Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


14th week of 2013 patent applcation highlights part 48
Patent application numberTitlePublished
20130085899CUSTOMIZABLE UNIFORM CONTROL USER INTERFACE FOR HOSTED SERVICE IMAGES - An electronic marketplace for service images permits users to browse descriptions of service images implementing desired functionalities of a virtual machine image. The described service images may contain one or more software applications and may be further offered for purchase through an electronic service image marketplace. The electronic marketplace can further provide uniform control objects that are associated with multiple service images and multiple instruction sets. Following an interaction with a particular uniform control object, the electronic marketplace can perform an action on a particular service image based on an association between the particular uniform control object and a particular instruction set associated with the particular service image.2013-04-04
20130085900ENHANCING THE SEARCH EXPERIENCE IN A NETWORKED PUBLICATION SYSTEM BY IMPROVED SEARCH AND LISTING PROCESS - A method comprising detecting an indication of entering a brand name in a search box from a client machine; responsive to detecting the indication, providing selectable images of categories of products of the brand and selectable product aspects of the products; detecting an indication of the selection of a product category and a product aspect from the client machine; responsive to detecting the indication of the selection of the product category and of the product aspect, providing selectable images of styles of products; and responsive to detecting an indication of the selection of an image of a product style, providing a number of selectable images of at least one product of the selected product category of the brand, the at least one product being of the selected style and aspect. The aspects may include a color selectable as a range of shades of the color.2013-04-04
20130085901INVENTORY MANAGEMENT SYSTEM - A statistical inventory management system may optimize inventory investment using historical usage and/or consumption of an inventory component by determining one or more target inventory levels (e.g., replenishment levels). Historical usage data may be summed for a plurality of at least partially non-overlapping time periods that may be each equal in duration to a supplier lead-time period for the component to create lead-time usage data. The lead-time usage data may be utilized to more accurately determine future inventory levels (e.g., target inventory levels) because the lead-time usage data may have a reduced variance compared to, for example, day-to-day usage. The inventory management system may be employable by a computing system having a display module (e.g., GUI) that allows a user to receive at least one graphical representation indicative of at least one target inventory level of at least one inventory component (e.g., by selectively interacting with the display module).2013-04-04
20130085902Automated account reconciliation method - Disclosed is a generalized method for automated account reconciliation capable of matching transactions in one accounting dataset to transactions in another accounting dataset with little initial data preparation. The method is highly flexible in that it does not require source data in a particular format, can accept both structured and unstructured (e.g. Descriptive text) data as input, is not domain- or language-dependent, and requires little to no training or user-provided heuristics. The method is also adjustable depending on a user's tolerance of error. Based on probability and information theory, computational linguistics, and statistics, the method can complete accounting reconciliation problems in significantly less time than is possible manually, and with just as high accuracy. Especially for large reconciliation problems, the method can save an overwhelming portion of the cost associated with this kind of task in the past.2013-04-04
20130085903Mileage Tracker Entry for Mobile Expense Solutions - An improved approach is described for implementing an expense solution that includes mileage tracker methods and systems. Mobile devices are integrated into an expense solutions architecture so that expense-related data can be captured, created, entered, and/or edited on the mobile device. This permits the user to generate expense line entries more in alignment with the location/way that many expense are actually generated, e.g., while the user is away from the office computer.2013-04-04
20130085904Mobile Expense Solutions Architecture - An expense solutions architecture is provided, in which an improved approach is described for implementing an expense solution. Mobile devices are integrated into an expense solutions architecture so that expense-related data can be captured, created, entered, and/or edited on the mobile device. This permits the user to generate expense line entries more in alignment with the location/way that many expense are actually generated, e.g., while the user is away from the office computer.2013-04-04
20130085905MOBILE DEVICE FOR MOBILE EXPENSE SOLUTIONS ARCHITECTURE - An improved approach is described for implementing mobile devices for an expense solutions architecture. Mobile devices are integrated into an expense solutions architecture so that expense-related data can be captured, created, entered, and/or edited on the mobile device. This permits the user to generate expense line entries more in alignment with the location/way that many expense are actually generated, e.g., while the user is away from the office computer.2013-04-04
20130085906METHOD AND SYSTEM FOR IMPLEMENTING EFFICIENT ENTRY FOR MOBILE EXPENSE SOLUTIONS - An improved approach is described for implementing an expense solution that includes efficient entry methods and systems. Mobile devices are integrated into an expense solutions architecture so that expense-related data can be captured, created, entered, and/or edited on the mobile device. This permits the user to generate expense line entries more in alignment with the location/way that many expense are actually generated, e.g., while the user is away from the office computer.2013-04-04
20130085907CALENDAR ENTRY FOR MOBILE EXPENSE SOLUTIONS - An improved approach is described for implementing an expense solution that includes calendar entry methods and systems. Mobile devices are integrated into an expense solutions architecture so that expense-related data can be captured, created, entered, and/or edited on the mobile device. This permits the user to generate expense line entries more in alignment with the location/way that many expense are actually generated, e.g., while the user is away from the office computer.2013-04-04
20130085908IMAGE ENTRY FOR MOBILE EXPENSE SOLUTIONS - An improved approach is described for implementing an expense solution that includes image entry methods and systems. Mobile devices are integrated into an expense solutions architecture so that expense-related data can be captured, created, entered, and/or edited on the mobile device. This permits the user to generate expense line entries more in alignment with the location/way that many expense are actually generated, e.g., while the user is away from the office computer.2013-04-04
20130085909SY BASED INTEGRATED POLICY AND CHARGING CONTROL - Various exemplary embodiments relate to a method for managing subscriber usage in a mobile network by a policy and charging rules function (PCRF) including: receiving a credit control request (CCR) message from a policy and enforcement rules function (PCEF) for an application; determining if a Sy connection to an online charging system (OCS) is necessary to implement the CCR; determining if a Sy session is present; sending an application authorization request (AAR) message to the OCS; binding a counter to the application; determining a policy to apply based upon the application; and sending a credit control answer (CCA) message to the PCEF to effect the policy.2013-04-04
20130085910Flexible account reconciliation - Disclosed are improvements to a method for account reconciliation comprising improved, extended, and more flexible algorithms for (1) automatically determining what transaction features are best candidates for matching diverse datasets; (2) automatically determining how logically to subdivide accounting datasets prior to reconciliation; (3) matching groups of transactions (allowing one-to-many, many-to-one, and many-to-many matches instead of just one-to-one matches); (4) making use of more types of transaction feature, including transaction dates (where proximity of two transactions in date may be significant even if the dates do not exactly match). The improved method is, therefore, better able to perform its intended function of identifying matching transactions. It is applicable to a wider class of problems while still saving significant costs and labor, and still retaining flexibility in not requiring source data in a particular format, and not being domain-dependent or requiring extensive user setup.2013-04-04
20130085911PATENT REGISTRY ARCHITECTURE WITH DIRECT PATENT OFFICE PAYMENT CONDUIT - Various embodiments of the present disclosure include systems and methods for managing patent annuity fee payments. One method comprises using one or more processors to provide a registry of patent matters comprising, at least, a listing of patent matters representing all patent matters registered at a national patent office for which respective patent annuity fees are payable. The method further includes registering customers of the registry as registered users of the registry, and allowing at least one registered user of the registry to tag one or more patent matters in the registry listing for payment of patent annuity fees. In one embodiment, a direct annuity payment conduit between a national patent office and at least one registered user of the registry is provided.2013-04-04
20130085912PATENT REGISTRY ARCHITECTURE - Various embodiments of the present disclosure include systems and methods for managing patent annuity fee payments. One method comprises using one or more processors to provide a registry of patent matters comprising, at least, a listing of patent matters representing all patent matters registered at a national patent office for which respective patent annuity fees are payable. The method further includes registering customers of the registry as registered users of the registry, and allowing at least one registered user of the registry to tag one or more patent matters in the registry listing for payment of patent annuity fees.2013-04-04
20130085913AUTOMATED SALES TAX PAYMENT SYSTEM - Described are technologies relating to transaction processing. In general, one aspect of the subject matter described herein can be embodied in methods that include the actions of calculating, in relation to a transaction, one or more tax amounts associated with a price of the transaction, obtaining, in relation to a payment source, an approval for at least the price of the transaction and the one or more tax amounts, thereby defining an approved sales transaction, and, subsequent to obtaining the approval, (a) settling at least a revenue portion of one or more approved sales transactions in favor of a first account, and (b) settling the one or more tax amounts in favor of a second account that is different than the first account.2013-04-04
20130085914AUTHENTICATED NAME RESOLUTION - A method, system, and computer-readable memory containing instructions include receiving a DNS request containing authentication information, validating the authentication information, determining an appropriate action to take based on the validating status, and taking the appropriate action. Actions may include responding with an individualized network layer address or service location address, delaying sending a response message, sending a network layer address or service location address corresponding to a site containing authentication information, and sending a response with a network layer address or service location address with a web address configured to mimic the website related to the requested resource.2013-04-04
20130085915BROADBAND INTELLIGENT EVENT REPOSITORY - Example methods disclosed herein to manage and process data associated with network usage include creating first links to represent relationships between event data items and rated data items, and creating second links to represent relationships between the rated data items and billed data items. Such example methods also include, in response to a request for network usage information associated with a first billed data item received after the first billed data item has been generated, processing a first one of the second links to identify a first rated data item associated with the first billed data item, processing a first one of the first links to identify a first event data item associated with the first rated data item, and returning the first event data item in response to the request.2013-04-04
20130085916DATA MANAGMENT SYSTEMS AND PROCESSING FOR FINANCIAL RISK ANALYSIS - A computer based system and method is directed to the determination of aggregate metrics of select financial indicators utilizing a protocol that preserves the confidentiality of the individual data sets comprising the aggregate metrics. The data processing system provides industry wide transparency of financial risk, concentration and the like based on data associated with individual firms free from risk of subsequent reverse determination of the underlying data.2013-04-04
20130085917EVENT RISK ASSESSMENT - The present subject matter discloses a system and method for assessing overall risk rating of one or more events in transactions relating to financial services. In one implementation, the method includes obtaining at least one parameter indicative of a risk criteria associated with the one or more events. The method further includes assigning values to the at least one parameter and determining a risk rating based on the values assigned for the at least one parameter. A risk index is generated for the one or more events based on the risk rating. Overall risk rating of the one or more events is assessed based at least in part on the risk index and a threshold value for the one or more events.2013-04-04
20130085918ELECTRONIC WALLET - An electronic wallet for accessing a credit card account information includes a card reader, a processor, a touch screen, a radio frequency (RF) module, and an antenna. The card reader, the touch screen, and the RF module are electrically connected to processor. The card reader is adapted to read card number and correlation information of the credit card. The processor receives the card number and correlation information from the card reader to identify the credit card issuer, and sends a control signal to the touch screen to display a login interface of the identified credit card issuer. The touch screen allows users to input the card number and password on the login interface. The processor encrypts the card number and the password. The RF module converts an encrypted signal received from the processor to RF signals, and sends the RF signals to networks through the antenna.2013-04-04
20130085919Interactive Account Management System and Method - Embodiments of the invention are directed to a computer-implemented interactive account management system operated in cooperation with a financial institution on behalf of multiple account holders. The interactive account management system may include a financial networking engine implemented by a processor for defining a financial network for each account holder and for identifying each member of an account holder financial network based on stored account information and account holder input. The system may additionally include interactive processing components for processing information to provide collaborative interaction between the members of the account holder financial network defined by the financial networking engine and user interface presentation tools for displaying financial guidance and collaborative interaction interfaces and inviting active participation from the financial network members.2013-04-04
20130085920System for Reducing Information Required to Open a New Account - An existing customer of a financial institution may open a new account with their financial institution using an optimized online interface. Initially, the interface presents a standard application for a new account in which an extensive number of fields for personal and financial information must be completed. A link is provided on this long application for use by existing account holders only. Upon selection of the link, an existing account holder is instead presented with a short application in which only the account holder's name, a portion of their social security number, their existing account number, and their account confirmation identifier are required to be entered.2013-04-04
20130085921HOME ENERGY COLLABORATIVE MESH PLATFORM - A method to share, barter, lend, trade, rent and give energy through technology and peer communities. An online service which allows users to globally monitor, manage and redistribute energy (electricity) at the individual house level. This method of collaborative consumption gives members in the organized communities the benefit of ownership with reduced personal burden and costs. The fundamental value is that it provides an alternative to traditional forms of purchasing and ownership.2013-04-04
20130085922MANAGING OUTLYING TRADING ORDERS - According to one embodiment, a method of managing trading is provided. In a market for a particular type of instrument, electronic data including buy orders and sell orders are received from a plurality of traders. Each buy order has an associated bid price and each sell order has an associated offer price. A determination is made of whether the particular trading order is an outlying trading order by electronically determining whether the particular trading order differs from at least one comparison price by more than a threshold value. If it is determined that the particular trading is an outlying trading order, a restrictive action is taken regarding one or more trading orders. For example, if a trader subsequently submits another trading order that would trade with the outlying trading order, an electronic alert message may be sent to the trader and the subsequent trading order may be prevented from trading with the outlying trading order at least temporarily.2013-04-04
20130085923System and Method for Coalescing Market Data at a Network Device - A network device coalesces data received from an exchange, and provides a user with the opportunity to receive fewer, but up-to-date, data updates from an exchange when duplicate prices become available or a large volume of prices becomes available suddenly. Accordingly, the trader can be assured of receiving non-duplicated prices that are fed at a rate that is cohesive with that trader's connection speed. The present invention is designed to conserve on bandwidth thereby increasing the likelihood that bandwidth will be available to receive desirable market information.2013-04-04
20130085924INTERACTIVE CREDIT MARKETPLACE SYSTEM AND METHOD - The present invention provides an interactive credit marketplace for credit offers, such as trade credit lines. The invention also relates to systems and methods for determining eligibility of a purchaser for particular credit offers and facilitating credit applications between purchasers and suppliers through a multiple-offer display mechanism, as well as for automated, streamlined processing of applications by purchasers for credit deals based on the multiple-offer display mechanism.2013-04-04
20130085925AUDIT AND VERIFICATION SYSTEM AND METHOD - A system and method is provided for use by verification authorities to audit, review and verify information received by applicants or individuals. It allows the end user to verify the information received and return the verified information to whatever institution requires the verification and audit of the information received. The system and method provides full and complete reports and details to allow them to make crucial decisions on verifying the information received. Further, the system and method verifies information received from individuals that may be used such as background, employment and other types of information. The system may allow a user to verify income re-verification, asset verification and in-depth fraud analysis. The system may also provide update and current information on clients and can give an indication and/or predictors on loan defaults and potential problems and return that information to the institution requiring such information.2013-04-04
20130085926Methods and Apparatus for Facilitating the Refinancing of Real Estate Loans - Methods and apparatus for facilitating the refinancing of real estate loans are disclosed. In some embodiments, a loan-to-value ratio is calculated. Responsive to the loan-to-value ratio being greater than a allowed loan-to-value threshold in a refinancing of the real estate loan, a value of paydown capital required to create a refinance loan-to-value ratio for a refinance loan that is less than or equal to the allowed loan-to-value threshold is calculated. Paydown capital equal to the value of paydown capital required to create the refinance loan-to-value ratio less than or equal to the allowed loan-to-value threshold is provided under revenue-capital repayment terms. In some embodiments, the loan-to-value ratio includes a function of a balance owed on a real estate loan, and a re-appraised property value of a property associated with the real estate loan.2013-04-04
20130085927Providing Increased Ability To Perform A Transaction Based On Locale - A method and system is provided that allows a user to select a default currency to be used with the mobile device and associate it with the currency selector of the device. When using the mobile device for mobile payments in a locale with a different currency than the user's default or home currency, the user can actuate the currency selector to convert the currency amount to the default currency and easily determine the default equivalent currency.2013-04-04
20130085928VEHICLE INTEGRATED PAYMENT DEVICE - A payment device including a vehicle having a unique identifier associated therewith. The unique identifier is associated with and identifies a specific financial payment account to permit a payment transaction for the purchase of goods and/or services.2013-04-04
20130085929SYSTEMS AND METHODS FOR MANAGING AND MAKING PATENT ANNUITY PAYMENTS - Various embodiments of the present disclosure include systems and methods of making or managing annuity payments. In one example embodiment, a method comprises tracking one or more patent annuity payments due on at least one patent for a user and docketing a due date for at least one of the annuity payments. In advance of the due date, the method includes identifying the cost of a forward contract to obtain or purchase currency equal to a total amount payable of the at least one annuity payment and providing the cost of the forward contract to the user.2013-04-04
20130085930SYSTEM AND METHOD FOR PROCESSING GIFT CARDS BY INTERCEPTING A PURCHASING TRANSACTION - Disclosed herein is a method for enabling gift card recipients to redeem gift card amounts using existing payment accounts. A system identifies a giver and recipient of a gift card amount and associated accounts. A policy is established which governs how the gift card is redeemed, such as a specific merchant or item. When a purchase is made using an existing credit/debit card according to the policy, the system intercepts the purchase and causes the gift card amount to be applied from an account other than the recipient account. No special codes, separate physical gift cards, or printable coupons are necessary for redemption. The recipient makes purchases using their normal purchasing credit/debit card via a qualifying purchase according to the policy, and the gift card is applied automatically. The recipient credit/debit card becomes a combination of an open-looped card and a closed-loop card. Thus, no money is wasted or lost.2013-04-04
20130085931SOCIAL PROXIMITY PAYMENTS - An application or App on a payer's mobile device is used to discover people known to the user and who are in close proximity to the user at the time of a payment request. Discovery can be through searching contact lists and/or social networks of the payer and/or through the payer device discovering contacts around the payer and then searching the payer's contact or social network list to see if there are any matches. These people are then shown to the user on the user device, such as with a photo, icon, name, and/or email address. The user selects desired ones, which causes requests to be sent to the selected people, such as through text, voice, or email, to the respective devices. The selected people can then easily confirm or authorize a payment be sent to the user or to a payee.2013-04-04
20130085932TRACING DOMAIN NAME HISTORY WITHIN A REGISTRATION VIA A WHOWAS SERVICE - A system, method, and computer-readable medium, is described that implements a repository object history (“WhoWas”) service that receives a WhoWas query to retrieve historical information about a repository object's change history, including a domain's registration activity. The WhoWas service searches repository object history information, formats it, and returns the results. The WhoWas service may be restricted to authorized users and may charge a fee for use. The service may also perform statistical data gathering based on historical WhoWas information, including on subsets of domains based on particular domain characteristics. In addition, historic IP address information and location information may be gathered and returned.2013-04-04
20130085933PATENT REGISTRY ARCHITECTURE WITH PORTAL FOR EXTERNAL ANNUITY PAYMENT SERVICE PROVIDERS - Various embodiments of the present disclosure include systems and methods for managing patent annuity fee payments. One method comprises using one or more processors to provide a registry of patent matters comprising, at least, a listing of patent matters representing all patent matters registered at a national patent office for which respective patent annuity fees are payable. The method further includes registering customers of the registry as registered users of the registry, and allowing at least one registered user of the registry to tag one or more patent matters in the registry listing for payment of patent annuity fees. In one embodiment, a registry portal allows an external annuity payment service provider to communicate electronically with the registry and tag patent matters on behalf of its clients.2013-04-04
20130085934PATENT CONTINUATION ANALYSIS - Various embodiments of the present disclosure include systems and methods for rating a patent continuation case by comparing the patent continuation case with a priority or parent patent case of the patent continuation case. Comparison elements are used in an embodiment with automatic comparison.2013-04-04
20130085935SYSTEMS AND METHODS FOR MOBILE IMAGE CAPTURE AND REMITTANCE PROCESSING - Systems and methods are provided for capturing and processing images of remittance coupons using a mobile device and obtaining data from the captured image which is used to set up or carry out payment of a bill that corresponds to the remittance coupon. Optimization and enhancement of image capture and image processing are provided on the mobile device to improve the initial quality of the captured image and provide a user with real time feedback. The image is then sent from the mobile device to a remote server, where additional image processing is performed to improve the quality of the image and then extract data from the image that is relevant to paying the bill. The extracted data may be verified through comparisons with databases which store information on billers, bill formats and other relevant content that will appear on the bill.2013-04-04
20130085936SECURE BILLING SYSTEM AND METHOD FOR A MOBILE DEVICE - A system and method are provided for scheduling the payments of bills. An authorization server is provided to be in communication with one or more payment servers and a mobile device. The authorization server receives bills from a billing account, and each of the payment servers can make payments to the billing account. A mobile billing manager, residing on at least the mobile device, detects a new bill and then displays a graphical user interface (GUI) on the mobile device. Through the GUI, selection inputs are received, the selection inputs being associated with paying a first amount at a first date from a first payment account. Based on the payment schedule, the mobile billing manager, through the authorization server, instructs the payment server to make payments.2013-04-04
20130085937Methods and Apparatus for Allocating Funds Based on Payment Obligations - Methods and apparatus for allocating funds based on payment obligations are disclosed. In response to a transaction on an account, transaction data for the transaction is compared to one or more transaction rules to determine if a payment obligation is applicable to the transaction. In some embodiments, the transaction rules provide an algorithmic representation of an agreement between a transaction recipient and one or more parties of the agreement. Responsive to determining that the payment obligation is applicable to the transaction, an allocation of funds based on the algorithmic representation of the agreement between the transaction recipient and the one or more parties of the agreement, is calculated. A record of the allocation of funds is stored on a storage device.2013-04-04
20130085938METHOD AND SYSTEM FOR ACCOUNT HOLDERS TO MAKE, TRACK AND CONTROL VIRTUAL CREDIT CARD NUMBERS USING AN ELECTRONIC DEVICE - A method and system that allows an account holder to create secure single and multi-use virtual credit account numbers from electronic devices, such as smart phones, tablets, computers and so forth. In addition, the method and system allows non-editable virtual credit card images to be created in another name from an administrator's account, which is perfect for employer/employee card creation, and electronically transmitted to an intended recipient. Secure virtual credit account numbers may be sent via email as a card image or SMS text message. An account holder or appointed administrator may establish restrictions on usage of a recipient's, such as an employee's, virtual credit card and the account holder may change those restrictions or disable the virtual credit card at any time from an electronic device, such as a smart phone, tablet, computer and so forth.2013-04-04
20130085939INTERACTIVE, AUTOMATED TRANSACTION REPORTING AND AUTOMATED COLLECTION - The present invention relates to reporting transactions, such as credit reporting, and provides systems and methods for conditioning payment from a purchaser to a seller of a scheduled payment based on the seller reporting information concerning the scheduled payment, or another scheduled payment to the seller, or a previous payment to the seller, or any combination thereof. The present invention also relates to systems and methods for automatically collecting payments from a purchaser for repayment.2013-04-04
20130085940SYSTEM AND METHOD OF CASHING A CHECK - A system and method of cashing a check which reduces wait times and automates a very manual process. An example method includes capturing an image of the check, sending a request including an image file containing the image of the check to a check approval system, receiving an approval to cash the check from the check approval system, and submitting the image file and the approval during a check cashing transaction at a self-service terminal.2013-04-04
20130085941SYSTEMS AND METHODS FOR SECURE WIRELESS FINANCIAL TRANSACTIONS - There are provided systems and methods for conducting secure wireless financial transactions using portable electronic devices. For example, a method of conducting a wireless transaction is provided that includes taking a picture of a first QR code displayed on a transaction terminal using a camera of a portable electronic device. The method also includes sending data from the portable electronic device to the transaction terminal to conduct the financial transaction with the transaction terminal using a near field communication channel or another wireless communication channel, or both. This data is derived from the first QR code to enable the transaction terminal to verify that the portable electronic device is physically located near the transaction terminal.2013-04-04
20130085942ELECTRONIC FUNDS TRANSFER - Described herein is a method for secure transfer of funds. The method includes receiving a funds transfer request from a user on a transaction initiating channel, following a first authentication, and verifying the first authentication on a transaction authorization channel based on a second authentication, wherein the second authentication is based partly on at least one request for an information element, wherein the information element includes one or more non-repeating information elements exclusively associated with the user and known to a source authorizing the funds transfer request.2013-04-04
20130085943ELECTRONIC PAYMENT SYSTEM FOR AUTOMATED MACHINE - An electronic payment system is provided to comprise a mobile terminal 2013-04-04
20130085944SYSTEM AND METHOD FOR APPLICATION SECURITY - A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret.2013-04-04
20130085945Limited Access to a Digital Version of a Purchased Paper Book - A content distribution system provides instant partial and/or time-limited access to a web-accessible digital version of a purchased or rented paper book in connection with the sale of that book to the user. Access to a digital version of a purchased or rented paper book may be partial, thereby limited to a predetermined amount of content of the book. The portion(s) of the book to which access is granted is user-selectable, and can be located anywhere in the book. Access to a digital version of a purchased or rented paper book may be time-limited, thereby limited to a number of days or tied to shipping information such that the temporary access expires when the paper copy of the book is delivered to the purchaser.2013-04-04
20130085946SYSTEMS, METHODS AND USER INTERFACES IN A PATENT MANAGEMENT SYSTEM - A method and system for generating patent prosecution analytics is provided. The method includes scraping data from an external patent database with the data containing information about office action activity and responses thereto for at least one patent matter stored in the database; analyzing the office action activity and responses thereto to identify at least instances in which a response has resulted in allowance of at least one claim in the at least one patent matter, or at least instances in which a response has not resulted in allowance of a claim in the at least one patent matter; identifying at least one Examiner or attorney associated with the instances of allowance or non-allowance; and creating a prosecution profile for the Examiner or attorney based on the identified instances of allowance or non-allowance.2013-04-04
20130085947SYSTEM AND METHOD FOR PATENT WHITE SPACE ANALYSIS - Various embodiments of the present disclosure include systems and methods for analyzing patent white space in a patent management system. A computer-implemented embodiment comprises using one or more processors to identify the patent technology class or subclass of the invention; generate white space information for the patent technology class or subclass of the invention, with the white space information at least including information relating to the age or population of at least some patents registered at a patent registry in the patent class or subclass of the invention; and present the white space information to a user.2013-04-04
20130085948PATENT RATING - Various embodiments of the present disclosure include systems and methods of assigning internal and external ratings to a subject patent owned by a subject entity. In one example embodiment, the method comprises assigning an internal rating to the subject patent based on one or more selected internal factors relating to the subject entity; and assigning an external rating to the subject patent based on one or more selected external factors relating to one or more third parties external to the subject entity.2013-04-04
20130085949PATENT ANALYSIS AND RATING - Various embodiments of the present disclosure include systems and methods of rating the importance of a patent in a patent portfolio by automatically determining the degree of similarity of the patent specification and/or patent claims to the content of web pages or online product literature of a third party.2013-04-04
20130085950PURPOSE ORIENTED PATENT PORTFOLIO MANAGEMENT - This disclosure comprises a method and system to automatically provide important business information to a user of the system at key decision-making times during the lifetime of a patent with the goal of aligning business and strategies. The system will include an interface into which the client can input information regarding purpose oriented prosecution information on a continual basis and another interface to present the compiled information to the client, or the working attorney, at a later time. This information will automatically be provided to a user based on the detection of a key event in the lifetime of the patent portfolio.2013-04-04
20130085951Method and System for Filing and Monitoring Electronic Claim Submissions in Multi-Claimant Lawsuits - The invention relates to systems and methods for filing and monitoring electronic claim submissions in proceedings involving a large number of claimants, such as securities class action lawsuits, estate dissolutions, arbitrations, and bankruptcies. The systems and methods create an easy-to-use and convenient way for institutions and individual claimants to register their claim relief upon judgment or settlement.2013-04-04
20130085952COMMUNICATION SYSTEM AND METHOD BETWEEN A HOME BUYER, SELLER, STRATEGIC BUSINESS SOURCE, AND LENDER - A computerized system and method are presented for exchanging information between a buyer, a seller, a lender, and a strategic business source. The system permits sellers, lenders and strategic business sources to input buyers that are then submitted for activation. The buyers use the system to obtain information about items, while the sellers, lenders, and strategic business sources make consistent contact with the buyer in order to work with the buyer. Information about the buyers is shared with the sellers, lenders, and strategic business sources. A business plan is input into the system for the financial institution employing the lender while another business plan is input for the seller institution employing the seller. Activity on the computerized system is calculated for compliance with the business plan. Feedback is provided to management relating to whether the business plan is being met.2013-04-04
20130085953Assessing Social Risk Due To Exposure From Linked Contacts - An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.2013-04-04
20130085954SYSTEM AND METHOD FOR IDENTIFYING A QUALIFIED CANDIDATE - A system, method and computer program product are provided for identifying a qualified candidate from among a plurality of initial candidates in an efficient and reliable manner. In the context of a system, an associative memory is provided that is configured to store information regarding a plurality of candidate entities and at least one requisition entity. The associative memory is also configured to store information regarding attributes associated with candidate and requisition entities. Further, the associative memory is configured to store information regarding associations between the entities. The system also includes a receiver module configured to receive one or more query terms. The system may also include an identification module configured to identify the qualified candidate based upon the query terms and the associations between the candidate entities and the at least one requisition entity that are provided by the associative memory.2013-04-04
20130085955SYSTEMS AND METHODS FOR MANAGING LEARNING MATERIALS - Systems and methods for locating recommended learning materials for students based on attributes associated with other students are presented. Exemplary methods may include building profiles associated with multiple students and assigning a score to each profile based on similarities between students. Profiles may include personal attributes identifying each respective student. A peer group of a student may be determined based on a threshold score representing a similarity between the profiles, and learning materials accessed by students within the peer group may be identified. Various search parameters may also be included in identifying learning materials, such as a course subject, or student preferences. Recommended learning materials may be identified based on various criteria including weighting access by students who receive high test scores, considering a number of times that the material has been accessed, and/or considering the creator of the resource.2013-04-04
20130085956Method of Donating to a Charity via an Event Outcome - A system and method to facilitate donating to a charity with a donation level linked to the outcome of a specific event or series of events. Participants raising money for a charity log onto a website where they select a charity, an event and a performance based wager. A donor, planning to contribute to a charity, logs onto the same website, and selects a charity, an event and a participant, and agrees to participate in the wager proposed by the participant. The donor authorizes payment of the proposed wager to the charity dependent on the participant performance. Participants may be individuals, teams or individual members of a team. The charities may be any registered or recognized charity. The events may be any on which a quantifiable prediction may be made. Donors may be individuals, corporations, associations, partnerships, special interest groups or fan clubs.2013-04-04
20130085957METHOD AND SYSTEM FOR AUTOMATIC PRODUCT REPLENISHMENT - A computer-implemented method and system are provided for automatic product replenishment. The method includes the steps of: (a) receiving an order for products to be sent to a customer on a given replenishment schedule; (b) determining a product replenishment plan for evolving the products to be sent to the customer to improve product performance; and (c) automatically sending products to the customer in accordance with the product replenishment plan over the replenishment schedule.2013-04-04
20130085958FLEXIBLE AND AUTOMATED PROCESSING OF ELECTRONIC DOCUMENTS - A system for processing electronic documents includes an existing business system (or systems) connected to a separate control system. The resulting composite system provides a framework that enables a flexible and customizable process definition for handling incoming documents. Within the process definition all the processing steps which are desired for handling an incoming electronic document can be predefined. Processing steps like checking the signature and authorizing an incoming legal document can be implemented in the control system and steps like posting a goods receipt or an invoice are implemented in one of the connected business systems. The content of the incoming document is evaluated to determine which business process may be used to carry out the necessary processing steps for the incoming electronic document. The assigned business process and a related process flow sequence define the processing steps to be implemented.2013-04-04
20130085959APPARATUS FOR PRESENTING TASK PROCEDURES OF INDUSTRIAL PLANT ASSETS - An apparatus for presenting task procedures of industrial plant assets to a field operator, the apparatus comprising an editing module accessed through a computer terminal, the editing module configured to allow a specialist to create at least one task procedure of at least one plant asset; an integration module configured to retrieve plant information provided by at least one other plant system; a server configured to store the at least one task procedure and the plant information; a presentation module configured to present the at least one task procedure and the plant information; and a mobile device configured to be operatively connectable to the server and to display to the field operator the at least one task procedure and the plant information presented by the presentation module.2013-04-04
20130085960Value Articulation of a Business Service - The present subject matter relates to a method for value articulation of a business service. In one embodiment, the method includes receiving input data associated with the business service. The method further includes generating a value articulation matrix having at least four dimensions such that each of the dimensions comprise elements selected from the input data. In said embodiment, a stakeholder dimension includes one or more elements indicative of stakeholders associated with the business service, an offering dimension includes one or more elements indicative of offerings of the business service, an enablement dimension includes one or more elements indicative of enablements possible due to the business service, and a benefit dimension includes one or more elements indicative of benefits associated with the business service.2013-04-04
20130085961ENTERPRISE CONTEXT VISUALIZATION - Embodiments of the invention provide systems and methods for providing a contextual visualization of business processes and related business data. According to one embodiment, a method for providing a contextual visualization of business processes and related business data can comprise generating a first canvas representing a first business process. The first canvas can comprise a collaborative, interactive environment accessible to one or more users and can provide access to business data of the first business process to the one or more users. One or more visual objects representing the business data of the first business process can be generated and added to the first canvas. The first canvas with the added one or more visual objects can be provided to the one or more users.2013-04-04
20130085962SYSTEM AND METHOD FOR GENERATING VISUAL MODELS FROM ACTIVITY BASED MODELING DATA - A system and method for translating activity based modeling into visual modeling may include storing activity based modeling data. The activity based modeling data may be read. A user may be enabled to classify data as elements of an activity based model. A visual model may be generated based on the classified data of the activity based modeling data. The visual model of the classified data of the activity based modeling data may be generated.2013-04-04
20130085963METHOD AND SYSTEM FOR IMPLEMENTING AN ADAPTIVE INVESTING METHODOLOGY - Method and system for implementing an adaptive investing methodology. An asset allocation is determined for each of a plurality of periods of a model duration that optimize an objective function. The asset allocations identify for each of the periods how much of the investment account to invest in one or more asset classes. The objective function subtracts a value of a shortfall risk function from an expected value of an amount of income to be generated by an annuity purchased at the end of the model duration with funds in the investment account at the end of the model duration. The asset allocations are associated with values of a plurality of investor variables. The values of the plurality of investor variables and their associated asset allocations may be stored in one or more wealth tables and used to look up asset allocations for one or more investors.2013-04-04
20130085964REVENUE ORIENTED PATENT PORTFOLIO MANAGEMENT - This disclosure comprises a method and system to automatically provide important business information to a user of the system at key decision making times during the lifetime of a patent with the goal of aligning business and strategies. The system will include an interface for the client to input information regarding business strategy on a continual basis and another interface to present the compiled information to the client at a later time, or to the working attorney. That information will be automatically sent to key decisions makers throughout the lifetime of a patent. Specifically, the business strategy information will consist of a revenue contribution ranking for client products as well as the competitors' products for each geographic region for which the invention is to be made, sold or transported.2013-04-04
20130085965Method and Apparatus of Investment Strategy Formulation and Evaluation - A technique for formulating and evaluating financial investment strategies is provided. In one aspect, a method based on the technique receives, on an input device, a first user input from a user; receives financial data from a data collecting service and a data mining service; stores the received data; computes to provide a user-specific investment strategy based at least on the first user input, a user profile of the user, a trading style of the user, and the received data; and displays to the user, on an output device, the user-specific investment strategy.2013-04-04
20130085966SYSTEM, METHOD, ARTICLE FOR FACILITATING DERIVATIVES TRANSACTIONS - A derivatives transaction service is provided and includes qualifying prospective users of the service based on a user type and credit evaluation, determining approved transaction types for qualified users, identifying approved risk mitigation methods for qualified users; enrolling qualified users in the service; and providing to a qualified user services such as transaction search services; transaction offer services; portfolio management services; and transaction negotiation services. The service may be provided using one or more configured computing systems.2013-04-04
20130085967Asset Investment Tool - A method to maximize a post-mortem asset disbursement, the method receives information about one or more assets owned by an asset holder, selects a life expectancy from the group consisting of a single life, a joint life, and both a single life and a joint life, and sets an expected aggregate expenditure of the asset holder over the life expectancy period. The method further calculates a first investment corpus, a first investment corpus life expectancy value, and calculates a first estimated post-mortem tax liability. The method further sets a value for carve out funds deducted from the first investment corpus, wherein said carve out funds take into account both gift tax and estate tax exclusions, calculates a second investment corpus, a second investment corpus life expectancy value, and a second estimated post-mortem tax liability. The method then determines a value for life insurance proceeds paid at end of life expectancy.2013-04-04
20130085968METHOD AND SYSTEM FOR SECURE MOBILE PRINTING - An approach is provided for secured mobile printing. A printing platform receives a printing request, generates authenticating information associated with the print request, and sends the authenticating information to a mobile device for retrieval of printed materials generated in response to the printing request.2013-04-04
20130085969DUAL TIER MARKETING SYSTEM FOR CONSUMER PRODUCTS - A two tier system of marketing cleaning products. The tiers are differentiated by artwork showing a first tier to have cleaning products usable for certain cleaning tasks and a second tier to have corresponding cleaning products. The cleaning products of the second tier may be marketed to the consumer as being better than the cleaning products of the first tier.2013-04-04
20130085970INTELLIGENT INTENT DETECTION FROM SOCIAL NETWORK MESSAGES - An intent engine that automatically detects user intent from messages of a social network (e.g., messages with questions to ask) and outputs intent data. The engine is intelligent in that it can process natural language input such as questions and terms. The user is then directed to an answer page filtered according to the intent data and which proviJoshdes answers related to a question, for example. The intent engine can be designated (e.g., tagged, or “friended”) and then linked into a specialized relationship (e.g., a “friend”). Accordingly, in one example, a URL link is constructed that points to the answer page, with filters configured based on the intent data. The URL is then sent back to the user as a friendly response. When the user selects the link, the user is presented with an answer page that provides answers which match the user intent derived from the user messages.2013-04-04
20130085971AUTOMATIC TRACE RETRIEVAL USING SEMANTIC BRIDGE - A method for performing automatic trace retrieval includes receiving a first and second model for a system or service (S2013-04-04
20130085972METHOD FOR ACQUIRING PROCESS PARAMETERS FOR A FILM WITH A TARGET TRANSMITTANCE - In a method for acquiring process parameters for a film, a computer divides parameter sets into a training data group and a test data group. Then, the computer inputs the training data group to a neural network (NN) so as to obtain relationship among parameter sets of the training data group and transmittances, and uses the test data group to estimate accuracy of the NN. Further, the computer modifies the NN until an error value of estimated parameters, which are acquired by the NN according to the obtained relationship, is smaller than a predetermined value, and uses the NN to acquire practical parameters corresponding to a target transmittance when the error value is smaller than the predetermined value.2013-04-04
20130085973LIBRARY INTELLIGENCE GATHERING AND REPORTING - Determining library usage patterns. The method includes accessing information, such as metadata from a plurality of libraries about patron access of physical resources at the libraries. The method further includes accessing information from the plurality of libraries about patron access of electronic resources. The method further includes accessing information about the plurality of libraries. The information is used to determine patron usage of electronic resources and/or physical resources based on library characteristics as determined from the information about the plurality of libraries.2013-04-04
20130085974USING CYCLIC MARKOV DECISION PROCESS TO DETERMINE OPTIMUM POLICY - A method for determining an optimum policy by using a Markov decision process in which T subspaces each have at least one state having a cyclic structure includes identifying, with a processor, subspaces that are part of a state space; selecting a t-th (t is a natural number, t≦T) subspace among the identified subspaces; computing a probability of, and an expected value of a cost of, reaching from one or more states in the selected t-th subspace to one or more states in the t-th subspace in a following cycle; and recursively computing a value and an expected value of a cost based on the computed probability and expected value of the cost, in a sequential manner starting from a (t −1)-th subspace.2013-04-04
20130085975Device for Monitoring the Lateral Environment of a Vehicle - A device for monitoring the lateral environment of a vehicle. The device includes an evaluation and control unit and at least one predictive sensor unit. The evaluation and control unit have at least one interface, which receives signals from the at least one predictive sensor unit, and an arithmetic unit which is coupled to the at least one interface and analyses signals from the at least one predictive sensor unit for detecting an object in a lateral monitoring region and for determining information about the detected object. The at least one predictive sensor unit is a low-cost sensor unit, and at least two predictive sensor units, which have overlapping monitoring regions, are disposed at a distance from each other on each vehicle side.2013-04-04
20130085976SYSTEM FOR PREDICTING A DRIVER'S INTENTION TO CHANGE LANES - Provided is a system for predicting a driver's intention to change lanes at a high accuracy involving a minimum amount of time delay. A driver's intention to change lanes is predicted by a prediction unit (2013-04-04
20130085977MINIMIZING RULE SETS IN A RULE MANAGEMENT SYSTEM - A method, system and computer program product for minimizing a rule set. A rule set application graph that describes a set of rules including actions and cases is built, whereby each rule defines an action for one or more cases. A rule violation graph for each rule describing the actions and cases not defined for that rule is built. A subset of rules having a reduced number of rules with the same set of actions and cases as the rule set application graph is determined by exploring candidate subsets of the rule set that are sufficient for reproducing the behavior of the original rule set.2013-04-04
20130085978Decision Tree Level Merging - A packet classification system, methods, and corresponding apparatus are provided for enabling packet classification. A processor of a security appliance coupled to a network uses a classifier table having a plurality of rules, the plurality of rules having at least one field, to build a decision tree structure including a plurality of nodes, the plurality of nodes including a subset of the plurality of rules. By merging levels of decision trees, the methods may produce wider, shallower trees that result in shorter search times and reduced memory requirements for storing the trees.2013-04-04
20130085979TESTING FOR RULE-BASED SYSTEMS - A non-transitory computer-readable medium tangibly embodied in a storage device encoded with instructions that, when executed on a processor, perform a method in a computer system for testing a rule-driven system, the method comprising detecting a potential read-write error or a potential write-write error in the rule-driven system, generating test results based on the detecting, and reporting the test results.2013-04-04
20130085980SYSTEMS AND METHODS OF PREDICTING A SUBJECT'S MEDICAL OUTCOME - Disclosed are methods of constructing systems for predicting a subject's medical outcome. Also disclosed are methods and systems for predicting a subject's medical outcome. The disclosed methods and systems can include identifying a group of subjects with the same medical condition and classifying this group of subjects into one or more subgroups. The subgroups are classified based on similarity of medical outcome, using classification and regression trees (CART) to generate a classification tree based on the presence of identifying genetic characteristics. Each node in the classification tree describes the presence of a specific genetic marker and each branch in the classification tree describes a genetic profile that predicts a subject's medical outcome.2013-04-04
20130085981METHODS AND APPARATUS FOR CONTROLLING DEPLOYMENT OF SYSTEMS - Methods and apparatus for controlling deployment of systems according to various aspects of the present invention operate in conjunction with at least one deployable asset, a scoring system, and an optimization system. The scoring and optimization systems provide an optimized solution to mission planning, asset positioning, and control of multiple entities within a geographic region. The system combines a scoring method with an optimization method to quickly select a globally optimal solution from a larger set of potential solutions.2013-04-04
20130085982ATTRIBUTE AND TOPOLOGY BASED CHANGE DETECTION IN A CONSTELLATION OF PREVIOUSLY DETECTED OBJECTS - A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.2013-04-04
20130085983USING CYCLIC MARKOV DECISION PROCESS TO DETERMINE OPTIMUM POLICY - A method for determining an optimum policy by using a Markov decision process in which T subspaces each have at least one state having a cyclic structure includes identifying, with a processor, subspaces that are part of a state space; selecting a t-th (t is a natural number, t≦T) subspace among the identified subspaces; computing a probability of, and an expected value of a cost of, reaching from one or more states in the selected t-th subspace to one or more states in the t-th subspace in a following cycle; and recursively computing a value and an expected value of a cost based on the computed probability and expected value of the cost, in a sequential manner starting from a (t−1)-th subspace.2013-04-04
20130085984MANAGING EXCESS CAPACITY OF DATABASE SYSTEMS IN A CAPACITY CONTROLLED COMPUTING ENVIRONMENT - Excess capacity available to a database system in a capacity controlled environment can be effectively managed. In particular, excess capacity that is not made available for normal operations of a database system can be used to manage errors, especially situations that may hinder expected performance of the database system. In addition, excess capacity can be used to optimize or further optimize database queries, especially those that meet a criterion (e.g., not fully optimize, not optimized as expected).2013-04-04
20130085985METHODS AND APPARATUS FOR PERFORMING DATABASE MANAGEMENT UTILITY PROCESSES - In one general aspect, a computer-readable storage medium can be configured to store instructions that when executed cause a processor to perform a process. The instructions can include instructions to identify, at a mainframe computing environment during an initiation phase associated with a management utility process, a set of tasks for implementing the management utility process, and instructions to send, to a non-mainframe computing environment, a description identifying at least a portion of the set of tasks. The instructions can also include instructions to receive an indicator, at the mainframe computing environment, that processing based on the at least the portion of the set of tasks associated with the management utility process has been completed, and instructions to execute a termination phase of the management utility process at the mainframe computing environment in response to the indicator.2013-04-04
20130085986SYSTEM MAINTENANCE AND TUNING OF DATABASES BY USING EXCESS CAPACITY IN CAPACITY CONTROLLED ENVIRONMENT - Excess capacity available to a database system in a capacity controlled environment can be effectively managed for maintenance and/or tuning activities. In this context, excess capacity can be used as needed and/or on a temporary basis. Furthermore, maintenance and/or tuning activities can be performed without requiring the use of the configured or allotted capacity. As a result, these operations can be performed without adversely affecting other operations which may be deemed more critical by the users of databases. System maintenance and tuning (or fine tuning) of a database environment can, for example, include operations associated with “Physical Tuning,” and “Index Tuning”. Some exemplary operations include collecting Statistics, analyzing a database workload, sampling, analyzing an execution plan, creating indexes.2013-04-04
20130085987DOWNLOADING METHOD AND DEVICE - A file downloading method applied to a network device, the file downloading device includes a path database to store file types, downloading address, storage paths, and relationships between the file types and downloading addresses and the storage paths; the file downloading method comprises the steps of: selecting a file for downloading; identifying the file type of the selected file; determining whether the file type and the downloading address of the selected file is stored in the storage path database; searching the path database for a storage path if it is determined that the file type and the downloading address of the selected file is stored in the storage path database; and saving the selected file according to the storage path discovered.2013-04-04
20130085988RECORDING MEDIUM, NODE, AND DISTRIBUTED DATABASE SYSTEM - A non-transitory computer-readable recording medium for recording a data management program to cause a computer to execute a process, the process comprising, within a prescribed time period after a record stored in another computer is updated, storing the updated record so that the record before the updating and the updated record are stored in a storage unit, and by a point in time at which the prescribed time period has passed from a second point in time that is a point in time from which the prescribed time period has passed from a first point in time, receiving a reference request for the updated record, and when a transaction to perform the updating in the another computer is present at the first point in time, transmitting the record before the updating that is stored in the storage unit to a requestor of the reference request.2013-04-04
20130085989CLOUD INFORMATION MIGRATION SYSTEMS AND METHODS - Information migration systems and methods are presented. In one embodiment, a cloud information migration method comprises: performing a migration interpretation process, including interpreting migration initiation information; performing a migration information retrieval process to automatically retrieve information in a first configuration from a first cloud vendor in accordance with the migration initiation information; performing a migration information configuration process, including automatically converting the retrieved information in a first configuration to information in a second configuration, wherein the second configuration is compatible with a second cloud vendor; and2013-04-04
20130085990REPLICA PLACEMENT STRATEGY FOR DISTRIBUTED DATA PERSISTENCE - Methods and systems are described that involve replica placement strategy for distributed systems. At the time of index creation, initial index replica placement is decided. The first index replica is placed locally on the current processing server node. This server node operates as a master host for the first replica. The other index replicas are placed on different hosts depending on the index type, split index or non-split index, and a set of criteria. For non-split indexes, the set of criteria includes: a number of recently created replicas per host, resource usage per host, and a total number of replicas per host. For split indexes, the set of criteria includes: a number of replicas of any split index part per host and a number of local first replicas of split index parts. If all criteria re equal, the first host in alphanumeric ordering receives a next replica.2013-04-04
20130085991Reverting a Current State Model of a Database to a Pre-refactored State - The subject disclosure is directed towards transforming model elements, associated with a current state model of a database, to a pre-refactored state. While applying refactoring operations on the database, identity change information is created that comprises each model element associated with the refactoring operations. Using the identity change information, a pre-refactored state model of the database is created. Using the model element in the pre-refactored state, a visual representation of a comparison between the pre-refactored state model and the current state model is produced.2013-04-04
20130085992DATA SYNCHRONIZATION TRANSPARENT TO APPLICATION - Synchronization of data accessible by an application program is performed transparent to the application program. After a data item is instantiated by the application program, the synchronization engine performs data synchronization without or with minimal intervention of the application program. The synchronization engine may be part of an operating system. The synchronization engine is preinstalled on a computing device; therefore, application program developers can simply define whether the data items associated with the application programs should be syncable, and if so, to what extent the data items should be syncable. The application program developer is relieved of the task of developing the synchronization engine or other software components associated with data synchronization.2013-04-04
20130085993SYSTEM AND METHOD TO JOIN AND CUT TWO-WAY REST OVERLAY TREES FOR DISTRIBUTED KNOWLEDGE BASES - System and method of event-driven synchronization of a database distributed among servers connected in a tree topology, including: transmitting, from a root server, a composition request to a first level of child servers of the root server; recursively transmitting, from each child server of a first level, a composition request to child servers at a second level, wherein the second level is lower than the first level; recursively transmitting, from each child server of the second level, a notification message to child servers at the first level, wherein the notification message comprises an identification of database fragments accessible to the child server; transmitting, from child servers at the first level, respective notification messages to the root server, wherein the root server synchronizes an availability of database fragments from the respective notification messages transmitted to the root server. Subtrees may be cut from or joined to the tree topology.2013-04-04
20130085994CREATING HOST-LEVEL APPLICATION-CONSISTENT BACKUPS OF VIRTUAL MACHINES - A host server hosting one or more virtual machines can back up host volumes and the one or more virtual machines installed thereon in an application-consistent manner. In one implementation, a host-level requestor instructs a host-level writer to identify which virtual machines qualify for application-consistent backups. The host-level requestor then instructs the host-level writer to initiate virtual machine backups through guest-level requesters in each appropriately-configured virtual machine, wherein the virtual machines create application-consistent backups within the virtual machine volumes. The host-level requester then initiates snapshots of the server volumes on the host-level. The virtual machine-level snapshots can thus be retrieved from within the host-level snapshots of the server volumes.2013-04-04
20130085995MANAGING BACK UP OPERATIONS FOR DATA - Backup operations for data resources can be managed as follows. At least one data resource residing on at least one data storage device is identified. An information processing system automatically determines that the at least one data resource fails to be associated with a backup policy. In response to the at least one data resource failing to be associated with a backup policy, at least one backup policy is associated with the at least one data resource.2013-04-04
20130085996SYSTEM AND METHOD FOR DATABASE PERSISTENCE OF TRANSACTION LOGS - A system and method for database persistence of transaction logs (TLOGs). Embodiments of the invention allow an administrator to configure their system to associate one or more Java Database Connectivity (JDBC) TLOG stores with a data source or database instead of a file system, for use in storing the primary TLOG. This provides an opportunity to exploit the high availability features of a database system; improve handling of disaster recovery scenarios, such as cross-site recovery using database replication; and alleviate the need for third-party distributed file system components, together with their cost and complexity.2013-04-04
20130085997INFORMATION SEARCH SYSTEM, SEARCH SERVER AND PROGRAM - In order for a conventional information search system to realize online updating of search indices, there would have to be provided two systems of physical storages for storing copies of indices, namely one for searching and another for updating. By means of a snapshot function provided by an OS, duplicates of original indices are created. A search engine is attached to those duplicates and is used as such, while an index update process is applied to the original index data.2013-04-04
20130085998LATENCY-AWARE LIVE MIGRATION FOR MULTITENANT DATABASE PLATFORMS - Methods and systems for database migration from a multitenant database include taking a snapshot of an original database to be migrated with a hot backup process, such that the database is still capable of answering queries during the hot backup process; maintaining a query log of all queries to the tenant database after the hot backup process begins; initializing a new database at a target server using the snapshot; replaying the query log synchronize the new database with the original database; and answering new queries with the new database and not the original database.2013-04-04
Website © 2025 Advameg, Inc.