19th week of 2015 patent applcation highlights part 60 |
Patent application number | Title | Published |
20150127508 | Methods, Apparatus, Systems for First Look Matching of Orders on an Exchange - Various embodiments are directed to a trading system and method for matching orders between liquidity takers and liquidity providers. A memory stores instructions which, when executed, direct the processor to perform various actions, such as the following. The processor may receive from a liquidity taker, an order to trade on an exchange. The order is routed to at least one liquidity provider with a target fill rate above a specific percentage. A response is received from the at least one liquidity provider. Based on the received response, the processor may update an actual fill rate of the at least one liquidity provider. The processor may determine, based on comparing the liquidity provider's actual fill rate with the target fill rate, a level of performance for the at least one liquidity provider. The processor may transmit a report about the at least one liquidity provider's level of performance. | 2015-05-07 |
20150127509 | Transactionally Deterministic High Speed Financial Exchange Having Improved, Efficiency, Communication, Customization, Performance, Access, Trading Opportunities, Credit Controls, and Fault Tolerance - The disclosed embodiments relate to implementation of a trading system, which may also be referred to as a trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact, as well as improved and equitable access to information and opportunities. | 2015-05-07 |
20150127510 | Transactionally Deterministic High Speed Financial Exchange Having Improved, Efficiency, Communication, Customization, Performance, Access, Trading Opportunities, Credit Controls, and Fault Tolerance - The disclosed embodiments relate to implementation of a trading system, which may also be referred to as a trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact, as well as improved and equitable access to information and opportunities. | 2015-05-07 |
20150127511 | Transactionally Deterministic High Speed Financial Exchange Having Improved, Efficiency, Communication, Customization, Performance, Access, Trading Opportunities, Credit Controls, and Fault Tolerance - The disclosed embodiments relate to implementation of a trading system, which may also be referred to as a trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact, as well as improved and equitable access to information and opportunities. | 2015-05-07 |
20150127512 | Transactionally Deterministic High Speed Financial Exchange Having Improved, Efficiency, Communication, Customization, Performance, Access, Trading Opportunities, Credit Controls, and Fault Tolerance - The disclosed embodiments relate to implementation of a trading system, which may also be referred to as a trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact, as well as improved and equitable access to information and opportunities. | 2015-05-07 |
20150127513 | Transactionally Deterministic High Speed Financial Exchange Having Improved, Efficiency, Communication, Customization, Performance, Access, Trading Opportunities, Credit Controls, and Fault Tolerance - The disclosed embodiments relate to implementation of a trading system, which may also be referred to as a trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact, as well as improved and equitable access to information and opportunities. | 2015-05-07 |
20150127514 | Transactionally Deterministic High Speed Financial Exchange Having Improved, Efficiency, Communication, Customization, Performance, Access, Trading Opportunities, Credit Controls, and Fault Tolerance - The disclosed embodiments relate to implementation of a trading system, which may also be referred to as a trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact, as well as improved and equitable access to information and opportunities. | 2015-05-07 |
20150127515 | Transactionally Deterministic High Speed Financial Exchange Having Improved, Efficiency, Communication, Customization, Performance, Access, Trading Opportunities, Credit Controls, and Fault Tolerance - The disclosed embodiments relate to implementation of a trading system, which may also be referred to as a trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact, as well as improved and equitable access to information and opportunities. | 2015-05-07 |
20150127516 | Transactionally Deterministic High Speed Financial Exchange Having Improved, Efficiency, Communication, Customization, Performance, Access, Trading Opportunities, Credit Controls, and Fault Tolerance - The disclosed embodiments relate to implementation of a trading system, which may also be referred to as a trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact, as well as improved and equitable access to information and opportunities. | 2015-05-07 |
20150127517 | METHODS AND APPARATUS FOR FACILITATING FAIRNETTING AND DISTRIBUTION OF CURRENCY TRADES - Methods and apparatuses are provided for facilitating fairnetting and the distribution of currency trades. In one example, the method may include: (i) estimating non-provided trade information for each trade type of aggregated sets of trades of a plurality of trades using a market mid-rate; (ii) determining a netted amount and a market amount to transact based on received trade information and the estimated non-provided trade information; (iii) executing one or more trades for the market amount at a market rate; and (iv) distributing the market amount and the netted amount proportionally amongst the plurality of trades. | 2015-05-07 |
20150127518 | TRADING BASED ON FILL RATE - According to various embodiments, trades may be filled based at in part on order price and fill rates determined for providers of orders. In some embodiments, orders at a given price in an order book may be ordered in order of decreasing fill rate, such that orders associated with a higher fill rate (or higher probability of fill) are preferenced above orders associated with a lower fill rate. In some embodiments, order books may also be ordered based in part on response times from order providers. For example, orders in an order book may be ordered according to an algorithm that preferences higher fill rates and shorter response times ahead of orders with lower fill rates and longer response times. Order book ordering algorithms may also consider order quantity and interdependence and duplication of order quantity. | 2015-05-07 |
20150127519 | IDEAL LATENCY FLOOR - The invention relates to a system and method for providing a latency floor for an electronic trading venue in which market participants who can respond within the value the floor and choose to compete in a specific race to make or take a price may each have a substantially equal chance of winning that race. The system may detect and distinguish individual “races” that occur on an electronic trading venue. Upon detection of the first order (or message) in such a race, the system may create a batch and a timer for that race. As orders pertaining to that race are received, they are added to its batch. Upon the timer reaching a predetermined value, typically the value of the floor, the race is determined to have ended and the orders are drained from the batch for processing (e.g., against the instrument's central limit order book (CLOB)). | 2015-05-07 |
20150127520 | LARGE LIQUIDITY SEEKING TRADING PLATFORM - An electronic trading system implements a display price that guarantees a minimum available quantity for trade. The electronic trading system determines a quantity of financial instruments available at various prices for incoming orders. A display bid price and display offer price are determined so that the quantity available at the display prices exceeds a display quantity threshold. The electronic trading system receives orders designated fast and slow. Fast orders are used for large, rapid trades at known prices. Slow orders trade with a delay for a price improvement auction. Orders meeting a minimum order quantity threshold may participate in an auction for incoming orders that offers price improvement to the execution price of aggressively priced orders. The electronic trading system implements risk management measures based on order size and percentage filled for individual trades and series of trades. The electronic trading system supports orders having multiple legs. | 2015-05-07 |
20150127521 | USER INTERFACE FOR PRESENTING RELEVANT QUESTIONS TO REPRESENTATIVE - Embodiments of the invention are directed to a system, method, or computer program product for providing a unified representation of all customer relationships with an entity. This representation focuses on customer products in arrears that are to be recovered. The invention presents an overarching view of all customer relationships to a representative. This allows the representative to make decision and take appropriate actions immediately based on the entire relationship with the customer when a customer communication is initiated. As such, the invention correlates all of the customer's relationships with a financial institution into one unified representation for a representative to review. The unified representation takes into consideration all of the customer's relationships as well as external factors on the communications and relationships. Thus providing a holistic customer service experience for a customer with accounts in arrears. | 2015-05-07 |
20150127522 | LOAN MANAGEMENT SYSTEM AND METHOD - A loan management system and method includes an alternative repayment amortization method. Each installment on repayment of the loan includes an equal fixed principal repayment amount and an interest amount. The equal fixed principal repayment amount is based on the amount of the loan and the number of installments to be paid over the life of the loan. The interest due for each installment is based on the interest rate and the amount of outstanding principal at the time a given installment is due. | 2015-05-07 |
20150127523 | METHODS AND SYSTEMS FOR PAYEE INVOICE FINANCING AND PAYMENT - A computer system for providing financing of payee invoices is provided. The system includes a processor and a computer-readable storage device having encoded thereon computer-readable instructions that are executable by the processor. The processor receives at least one invoice from at least one payee that represents a verified debt obligation payable by a payor to the at least one payee on a specified due date. The processor also determines if the at least one verified invoice is eligible for financing to enable early payment of the at least one invoice. The processor also aggregates a plurality of financing-eligible invoices according to at least one aggregation criterion, to enable financing of the aggregated invoices as a unit, and determines whether financing of the unit of aggregated invoices, including the at least one verified invoice, will include participation by at least one partner. | 2015-05-07 |
20150127524 | SYSTEMS AND METHODS FOR PROVIDING ENHANCED LOAN QUALIFICATION INFORMATION - Methods and systems are disclosed for providing enhanced information relating to terms for financing a purchase, such as a real estate purchase. According to disclosed embodiments, a financial service system collects financial information associated with the prospective buyer. The financial service system also configures a secure software object, or token, comprising the buyer's financial information. The financial service system transmits the token to various inventory listing sites. By utilizing graphical user interfaces on the inventory listing sites that integrate the transmitted token information, the prospective buyer is provided enhanced information for shopping and researching their purchase, including how the purchase and its financing fit into their overall financial profile. | 2015-05-07 |
20150127525 | DYE PACH: SYSTEMS AND METHODS FOR ACH FUND TRACKING - When an Automated Clearing House (ACH) fund transaction is deemed to have suspicious nature, the ACH transfer file for the transaction may be marked with a unique key (dye pACH). The unique key may be used to track the transfer paths of funds through a plurality of financial institutions. Thus, the suspicious ACH fund may be tracked through the plurality of financial institutions. Law enforcement entities, such as police or Federal Bureau of Investigation (FBI) may use the unique key to track suspicious fund transfers through a plurality of financial institutions to detect money laundering or fraud activities or obtain high-level understanding of cybercrime organizations. | 2015-05-07 |
20150127526 | METHOD, SYSTEM AND SERVER SYSTEM OF PAYMENT BASED ON A CONVERSATION GROUP - A method and device of requesting and receiving payment in a group chat environment are disclosed. The method includes: displaying a conversation interface of a group chat session for a pre-established conversation group, the pre-established conversation group including a user of the user device and a plurality of other users participating in the pre-established conversation group; providing, in the conversation interface of the group chat session, a control for requesting payment from the pre-established conversation group; detecting an input from the user invoking the control for requesting payment from the pre-established conversation group; and in response to detecting the input from the user, posting a group payment request as a chat message to the group chat session. | 2015-05-07 |
20150127527 | PAYMENT PROCESSING SYSTEM AND METHOD - A computer-implemented method, system, and computer program product for processing a payment comprises: receiving a transaction request from a payee, the transaction request including an identifier of a payor, and identifier of the payee, and a payment amount; prompting the payor to input login credentials for a payor-identified funding institution; receiving the login credentials from the payor; transmitting the login credentials to the funding institution; receiving, from the funding institution, information regarding one or more accounts at the funding institution linked to the payor; prompting the payor to select an account; and generating a fund transfer request to instruct a financial clearing house to transfer funds in the amount of the payment amount from the selected account to a receiving account associated with the payee. | 2015-05-07 |
20150127528 | SYSTEM FOR CONNECTING USERS AND METHOD THEREOF - A method of connecting users is disclosed. A method may include creating a plurality of user accounts, each of the user accounts corresponding to one of the plurality of users, and having a plurality of uploadable features including a first feature permitting the user to upload at least one advertisable characteristic to a user account, forming a user network including one or more of the plurality of user accounts in communication with one or more other user accounts, identifying each of the plurality of user accounts containing the at least one advertisable characteristic, linking each of the plurality of user accounts containing the at least one advertisable characteristic, and notifying each of the plurality of user accounts containing the at least one advertisable characteristic of the identity of the other of the plurality of user accounts containing the at least one advertisable characteristic. | 2015-05-07 |
20150127529 | METHODS AND SYSTEMS FOR MOBILE PAYMENT APPLICATION SELECTION AND MANAGEMENT USING AN APPLICATION LINKER - An application linker system that manages a plurality of application identifiers associated with a plurality of payment applications present on a device is disclosed. The application linker may manage relationships between application identifiers and payment applications that are provisioned for secure storage on a device. For example, a transaction can be conducted between a portable communication device and an access device. The method includes receiving a request for available payment applications located on the portable communication device from the access device, determining application identifiers associated with payment applications on the device, and sending a list of available payment applications including the application identifiers to the access device. The payment applications store payment information associated with one or more consumer accounts. One of the application identifiers is associated with two or more payment applications. | 2015-05-07 |
20150127530 | ROTATING ACCOUNTS FOR TRANSFERS - A system and method may create a user interface where a first account may be lined up in relation to a second account and a transfer may move value from the first account to the second account. | 2015-05-07 |
20150127531 | REAL TIME RECURRING DISTRIBUTOR BILLING FOR SUBSCRIPTION PRODUCTS - A system of billing for subscription products and services from multiple vendors across multiple layers of buyers and sellers is presented. Each subscription is charged according to a rate plan, which may include volume, tiered, or usage-based pricing. In billing for subscriptions, sellers may use a single standard rate plan for each product, or may use a variety of rate plans depending on the type of customer, time period, or other attributes. The rate plans stored in the system are dynamic, such that a seller can instantly modify an existing rate plan in order to create a new rate plan. | 2015-05-07 |
20150127532 | TEXT SUBSCRIPTION IDENTIFIER TO RENEW SUBSCRIPTION - A subscription identifier is communicated between the billing server and subscription server. The billing server receives a subscription identifier text message from the user device. The billing server identifies a carrier server from the subscription identifier text message. The billing server receives an authorization text message from the user device in response to an authorization request text message and charges an account of the carrier server that has been identified. If the charge has been successful, then the billing server transmits a renewal notification text message to the subscription server. The subscription server updates an account having the subscription identifier to reflect a new expiration. | 2015-05-07 |
20150127533 | AUTHORIZATION OF CHECK DEPOSITS - A method for authorizing check deposits includes digitally recording a check; using digital image recognition methods to determine digital check data which describe the issuer, the recipient and the sum of the check; and authorizing the further processing of the check if one or more of the following steps are successful: a) checking, in a database protected from external access, whether the issuer of the check has cleared the recipient by comparing the digital check data with data from the database; and b) loading digital communication addresses of the issuer from a database protected from external access, transmitting the digital check data to the communication address with the request to digitally clear the check, and receiving digital clearance of the check from the issuer. | 2015-05-07 |
20150127534 | ELECTRONIC REFUND REDEMPTION - A system for electronic refund redemption includes an interface operable to receive an electronic communication identifying a product purchased by a user from a vendor, an amount of value added tax (“VAT”) included for the purchased product, and VAT refund criteria associated with the VAT jurisdiction in which the products were purchased, wherein the VAT refund criteria identifies products subject to a VAT refund in the VAT jurisdiction, and a processor, communicatively coupled to the interface, operable to determine, based on the VAT refund criteria, that the purchased product qualifies for a VAT refund and a VAT refund amount for the purchased product. | 2015-05-07 |
20150127535 | POSTING REAL-TIME PAYMENT CARD AUTHORIZATION PROCESS DATA TO SOCIAL MEDIA SITE - A social media location posting system a payment card transaction authorization processor and a location posting service processor. The payment card transaction authorization processor is configured to receive over a network a payment card transaction authorization request for a cardholder and store in a computer storage file associated with the cardholder payment card transaction data included in the authorization request. The location service processor is configured to post over the network at least a portion the payment card transaction data stored in the file associated with the cardholder to a social media site associated with the cardholder. | 2015-05-07 |
20150127536 | METHOD AND SYSTEM OF UTILIZING MOBILE PHONE AS LOCATOR TO MANAGE CARD ACCEPTANCE - A financial transaction method that includes receiving at a geolocation authentication module, a request from a managing computer system storing data associating identification information of individual mobile devices with individual payment card accounts, the request originating from a merchant and includes data identifying the geographic origin of the request for authorization against the payment card account of the customer; identifying a mobile device associated with the payment card account against which the request for authorization has been received; requesting data identifying a current geographic location of the at least one mobile device associated with the payment card account from a mobile device service provider, the mobile device service provider storing data identifying the current geographic location of the mobile device associated with the payment card account; and receiving, from the mobile device service provider, the data identifying the geographic location of the mobile device associated with the payment card account. | 2015-05-07 |
20150127537 | IC Chip for Preventing Identification Key Leak and Authorization Method Thereof - Disclosed are an IC chip for preventing identification key leak and an authorization method thereof. An IC chip capable of performing a financial function includes: a PIN supply unit for supplying a PIN used for authorization when performing a financial function using the IC chip; and a blocking unit for physically blocking the gap between the PIN supply unit and an input-output interface when the PIN is supplied to the outside through the input-output interface at an initial access of the IC chip. | 2015-05-07 |
20150127538 | SIGNAL DETECTION AND BLOCKING FOR VOICE PROCESSING EQUIPMENT - A telephone call processor for processing telephone calls comprising voice signals and data signals, the call processor comprising a first telephone interface and a second telephone interface, the call processor being operable in a first mode and in a second mode. In the first mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface and to transmit voice signals and data signals via the second telephone interface. In the second mode, the call processor is adapted to receive voice signals and data signals at the first telephone interface, to block data signals from being transmitted via the second telephone interface and optionally to transmit voice signals via the second telephone interface. | 2015-05-07 |
20150127539 | SYSTEM AND METHOD FOR AUTHENTICATING, ASSOCIATING AND STORING SECURE INFORMATION - The present application discloses a method for authorizing mobile payment from a mobile application installed on a mobile device. After a user logs into a user account at the mobile application, the mobile device receives user information, and obtains payment card information retrieved from a first image of a payment card captured by the mobile device. Then, a request is sent to a server for authorizing the user to make mobile payment using the mobile application. The server is configured to authenticate the request by communicating with a financial institution using the user information and the payment card information. The mobile device receives a confirmation message after the authentication of the user information and the payment card information by the financial institution, and displays the confirmation message to the user of the mobile device such that the user can make mobile payment via the user account at the mobile application. | 2015-05-07 |
20150127540 | Transit Agency As An Issuer And/Or Program Manager Of Prepaid Products - Described is processing for requested user access, starting with receiving transaction data from a portable consumer device presented by the user at a gate access device of an access agency for the requested access. The transaction data from the gate access device is processed and a fee amount for the requested access is determined. The processing next involves determining an account balance in accordance with the determined fee amount and a prior balance amount associated with the portable consumer device, and reconciling the determined account balance and account data associated with the portable consumer device at a processing computer of the access agency such that the access request is indicated as either approved or declined. | 2015-05-07 |
20150127541 | WEARABLE TRANSACTION DEVICES - The disclosed embodiments include wearable transaction devices. A wearable transaction device may client device for executing a transaction. The client device may include interface hardware for communicating transaction information, a memory device for storing the transaction information, and sensor hardware configured to sense an action performed by a user. The client device may also include one or more hardware processors configured to access the transaction information, and identify an operation based on at least the transaction information. The one or more hardware processors may be further configured to determine that the operation is authorized by the user, and transmit a notification to a server based on the determination that the operation is authorized by the user, the notification including at least an indication of the identified operation. | 2015-05-07 |
20150127542 | SYSTEM AND METHOD FOR VERBAL AUTHORIZATION FOR FULFILLMENT OF A SERVICE - In some embodiments, a verbal authorization system comprises a financial services repository operable to store information identifying one or more financial services provided by a financial enterprise. The financial enterprise provides a financial service of the one or more financial services in response to a written authorization from a client. An eligibility engine is operable to determine whether the client is eligible to apply for verbal authorization status such that the client may provide verbal authorization during a telephone call to a fulfillment representative of the financial enterprise in lieu of the written authorization. A verbal authorization repository is operable to store client authorization information. The client authorization information identifies the client and whether the client has achieved the verbal authorization status. | 2015-05-07 |
20150127543 | ELECTRONIC TRANSACTION SYSTEM AND A TRANSACTION TERMINAL ADAPTED FOR SUCH A SYSTEM - A system for performing electronic transaction includes: a payment terminal including a human interface module, a first processor, and an internal bus for connecting these elements; a host terminal connectable to the human interface module through a connection; and a security module. The human interface module includes a keyboard, a display, a card reader for reading and authenticating a bank card or credit card. The host terminal includes a second processor, a memory, and a power supply. A transaction terminal task manager is included in the first security module, the first security module being hosted in the host terminal. The human interface module executes transaction phases under control of the security module, and executes security treatments, totally autonomously from the host terminal. The security treatments include presentation of a PIN code to the bank card or credit card. | 2015-05-07 |
20150127544 | METHOD AND APPARATUS FOR RECONCILING A TRANSACTION - A method and apparatus that improves treasury management functionality for a cash positioning and reporting system is provided. Several portions of the payment process may be improved. The approval process may be streamlined by providing supplemental contact information at each stage of the approval process. Confirmation of payments made via a wire transfer may be sent to a payee. A reference number from the wire transfer may be included in the confirmation. The reference number may permit tracking of the payment by the payee. Likewise, supplemental wire transfer information may be provided to the general ledger system to improve reconciliation of payments and invoices. | 2015-05-07 |
20150127545 | WIRELESS TRANSACTION MEDIUM HAVING COMBINED MAGNETIC STRIPE AND RADIO FREQUENCY COMMUNICATIONS - A wireless financial transaction instrument, such as a card, has a magnetic stripe, a display, and an on-board power supply, such as a battery, and is usable with a dual capture point of sale terminal. Information is received by such a terminal from the card wirelessly, and also from the magnetic stripe, and the data received contactlessly is preferably used to verify that read from the stripe. The display can display the account number on command, or to display a current balance, or amount of credit remaining, or any combination of these items of information. | 2015-05-07 |
20150127546 | METHODS FOR PROVIDING INTERNET SERVICES THROUGH A TOLL FREE CONNECTION TO A USER AND DEVICES THEREOF - Techniques for providing internet services to a user through a toll free connection are provided. The techniques include receiving, from an Internet Access Point (IAP), a request for the internet services through the toll free connection provided by a Cloud Service Provider (CSP), wherein the CSP is selected by the user from a plurality of CSPs. Access credentials are received from IAP and are forwarded to the selected CSP. A token is received from the CSP if the user is authenticated by the CSP based on the access credentials. The token is sent to the IAP wherein the token is used by the user to access the Internet services through the toll free connection. | 2015-05-07 |
20150127547 | NETWORK TOKEN SYSTEM - Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing, along with a token, a token assurance level and data used to generate the token assurance level. At the time a token is issued, one or more Identification and Verification (ID&V) methods may be performed to ensure that the token is replacing a PAN that was legitimately used by a token requestor. A token assurance level may be assigned to a given token in light of the type of ID&V that is performed and the entity performing the ID&V. Different ID&Vs may result in different token assurance levels. An issuer may wish to know the level of assurance and the data used in generating the level of assurance associated with a token prior to authorizing a payment transaction that uses the token. | 2015-05-07 |
20150127548 | METHOD AND SYSTEM FOR GENERATING ONE-TO-ONE MERCHANT OFFERS - A method for discounting a payment transaction includes: storing, in a memory, transaction data for a payment transaction, wherein the transaction data includes at least a transaction amount; receiving, by a receiving device, payment data submitted for payment for the payment transaction, wherein the payment data includes at least a consumer identifier corresponding to a consumer and payment information; receiving, by the receiving device, offer data, wherein the offer data includes an offer identifier corresponding to the consumer and a transaction modifier; encrypting, using a predetermined encryption key, the consumer identifier to obtain an encrypted consumer identifier; and updating, in the memory, the transaction amount included in the transaction data based on the transaction modifier if the encrypted consumer identifier corresponds to the offer identifier. | 2015-05-07 |
20150127549 | USING BIOMETRIC AUTHENTICATION FOR NFC-BASED PAYMENTS - In order to validate a user to facilitate conducting a high-valued financial transaction via wireless communication between an electronic device (such as a smartphone) and another electronic device (such as a point-of-sale terminal), the electronic device may authenticate the user prior to the onset of the high-valued financial transaction. In particular, a secure enclave processor in a processor may provide local validation information that is specific to the electronic device to a secure element in the electronic device when received local authentication information that is specific to the electronic device (such as a biometric identifier of the user) matches stored authentication information. Moreover, an authentication applet in the secure element may provide the local validation information to an activated payment applet in the secure element. This may enable the payment applet to conduct the high-valued financial transaction via wireless communication, such as near-field communication. | 2015-05-07 |
20150127550 | USING BIOAUTHENTICATION IN NEAR-FIELD-COMMUNICATION TRANSACTIONS - In order to authenticate a user to facilitate conducting a financial transaction via wireless communication between an electronic device (such as a smartphone) and another electronic device (such as a point-of-sale terminal), the electronic device may securely communicate an authentication-complete indicator to a secure element in the electronic device. In particular, a secure enclave processor in a processor may provide the authentication-complete indicator to the secure element using an encrypted token when received authentication information (such as a biometric identifier of the user) matches stored authentication information. Moreover, an authentication applet in the secure element may decrypt the token, and then may set an authentication-complete flag in an operating system of the secure element based on the authentication-complete indicator. This authentication-complete flag may enable an activated payment applet in the secure element to conduct the financial transaction via wireless communication, such as near-field communication. | 2015-05-07 |
20150127551 | SECURING COMMUNICATIONS WITH A PIN PAD - Described in an example embodiment herein is an apparatus comprising an input device and a processor communicatively coupled with the input device. The processor employs asymmetric encryption to provision the input device with a terminal master key. The processor employs the terminal master key with a symmetric encryption algorithm to transfer a communication key to the input device. The processor obtains data representative of a financial account. The processor receives data representative of the personal identification number for authorizing a financial transaction with the financial account from the input device, the data representative of the personal identification number is encrypted with the communication key. The processor receives a request for a financial transaction associated with the financial account via the input device. The processor determines whether the financial transaction is authorized based on the data representative of the personal identification number received from the input device. | 2015-05-07 |
20150127552 | Systems and Methods for RFID Security - An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security. | 2015-05-07 |
20150127553 | INTELLIGENT PAYMENT CARD AND A METHOD FOR PERFORMING SECURE TRANSACTIONS USING THE PAYMENT CARD - An intelligent payment card and a method for performing a financial transaction using the payment card are disclosed. The payment card includes inter-alia a biometric sensor, an input module, and a display screen. The payment card is activated when a primary user successfully authenticates himself by the way of providing valid finger print(s) to the biometric sensor of the payment card. The payment card is removably embedded with criteria that dictate at least a maximum transaction amount, maximum number of transactions to be performed on the card and maximum threshold time for completing a transaction. The payment card also includes a processor unit which compares the authorization code input by the user with a unique identification number stored within the payment card, and upon successful authentication enables the user to perform desired financial transaction and also ensures that the removably embedded criteria are not violated during the financial transaction. | 2015-05-07 |
20150127554 | MERCHANT MANAGED METHOD AND SYSTEM FOR TEXT-TO-PAY SUBSCRIPTIONS AT A SUBSCRIPTION SERVER - A subscription identifier is communicated between the billing server and subscription server. The billing server receives a subscription identifier text message from the user device. The billing server identifies a carrier server from the subscription identifier text message. The billing server receives an authorization text message from the user device in response to an authorization request text message and charges an account of the carrier server that has been identified. If the charge has been successful, then the billing server transmits a renewal notification text message to the subscription server. The subscription server updates an account having the subscription identifier to reflect a new expiration. | 2015-05-07 |
20150127555 | ELECTRONIC PAYMENT ANTI-FRAUDULENT SYSTEM THROUGH REAL-TIME PHONE BASED VERIFICATION CODE - The Electronic Payment Anti-Fraudulent System through Real-Time Phone based Verification Code is introduced to provide a method or a mechanism to secure the online payments and transactions for both registered online buyers and electronic merchants; this is mainly performed through 2 major sub methods:
| 2015-05-07 |
20150127556 | INFORMATION PRESENTATION METHOD, INFORMATION PRESENTATION SYSTEM, PROGRAM, AND RECORDING MEDIUM - One aspect of the present disclosure provides an information presentation method for presenting a recommended guarantee content of a first device included in a plurality of devices. The information presentation method includes acquiring use history information including data indicating use of the first device (S | 2015-05-07 |
20150127557 | CUSTOMER SERVICE SOFTWARE TO ANALYZE RISK AND PROFITABILITY AND MODIFY SCRIPTING IN REAL-TIME - A customer service software and related methods and systems can modify scripting in real-time based on the likelihood of customer fraud and/or profitability. The methods of the present invention analyze a plurality of different indicators of potential for risk, as well as a plurality of indicators for potential for long term profitability. Weights to these factors can be assigned and a weighted risk and profit score can be determined. Once determined, this weighted risk and profit score can be used to modify the customer service policies and scripting in real-time. | 2015-05-07 |
20150127558 | METHOD FOR DETERMINING RESPONSE CHANNEL FOR A CONTACT CENTER FROM HISTORIC SOCIAL MEDIA POSTINGS - Some social networks provide message histories that record information about previous posts that users make to the social media network. From this information, a contact center determines trends in the usage of a social media network by a user. The contact center can mine the message history database for times, frequency of posts, location of the user during posts, and other information provided in the message histories. From this information or metadata about the messages, the contact center develops trends about the user's postings of messages on social media networks. The contact center can further receive subsequent posts and read metadata related to the subsequent posts. The new metadata can be used to modify the trends over time. | 2015-05-07 |
20150127559 | METHODS AND SYSTEMS OF PROVIDING TEXT BOOK SHARING, MANAGEMENT, AND FUNDS MANAGEMENT - A system and method for setting up (instantiating) and managing a book sharing system in a communication network. The system provides a software application that permits multiple users to participate in book sharing, and funds management. Method of book sharing include pre pay method, and a post pay method. The Book Sharing method shares the cost of books between all the users of the book, including all past users of the book. Pre pay book sharing adds a book to book sharing system and the first user pays for total cost of the book. As additional users use the book, the total cost of the book is divided among all the users of the book. In the post pay book sharing system, the total cost of the book is divided in the estimated number of users for the book. As the users are added, they pay for the book sharing. | 2015-05-07 |
20150127560 | UNIFIED RECOVERY SYSTEM FOR PAYMENTS IN ARREARS - Embodiments of the invention are directed to a system, method, or computer program product for providing a unified representation of all customer relationships with an entity. This representation focuses on customer products in arrears that are to be recovered. The invention presents an overarching view of all customer relationships to a representative. This allows the representative to make decision and take appropriate actions immediately based on the entire relationship with the customer when a customer communication is initiated. As such, the invention correlates all of the customer's relationships with a financial institution into one unified representation for a representative to review. The unified representation takes into consideration all of the customer's relationships as well as external factors on the communications and relationships. Thus providing a holistic customer service experience for a customer with accounts in arrears. | 2015-05-07 |
20150127561 | PREVENTING CONTACT BY LOCKING - Embodiments of the invention relate to systems, methods, and computer program products for preventing a customer communication by locking access to customer information. The system, method, and computer program product are configured to a) identify information relating to an event or condition that triggers a lock of customer information associated with a customer; b) lock at least a portion of the customer information associated with the customer based at least partially on the identifying; and c) generate a notification indicating that at least the portion of the customer information associated with the customer is locked based at least partially on the locking. | 2015-05-07 |
20150127562 | AUTOMATIC CONTACT LIST GENERATION - Embodiments of the invention relate to systems, methods, and computer program products for determining an automatic contact list. The system, method, and computer program product are configured to receive a request to create a contact list, the request comprising selection criteria; identify data associated with a plurality of customers meeting the selection criteria, wherein each customer is associated with at least one contact; determine contacts that are excluded based on at least one of locking, external requests, geography, time, velocity, and permission to contact; and determine a contact list based on customers that are not excluded. The system allows a user to create an automatic contact list that both meets the user's criteria while also complying with business and legal regulations. | 2015-05-07 |
20150127563 | SYSTEM AND METHOD FOR DISPLAYING PRODUCT CERTIFICATION - A product certification code is provided. The product certification code is associated with a target product and comprises a uniform resource identifier (URI). The URI is configured to identify certification information at a certification data provider, which is configured to maintain the certification information about the target product. A method for retrieving the certification information from the certification data provider is also provided. Further, the certification data provider and a method for providing the certification information from the certification data provider are also provided. | 2015-05-07 |
20150127564 | EXPORT LICENSE COMPLIANCE SYSTEM ("ELCS") USING CONTROLLED COMMUNICATIONS - An internet based method and system for communicating terms and conditions of an issued export license to all parties (e.g., exporter, distributor, consignee) in a transaction. The system directs prescribed export related messages from the exporter to the parties. The messages include instructions to the recipients to take certain actions required by the export license terms, and directs those parties to report the results back to the exporter. | 2015-05-07 |
20150127565 | Social Match Platform Apparatuses, Methods and Systems - The SOCIAL MATCH PLATFORM APPARATUSES, METHODS AND SYSTEMS (“SMP”) transforms platform join requests, social network info, and SMP network info inputs via SMP components NJ, JIP, CIP, OP, CN-SGU and CN-UPSOG into job info, candidate info, offer info, and social meetup info outputs. A job information request for a candidate may be obtained. Social data associated with the candidate may be determined. A social job relevancy rating for various jobs may be calculated using the social data. A job may be selected using the social job relevancy rating for the job, and information regarding the selected job may be provided. | 2015-05-07 |
20150127566 | INTERACTIVE GROUP PERSONNEL INFORMATION RETRIEVAL AND COMMUNICATION - Methods for managing an interactive personnel directory are disclosed. Example of a method includes providing a database of personnel records that includes contact information, the database being resident on a non-transitory storage medium of a host computer or a mobile device; processing an authority code that defines user-specific privileges, wherein the authority code is configured to provide personnel record of a selected contact to the user upon request and within the defined user-specific privileges; and providing a user-interface configured to allow the user to contact the selected contact via the host computer or mobile device by selecting the contact information on the personnel record of the selected contact. | 2015-05-07 |
20150127567 | DATA MINING INCLUDING PROCESSING NATURAL LANGUAGE TEXT TO INFER COMPETENCIES - A data mining system extracts job opening information and derives, for a given job, relevant competencies and derives, for a given candidate, relevant competencies, for the candidate. In some embodiments, the data mining performs authentication of relevant competencies before performing matching. The matching outputs can be used to provide data to a candidate indicating possible future competencies to obtain, to provide data to a teaching organization indicating possible future competencies to cover in their coursework, and to provide data to employers related to what those teaching organizations are covering. | 2015-05-07 |
20150127568 | INTERACTIVE SYSTEM FOR JOB OFFERING AND SUBSCRIPTION - The present invention concerns an interactive system ( | 2015-05-07 |
20150127569 | MOBILE EMPLOYMENT DISCOVERY USING GEOGRAPHIC LOCATION MATCHING - A computer implemented employment discovery system for identifying a potential employment position of an employer for an employment candidate, the system comprising: a computer processor configured for executing of a set of instructions stored in a memory for: storing candidate employment profile information and a candidate contact address of a candidate mobile device associated with the employment candidate; storing agent profile information for a candidate agent associated with the employment candidate including an agent contact address of an agent mobile device associated with the candidate agent; generating employment position information of the potential employment position including geographical information of the employer; receiving a geographical location of the agent mobile device and generating a geographical match of the geographical location with the geographical information by comparing the geographical location with the geographical information; generating a profile match of the candidate employment profile information with the employment position information by comparing the candidate employment profile information with the employment position information; based on the geographical match and the profile match, generating a match message including details of the potential employment position and the geographical information of the employer; and sending the match message to the agent contact address over a communications network to the agent mobile device. | 2015-05-07 |
20150127570 | AUTOMATIC ACCIDENT REPORTING DEVICE - A device is configured to receive vehicle information associated with a vehicle, and determine that the vehicle has been in an accident based on the vehicle information. The device is configured to generate an accident report based on determining that the vehicle has been in the accident and based on the vehicle information. The device is configured to provide the accident report for display, and to receive a confirmation that the accident report is accurate based on providing the accident report for display. The device is configured to output the accident report based on receiving the confirmation. | 2015-05-07 |
20150127571 | Address Updates - Systems and techniques are disclosed that allow a mailer to obtain confirmation of a current address from a recipient, and/or an express request from the recipient to update a mailing address stored by the mailer. In an embodiment, a mailer may send a first mail piece to the recipient, which directs the recipient to access a website or other electronic resource to verify his or her address. Upon receiving express confirmation of the recipient's address, a second mail piece may be sent to the current address, and/or the recipient's address may be updated in the mailer's records. | 2015-05-07 |
20150127572 | Method for Leveling Delivery Volumes - The business of delivering LP gas cylinders involves the work of leveling scheduled delivery counts for a scheduled delivery day in a predetermined period based on delivery capabilities of deliverymen. However, it takes a lot of time because a delivery manager, a deliveryman or the like performs this work with direct data reference. The delivery management system causes to a computer to extract data from each data storage unit, calculate a total deliverable count that is the total of deliverable counts for each scheduled delivery day in the predetermined period, calculate a total scheduled delivery count, and calculate a leveled count for each scheduled delivery day in the predetermined period. | 2015-05-07 |
20150127573 | VIRTUAL POSTAGE BASED ON IMAGE RECOGNITION - A number of approaches for using a camera or other device to capture an image of an arbitrary signature, drawing and/or other scribble rendered on a package and utilizing the captured image as electronic postage for shipping the package to the recipient destination. A sender wishing to send a package handwrites a signature or other scribble directly onto the package that is to be shipped. A mobile device (e.g., smartphone) can be used to capture an image of the scribble and perform image recognition to determine whether the captured image contains sufficient features to be distinct from other images stored in a database. If the image is sufficiently distinct, the image can be accepted as electronic postage for the package. When the package is picked up, the delivery person scans the scribble and matches it to the image on file to determine the recipient address and other shipping information. | 2015-05-07 |
20150127574 | TERMS OF SERVICE (TOS) AGREEMENT GENERATION METHOD AND ELECTRONIC DOCUMENT ENROLLMENT VERIFICATION METHOD WITHIN AN ONLINE SYSTEM - A system and method for generating a terms of service agreement within an online document retrieval and storage system, and an electronic document enrollment verification process within the terms of service agreement that includes accessing the online document retrieval and storage system, viewing a terms of service (TOS) agreement displayed via the user computing device, selecting to view an electronic document within the TOS agreement, inputting verification information displayed within the electronic document, and accepting or rejecting the TOS agreement displayed. | 2015-05-07 |
20150127575 | APPARATUSES, METHODS AND SYSTEMS FOR PROVIDING A VIRTUAL DEVELOPMENT AND DEPLOYMENT ENVIRONMENT INCLUDING REAL AND SYNTHETIC DATA - A development and testing environment with reduced database storage requirements that uses synthetic data based on anonymized real data, which allows the use of sensitive data for testing while protecting such data as required by privacy laws, secrecy laws and company policies. | 2015-05-07 |
20150127576 | RECOMMENDATIONS AS AN INCENTIVE TO RATE - Various aspects of the subject technology relate to systems, methods, and machine-readable media for providing recommendations as an incentive for a user to contribute a rating on a topic are provided. A system may be configured to receive a user rating of a topic from a client device, wherein the user rating is associated with a user, increment a count associated with the user in response to receiving the user rating of the topic, and determine whether the count exceeds a threshold. If the count exceeds the threshold, the system may generate a plurality of recommendations for the user based on the user rating of the topic and provide a subset of the plurality of recommendations for the user. | 2015-05-07 |
20150127577 | METHOD AND APPARATUS FOR RATING OBJECTS - A method and apparatus can be configured to provide profile information of a current user. The method can also receive a rating of an object. The received rating of the object is based on a plurality of other ratings of the object inputted by a plurality of other users. The plurality of other ratings are transformed to a plurality of weighted ratings, the plurality of weighted ratings are transformed to determine the received rating of the object. The received rating of the object is determined according to the provided profile information of the current user. | 2015-05-07 |
20150127578 | STATELESS SIMULATION SERVICE - A proxy simulation service can be used to test a complex system, such as a fulfillment network, that depends on upstream and downstream processes in order to operate. The proxy simulation service can be configured to send an event, such as an order request, so as to appear to be sent from a process upstream of the system; and can be configured to receive a request from the system, such as a request to charge payment information, so as to appear as a downstream process of the system. The proxy simulation service can then simulate a response to the received system request based on the request and on state information related to the request. The simulated response can then be sent to the system being tested. | 2015-05-07 |
20150127579 | METHOD AND APPARATUS TO PRESENT AN INTEGRATED PROCESS MODELER - A method and apparatus for an integrated process modeler is described. The modeler comprises a non-technical interface to permit design of a business process by a non-technical use and a technical interface to implement substeps of the process to automate technical aspects of the process by a technical user, using the same process modeler. The resulting process designed to be used by non-technical employees, to automatically lead the non-technical employees through the business process. | 2015-05-07 |
20150127580 | Equalizer - A system, method, and computer program product for modeling a risk are provided. An equalizer and an equalizer backend model portfolio risk based on a scenario generated by the equalizer. A scenario includes an active factor, a passive factor, and a change in an active factor level. To model portfolio risk, the equalizer backend uses two-tiered regression analysis. In the first regression, the equalizer backend regresses the passive factor against the active factor and determines changes in a passive factor level. In the second regression, the equalizer backend regresses the changes in the passive and active factor levels against positions in the portfolio that models portfolio risk. The equalizer displays the modeled portfolio risk. | 2015-05-07 |
20150127581 | Planning Tool for Determining a Future Cost of Retirement - A future cost of retirement planning tool conveniently translates lump-sum investment amounts into a future lifetime annual income amount. This future lifetime annual income amount is predicted as a function of retirement date, future pre-retirement saving rate, retirement income goal, and investment portfolio composition. The planning tool also provides probability distributions (or other measurements of variability) of the predicted future lifetime annual income amount based on the foregoing factors. This information is presented to a user in a convenient graphical interface. | 2015-05-07 |
20150127582 | SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM FOR CALCULATING MIXED FREQUENCY VALUATION CHANGES OF ILLIQUID ASSETS - Methods and systems for determining mixed frequency valuations and valuation changes for illiquid assets. | 2015-05-07 |
20150127583 | Reuse of On-Demand Enterprise System Customization Knowledge Utilizing Collective Experience - Systems and methods allow sharing and reuse of acquired customization knowledge of enterprise systems, utilizing collective customization experience. Particular embodiments employ Case-Based Reasoning (CBR) principles to manage customization experience in the context of both Software as a Service (SaaS) and Platform as a Service (PaaS) environments. Collective customization knowledge may be explicitly retrieved, adapted, shared, reused, and/or traded between tenants, partners, and optionally provider(s), of on-demand enterprise systems. A previous customization case stored within an experience base, may include one or more of the following: information allowing annotation of price information for trading the previous customization case (e.g. to another tenant); information restricting visibility of the previous customization case within the experience base; information defining a rating for the previous customization case within a community; information capturing a reuse frequency of the previous customization case; and/or information rendering anonymous at least a portion of the previous customization case. | 2015-05-07 |
20150127584 | EVALUATION OF A RECOMMENDER - A machine may implement a recommender that provides recommendations to users. The machine may be configured to present a first version of the recommender configured by various parameters. A user may submit a message to the machine, and the machine may identify a parameter among the various parameters by tokenizing the message and identifying the parameter among the tokens. The machine may then generate a second version of the recommender by modifying the parameter and configuring the second version according to the modified parameter. The machine may then present the first and second versions of the recommender contemporaneously two different portions of the users. By tokenizing a further message received from the users, the machine may evaluate the first and second versions and determine whether the second version is a replacement of the first version. | 2015-05-07 |
20150127585 | INFERRING USER PREFERENCES FROM AN INTERNET BASED SOCIAL INTERACTIVE CONSTRUCT - In embodiments of the present invention improved capabilities are described for a computer program product embodied in a computer readable medium that, when executing on one or more computers, helps determine an unknown user's preferences through the use of internet based social interactive graphical representations on a computer facility by performing the steps of (1) ascertaining preferences of a plurality of users who are part of an internet based social interactive construct, wherein the plurality of users become a plurality of known users; (2) determining the internet based social interactive graphical representation for the plurality of known users; and (3) inferring the preferences of an unknown user present in the internet based social interactive graphical representation of the plurality of known users based on the interrelationships between the unknown user and the plurality of known users within the graphical representation. | 2015-05-07 |
20150127586 | INFERRING USER PREFERENCES FROM AN INTERNET BASED SOCIAL INTERACTIVE CONSTRUCT - In embodiments of the present invention improved capabilities are described for a computer program product embodied in a computer readable medium that, when executing on one or more computers, helps determine an unknown user's preferences through the use of internet based social interactive graphical representations on a computer facility by performing the steps of (1) ascertaining preferences of a plurality of users who are part of an inter-net based social interactive construct, wherein the plurality of users become a plurality of known users; (2) determining the internet based social interactive graphical representation for the plurality of known users; and (3) inferring the preferences of an unknown user present in the interact based social interactive graphical representation of the plurality of known users based on the interrelationships between the unknown user and the plurality of known users within the graphical representation. | 2015-05-07 |
20150127587 | INFERRING USER PREFERENCES FROM AN INTERNET BASED SOCIAL INTERACTIVE CONSTRUCT - In embodiments of the present invention improved capabilities are described for a computer program product embodied in a computer readable medium that, when executing on one or more computers, helps determine an unknown user's preferences through the use of internet based social interactive graphical representations on a computer facility by performing the steps of (1) ascertaining preferences of a plurality of users who are part of an inter-net based social interactive construct, wherein the plurality of users become a plurality of known users; (2) determining the internet based social interactive graphical representation for the plurality of known users; and (3) inferring the preferences of an unknown user present in the interact based social interactive graphical representation of the plurality of known users based on the interrelationships between the unknown user and the plurality of known users within the graphical representation. | 2015-05-07 |
20150127588 | PRUNING PROCESS EXECUTION LOGS - Methods and systems for pruning process execution logs include learning a predictive model from a set of execution traces that characterize a process, where the predictive model determines a likelihood of a given instance reaching a specified outcome; identifying attributes in the predictive model that fall below a threshold measure of relevance to the specified outcome using a processor; and removing the identified attributes from the set of execution traces. | 2015-05-07 |
20150127589 | ITERATIVE REFINEMENT OF PATHWAYS CORRELATED WITH OUTCOMES - A method for refining a process model includes mining a process model from a set of execution traces; determining whether the process model is too dense or too sparse; learning a predictive model from the execution traces to predict an outcome; modifying the predictive model; and mining a refined process model from updated traces based on attributes present in the modified predictive model. Modifying the predictive model includes making the predictive model more specific if it is determined that the process model is too dense; and making the predictive model more general if it is determined that the process model is too sparse. | 2015-05-07 |
20150127590 | SYSTEMS AND METHODS FOR LAYERED TRAINING IN MACHINE-LEARNING ARCHITECTURES - A computer-implemented method for layered training of machine-learning architectures includes receiving a plurality of data elements wherein each data element is associated with a timestamp, determining a training window for each model layer of a layered stack of model layers, determining a plurality of training data elements for each training window by identifying the data elements with timestamps corresponding to each of the training windows, identifying a previous checkpoint for each model layer wherein the previous checkpoint for each model layer is generated by a parent model layer, training each model layer with the determined training data elements for each model layer and the identified previous checkpoint for each model layer, generating a plurality of current checkpoints wherein each current checkpoint of the plurality of current checkpoints is associated with a model layer, and storing the plurality of current checkpoints at the memory. | 2015-05-07 |
20150127591 | IDENTIFYING SUGGESTIVE INTENT IN SOCIAL POSTS - This document describes techniques for identifying suggestive intent in social posts. In one or more implementations, a topic is received and social posts to one or more social networks that are related to the topic are collected. Then, one or more suggestive intent posts expressing suggestions towards the topic are identified from the collected social posts. In one or more implementations, a set of related topics are received and social posts to one or more social networks that correspond to the related topics are collected. Then, aspects corresponding to the related topics are identified, and a sentiment score is generated for each aspect of each related topic that can be used to compare aspects of the related topics. In one or more implementations a suggestive intent model, usable to identify social posts expressing suggestive intent, is built from a training corpus of annotated social posts. | 2015-05-07 |
20150127592 | INTERACTIVE CLOTHES SEARCHING IN ONLINE STORES - A clothing search system provides a clothing search to users using a component-based image search. Retailer catalogs are analyzed to determine clothing components within clothing images. Features associated with the components are determined. When a user requests a clothing search, the clothing search system selects clothing based on the components and features requested by the user. The user may also provide an image to the clothing search system. The clothing search system determines components and features of the image and identifies clothing with matching components. | 2015-05-07 |
20150127593 | Platform to Acquire and Represent Human Behavior and Physical Traits to Achieve Digital Eternity - An artificial intelligence platform that is capable of reproducing a person's identity and allowing others to interact with it is described. It does so by creating a Digital Identity, founded on the very concept of a Digital Soul capable of bringing back to life (mirroring) the physical aspect, behavior, emotions, mannerisms and relational sphere of the subject. Each Digital Identity is capable of interacting with its surroundings and of formulating specific responses based on an innovative knowledge base structure of the individual, his emotional background (psychological model) and relational structure (skills/aptitude). The creation of a Digital Identity is defined by the ensemble of the individual's Digital Soul (Animus, Loquor and Indoles), physical characteristics (Corpus) and relational sphere with people (Societas) and with the environment (Circum). | 2015-05-07 |
20150127594 | TRANSFER LEARNING FOR DEEP NEURAL NETWORK BASED HOTWORD DETECTION - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for training a deep neural network. One of the methods includes training a deep neural network with a first training set by adjusting values for each of a plurality of weights included in the neural network, and training the deep neural network to determine a probability that data received by the deep neural network has features similar to key features of one or more keywords or key phrases, the training comprising providing the deep neural network with a second training set and adjusting the values for a first subset of the plurality of weights, wherein the second training set includes data representing the key features of the one or more keywords or key phrases. | 2015-05-07 |
20150127595 | MODELING AND DETECTION OF ANOMALY BASED ON PREDICTION - Embodiments relate to determining likelihood of presence of anomaly in a target system based on the accuracy of the predictions. A predictive model makes predictions based at least on the input data from the target system that change over time. The accuracy of the predictions over time is determined by comparing actual values against predictions for these actual values. The accuracy of the predictions is analyzed to generate an anomaly model indicating anticipated changes in the accuracy of predictions made by the predictive model. When the accuracy of subsequent predictions does not match the range or distribution as anticipated by the anomaly model, a determination can be made that the target system is likely in an anomalous state. | 2015-05-07 |
20150127596 | Particle Methods for Nonlinear Control - Aspects herein describe new methods of determining optimal actions to achieve high-level goals with minimum total future cost. At least one high-level goal is inputted into a user device along with various observational data about the world, and a computational unit determines, through particle methods, an optimal course of action as well as emotions. The particle method comprises alternating backward and forward sweeps and tests for convergence to determine said optimal course of action. In one embodiment a user inputs a high-level goal into a cell phone which senses observational data. The cell phone communicates with a server that provides instructions. The server determines an optimal course of action via the particle method, and the cell phone then displays the instructions and emotions to the user. | 2015-05-07 |
20150127597 | INFERRING USER PREFERENCES FROM AN INTERNET BASED SOCIAL INTERACTIVE CONSTRUCT - In embodiments of the present invention improved capabilities are described for a computer program product embodied in a computer readable medium that, when executing on one or more computers, helps determine an unknown user's preferences through the use of internet based social interactive graphical representations on a computer facility by performing the steps of (1) ascertaining preferences of a plurality of users who are part of an internet based social interactive construct, wherein the plurality of users become a plurality of known users; (2) determining the internet based social interactive graphical representation for the plurality of known users; and (3) inferring the preferences of an unknown user present in the internet based social interactive graphical representation of the plurality of known users based on the interrelationships between the unknown user and the plurality of known users within the graphical representation. | 2015-05-07 |
20150127598 | INFERRING USER PREFERENCES FROM AN INTERNET BASED SOCIAL INTERACTIVE CONSTRUCT - In embodiments of the present invention improved capabilities are described for a computer program product embodied in a computer readable medium that, when executing on one or more computers, helps determine an unknown user's preferences through the use of internet based social interactive graphical representations on a computer facility by performing the steps of (1) ascertaining preferences of a plurality of users who are part of an internet based social interactive construct, wherein the plurality of users become a plurality of known users; (2) determining the internet based social interactive graphical representation for the plurality of known users; and (3) inferring the preferences of an unknown user present in the internet based social interactive graphical representation of the plurality of known users based on the interrelationships between the unknown user and the plurality of known users within the graphical representation. | 2015-05-07 |
20150127599 | STATELESS DATABASE CACHE - A cache and method of caching for a database are provided, in which the cache and the database are in the same state. Responsive to a query for data, the method extracts search terms from the query and maps filter settings to an appropriate format. The method also (a) outputs data retrieved from a cache, if there is a cache hit and (b) builds cache and retrieves the data from the database, if there is a cache miss. If there are multiple users and/or instances, the cache may be updated for all users and/or instances by determining whether all changes are to be committed, in which case the changes are pushed to all users and/or instances. | 2015-05-07 |
20150127600 | REPORT DATA MANAGEMENT SERVER AND REPORT DATA MANAGEMENT PROGRAM - A report data management server includes a report data storing unit storing position information and report data in association with each other. The report data management server receives a request for supply of information containing position information, extracts information corresponding to position information contained in the request for supply from the report data storing unit, and supplies extracted information to a user terminal. | 2015-05-07 |
20150127601 | SYSTEM AND METHOD FOR IMPROVING AND MANAGING SMART GRID UNREAD METER INVESTIGATIONS - The system and method of the present disclosure generally comprises a widget that collects and organizes pertinent meter-centric investigation information; allows quick and easy access to additional detail; provides the ability to make updates; and interfaces with other applications through, for example, automated meter change orders. The system and method of the present disclosure further comprises several inquiry modules, including but not limited to an unread meter work queue, unread meter priority work queue, meter cancellation widget, and unread meter work queue administration. | 2015-05-07 |
20150127602 | PATTERN MINING BASED ON OCCUPANCY - An example method of pattern mining includes identifying, via a logic circuit, a plurality of patterns present in a plurality of transactions, the transactions including sets of items, and selecting, via the logic circuit, one of the identified patterns based on an occupancy of the identified pattern in the transactions. | 2015-05-07 |
20150127603 | Inline User Addressing in Chat and Document Editing Sessions - A computer-implemented method is executed on a server having one or more processors and memory storing one or more programs to be executed by the one or more processors. The method includes receiving document editing commands, for editing a respective document, from one or more users in a document editing session, and editing the respective document in accordance with the commands received from the users. The received commands including document text for the document. The method further includes detecting, within the respective document text, an embedded request to invite a specified user to access the respective document, and responding by sending an invitation to the specified user, and, if needed, adding the specified user to an access control list of the respective document to enable the specified user to access the document in response to detecting the embedded request. | 2015-05-07 |
20150127604 | SYSTEMS AND METHODS FOR REMOTE UPDATING OF ELECTRONIC HISTORICAL RECORDS - A computer-implemented method for managing family history records is described. Family history data is collected. The collected family history data is compared to data in an existing family history record. Upon determining the collected family history data matches at least a portion of the data in the existing family history record, the existing family history record is updated to include at least a portion of the collected family history data. | 2015-05-07 |
20150127605 | FRAME BASED DATA REPLICATION IN A CLOUD COMPUTING ENVIRONMENT - A device may receive information associated with a write operation to be performed on a storage volume included in a cloud computing environment, and may divide the information into a group of write frames. Each write frame may include a respective portion of the information. The device may determine information that identifies members of a replication set associated with the storage volume. The device may provide each write frame to each member. The device may receive a reply frame, associated with a write frame, from a member. The device may determine that the reply frame is a last reply frame associated with the write frame and may modify source information to form a modified reply frame. The device may provide the modified reply frame. The modified reply frame may be provided to indicate that the portion of the write operation, associated with the write frame, has been successfully performed. | 2015-05-07 |
20150127606 | PLURAL ARCHITECTURE MASTER DATA MANAGEMENT - According to one embodiment of the present invention, a system for managing data within a plurality of data management architectures comprises at least one processor. The system persists an entity managed by a first data management architecture to a second data management architecture. The first data management architecture manages entity data within one or more data sources, while the second data management architecture manages persisted entities with data from the one or more data sources within a common repository. A modification to data of the persisted entity is detected within the one or more data sources, and the modified data is synchronized with the persisted entity in the repository of the second data management architecture. Embodiments of the present invention further include a method and computer program product for managing data within a plurality of data management architectures in substantially the same manner described above. | 2015-05-07 |
20150127607 | DISTRIBUTED DATA SYSTEM WITH DOCUMENT MANAGEMENT AND ACCESS CONTROL - Data management systems and methods include a cloud-based platform coupled to a system of agents or folders hosted on client devices. The platform does not store actual data but instead makes use of metadata provided by the agents to track a location of all data in the system and manage the distributed storage, movement and processing of the actual data among the agents. In so doing, the platform pools networked storage into “virtual clusters” using local storage at the agents. The agents collectively monitor, store, and transfer or move data, and perform data processing operations as directed by the platform, as described in detail herein. The agents include agents hosted on or coupled to processor-based devices, agents hosted on devices of a local area network, agents hosted on devices of a wide area network, agents hosted on mobile devices, and agents hosted on cloud-based devices. | 2015-05-07 |