45th week of 2013 patent applcation highlights part 63 |
Patent application number | Title | Published |
20130297483 | SYSTEM, METHOD, AND APPARATUS FOR TRADING IN A DECENTRALIZED MARKET - A method and system for facilitating the execution of transactions in a decentralized market are provided herein. The decentralized market includes a number of execution points each associated with and maintained in a secure environment by a single participant. Each participant is able to control the amount of data that is made publicly available, if at all, regarding any transactions that are conducted at that participant's execution point. | 2013-11-07 |
20130297484 | Public Offering Risk Management - The present invention provides an auction system that allows IPO sales to be offered in an open and transparent manner, wherein, a certain percentage (up to 100%) of shares in an IPO can be offered to qualified bidders at a “buy now” pre-auction price, set by an issuer and/or underwriter. Investors can be allowed to “bid some shares out of the auction process” and thus guarantee those investors' allocation while also allowing bidders to participate in an open auction for other shares. Shares of stock to be offered in an IPO can include a subset of pre-auction price shares and a subset of auction price shares. The pre-auction price shares are offered to pre-auction bidders at a pre-auction price, and auction shares are generally sold to the highest bidder. Pre-auction sales can serve as a catalyst for generating enthusiasm for an associated IPO auction. | 2013-11-07 |
20130297485 | Crowd-Sourced Credit Rating and Debt Tracking System to Facilitate Small Purchases on Trust Based Credit - Systems and methods are provided for facilitating transactions between consumers and merchants on trust based credit. The systems and methods described herein enable a series of operations whereby a purchaser can initiate a transaction and instead of paying using a credit card or cash, the consumer can use trust based credit “tab” with the merchant and pay its bill at a later time. Based on this selection, a credit transaction request (identifying the consumer, the merchant and the credit amount) can be transmitted to the system server. In response, the system server can generate a report with the consumer's credit transaction history and credit profile and transmit the information back to the merchant. The merchant can elect to approve and finalize the credit transaction or decline. The consumer's transaction history can be updated with the transaction and all necessary adjustments to the consumer's credit profile can be made. | 2013-11-07 |
20130297486 | HYBRID INSTALLMENT-REVOLVING CREDIT METHOD AND SYSTEM - A hybrid installment-revolving credit method and system involves establishing a contractually fixed set of payments to be paid on a contractually fixed schedule for each purchase made on the revolving credit line, so that the cost and terms of credit are fixed in the purchase contract and no interest is charged on the balance due. In one embodiment, the method and system involves purchase and immediate installment resale at a markup, with the ownership rights of the purchased goods or services passing through the creditor from the supplier to the purchaser. | 2013-11-07 |
20130297487 | System and Method for Providing a Cash Advance - A loan system and cash advance product is provided which provides funds instantly to a financial institution or equivalent payment provider for pick-up by a registered user of the system. The user selects a cash advance product provided by an authorized distributor. The authorized distributor authenticates the user, pre-authorizes the purchase of the cash advance product, communicates with a loan system that verifies the user, authorizes the transaction, and transfers funds to the financial institution associated with the user. The authorized distributor then charges the user on his bill and remunerates the loan system cash advance product once the user has paid the bill. | 2013-11-07 |
20130297488 | SYSTEM, METHOD, SERVICE AND COMPUTER READABLE MEDIUM FOR TAKING AND PROCESSING PAPERLESS MORTGAGE LOAN APPLICATIONS - A system, service, method, and computer program product is described that allows borrowers to fill-in, sign and submit mortgage loan applications and custom disclosures directly from tablet computers without the need of paper. The signed forms and data are securely transferred from the tablet computers to the loan agent's LOS software and imaging system. | 2013-11-07 |
20130297489 | Data Analytics Models for Loan Treatment - Data analytics are provided in loan treatment. Various sources of data may be used to optimize or predict value for a loan. Using machine-learning and/or statistical analysis, loans or treatment best suited for a particular borrower may be determined. Due to the large amounts of data available, borrower behavior may be learned from previous behavior of others and mapped to a predictive model. Machine-learning indicates the most relevant factors in loan treatment, providing a matrix for predicting loan value or treatment success. A given borrower may be classified into one of many classes of borrower based on credit information, property information, desired loan information, real estate market information, and/or other data. Tens, hundreds, or even thousands of variables may be used to predict the optimum treatment. | 2013-11-07 |
20130297490 | METHODS AND SYSTEMS FOR ROUTING AND SETTLING PAYMENT TRANSACTIONS ELECTRONICALLY - Methods and systems for routing payment transactions electronically for multinational vendors in a transnational business environment in which an integrated payments platform processor is used in receiving payment transactions related to a plurality of different countries by a financial institution for online purchases. Each payment transaction is interrogated, using the integrated payments platform processor, to identify the payment transaction as an internal type of transaction or an external type of transaction and a country to which the payment transaction relates. Internal types of transactions are routed to an internal transaction processing path and external types of transactions to an external processing path, and the financial institution may arrange settlement of each payment transaction likewise using the processor. | 2013-11-07 |
20130297491 | PRODUCT-CENTRIC CHARGING SYSTEM AND METHOD - A method of operating a charging system ( | 2013-11-07 |
20130297492 | CHARGEBACK AUTOMATION SYSTEM AND METHOD - E-commerce customers may dispute a charge for various reasons. When they dispute a charge with the payment processor, the payment processor reverses the charge and notifies the payment gateway that transacted the payment. An automated chargeback dispute program is scheduled to run each day to collect data for disputing the chargeback notifications. Data is extracted from the payment processing gateway and e-commerce platform that performed the original transaction. The data is formatted into a response, such as a letter, file, or API message and electronically submitted to the issuing bank. | 2013-11-07 |
20130297493 | METHOD FOR ENABLING GIFT PREPAY - A variation of the invention is a method that: based on an action of a recipient stored in a social networking system, identifies recipient interest in a product; based on an association between the recipient and a sender stored in the social networking system, prompts the sender to supply a fund to be applied to a purchase of the product by the recipient; requests a financial account identifier from the recipient; identifies recipient initiation of a purchase of the product from the merchant based on a financial account identifier collected, by the merchant, from the recipient; adjusts a purchase price of the product for the recipient, prior to completion of purchase, to reflect the fund supplied by the sender; generates a notification indicating purchase of the product by the recipient; and initiates transfer of the fund to the merchant in response to recipient purchase of the product. | 2013-11-07 |
20130297494 | MONEY TRANSFER SYSTEM AND MESSAGING SYSTEM - A system for transferring funds from a sender to a recipient with a recorded message is disclosed. In one step the method includes receiving a request for a fund transfer from the sender. The sender may make the request for a fund transfer at a transaction processing device. In another step a payment is received from the sender for the fund transfer and a payment confirmation is transmitted to the host computer system. An identifier may then be assigned to the fund transfer. A recorded message from the sender may be received and at least a copy of the recorded message may be transmitted to a host computer system. The recorded message may then be associated with the fund transfer. A request, including the identifier, may be received from the recipient to receive the recorded messaged. In another step the recorded message may be sent to the recipient. | 2013-11-07 |
20130297495 | Application Server Billing - An Application Server entity in an IP Multimedia Subsystem (IMS) network comprises an interface for interfacing with an application and control logic which is arranged to inspect signaling information received from the application via the interface in the form of Extensible Markup Language (XML). The received signaling information is compared with stored rule data which specifies a relationship between an element in the signaling information and an action that should be taken and output data is generated based on the comparison. The Application Server can output operational measurements and/or charging information which more accurately reflect usage made of the Application Server resources. The need for a separate OSA/Parlay-X gateway can be avoided. | 2013-11-07 |
20130297496 | Apparatus and Method for Processing Service Interactions - An interactive voice and data response system that directs input to a voice, text, and web-capable software-based router, which is able to intelligently respond to the input by drawing on a combination of human agents, advanced speech recognition and expert systems, connected to the router via a TCP/IP network. The digitized input is broken down into components so that the customer interaction is managed as a series of small tasks performed by a pool of human agents, rather than one ongoing conversation between the customer and a single agent. The router manages the interactions and keeps pace with a real-time conversation. The system utilizes both speech recognition and human intelligence for purposes of interpreting customer utterances or customer text, where the role of the human agent(s) is to input the intent of caller utterances, and where the computer system-not the human agent-determines which response to provide given the customer's stated intent (as interpreted/captured by the human agents). The system may use more than one human agent, or both human agents and speech recognition software, to interpret simultaneously the same component for error-checking and interpretation accuracy. | 2013-11-07 |
20130297497 | Systems and Methods Involving Processing of Payments Using Handheld Devices - Embodiments of the invention provide systems and methods for allowing merchants to perform remote credit card transactions by facilitating non-CNP transactions via a package delivery service. A non-CNP transaction includes a credit card transaction where the card is physically presented to the merchant and a receipt may be signed. Various embodiments may also include transactions in which an imprint of the card is taken. | 2013-11-07 |
20130297498 | METHOD AND SYSTEM FOR PROVIDING BROADBAND ACCESS TO A PLURALITY OF CUSTOMERS - A system for transferring web content between a customer's user terminal and a web service over the Internet including an access network connected to the user terminal, a proxy server connected to the access network and the Internet, and a billing system. The billing system maintains accounts for the customers, each account having a prepaid balance. When a request for content transfer is received by the proxy server, the proxy server determines the cost to the user terminal for presentation to the customer. If the customer elects to continue with the transfer, the cost is deducted from his account and the transfer is effectuated. | 2013-11-07 |
20130297499 | ADVANCED PAYMENT MANAGEMENT SYSTEM - The present disclosure involves a method that involves: receiving a request to pay a bill having a billing date; identifying a plurality of funding instruments available for paying the bill; retrieving respective billing cycles of the funding instruments; and recommending one of the funding instruments to pay the bill based on the billing date of the bill and the respective billing cycles of the funding instruments. The present disclosure also involves a system that involves: means for receiving a request to make a payment, the payment having a payment deadline; means for identifying a plurality of different funding sources; means for retrieving billing period information associated with each funding source; and means for recommending using one of the funding sources to make the payment, wherein the means for recommending includes means for comparing the payment deadline with the respective billing period information of the funding sources. | 2013-11-07 |
20130297500 | Electronic Payment Automated Reconciliation Platform - The systems, methods and apparatus relate to transparent, unified financial transactions as a means of reducing inefficiency, fraud, and mistake. More specifically, the systems, methods, and apparatus address automated reconciliation of financial transactions, the establishment of a four-way reconciliation process and a unified and transparent escrow process. | 2013-11-07 |
20130297501 | SYSTEM AND METHOD FOR LOCAL DATA CONVERSION - Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for processing transactions using conversion or filtering of restricted information. One embodiment of the invention is directed to a method comprising receiving, at a server computer located outside a restricted zone, a transaction request message including an unrestricted account alias, wherein the unrestricted account alias was previously converted from a restricted account identifier into the unrestricted account alias by a server computer located in a restricted zone. The server computer located outside the restricted zone may determine an account associated with the unrestricted account alias and process the transaction request message. Similar methods may be applied to settlement files including an unrestricted account alias that is converted to a restricted account identifier. Other embodiments are directed to filtering restricted information from service requests or other transactions. | 2013-11-07 |
20130297502 | Mobile Transaction network using a prepaid VTN card - A method of storing money on VTN prepaid card purchased at agent location and transferring the money using a hybrid VTN mobile and internet procedure to the recipient. | 2013-11-07 |
20130297503 | SYSTEMS AND METHODS FOR SECURE DIGITAL IDENTIFICATION CARD PROCESSING - A system and method for verifying a transaction includes verifying a transaction, by a processing device, includes receiving a verification code generated by a verification device based in part on a current count from a counter configured to count the passage of defined intervals of time, wherein the counter is started at a randomly generated start count. The method also includes verifying the verification code based in part on a current count calculated independently from the counter. On a condition the verification code is verified, approval for the transaction is transmitted. The verification device includes a counter configured to count the passage of defined intervals of time. The processing device includes a second circuit configured to electronically receive and verify the verification code based, in part, on the current count, wherein the second circuit calculates the current count independently of the counter. | 2013-11-07 |
20130297504 | TRANSACTION DATA TOKENIZATION - A system and method of tokenizing sensitive cardholder payment information for use in cashless transactions includes receiving a request to process a cashless transaction between a merchant and a purchaser using first payment data stored with an electronic wallet provider on behalf of the purchaser. First payment data is retrieved from the electronic wallet provider. The first payment data is tokenized into a payment token, and provided to the merchant for use in completing the cashless transaction. The merchant issues a request to process payment for the cashless transaction using the payment token. The payment token is detokenized into second payment data, with correspondence between the first and second payment data being indicative of payment token authenticity. Payment for the cashless transaction is processed using the second payment data, and the merchant is provided with a response indicating either the success or failure of the payment processing. | 2013-11-07 |
20130297505 | SYSTEM AND METHOD FOR INSTANT ISSUE OF PERSONALIZED FINANCIAL TRANSACTION CARDS - In a method for instantly issuing a personalized financial transaction card to a customer, a bank employee receives customer and card information a branch location, including a card PIN. The customer and card information is input into a data terminal and communicated across a network to a card services provider, where the PIN is entered into a PIN database. A reference number associated with the customer and a PIN offset is generated. The reference number is used to retrieve the PIN from the PIN database. The PIN is then used to apply calculations to the card file. The card file is securely sent from the card services provider across the network to the branch location. Using information from the card file, the financial transaction card is printed for the customer at the branch location. | 2013-11-07 |
20130297506 | SYSTEM AND COMPUTER PROGRAM PRODUCT TO ISSUE A RETAIL PREPAID CARD INCLUDING A USER-DESIGNED EXTERNAL FACE USING A CHIT AND RELATED COMPUTER IMPLEMENTED METHODS - Embodiments of systems, computer program product, and related computer implemented methods to issue a closed-loop retail prepaid card including a user-designed external face using a chit, the chit being defined by an identification mechanism representing a financial commitment to issue a closed-loop retail prepaid card in an amount associated with a value paid for the chit, are provided. Embodiments of the present invention advantageously provide a service that enables a consumer to purchase, at the storefront of a retail establishment, a chit card that the consumer can subsequently redeem through a graphical user interface of an Internet website for a closed-loop retail prepaid card with a user-designed external face. The user-designed closed-loop retail prepaid card, for example, can be subsequently printed and delivered to an intended recipient. Advantageously, such a service can be made available to any retail establishment that uses a point-of-sale system. | 2013-11-07 |
20130297507 | SYSTEM AND METHOD FOR WIRELESS TRANSACTION AUTHENTICATION - A transaction authentication system uses a mobile unit to connect with a wireless network and with an authentication station using a short-range transceiver. Prior to a transaction, the mobile unit transmits an Identity to an authentication processor using the wireless provider network and receives a Hash and Identifiers therefrom. During a transaction, the mobile unit connects to an authentication station using a short-range air link and transmits its Hash. The authentication station transmits the received Hash to the authentication processor, which confirms the Identity of the mobile unit. If identified, the authentication processor sends a Private Identifier to the authentication station and the mobile unit connects using an air link with the Private Identifier. The authentication station sends a success message if it connects to the mobile unit using the Private Identifier air link. A device authentication message is sent to a transaction processor to process the requested transaction. | 2013-11-07 |
20130297508 | SECURE FINANCIAL TRANSACTIONS - A primary account number (“PAN”) of a conventional credit or debit account with a bank or other financial institution is emulated or simulated, which incorporates, in encrypted form, the actual account number. The simulated PAN may also incorporate an amount to be debited from that account. Thus, an account number and an amount are encrypted and mapped into a string of digits which appears to be a valid PAN. The actual account number and the transaction amount are thus embedded in the simulated PAN. The simulated PAN is then processed by existing financial transacting infrastructure, with the issuing bank knowing that it is not a PAN and that the appropriate digits are to be decrypted to provide the embedded account number and the embedded amount. | 2013-11-07 |
20130297509 | MOBILE PAYMENT USING DYNAMIC AUTHORIZATION CODE AND MULTI-PAYER SHARED CARD NUMBER - Various technologies related to implementing payment via a mobile device are described. An authorization code and a credit card number can be provided by an issuer to a mobile device, which in turn provides the authorization code and the credit card number to a merchant. The merchant can then provide the authorization code and the credit card number to an issuing bank, which can reconcile the authorization code and the credit card number and issue payment authorization. | 2013-11-07 |
20130297510 | FINANCIAL INTERMEDIARY FOR ELECTRONIC COMMERCE - Disclosed are various embodiments for an electronic escrow intermediary application that permits a buyer and seller to conduct a digital escrow transaction involving a third-party intermediary. An electronic transaction can occur through a third-party electronic commerce application or through the escrow intermediary application itself. Registration of a buyer and a seller is verified and either party is permitted to choose a registered third-party intermediary. After a purchase is made by a buyer, the terms and regulations associated with the transaction are transmitted to the third-party intermediary. The purchase money is placed in an escrow account until verification has been received by the third-party intermediary that the item has been delivered, complies with government regulations, and is, in fact, what the seller represents. Upon verification, the purchase money is distributed according to the terms of the transaction to the seller and to the third-party intermediary. | 2013-11-07 |
20130297511 | Closed System Processing Connection - In one embodiment of the invention, a method is described. The method comprises receiving at a server computer, an authorization request message from a first merchant computer operated by a first merchant that includes information associated with a transaction conducted by a consumer using a prepaid device associated with a second merchant, determining, based on the information in the authorization request message, the second merchant associated with the prepaid device, transmitting the authorization request message to a second merchant computer operated by the second merchant, receiving an authorization response message from the second merchant computer, and sending the authorization response message to the first merchant computer. | 2013-11-07 |
20130297512 | CARDHOLDER VERIFICATION RULE APPLIED IN PAYMENT-ENABLED MOBILE TELEPHONE - A method includes a cardholder device receiving at least one cardholder verification rule from a computer, and storing the cardholder verification rule. The cardholder verification rule prescribes circumstances under which a cardholder is required to perform a cardholder verification process in connection with a purchase transaction. The method includes the cardholder device receiving purchase transaction information from a merchant device, and then determining by using the stored cardholder verification rule, and based on at least one of the received purchase transaction information and current circumstances, that cardholder verification is not required. The cardholder device then uploads payment information to the merchant device to complete the purchase transaction. | 2013-11-07 |
20130297513 | MULTI FACTOR USER AUTHENTICATION - Technologies are generally described for multi factor security authentication algorithm methods in authorizing and using client devices to perform banking transactions. A customer can register and associate a client device with their account. The customer can further create unique login information associated with their account. A customer's login information, client device, and a push confirmation must be verified for accuracy prior to allowing the customer to perform banking operations. Using multi factor authentication process, banking transactions can be performed more reliably and securely. | 2013-11-07 |
20130297514 | Two-Level Authentication for Secure Transactions - A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A Personal Digital Key stores one or more profiles (e.g., a biometric profile) in a tamper-proof memory that is acquired in a secure trusted process. Biometric profiles comprise a representation of physical or behavioral characteristics that are uniquely associated with an individual that owns and carries the PDK. The PDK wirelessly transmits the biometric profile over a secure wireless transaction to a Reader for use in a biometric authentication process. The Reader compares the received biometric profile to a biometric input acquired at the point of transaction in order to determine if the transaction should be authorized. | 2013-11-07 |
20130297515 | Wireless Payment with a Portable Device - A portable device receives an account information request signal from a merchant machine. The portable device transmits a response message to the merchant machine. The response message comprises the account information for a purchase. The portable device transmits a first message to an account server. The first message comprises a request to get information comprising the purchase amount. The portable device receives a second message comprising the information from the account server. The portable device sends the purchase amount to a display. | 2013-11-07 |
20130297516 | PAYMENT TRANSACTION METHOD AND CORRESPONDING APPLICATIONS - A payment transaction is to be executed between a user terminal (TU | 2013-11-07 |
20130297517 | WEB-BASED WORKFLOW AUTOMATION SYSTEM - A web-based workflow automation system for developing event-based workflows is provided. The workflow automation system enables users with little or no programming knowledge to easily create and schedule event based workflows utilizing a web based interface. The workflow automation system provides a unified platform for project and workflow creation, execution, and testing. | 2013-11-07 |
20130297518 | Recycling System - A recycling system includes a plurality of tracking devices, a conveying system, a scanning system and a monitoring system. Each of the tracking devices may be associated with at least one of a plurality of tracking codes. Each of the tracking codes is associated with at least one of a plurality of waste generating entities. The recycling system can scan the tracking devices of the waste portions as they are directed by and through the conveying system. The monitoring system receives information about the content of each of the waste portions and associates the content information with the tracking codes. Advantageously, the recycling system can then track compliance of the waste generating entities in a recycling disposal program. | 2013-11-07 |
20130297519 | SYSTEM AND METHOD FOR IDENTIFYING POTENTIAL LEGAL LIABILITY AND PROVIDING EARLY WARNING IN AN ENTERPRISE - A system for detection of potential legal liability is presented. The system uses factual information that has triggered liability based on any number of legal theories, and compares the words expressing those facts to customer and employee communications in order to identify potential liability to an enterprise by reviewing of the enterprise's emails. The system generates seeding information based on the factual information and words expressing certain sentiments, and provides the seeding information to a document fracturing engine which scans the email archives and identifies emails with words that potentially give rise to a liability risk. The identified emails may then be reviewed by authorized personnel so that appropriate proactive and/or corrective action may be taken before the legal liability occurs. | 2013-11-07 |
20130297520 | Position Modeling Systems - Position class modeling systems are presented. Modeling systems can include a position class modeling engine configured to model one or more positions within an organization as a position class as a function of one or more values of modeling factors. The modeling engine derives one or more elasticity of the modeling factors where the elasticity provides in indication of how a position class would change based on changes of the modeling factor values. | 2013-11-07 |
20130297521 | METHODS AND APPARATUS FOR DONATING ONE OR MORE ITEMS - According to some aspects, a computer-implemented method for donating one or more items to at least one recipient selected from a plurality of potential recipients is provided. The method comprises using at least one processor to perform presenting the donor with a plurality of items that a selected recipient desires to receive as a donation, receiving first input indicating the donor's selection of at least one item from the plurality of items, and interacting with the donor to allow the donor to donate at least a portion of the at least one selected item to the selected recipient. | 2013-11-07 |
20130297522 | Consumer-Shipper-Supplier Mediation System and Method - A consumer-shipper-supplier mediation system/method that coordinates the ordering/production/delivery of products between consumers and suppliers is disclosed. The system/method allows consumers to aggregate orders for product manufacturing and mediate these product order requests to suppliers and shippers who can then optimize product manufacturing and shipping to meet the aggregated consumer orders. The system/method also permits symmetric operation to allow suppliers to schedule product production and optimize price-per-unit by using PUSH advertising to prospective consumers who have placed tentative orders for products that have yet to be manufactured or are not yet needed. In some preferred embodiments the mediation system/method incorporates a shipping interface to permit shippers to be fully integrated within the consumer-shipper-supplier commerce chain. The system/method in some preferred embodiments matches consumer-shipper-supplier constraints while simultaneously maximizing supplier-shipper pricing margins and minimizing consumer delivered product costs. | 2013-11-07 |
20130297523 | SYSTEM AND METHOD FOR USING ELECTRONIC CONTACT IDENTIFIER FOR COMPLETING A SALES TRANSACTION - A computerized system and method for obtaining a shipping address needed to complete a sales transaction. In a preferred embodiment, the computerized system and method utilizes at least one electronic contact identifier to cause an electronic message, which has been generated by the system, to be delivered to an intended recipient of at least one item that has been selected for purchase at an ecommerce site. The generated message may contain a link to a webpage which can be accessed by the intended recipient and where he or she may provide the system with his or her shipping address. Upon obtaining the shipping address, the system may then cause a payment for the at least one item to be processed and the at least one item to be shipped to the obtained address. | 2013-11-07 |
20130297524 | METHOD AND SYSTEM FOR PROVIDING SHIPMENT TRACKING AND NOTIFICATIONS - Improved approaches for monitoring status of articles being shipped are disclosed. The monitoring can produce notifications to interested parties. The notifications typically contain status information pertaining to the articles being shipped. Alternatively, interested parties can gain access to status information pertaining to the articles being shipped via a website. According to one embodiment, the status information includes at least position (location) information and shipping conditions information. | 2013-11-07 |
20130297525 | SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR LOGICAL CLUSTERING OF PACKAGE DATA AND DERIVED ANALYTICS AND SHARING OF SENSOR INFORMATION - Methods, systems, and computer-readable media are disclosed for verifying integrity of a cluster. The methods, systems, and computer-readable media may receive data identifying a first set of packages at a first location and generating a cluster based on the received data. Thereafter, additional data identifying a second set of packages at a second location may be received and the integrity of the cluster at the one or more additional locations may be verified. The integrity of the cluster may be verified based on a comparison of a verification cluster that is generated based on the received data at the second location with the originally generated cluster. | 2013-11-07 |
20130297526 | SYSTEMS AND METHODS FOR PROVIDING PERSONALIZED DELIVERY SERVICES - Systems and methods are disclosed for providing personalized delivery services by a carrier providing a package delivery service. For example, a consignee may indicate a delivery preference to be applied to delivery of a package, such as indicating a specific location where the package is to be left upon delivery, if the consignee is not present to accept the package. In one embodiment, the consignee may be notified by the carrier of the scheduled delivery of the package, and may be linked to the carrier's web site to indicate a delivery preference. Alternatively, the delivery preference may be indicated by the consignee proactively accessing the web site. After conveying a delivery preference, the carrier's systems communicate the delivery preference at the appropriate time to a portable computing device which informs the delivery personnel of the consignee's delivery preference. Other embodiments allow the consignor to indicate delivery preferences. | 2013-11-07 |
20130297527 | LOGISTICS SYSTEM AND A METHOD FOR PROVIDING LOGISTICS SERVICE WITH THE LOGISTICS SYSTEM - A logistics system for providing logistics service across one or more areas is provided. The system comprises: a plurality of nodes each located in a respective area configured for providing logistics delivery; and an intelligent logistics distribution platform configured to communicate with each node and select a route consisted of said nodes for the logistics service; wherein the nodes located in each area are arranged to form a number of tree structures with respective roots of said trees being connected with each other such that the intelligent logistics distribution platform is capable of deriving a unique shortest route for the logistics service. | 2013-11-07 |
20130297528 | BUSINESS PROCESS MODEL NOTATION EXTENSION FOR MODELING OF INTEGRATION PROCESSES - Computer implemented methods and computer program products involve instructions including identifying a business process model. An integration process definition can be identified. The integration process definition can be integrated into the business process model. An enhanced business process model can be defined, the enhanced business process model including the business process model and the integration process definition. | 2013-11-07 |
20130297529 | FRESH WATER PRICE INDEX BASED ON WATER QUALITY - A method and system for computing a stable index value of fresh water based on water quality category and/or grade from current values of root commodities (i.e. freely marketed products) that either have fresh water as a constituent and/or utilize fresh water in their production, usable to develop a stable investment instrument for investing in fresh water. A processor may process associations between a root commodity and a water quality category of fresh water. A display associated with a computer may display updateable current prices of fresh water of a particular water quality category and/or grade and updateable current prices of one or more root commodities. A water measurement device may measure at least one water source of fresh water with respect to at least one of TDS, carbonate content, pH, hardness, sodium, chloride, nitrate, toxins and sodium adsorption ratio and compare against standards to categorize the fresh water. | 2013-11-07 |
20130297530 | Methods and Apparatus for Improving Factor Risk Model Responsiveness - Construction of factor risk models that better predict the future volatility of returns of a portfolio of securities such as stocks, bonds, or the like is addressed. More specifically, improved factor-factor covariance estimation is made even when the covariances change rapidly over time. Methods and techniques for achieving better accuracy, responsiveness, and stability of factor risk models are addressed. | 2013-11-07 |
20130297531 | DEVICE FOR MODIFYING VARIOUS TYPES OF ASSETS - An asset modification device includes memory, an asset modification module, and operation modules. The memory stores limit tables and asset operational data. The asset modification module selects an asset to modify, a limit table regarding the asset, an operational module based on an entry in the limit table, and evaluation data. A specific task execution module of the selected operation module executes a specific task on asset operational data of the asset to produce a modified asset when an evaluation data filter of the selected operation module indicates that analysis of the evaluation data is favorable for modification of the asset via the specific task. | 2013-11-07 |
20130297532 | System And Method For Rating A Financial Portfolio - System and method for ranking the performance of a first portfolio relative to the performance of a plurality of portfolios. Software executing on a server determines a ranking for a first portfolio associated with a first client identifier. The ranking is based on a comparison between the performance of the first portfolio and the performance of the plurality of portfolios. Each of the portfolios is associated with a client identifier. Software executing on the server generates a report based on the first portfolio ranking and transmits the report to the client. The performance ranking may be based on a peer group. Financial advisors are rated based on the performance of portfolios they manage relative to other portfolios in the same peer group. | 2013-11-07 |
20130297533 | PROCESSING SECURITIES-RELATED INFORMATION - Embodiments of the invention provide techniques for improving clarity of disclosure materials provided to investors, by enabling securities issuers, intermediaries and/or other entities to create and disseminate clear and concise summary-level information on individual securities to investors to enable informed investment decisions. The information may include a summary version of the full statutory prospectus (a “summary prospectus”). A summary prospectus may include a concise, “plain English” synopsis and/or representation of certain information contained in the hill statutory prospectus, such as a security's investment objectives and strategies, costs, risks and/or other information. | 2013-11-07 |
20130297534 | SYSTEM AND METHOD FOR MULTI-FACTOR MODELING, ANALYSIS AND MARGINING OF CREDIT DEFAULT SWAPS FOR RISK OFFSET - A system and method for determining a margin requirement associated with a plurality of financial instruments within a portfolio is disclosed. The system and method include receiving a plurality of data associated with the plurality of financial instruments within the portfolio, determining a systematic risk margin based on at least a portion of the received plurality of data, determining a curve risk margin based on at least a second portion of the received plurality of data, determining a convergence and divergence risk margin based on at least a third portion of the received plurality of data, determining a sector risk margin based on at least a fourth portion of the received plurality of data, determining an idiosyncratic risk margin based on at least a fifth portion of the received plurality of data, determining a liquidity risk margin based on at least a sixth portion of the received plurality of data, determining a basis risk margin based on at least a seventh portion of the received plurality of data, and calculating a multi-factor risk margin based on one more of the determined risk factors. | 2013-11-07 |
20130297535 | METHOD AND APPARATUS FOR PRESENTING CLOUD-BASED REPOSITORIES BASED ON LOCATION INFORMATION - An approach is provided for presenting cloud-based repositories based on location information. The cloud-based storage platform determines location information associated with one or more cloud-based repositories that include data associated with at least one user. Next, the cloud-based storage platform causes, at least in part, a presentation of a user interface depicting one or more representations of the one or more cloud-based repositories based, at least in part, on the location information. | 2013-11-07 |
20130297536 | MENTAL HEALTH DIGITAL BEHAVIOR MONITORING SUPPORT SYSTEM AND METHOD - A system and method for monitoring a user's mental health tor and collect data concerning. The user's use of electronic devices is tracked, such as usage of his mobile phone, tablet and his web activity. The invention “learns” each patient's unique behavioral patterns to be used as a “base line” representing the steady state (chronic phase) of the patient. The algorithmic processing unit detects any irregularities in a patient's behavioral patterns and produces a deterioration prediction. If it is determined that a threshold is exceeded, an alert is sent to a health professional. | 2013-11-07 |
20130297537 | Method and System for creating Dynamic Neural Function Libraries - The current invention comprises a function library and relates to Artificial Intelligence systems and devices. Within a Dynamic Neural Network (the “Intelligent Target Device”) training model values are autonomously generated in during learning and stored in synaptic registers. One instance of an Intelligent Target Device is the “Autonomous Learning Dynamic Artificial Neural Computing Device and Brain Inspired System”, described in patent application number 20100076916 and referenced in whole in this text. A collection of values that has been generated in synaptic registers comprises a training model, which is an abstract model of a task or a process that has been learned by the intelligent target device. A means is provided within the Intelligent Target Device to copy the training model to computer memory. A collection of such training model sets are stored within a function library on a computer storage facility, such as a disk, CD, DVD or other means. | 2013-11-07 |
20130297538 | SYSTEM AND METHOD OF DESIGNING MODELS IN A FEEDBACK LOOP - A method and system for designing models is disclosed. The method includes selecting a plurality of models for modeling a common event of interest. The method further includes aggregating the results of the models and analyzing each model compared to the aggregate result to obtain comparative information. The method also includes providing the information back to the plurality of models to design more accurate models through a feedback loop. | 2013-11-07 |
20130297539 | SPIKING NEURAL NETWORK OBJECT RECOGNITION APPARATUS AND METHODS - Apparatus and methods for feedback in a spiking neural network. In one approach, spiking neurons receive sensory stimulus and context signal that correspond to the same context. When the stimulus provides sufficient excitation, neurons generate response. Context connections are adjusted according to inverse spike-timing dependent plasticity. When the context signal precedes the post synaptic spike, context synaptic connections are depressed. Conversely, whenever the context signal follows the post synaptic spike, the connections are potentiated. The inverse STDP connection adjustment ensures precise control of feedback-induced firing, eliminates runaway positive feedback loops, enables self-stabilizing network operation. In another aspect of the invention, the connection adjustment methodology facilitates robust context switching when processing visual information. When a context (such an object) becomes intermittently absent, prior context connection potentiation enables firing for a period of time. If the object remains absent, the connection becomes depressed thereby preventing further firing. | 2013-11-07 |
20130297540 | SYSTEMS, METHODS AND COMPUTER-READABLE MEDIA FOR GENERATING JUDICIAL PREDICTION INFORMATION - Systems, methods and computer-readable storage media for generating judicial prediction information are described. A judicial information prediction system may be configured to receive an analysis request comprising judicial request elements and to access at least one judicial information source associated with the analysis request. The judicial request elements may include items of interest associated with the prediction of a legal action. For example, the judicial request elements may include a court, a judge, an area of the law, and a legal action, such as a motion to dismiss. The judicial information prediction system may operate to analyze the at least one judicial information source based on the judicial request elements to generate judicial prediction information. For instance, the judicial prediction information may indicate the likelihood of success of a legal event based on the circumstances specified in the analysis request. | 2013-11-07 |
20130297541 | SPIKING NEURAL NETWORK FEEDBACK APPARATUS AND METHODS - Apparatus and methods for feedback in a spiking neural network. In one approach, spiking neurons receive sensory stimulus and context signal that correspond to the same context. When the stimulus provides sufficient excitation, neurons generate response. Context connections are adjusted according to inverse spike-timing dependent plasticity. When the context signal precedes the post synaptic spike, context synaptic connections are depressed. Conversely, whenever the context signal follows the post synaptic spike, the connections are potentiated. The inverse STDP connection adjustment ensures precise control of feedback-induced firing, eliminates runaway positive feedback loops, enables self-stabilizing network operation. In another aspect of the invention, the connection adjustment methodology facilitates robust context switching when processing visual information. When a context (such an object) becomes intermittently absent, prior context connection potentiation enables firing for a period of time. If the object remains absent, the connection becomes depressed thereby preventing further firing. | 2013-11-07 |
20130297542 | SENSORY INPUT PROCESSING APPARATUS IN A SPIKING NEURAL NETWORK - Apparatus and methods for feedback in a spiking neural network. In one approach, spiking neurons receive sensory stimulus and context signal that correspond to the same context. When the stimulus provides sufficient excitation, neurons generate response. Context connections are adjusted according to inverse spike-timing dependent plasticity. When the context signal precedes the post synaptic spike, context synaptic connections are depressed. Conversely, whenever the context signal follows the post synaptic spike, the connections are potentiated. The inverse STDP connection adjustment ensures precise control of feedback-induced firing, eliminates runaway positive feedback loops, enables self-stabilizing network operation. In another aspect of the invention, the connection adjustment methodology facilitates robust context switching when processing visual information. When a context (such an object) becomes intermittently absent, prior context connection potentiation enables firing for a period of time. If the object remains absent, the connection becomes depressed thereby preventing further firing. | 2013-11-07 |
20130297543 | TOOLS AND METHODS FOR DETERMINING RELATIONSHIP VALUES - Systems, apparatus, and methods for correlating two items of interest, based on a plurality of data items and characteristics. The data items may include objective and quantitative data, as well as subjective and qualitative data. In one implementation, the relationship of an individual to a metric is determined. The system, apparatus, and methods may store characteristics describing individuals generally, along with metrics relevant to an organization; receive a plurality of data items; extract information associated with the individual from the data items; determine a number of relationships between the data items, individuals, metric, and characteristics; and use the relationships to determine an overall relationship between the individual and the metric, based on the data and characteristics. In addition, related groups of characteristics may be identified. Similarly, the relationships between any individual, metric, sub-metric, group of characteristics, data item, data source, characteristic, or groups thereof may also be determined. | 2013-11-07 |
20130297544 | Reuse of On-Demand Enterprise System Customization Knowledge Utilizing Collective Experience - Systems and methods allow sharing and reuse of acquired customization knowledge of enterprise systems, utilizing collective customization experience. Particular embodiments employ Case-Based Reasoning (CBR) principles to manage customization experience in the context of both Software as a Service (SaaS) and Platform as a Service (PaaS) environments. Collective customization knowledge may be explicitly retrieved, adapted, shared, reused, and/or traded between tenants, partners, and optionally provider(s), of on-demand enterprise systems. A previous customization case stored within an experience base, may include one or more of the following: information allowing annotation of price information for trading the previous customization case (e.g. to another tenant); information restricting visibility of the previous customization case within the experience base; information defining a rating for the previous customization case within a community; information capturing a reuse frequency of the previous customization case; and/or information rendering anonymous at least a portion of the previous customization case. | 2013-11-07 |
20130297545 | METHOD AND APPARATUS FOR IDENTIFYING CUSTOMER SERVICE AND DUPLICATE QUESTIONS IN AN ONLINE CONSULTATION SYSTEM - Embodiments of the present invention further provide systems and methods for creating search engine optimized titles representing the relevant content of a document where the title is of the appropriate character length such that search engines will view and index the entire title. | 2013-11-07 |
20130297546 | GENERATING SYNTHETIC SENTIMENT USING MULTIPLE TRANSACTIONS AND BIAS CRITERIA - A system is presented that provides sentiment analysis technology that takes into account the perspective or context of the individual or entity for which the sentiment analysis is being performed. Using multiple points of reference within a hierarchical head noun structure (containing head nouns of root terms and possibly dependent terms), the structure allows the system to return different outcomes depending on a user query specifying one or more head nouns to be taken as reference points for sentiment calculations. As a result, an appropriate context for sentiment analysis is determined which takes into account the perspective/context associated with the individual or entity for which the analysis is performed. | 2013-11-07 |
20130297547 | AGGREGATE CONTEXT INFERENCES USING MULTIPLE CONTEXT STREAMS - Methods, systems, computer-readable media, and apparatuses for inferring context are provided. In one potential implementation, first context information associated with a first duration is identified, second context information is accessed to determine a context segmentation boundary; and the first context information and the second context information is then aggregated to generate an inferred segmented aggregated context. In a further implementation, the first context information is used to average inferred contexts, and the context segmentation boundary is used to reset a start time for averaging the first context information. | 2013-11-07 |
20130297548 | Method For Operating A Programmable Logic Controller - A method is disclosed for operating a programmable logic controller which executes program(s) based on cycles having a predetermined cycle time in a predefined memory. An automated reasoning method based on an ontology and a description logic is implemented in the programmable logic controller. To enable this, at least the concepts and roles of the ontology are encoded using index numbers and the axioms of the ontology are encoded using tuples of integral index numbers. The automated reasoning method is interrupted before the end of a cycle and subsequently resumed at the current status of program execution. This allows for the cyclic programming paradigm of a programmable logic controller. The method can be used for any types of programmable logic controller, e.g., controllers of devices belonging to an automation system or energy generation devices. In such scenarios the automated reasoning method may be used for diagnosing the corresponding devices. | 2013-11-07 |
20130297549 | TRAVEL PROCESS PREDICTION SYSTEM, TRAVEL PROCESS PREDICTION APPARATUS AND NON-TRANSITORY RECORDING MEDIUM - An information acquiring apparatus acquires, when a travel object such as a traveler travels with transportation, passage time at which the travel object passes through each passage point at a departure/arrival facility, transportation specifying information indicating transportation, situation information indicating a situation and so forth. The travel process prediction apparatus stores the acquired information in an associated manner, and obtains a regression equation representing the relationship between items included in the transportation specifying information or situation information and passage time at a specific passage point, elapsed time while the travel object passes through two specific passage points or a result of comparison between the passage time and boarding completion time. The travel process prediction apparatus calculates a predicted value of future passage time, elapsed time or a result of comparison by substituting the content of the expected transportation specifying information or situation information for the regression equation. | 2013-11-07 |
20130297550 | BUILDING ANALYTIC DEVICE - An information analytic system including an information gathering unit configured to gather at least one piece of information from at least one of a plurality of devices connected to a network, an information analysis unit configured to analyze the gathered information, and a rule generation unit configured to generate at least one rule based on the analysis performed by the information analysis unit. The rule analysis unit is configured to analyze each generated rule to identify the rules that can be applied to the corresponding piece information, and to apply applies the identified rule to the corresponding piece of information. The rule analysis unit is also configured to analyze unapplied rules and to determine what additional information is required to apply each unapplied rule to at least one piece of information. | 2013-11-07 |
20130297551 | SYSTEM AND METHOD FOR PROVIDING INTELLIGENT LOCATION INFORMATION - A method and system that includes extracting event models from at least one personal planning source of a user, wherein a parameter of an event model includes event location; periodically receiving location information of at least one mobile device of the user; storing the location information in a location log; a pattern worker module maintaining user location patterns through the location log; generating a location prediction from the extracted event models and the user location patterns; a first content worker module checking if the location prediction meets a set of content requirements; if the set of content requirements is satisfied, initiating content retrieval from at least one service; and pushing the content to the mobile device. | 2013-11-07 |
20130297552 | METHOD OF EXTRACTING KNOWLEDGE RELATING TO A NODE IN A DISTRIBUTED NETWORK - Embodiment is related to a method of extracting knowledge relating to a node from a plurality of nodes in a distributed network. Firstly, acquiring expertise information of each of plurality of nodes connected to distributed network. The expertise information is acquired by a mode comprising inputting, importing and learning by plurality of nodes. Next, a network power of a node from plurality of nodes is computed based on plurality of nodes connected to node. The network power is based on expertise information of plurality of nodes connected to node. Thirdly, a contribution score of the node from plurality of nodes is measured based on role of node towards one or more transactions in distributed network. Lastly, a reputation score of node is determined using at least one of the acquired expertise information, computed network power and measured contribution score for extracting knowledge relating to node in distributed network. | 2013-11-07 |
20130297553 | METHOD AND APPARATUS FOR PREDICTING QUESTION ANSWERABILITY IN AN ONLINE CONSULTATION SYSTEM - Embodiments of the present invention further provide systems and methods for predicting the likelihood of a user posted the question to an online consultation system to not receive an answer based on the features extracted from the question. | 2013-11-07 |
20130297554 | METHODS AND SYSTEMS FOR EMPLOYING ARTIFICIAL INTELLIGENCE IN AUTOMATED ORTHODONTIC DIAGNOSIS & TREATMENT PLANNING - Methods and systems for diagnosing and identifying a treatment for an orthodontic condition are disclosed. Such methods and systems generally entail the use of a server on which a centralized website is hosted. The server is configured to receive patient data through the website. The methods and systems further include the use of a database that includes or has access to (i) information derived from textbooks and scientific literature and (ii) dynamic results derived from ongoing and completed patient treatments. The methods and systems further include the operation of at least one computer program within the server, which is capable of analyzing the patient data and identifying at least one diagnosis of the orthodontic condition. The methods and systems further entail assigning a probability value to the at least one diagnosis, with the probability value representing a likelihood that the diagnosis is accurate. The methods and systems further include instructing the computer program to identify at least one treatment approach, a corrective appliance, or a combination thereof for the at least one diagnosis. | 2013-11-07 |
20130297555 | OCCUPANCY PATTERN DETECTION, ESTIMATION AND PREDICTION - Systems and methods are described for predicting and/or detecting occupancy of an enclosure, such as a dwelling or other building, which can be used for a number of applications. An a priori stochastic model of occupancy patterns based on information of the enclosure and/or the expected occupants of the enclosure is used to pre-seed an occupancy prediction engine. Along with data from an occupancy sensor, the occupancy prediction engine predicts future occupancy of the enclosure. Various systems and methods for detecting occupancy of an enclosure, such as a dwelling, are also described. | 2013-11-07 |
20130297556 | IN-MEMORY SPATIAL DATABASE FOR GEOCODING/GEOPROCESSING - The embodiments provide an in-memory database system having an extraction module configured to extract data (e.g., business data and address data) from one or more external data sources and transform the data into a standard format, a geocoder configured to geocode the address data including obtaining spatial data based on the address data using an internal reference table, and an internal database configured to store the internal reference table, the business data, the address data, and the spatial data | 2013-11-07 |
20130297557 | COLUMN BASED DATA TRANSFER IN EXTRACT, TRANSFORM AND LOAD (ETL) SYSTEMS - Executing a plurality of transform stages in an extract, transform and load (ETL) job including, for each of the transform stages, receiving a plurality of input row identifiers (RIDs) corresponding to a first plurality of source database table rows in a source database table. Data is retrieved directly from a subset of the source database table columns in the first plurality of source database table rows based on the input RIDs and transform logic. Partial row data including data from the subset of the source database table columns is generated for each of the first plurality of source database table rows. Transformed data is generated based on the partial row data and to the transform logic. Output RIDs corresponding to a second plurality of rows in the source database table that include a least a subset of the transformed data are output to a downstream stage. | 2013-11-07 |
20130297558 | EXTENDING OLAP NAVIGATION EMPLOYING ANALYTIC WORKFLOWS - Analytic workflows for performing data analysis and other related operations are stored in an analytic workflow library and provided to a user upon selection of data from a data store. A workflow manager may rank the workflows based on a number of ranking algorithms prior to presentation. User selected workflows are executed in conjunction with relevant external applications and the analysis result provided to the user through the user's client application used to select the data. Workflows and associated interfaces may be received from a variety of sources and integrated into the workflow framework for enhancing data analysis. | 2013-11-07 |
20130297559 | STRUCTURED COAUTHORING - A system is presented for structured coauthoring of a document, the system comprising a server. The server includes one or more documents organized into sections, a document permissions module that stores user access permissions for each section of a document, a document update processing module that processes requests from a user to share document updates with other users and that processes requests from a user to receive document updates from other users and a document rendering module that renders a document for display on a client so that sections of the document are updated with shared document updates made by users. The user access permissions determine the extent to which a user can modify each section of the document. | 2013-11-07 |
20130297560 | SYSTEM AND METHOD FOR MODIFYING VARIOUS TYPES OF ASSETS - A device includes a network interface module, memory, and a processing module. The memory stores limit tables regarding an asset and operational data regarding the asset. When an asset is to be modified, the processing module retrieves a limit table(s) and identifies time-varying and time-sensitive data and an operation therefrom. The processing module then receives, via the network interface module, the time-varying and time-sensitive data and analyzes it based on evaluation criteria in the limit table. When the analysis is favorable, the processing module triggers the operation. With the operation triggered, the processing module further analyzes the time-varying and time-sensitive data based on correlated evaluation criteria of the evaluation criteria. When the further analysis is favorable, the processing module activates the operation for execution up operational data regarding the asset such that the asset is modified. | 2013-11-07 |
20130297561 | WEB ACCELERATION BASED ON HINTS DERIVED FROM CROWD SOURCING - In an embodiment, a UE determines to load a web page via a mobile browsing application on the UE. The UE obtains, from a web server, web page resource information for loading the web page on the UE. The UE loads the web page using the web page resource information and identifies one or more hints for assisting one or more mobile browsing applications on at least one other UE to perform an initial load of the web page, which the UE then reports to a hints server. The hints server collects hints from the UE as well as other UEs, evaluates their relevance and generates and/or updates a crowd-sourced hints list based on their perceived relevance. The hints server provides the crowd-sourced hints list to a target UE, and the target UE uses the crowd-sourced hints list to load the web page. | 2013-11-07 |
20130297562 | MANAGING METADATA FOR GRAPH-BASED COMPUTATIONS - Determining metadata associated with a graph-based computation includes functionally transforming metadata associated with a first portion of a graph to generate transformed metadata associated with a second portion of the graph; determining a third portion of the graph related to the second portion of the graph; and propagating the transformed metadata from the second portion of the graph to the third portion of the graph. | 2013-11-07 |
20130297563 | TIMESTAMP MANAGEMENT METHOD FOR DATA SYNCHRONIZATION AND TERMINAL THEREFOR - A method for managing timestamps uses the difference between last data synchronization time and new data synchronization time of the data stored in the respective terminals. The method for managing timestamps for data synchronization of a terminal includes configuring a first time and a last synchronization time based on a last data synchronization time and time of a reference terminal at a last data synchronization; configuring, when data synchronization occurs, a second time based on a data synchronization occurrence time; and configuring the timestamp of the data based on the last synchronization time and a difference between the first and second times. | 2013-11-07 |
20130297564 | EVENT-BASED RECORDS MANAGEMENT - Systems and methods of managing operational records, for example of a private response center. In one implementation the system includes one or more processors, memory holding instructions executable by the one or more processors, distributed storage holding a plurality of event stores storing records of events, and one or more electronic communication links between locations at which the event stores are stored. The instructions, when executed by the one or more processors, cause the system to receive a request for a view of a state of the system, and construct the view from the records in at least one of the event stores. | 2013-11-07 |
20130297565 | Database Management System - A multi-user, elastic, on-demand, distributed relational database management system. The database is fragmented into distributed objects called atoms. Any change to a copy of an atom at one location is replicated to all other locations containing a copy of that atom. Transactional managers operate to satisfy the properties of atomicity, consistency, isolation and durability. | 2013-11-07 |
20130297566 | RECOVERING STATEFUL READ-ONLY DATABASE SESSIONS - A process, apparatus, and computer-readable medium are provided for rebuilding a database session when a previous database session becomes unavailable and the commands previously sent for execution on the previous database session satisfy certain criteria. The process includes determining whether or not a set of commands sent by a client for execution on the previous database session is acceptable to replay based at least in part on whether or not the set of commands satisfies one or more criteria. The process further includes determining that the previous database session is unavailable due to a planned or unplanned recoverable error. In response to determining that the previous database session is unavailable, if the set of commands is acceptable for replay, the set of commands is sent for execution on a new database session to rebuild the state, which was exposed to the client from the previous database session, on the new database session. The process masks the outage from the application. | 2013-11-07 |
20130297567 | DATA STREAM QUALITY MANAGEMENT FOR ANALYTIC ENVIRONMENTS - According to one aspect of the present disclosure, a system and technique for data quality management is disclosed. The system includes a processor and an ingress quality specification (IQS) module executable by the processor in a runtime environment with a data stream analytic module. The IQS module is configured to: receive the data stream; analyze a subset of data of the data stream to determine if the subset of data meets a quality expectation of the analytic module; annotate the subset of data to indicate a quality status based on whether the subset of data meets the quality expectation of the analytic module; and output the data stream to the analytic module. | 2013-11-07 |
20130297568 | System and Method for Organizing Data - A system and method for organizing raw data from one or more sources uses an improved mechanism for identifying duplicate data between fields (e.g., columns) in the databases. The fields may be similar fields within a single database or similar or identical fields within a pair of databases and as organized as arrays or field vectors. The present invention sorts each of the field vectors and if necessary, partitions them by common value. A number of comparisons required to identify the duplicate data between the field vectors is reduced by feeding back a difference between the compared values. This difference is used to adjust indices into the field vectors for subsequent comparison. | 2013-11-07 |
20130297569 | ENHANCING DATA PROCESSING PERFORMANCE BY CACHE MANAGEMENT OF FINGERPRINT INDEX - Various embodiments for improving hash index key lookup caching performance in a computing environment are provided. In one embodiment, for a cached fingerprint map having a plurality of entries corresponding to a plurality of data fingerprints, reference count information is used to determine a length of time to retain the plurality of entries in cache. Those of the plurality of entries having a higher reference counts are retained longer than those having lower reference counts. | 2013-11-07 |
20130297570 | METHOD AND APPARATUS FOR DELETING DUPLICATE DATA - Present invention provides a method and an apparatus for deleting duplicate data. The method include: receiving a modified data block for a user file stored in the data storage system; querying whether the modified data block is found in the system data block file; if the modified data block is not found in the system data block file, adding the modified data block to the system data block file, and updating an index relationship of the user file with the system data block file to include an index pointing to the modified data block added in the system data block file. With the method and apparatus for deleting duplicate data provided by embodiments of the present invention, the duplicate data after modification is deleted, which improves the performance in modifying other data block files and improves the effect of deleting the duplicate data. | 2013-11-07 |
20130297571 | System and Method for Application Aware De-Duplication of Data Blocks in a Virtualized Storage Array - A system and method for application aware de-duplication of data blocks in a virtualized storage array is disclosed. In one embodiment, in a method of de-duplication of data, a master list of metadata is created based on a number of occurrences of data blocks within a storage array. A first sublist of metadata is created from the master list of metadata. The first sublist of metadata is provided to a first component of a networked storage system. It is determined whether the data block being written has a corresponding entry in the master list of metadata based on a determination that a data block being written does not have any corresponding entry in the first sublist of metadata. The data block being written is replaced with a pointer based on a determination that the data block being written has a corresponding entry in the master list of metadata. | 2013-11-07 |
20130297572 | FILE AWARE BLOCK LEVEL DEDUPLICATION - A system provides file aware block level deduplication in a system having multiple clients connected to a storage subsystem over a network such as an Internet Protocol (IP) network. The system includes client components and storage subsystem components. Client components include a walker that traverses the namespace looking for files that meet the criteria for optimization, a file system daemon that rehydrates the files, and a filter driver that watches all operations going to the file system. Storage subsystem components include an optimizer resident on the nodes of the storage subsystem. The optimizer can use idle processor cycles to perform optimization. Sub-file compression can be performed at the storage subsystem. | 2013-11-07 |
20130297573 | Character Data Compression for Reducing Storage Requirements in a Database System - A system, method, and computer program product for character data compression for reducing data storage requirements in a database system are described. Embodiments include identifying data of a particular character type in a full data page, and identifying usage frequency of each character of the particular character type. Each character is encoded based on the identified usage frequency and stored, with storage requirements for most frequently used characters are reduced. | 2013-11-07 |
20130297574 | METHOD AND APPARATUS FOR COMPRESSING THREE-DIMENSIONAL POINT CLOUD DATA - A method and apparatus for compressing three-dimensional point cloud data is disclosed. In one aspect, a method for compressing three dimensional point cloud includes steps of retrieving three-dimensional point cloud data; providing one or more grids to the three-dimensional point cloud data; assigning one binary digit to each three-dimensional grid voxel containing said point cloud data and assigning the other binary digit to each three-dimensional grid voxel that does not have said point cloud data; converting the three-dimensional grid into two-dimensional tiles; and storing information of a plurality of binary strings in said two-dimensional tiles. In one embodiment, the step of storing information of a plurality of binary strings in said two-dimensional tiles includes a step of storing the number of repeating times of each binary digit in the binary strings. The method can significantly reduce memory space, as well as preserving small details of the point cloud. | 2013-11-07 |
20130297575 | DATA MANAGEMENT SYSTEMS AND METHODS USING COMPRESSION - The present disclosure is directed to systems and methods for providing fast and efficient data compression using a combination of content dependent, content estimation, and content independent data compression. In one aspect of the disclosure a method for compressing data comprises the steps of: analyzing a data block of an input data stream to identify a data type of the data block, the input data stream comprising a plurality of disparate data types; performing content dependent data compression on the data block, if the data type of the data block is identified; performing content estimation data compression if the content is estimable; and performing content independent data compression on the data block, if the data type of the data block is not identified or estimable. In another aspect of the present invention LZDR compression is applied to simultaneously perform one method of compression while computing statistics useful in estimating the optimal form of compression to be applied. | 2013-11-07 |
20130297576 | EFFICIENT IN-PLACE PRESERVATION OF CONTENT ACROSS CONTENT SOURCES - Technologies are described herein for providing efficient in-place preservation of content in multiple, disparate content sources without disrupting end-users' access to the content or content sources. A preservation request comprising a specification of a content source and a filter specification is received and the content source is marked as “on hold.” If a content item in the content source is modified or deleted, a copy of the current version of the content item is placed in a preservation storage area. A trim job may be run periodically that removes content items from the preservation storage area that do not match the filter specification. | 2013-11-07 |
20130297577 | DATABASE ELEMENT VERSIONING SYSTEM AND METHOD - This disclosure relates to database systems and, more particularly, to database systems with version controlled data. A version controlled database program resides on a computer readable medium, having a plurality of instructions stored thereon, which, when executed by a processor, cause the processor to perform operations. The operations include defining a version object software layer. The version object software layer may be configured to read and write data of a version controlled database to a physical storage medium, maintain one or more versions of at least one element of the data, and provide access to the data. The operations may also include defining a database management software layer. The database management software layer may be configured to read and write data to the version object software layer and provide a database access interface for accessing the data. | 2013-11-07 |
20130297578 | INTEGRATED CIRCUIT DEVICE AND METHOD FOR DETERMINING AN INDEX OF AN EXTREME VALUE WITHIN AN ARRAY OF VALUES - An integrated circuit device comprises at least one digital signal processor, DSP, module, the at least one DSP module comprising a plurality of data registers and at least one data execution unit, DEU, module arranged to execute operations on data stored within the data registers. The at least one DEU module is arranged to, in response to receiving an extreme value index instruction, compare a previous extreme value located within a first data register set of the DSP module with at least one input vector data value located within a second data register set of the DSP module, and determine an extreme value thereof. The at least one DEU module is further arranged to, if the determined extreme value comprises an input vector data value located within the second data register set, store the determined extreme value in the first data register set, determine an index value for the determined extreme value, and store the determined index value in the first data register set. | 2013-11-07 |
20130297579 | CODE REGENERATION DETERMINATION FROM SELECTED METADATA FINGERPRINTS - A fingerprint is computed from selected metadata of binary files, and used in determining whether to regenerate code-behind file(s). In one case, after ascertaining that a binary-file-set's current metadata-fingerprint differs from a previous metadata-fingerprint, the corresponding code-behind-file-set is regenerated. A code-behind file may also be regenerated, even though its current fingerprint matches its previous fingerprint, because its metadata has changed. If the current fingerprint matches the previous fingerprint and metadata is unchanged, regeneration can be avoided. The fingerprint may consist of, or merely contain, definitions of classes, properties, and other items, and may be limited to metadata that is used when generating the code-behind-file-set. System assemblies are not fingerprinted. Timestamps may be used. Metadata-fingerprint computation code and regeneration determination code are described. Metadata-fingerprints may be used in developing applications with web-based application code frameworks, frameworks having code for rendering a user interface, other frameworks, XAML, C#, and other programming languages. | 2013-11-07 |
20130297580 | LOCK REORDERING FOR OPTIMISTIC LOCKING OF DATA ON A SINGLE NODE TO AVOID TRANSACTION DEADLOCK - A node a data grid receives a prepare request identifying data to lock for a first transaction. The prepare request indicates a locking order that is different from a locking order indicated by a prior prepare request of a second transaction using the same data. The node identifies keys that correspond to the data. The keys are co-located on the node. The node ranks the keys to define an order for acquiring locks for the data based on key identifiers that correspond to the keys. The defined order matches a locking order used by the second transaction. The node acquires locks for the data using the defined order. | 2013-11-07 |
20130297581 | Systems and methods for customized filtering and analysis of social media content collected over social networks - A new approach is proposed that contemplates systems and methods to filter and/or rank a plurality of content items retrieved from a social network based on the sentiments expressed by the authors of the content items and/or the influence level of the authors over the social network. First, content items matching a set of keywords submitted by a user are retrieved from the social network. The sentiments and/or the influence levels of the authors of these content items are then identified in real time. Once identified, the sentiments and/or influence levels of the authors are used to filter and/or rank the retrieved content items to generate a search result that matches with the sentiment and/or influence level specified by the user. Finally, the customized search result based on the sentiments and/or the influence levels of the authors is presented to the user. | 2013-11-07 |
20130297582 | PEER SHARING OF PERSONALIZED VIEWS OF DETECTED INFORMATION BASED ON RELEVANCY TO A PARTICULAR USER'S PERSONAL INTERESTS - The technology performs predictive analytics on web content for users researching or tracking detailed topics on the web who are limited by the sparse input capability of current search tools. Using a machine learning technology core and other predictive analytics tools, the technology allows users to create predictive models based on exemplars of their interest such as articles and documents. Predictive models are mathematically patterned and pointed at the web. Results are presented to the user, with the ability to re-train the system as desired as well as create new models. This particular invention has the ability to connect users with similar interests by comparing their predictive models, thus facilitating collaboration and promoting social media interaction (“social clustering”). | 2013-11-07 |