, and receives the rental approval information and the return confirmation information transmitted from the bicycle management server in response to the rental approval request information and the return request information. | 2015-03-12 |
20150074005 | Method and apparatus for facilitating patent searching - One embodiment of the present invention provides a system that displays a patent. This system provides a user interface, which is configured to display panels containing different sections of the patent, wherein the panels for the different sections of the patent are visible at the same time. In this way, a user does not have to navigate to view the different sections of the patent. In a variation on this embodiment, the panels for the different sections of the patent can include: (1) a patent summary panel, which displays the abstract of the patent and also displays information associated with the patent, including: the patent number, the filing date, the issue date, the names of the inventors and the assignee; (2) a citations panel which displays documents which are cited by the patent; and (3) a claims panel which displays one or more claims in the patent. | 2015-03-12 |
20150074006 | Method for Producing Electronic Contracts Certified by a User of a Telecommunications Operator - The object of the invention is a certification method of contracts in an electronic format wherein a telecommunication operator certifies sending a contract by a user customer of said operator to another user which is not a customer of the telecommunication operator by means of an electronic mail and/or SMS; and this can sign by means of the response to the electronic mail or to the SMS the acceptance or rejection of the contract in a reliable way, generating proof of the transaction in every moment, so that it can be considered a legally binding contract since the entire process is certified by a telecommunication operator. | 2015-03-12 |
20150074007 | INTERACTIVE CASE MANAGEMENT SYSTEM - Embodiments of the present disclosure are directed to a method for processing computer readable electronic files in an investigation in a computer system including a processor coupled to a display and an electronic storage device coupled to the processor. The method includes the processor accessing the electronic files and related data from a data source. The accessed files and related data are culled by the processor based on predetermined filter criteria. The processor stores the remaining files and related data in a third-party data repository and maps a set of electronic files and related data stored in the third-party data repository into a predetermined database schema. The mapped files and related data are analyzed by the processor, which applies a status decision on them. The analyzed electronic files and related data are submitted to a third-party e-discovery processing application based on the applied status decision. | 2015-03-12 |
20150074008 | SECURE IDENTIFICATION SYSTEM AND METHOD - A computer based system is provided which utilizes a machine readable code presented by one intelligent (handheld) device and read by another. The existing credit authorization means used by banking, or other authorization means, validated the operator of the handheld, which may further be associated to the owner with an RFID, Bluetooth, biometric, or similar device held on the person of the operator or perhaps embedded on the individual. Transactions between secure servers allow validation of identity and monetary transfers. | 2015-03-12 |
20150074009 | SYSTEM AND METHOD FOR AUTOMATED TRAINING, CERTIFICATION AND RECORDATION FOR CLIMBER/TOWER SAFETY AND REGULATORY COMPLIANCE AT COMMUNICATIONS SITES - A computer based system for monitoring compliance of climber/tower safety procedures and personnel at communication towers. The system includes an updatable database of the wireless transmission towers and their unique safety information. The system can monitor and automatically generate reports of tower climber safety training and certification. Workers may be sorted by their employers, training status or other safety information including regulatory compliance. Communication towers may be sorted by structure type, safety status, type of work performed and who performed the work. The custom signs with the machine readable indicia can be used to enhance access to an automated climber/tower safety system. | 2015-03-12 |
20150074010 | NFC ENABLED CHARITABLE VOLUNTEERING AND GIVING - A method of using near field communication to facilitate charitable giving and volunteering. The method includes the steps of: determining, by a computing device, information about a person and information about a charitable organization based at least in part on reading a near field communication element; determining, by the computing device, whether the person desires to give to the charitable organization or to volunteer to help the charitable organization; sending, by the computing device, the information about the person to the charitable organization in an event that the person desires to volunteer to help the charitable organization; and sending, by the computing device, a donation to the charitable organization in an event that the person desires to give to the charitable organization. Also, computing devices that perform such methods. | 2015-03-12 |
20150074011 | SUPPLY CHAIN MANAGEMENT ANOMALY DETECTION - An integrated supply chain management with anomaly detection. An order schedule has one or more orders, each of which has a production requirement and a due date. An asset schedule has asset commitments associating assets with orders. Each asset has equipment specifications, including an asset class and one or more operational thresholds. The computer system identifies an asset of a class corresponding to a production requirement of an order and modifies the asset schedule to commit the asset to the order prior to the due date of the order. The computer system receives sensor input for the asset and determines whether an anomaly exists. If so, the computer system commits a second asset to the order. | 2015-03-12 |
20150074012 | SERVER EQUIPMENT AND METHOD FOR ARRANGING OF TRANSPORTATION AND REDUCTION OF EMISSIONS - Server equipment, a system and a method are configured to receive cargo data or other data related to the transportation of cargo or to travel. Data is registered for one or more parties of the cargo, for example, on a central server. On the basis of the data, one can separate and/or link the data regarding two or more pieces of air cargo or other cargo at least part of which is transported using another means of transportation, for example transportation by road. Cargo can also refer to a passenger. | 2015-03-12 |
20150074013 | SYSTEM AND METHODS FOR ROUTE EFFICIENCY MAPPING - A system includes a simulation module and a mapping module. The simulation module is configured to simulate performance of a first mission over at least one route by a first vehicle, and to simulate the performance of the first mission using route information corresponding to one or more characteristics of the at least one route and vehicle information corresponding to one or more characteristics of the first vehicle. The simulation module is configured to determine performance characteristics for the first mission, with the performance characteristics including at least one fuel usage characteristic evaluated for plural sections of the at least one route. The mapping module is configured to provide a fuel efficiency map describing fuel usage along at least a portion of the at least one route using the performance characteristics determined by the simulation module. | 2015-03-12 |
20150074014 | SYSTEM AND METHOD FOR AUTOMATED ROLE RE-FACTORING - In an example embodiment, roles within a job based security model are refactored to roles within a task oriented security model. The task oriented security model comprises task roles, which allow access to functionality and data, and enabler roles, which provide limits on the scope of the task roles. Data such as user assignment data, role to functionality mapping, functionality authorization objects, user identity and organizational data may be combined and normalized to create a mapping of users to functionality and organizational data. A refactoring engine may then examine the map to identify new candidate roles using contiguous regions of the map. Tuning parameters and constraints allow tuning of the candidate roles, and statistical metrics allow evaluation of the candidate roles. Candidate roles may be tested and applied in the new system. | 2015-03-12 |
20150074015 | SYSTEM AND METHOD FOR DISSEMINATING A CERTIFIED ANALYSIS FOR REFERENCE MATERIALS - Systems and methods for disseminating information pertaining to a reference material or certified reference material are disclosed. In one embodiment, the system includes the certified reference material and a package containing same, the package comprising a storage medium that stores an information product in a machine-readable format, the information product comprising either a pointer to certified analysis data or the certified analysis data itself. In one embodiment, the method comprises adding a quantity of a certified reference material to a package, incorporating, on the package, a storage medium for storing the information product, and encoding the information product in the storage medium. | 2015-03-12 |
20150074016 | Visualized Market Monitoring - Techniques for passive, visualized monitoring of market data using visuals are described and involve receiving by one or more computers a data stream of current market values for the financial item, applying the data stream to a rules engine to determine a change value and using by the computers the determined change value to retrieve an image according to a selected graphical representation of a financial item, with the change value corresponding to a defined status level for the financial item. | 2015-03-12 |
20150074017 | Market Driven Aural Monitor - Techniques for conveying market information to users are described. The techniques are computer driven and involve receiving by one or more computers a data stream of current market values for the financial item, applying by the one or more computers the data stream to a rules engine to determine a change value corresponding to a change between a current value of the financial item and a historical value and using by the one or more computers the determined change value to retrieve an audio file according to a selected audio representation, with the change value corresponding to a defined status, e.g., price, trading volume level for the financial item. | 2015-03-12 |
20150074018 | METHOD AND SYSTEM FOR AUTOMATICALLY IDENTIFYING TAX AGENCIES FOR REAL ESTATE PROPERTIES - Computer-based systems and methods are disclosed for automatically identifying taxes for real estate properties. The systems and methods can automatically identify the tax agency and/or tax identifier for real estate properties without substantial user interaction. In some embodiments, the systems and methods can automatically identify the real estate property and/or parcel based at least in part on received tax information without substantial user interaction. A confidence score and/or error rate may also be calculated based on one or more business rules to provide information about the relative error rate in any of the identifications provided. | 2015-03-12 |
20150074019 | HEALTH GUIDANCE RECEIVER SELECTION CONDITION GENERATION SUPPORT DEVICE - A memory that stores health checkup data of a person and a label value representing whether or not the person fell under a predetermined health guidance criterion in the subsequent period, and a processor connected with the memory are provided. The processor learns a discriminant model with use of the health checkup data of each person and the label value. The discriminant model, in which health checkup items of the health checkup data are used as explanatory variables, is represented as a polynomial including the explanatory variables and coefficients of the respective explanatory variables, and is used for discriminating whether or not the person falls under the health guidance criterion in the subsequent period. The processor generates, as a selection condition, combinations of the health checkup items as the explanatory variables and values of the coefficients in the discriminant model after learning. | 2015-03-12 |
20150074020 | SENTIMENT POLARITY FOR USERS OF A SOCIAL NETWORKING SYSTEM - A social networking system infers a sentiment polarity of a user toward content of a page. The sentiment polarity of the user is inferred based on received information about an interaction between the user and the page (e.g., like, report, etc.), and may be based on analysis of a topic extracted from text on the page. The system infers a positive or negative sentiment polarity of the user toward the content of the page, and that sentiment polarity then may be associated with any second or subsequent interaction from the user related to the page content. The system may identify a set of trusted users with strong sentiment polarities toward the content of a page or topic, and may use the trusted user data as training data for a machine learning model, which can be used to more accurately infer sentiment polarity of users as new data is received. | 2015-03-12 |
20150074021 | GENERATING A TRAINING MODEL BASED ON FEEDBACK - A method and apparatus for generating a training model based on feedback are provided. The method for generating a training model based on feedback, includes calculating an eigenvector of a sample among a plurality of samples; obtaining scores granted by a user for one or more of the plurality of samples in a round, obtaining scores granted by the user for a first number of samples; obtaining scores granted by the user for a second number of samples in response to detecting, based on the eigenvector, an inconsistency between the scores granted by the user for the first number of samples; and generating a training model based on the scores granted by the user for the first and second numbers of samples. A corresponding apparatus is also provided. | 2015-03-12 |
20150074022 | METHOD AND SYSTEM OF AUTOMATICALLY DOWNLOADING MEDIA CONTENT IN A PREFERRED NETWORK - In one exemplary aspect, a sorted list of scored media content episodes is received with a computing device of a user. Each respective media content episode is scored by an iterative autotuning prediction algorithm, and wherein each element of the sorted list of scored media content episodes comprises a value that represents a likelihood of a user listening to the respective media content episode and a reference to a location of the respective media content episode. A number of bytes of a download iteration for each media content episode is determined based on value that represents a likelihood of the user listening to the respective media content episode and an index of the respective media content episode in the sorted list. It is detected that a mobile device is in the preferred network. The download iteration is implemented for each media content episode when it is detected that the mobile device is in the preferred network. | 2015-03-12 |
20150074023 | UNSUPERVISED BEHAVIOR LEARNING SYSTEM AND METHOD FOR PREDICTING PERFORMANCE ANOMALIES IN DISTRIBUTED COMPUTING INFRASTRUCTURES - An unsupervised behavior learning system and method for predicting anomalies in a distributed computing infrastructure. The distributed computing infrastructure includes a plurality of computer machines. The system includes a first computer machine and a second computer machine. The second computer machine is configured to generate a model of normal and anomalous behavior of the first computer machine, where the model is based on unlabeled training data. The second computer machine is also configured to acquire real-time data of system level metrics of the first machine; determine whether the real-time data is normal or anomalous based on a comparison of the real-time data to the model; and predict a future failure of the first computer machine based on multiple consecutive comparisons of the real-time data to the model. Upon predicting a future failure of the first computer machine, generate a ranked set of system-level metrics which are contributors to the predicted failure of the first computer machine, and generate an alarm that includes the ranked set of system-level metrics. The model of normal and anomalous behavior may include a self-organizing map. | 2015-03-12 |
20150074024 | Inverse Function Method of Boolean Satisfiability (SAT) - A computer system uses an inverse function method to solve Boolean Satisfiability problems. The system benefits from the system disclosed in the US patent “Knowledge Acquisition and Retrieval Apparatus and Method” (U.S. Pat. No. 6,611,841). The system applies a learning function to access iterative set relations among variables, literals, words and clauses as knowledge; and applies deduction and reduction functions to retrieve relations as reasoning. The system uses knowledge learning (KL) and knowledge reasoning algorithms (KRA). The system abandons the “OR” operation of Boolean logic and processes only set relations on data. The system leverages the reversibility of deduction and reduction to determine whether 3-SAT formulas are satisfiable. | 2015-03-12 |
20150074025 | MULTI-OBJECTIVE SEMICONDUCTOR PRODUCT CAPACITY PLANNING SYSTEM AND METHOD THEREOF - Disclosure is a multi-objective semiconductor product capacity planning system and method thereof. The system comprises a data input module, a capacity planning module and a computing module. The machine information of the production stations, the product information and the order information are input by the data input module. According to the demand quantity of order, capacity information and product information, the capacity planning module plans a capacity allocation to determine the satisfied quantity of orders. The capacity allocation information is used to form a gene combination by chromosome encoding method. The computing module calculates the gene combination several times to generate numerous candidate solutions by a multi-objective genetic algorithm. The numerous candidate solutions sorts out and generates a new gene combination, and repeats the calculation to form candidate solution set until stop condition is satisfied. The candidate solution set is transformed into numerous suggestive plans as options. | 2015-03-12 |
20150074026 | APPARATUS AND METHODS FOR EVENT-BASED PLASTICITY IN SPIKING NEURON NETWORKS - Event based communication in a spiking neuron network may be provided. The network may comprise units communicating by spikes via synapses. Responsive to a spike generation, a unit may be configured to update states of outgoing synapses. The spikes may communicate a payload data. The data may comprise one or more bits. The payload may be stored in a buffer of a pre-synaptic unit and be configured to accessed by the post-synaptic unit. Spikes of different payload may cause different actions by the recipient unit. Sensory input spikes may cause postsynaptic response and trigger connection efficacy update. Teaching input may be used to modulate plasticity. | 2015-03-12 |
20150074027 | Deep Structured Semantic Model Produced Using Click-Through Data - A deep structured semantic module (DSSM) is described herein which uses a model that is discriminatively trained based on click-through data, e.g., such that a conditional likelihood of clicked documents, given respective queries, is maximized, and a condition likelihood of non-clicked documents, given the queries, is reduced. In operation, after training is complete, the DSSM maps an input item into an output item expressed in a semantic space, using the trained model. To facilitate training and runtime operation, a dimensionality-reduction module (DRM) can reduce the dimensionality of the input item that is fed to the DSSM. A search engine may use the above-summarized functionality to convert a query and a plurality of documents into the common semantic space, and then determine the similarity between the query and documents in the semantic space. The search engine may then rank the documents based, at least in part, on the similarity measures. | 2015-03-12 |
20150074028 | PROCESSING DEVICE AND COMPUTATION DEVICE - According to one embodiment, a processing device is configured to process input data formed of a plurality of input digital values. The processing device has a plurality of computation layers connected in series. Each of the computation layers has a plurality of computation devices. Each of the plurality of computation devices in the computation layer of a first stage is configured to generate a digital value from the input digital values and weight coefficients defined in advance. The weight coefficients are applied to each of the input digital values. Each of the plurality of computation devices of the computation layer of a second or subsequent stage is configured to generate a new digital value from the digital values generated by the computation devices of the computation layer of the previous stage and weight coefficients defined in advance. The weight coefficients are applied to each of the digital values. | 2015-03-12 |
20150074029 | ktRAM DESIGN - A ktRAM architecture comprising a memory wherein each input synapse or “bit” of the memory interacts on or with a common electrode through a common “dendritic” electrode, and wherein each input can be individually driven. Each input constitutes a memory cell driving a common electrode. One or more AHaH nodes can be provided wherein read out of data is accomplished via a common summing electrode through memristive components and wherein multiple input cells are simultaneously active. | 2015-03-12 |
20150074030 | Distributable Serializable Finite State Machine - A distributable and serializable finite state machine and methods for using the distributable and serializable finite state machine are provided wherein finite state machine instance can be location-shifted, time-shifted or location-shift and time-shifted, for example by serializing and deserializing each instance. Each instance can be located-shifted between agents, and a persistent memory storage location is provided to facilitate both location-shifting and time-shifting. Finite state machine instances and the actions that make up each instance can be run in a distributed fashion among a plurality of agents. | 2015-03-12 |
20150074031 | Computer implementation of term functor logic, (TFL), based on directed graph representation of TFL - The invention is a method of computer implementation of Term Functor Logic (TFL), embodied in a fully functional prototype, a computer program, Functor Logic Processor-Version 1, (FLP-1). The method is the “FLP method”, FLP. Input to FLP-1 consists of sentences (logical formulae) in TFL. Output are sentences that are the logical conclusions, (deductive inferences) derivable from the Input. FLP provides a “natural deduction” system for TFL, a basis for expert systems for logical analysis of input data, capable of wide application. The FLP method is based on a functional representation of the Input by a non-planar directed graph. All Output is determined from the adjacency matrix of the directed graph by algorithmic routines, including calculations of conclusions in a functor algebra unique to the method. | 2015-03-12 |
20150074032 | METHOD AND SYSTEM FOR ENTITY BASED POSITION ASSIGNMENT - A method and system for entity based position assignment are provided. The method includes: retrieving position data related to each position of a plurality of positions; retrieving data related to each entity of a plurality of entities, wherein each entity is to be assigned to one of the plurality of positions; determining a desirable arrangement based at least in part on the position data and the entity data; and arranging each entity in a corresponding desired position within the desirable arrangement. The system includes: a position module configured to retrieve position data relating to each position of a plurality of positions; an entity module configured to retrieve entity data relating to each entity of a plurality of entities, wherein each entity is to be assigned to a position; and a data analysis module configured to determine a desirable arrangement based at least in part on the position data and the entity data and further configured to arrange each in a corresponding desired position within the desirable arrangement. | 2015-03-12 |
20150074033 | CROWDSOURCED ELECTRONIC DOCUMENTS REVIEW AND SCORING - A system and a method for facilitating an expertise driven review and scoring of electronic documents in a crowdsourced environment. The system includes a server computer, a memory circuit and a processing circuit. The processing circuit is coupled to the memory circuit and includes or is coupled to a credentialing engine. The system further includes an expert scoring module. The system further includes a document reviewing and scoring engine coupled to the processing circuit. The document review and scoring module associates an aggregate score to the electronic document based on aggregation of the review ratings by crowdsourced experts and aggregate scores of each of the crowdsourced experts based on the set of attributes including one or more of the credentialed expertise, reputation of the expert, and the officiality. | 2015-03-12 |
20150074034 | GLOBAL REGULAR EXPRESSION BACKREFERENCES - A system and a method are provided for querying a knowledge resource. The querying system is configured for executing queries in a query language that accepts global backreferences that are not limited to a being located in the condition including a regular expression (regex) to which the global backreference refers. In the method, an input query is received, a query based thereon containing one or more global backreferences is executed, and results are retrieved. One condition of the query includes a regex that identifies strings that match the regex. The regex includes one or more capturing groups for capturing substrings of an identified matching string. The global backreference retrieves the captured substring(s). Each global backreference in the query can be a remote backreference, which is outside the regex condition to which it refers, or a local backreference, which is in the same condition as the regex. | 2015-03-12 |
20150074035 | DETECTING ROOT CAUSE FOR TRANSACTION DEGRADATION USING CAUSAL BAYESIAN NETWORKS - Techniques for detecting root cause for transaction degradation using causal Bayesian networks are disclosed. In some embodiments, various states associated with an application comprising transactions and components are determined, wherein the determined states are associated with the application transactions and components. The determined states are used as input to build a Bayesian network whose nodes represent application transactions and components. A root cause set comprising one or more application components that is associated with a transaction degradation is inferred by traversing the Bayesian network. | 2015-03-12 |
20150074036 | KNOWLEDGE MANAGEMENT SYSTEM - A knowledge management system configured to integrate information and to distill non-obvious knowledge from data by applying various engines operative in accordance with available information knowledge. | 2015-03-12 |
20150074037 | In Memory Database Warehouse - An in memory database system includes a random access memory to store an in memory database table, a stored set of defined views over the database tables, a stored set of analytical services adapted to provide transaction services and database warehouse services, an engine to run the analytical services on the database table, and an interface to interact with users and provide access to the engine, analytical services, and views to perform transactions and data warehouse functions on the database table. | 2015-03-12 |
20150074038 | Historical Data for In Memory Data Warehouse - A method includes processing a transaction on an in memory database where data being processed has a validity time, updating a time dependent data view responsive to the transaction being processed to capture time validity information regarding the data, and storing the time validity information in a historization table to provide historical access to past time dependent data following expiration of the validity time. | 2015-03-12 |
20150074039 | METADATA-DRIVEN AUDIT REPORTING SYSTEM - A system is provided that reports audit data. The system defines metadata that defines a business object of an application module and an attribute of the business object as being auditable. The system further configures the metadata to enable auditing for the attribute of the business object. The system further generates audit data for the attribute of the business object based on the metadata, where the audit data includes a history of one or more modifications to the attribute of the business object. The system further stores the audit data within a shadow database table based on the metadata. The system further displays the audit data within a user interface. | 2015-03-12 |
20150074040 | DEFERRING DATA RECORD CHANGES USING QUERY REWRITING - Staging data record changes from a faster storage medium to a slower storage medium using data query rewriting is provided. In response to receiving a data query corresponding to a particular data record, it is determined whether the data query is one of a transactional data query or an analytical data query. In response to determining that the data query is a transactional data query, the transactional data query is rewritten to apply transactional delta changes to the particular data record on a storage-class memory of a computer. In response to determining that the data query is an analytical data query, the analytical data query is rewritten to select and reconcile each data record corresponding to the particular data record stored on the storage-class memory with the particular data record stored on a persistent data storage device of the computer. | 2015-03-12 |
20150074041 | DEFERRING DATA RECORD CHANGES USING QUERY REWRITING - Staging data record changes from a faster storage medium to a slower storage medium using data query rewriting is provided. In response to receiving a data query corresponding to a particular data record, it is determined whether the data query is one of a transactional data query or an analytical data query. In response to determining that the data query is a transactional data query, the transactional data query is rewritten to apply transactional delta changes to the particular data record on a storage-class memory of a computer. In response to determining that the data query is an analytical data query, the analytical data query is rewritten to select and reconcile each data record corresponding to the particular data record stored on the storage-class memory with the particular data record stored on a persistent data storage device of the computer. | 2015-03-12 |
20150074042 | SYSTEM AND METHOD FOR DYNAMIC INTERACTION WITH A RESEARCH PUBLICATION DATABASE - Systems, apparatus, and methods are provided for providing dynamic interaction with a research publication database. | 2015-03-12 |
20150074043 | DISTRIBUTED AND OPEN SCHEMA INTERACTIONS MANAGEMENT SYSTEM AND METHOD - A system or method may receive, on a distributed computing system comprising a plurality of computing nodes, raw interaction data describing at least one interaction between two or more parties. The distributed computing may implement a map-reduce algorithm to map the raw interaction data into one or more entities, wherein each entity describes an attribute of an interaction. The distributed computing system my further update an interaction table to include each of the entities, wherein entities describing attributes of the same interaction are correlated. | 2015-03-12 |
20150074044 | GRAPH-BASED DATA MODELS FOR PARTITIONED DATA - The disclosed embodiments provide a system that manages access to data. During operation, the system provides a graph-based data model of the data, wherein the graph-based model comprises a set of nodes and a set of directed edges among the nodes. Next, the system stores the graph-based data model in a set of partitions, wherein each partition from the set of partitions includes one or more nodes from the set of nodes and all outgoing edges from the one or more nodes. Finally, the system enables lookup of a set of outgoing edges associated with a source node from the one or more nodes. | 2015-03-12 |
20150074045 | Business Rule Management System - Mechanisms for operating a business rule management system are provided. The mechanisms access a text file describing one or more business processes, and bindings of a plurality of text chunks within the text file to a respective plurality of elements within the business rule management system. The mechanisms detect a change in a bound text chunk in the text file and modify the respective bound element within the business rule management system according to the detected change in the bound text chunk in the text file. | 2015-03-12 |
20150074046 | Systems and Methods for Managing Databases - Systems and methods for managing databases are disclosed. One disclosed system includes a processor-addressable physical memory and a processor in communication with said processor-addressable physical memory and configured to execute an environment and to allocate an environment memory to said environment. In such a system, said environment is configured to maintain a database of objects in a database memory within said environment memory. An application executes in an application memory within said environment memory, and upon instantiation of a database object, the application environment allocates memory in said database for said database object, the database providing master storage for said database object. Upon an instruction to obtain said database object from said application, the environment provides to said application a reference to said database object; and upon an access operation on said database object by said application, provides to said application direct access to data of said database object. | 2015-03-12 |
20150074047 | MULTI-PROFILE SYNCHRONIZATION - Various embodiments provide an automated multi-device login synchronization function. For example, a private computing device, such as a smartphone or table computer, can detect a shareable device, such as a television set top box or video game consul, when the private device enters a room. In one example, the private device can determine whether the shareable device is currently associated with one or more user profiles. If the shareable device is not associated with a user profile, a command can be sent, by the private device to apply user settings and/or preferences for, and make content associated with, a user profile associated with the private computing device available on the shareable device. If, however, the shareable device is associated with a second user profile, a similar command can be sent causing the shareable device to merge the first and second user profiles to create a merged profile. | 2015-03-12 |
20150074048 | METHODS AND SYSTEMS FOR REAL-TIME TRANSACTIONAL DATABASE TRANSFORMATION - Methods and systems are disclosed for real-time transactional database transformation implemented as part of a real-time transactional database management system. | 2015-03-12 |
20150074049 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR TRANSFERRING DOCUMENT ATTRIBUTES - The present invention provides a method, system, and program product for transferring document attributes. Specifically, under the present invention, a change to an attribute corresponding to a document archived in a content storage system is received on an indexing system. In response to the change, an archival date corresponding to storage of the document in the content storage system is set to a current date. Also, a start date and an end date in an index transfer tool is set to the current date. Thereafter, the changed attribute is transferred to the content storage system based on a matching of the newly changed archival date with the set start and end dates. | 2015-03-12 |
20150074050 | SYSTEM AND METHOD FOR INCREMENTAL REPLICATION - A method of incrementally replicating investigative analysis data is disclosed along with a system for performing the same. The method and system provide the ability to break a data replication job into multiple “replication chunks” which can be exported and imported separately. By doing so, the method and system can efficiently replicate large numbers of data object changes over an unreliable data network. | 2015-03-12 |
20150074051 | BUILDING A METADATA INDEX FROM SOURCE METADATA RECORDS WHEN CREATING A TARGET VOLUME FOR SUBSEQUENT METADATA ACCESS FROM THE TARGET VOLUME - Provided are a computer program product, system, and method for building a metadata index from source metadata records when creating a target volume for subsequent metadata access from the target volume. A copy operation is initiated to copy the source volume to the target volume, wherein the target volume is created with a target volume name different from a source volume name of the source volume. Source volume metadata having records including information on data sets in the source volume is copied to target volume metadata. A metadata index is generated indicating locations of the records in the target volume metadata having information on the data sets in the target volume. The metadata index is used to access the records in the target volume metadata when accessing data sets in the target volume. | 2015-03-12 |