Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


19th week of 2009 patent applcation highlights part 57
Patent application numberTitlePublished
20090119208FINANCIAL TRANSACTION FUNDS COLLECTION AND DISTRIBUTION - There is provided financial transaction funds collection and distribution methodology and system. A financial service provider assists in providing information to a third party transaction processor, who is engaged to process financial transactions such as insurance claims. Payors enroll as participants with the financial service provider, and information about the payors' banks, funding sources, or other financial institutions are linked to the payors in a database maintained by the payment system. Once a payor and the payor's financial institution are enrolled, funds may be obtained from the payor's bank by the financial service provider on behalf of the third party transaction processor, and without transaction-by-transaction involvement from the payor, significantly reducing the time, expense, and costs associated with financial transaction collection and payment.2009-05-07
20090119209MOBILE TRANSACTION NETWORK - A financial transaction processing system and network that supports multiple types of financial and other transactions which may be initiated or confirmed using a mobile device, internet or telephone. The system employs one or more centralized host processors which connect to one or more clearing banks, and to a network of various other partners which may include custodian banks and other service providers such as merchants. The host processor acts as a communications switch validating incoming transaction requests from users and routing them to the appropriate partners for execution. The central processor maintains user records that can be queried by the partner processors. The financial network provides accessibility, speed and finality of settlement in transactions by using several settlement methods including the use of correspondent bank accounts held at the clearing banks or other interbank settlement methods such as the ACH.2009-05-07
20090119210METHODS AND APPARATUS FOR OPERATING AN INTERMODAL FACILITY - Methods and apparatus to operate an intermodal facility are disclosed. In a method described herein, a carrier enters into a contractual agreement with a separate intermodal facility owner to have exclusive use of the intermodal facility. Alternatively, a rail-to-truck and/or truck-to-rail intermodal facility owner may provide non-exclusive use to multiple railroads. In one embodiment, the contractual agreement is a contingent lease. For example, if intermodal facility use falls below a threshold, a carrier may terminate the contingent lease. Preferably, the carrier has no minimum use requirements associated with the intermodal facility. Instead, the shipper associated with the carrier is charged by the intermodal facility owner based on the amount of intermodal facility use (e.g., on a per container basis). In one preferred embodiment, a real estate developer owns the intermodal facility and builds a business park near the intermodal facility in order to capture the related business.2009-05-07
20090119211Methods and systems for managing financial institution customer accounts - A computer-implemented method and system for managing financial institution customer transaction accounts involves issuing a relationship presentment card with a relationship identifier unique to the customer that is linked to a plurality of the customer's financial institution transaction accounts via pre-defined parameters for determining to which of the customer's linked accounts to post particular transactions with the relationship presentment card. Thereafter, when data for a transaction with the card is received by a processing platform of the financial institution via a merchant acquirer and a card association processing network, the card processing platform of the financial institution identifies a particular financial institution account of the customer to which the transaction should be posted according to the pre-defined parameters based on the transaction data and posts the transaction to the identified financial institution account of the customer.2009-05-07
20090119212REQUEST MONEY SOCIAL NETWORKING APPLICATIONS - In some example embodiments, a system and method is illustrated as including receiving a funds request that contains an identifier to uniquely identify a first member of a social networking community, the funds request including an amount of funds requested. Further, this method may include receiving a funds authorization from a grantor of funds. Additionally, this method may include transmitting a funds transfer instruction based upon the funds authorization. Moreover, this method may include transferring the amount of funds requested from an account held by the grantor of funds to an account held by the first member of a social networking community.2009-05-07
20090119213ON-LINE AUTHORIZATION IN ACCESS ENVIRONMENT - A method is disclosed. The method includes interacting with a gate access device that is capable of preventing access to a location, where the gate access device subsequently sends an authorization request message to an issuer for approval, the authorization request message including a request to charge a predetermined amount of money to pay for access to a location, and entering the location if the gate access device receives an authorization response message indicating that the charge is authorized.2009-05-07
20090119214METHOD AND DEVICE FOR EXCHANGING VALUES BETWEEN PERSONAL PROTABLE ELECTRONIC ENTITIES - A method and a portable electronic device enables a debitor to transfer a monetary or other amount to a creditor, in particular via a near-field wireless communication module. After receiving information for authenticating the debitor via the communication module and after receiving data linked to the monetary or other amount, a transaction request including the data is created and sent. The transaction request is advantageously sent via a mobile telephone network or via a data communication network.2009-05-07
20090119215SECURE E-PAYMENTS - Systems and methods that supply a fair transaction when a user (e.g., buyer) obtains digital content that is ordered from a merchant. A trusted component associated with a device of a user can compute a cryptographic hash value for the digital content (e.g., during a download thereof), wherein such hash value cannot be altered (e.g., tampered) by the user. Accordingly, the subject innovation implements a trusted agent on a user's device, wherein such agent itself can further be downloaded to the user device as part of the transaction.2009-05-07
20090119216System for rental or sale of multimedia files - A system for the rental or sale of multimedia files, comprising a vending machine for multimedia files associated with means for the transfer of the multimedia files to a storage medium owned by a user.2009-05-07
20090119217DIGITAL RIGHTS MANAGEMENT METHOD AND APPARATUS OF MOBILE TERMINAL - A DRM method and apparatus of a mobile terminal is provided for protecting unauthorized use of a time-based DRM content and improving license validation reliability by providing a reliable reference time regardless of changes of local time and time zone. The digital rights management method of the present invention includes detecting a playback command for playing a right protected content, determining whether a previously stored reference parameter exists, which is generated using a reference time received from a server and a local time of the mobile terminal, and testing, when a previously stored reference parameter exists, validity of a license of the right protected content with reference to the reference parameter and the local time when the playback command is detected.2009-05-07
20090119218LICENSE MANAGEMENT APPARATUS, LICENSE MANAGEMENT METHOD, AND LICENSE AUTHENTICATION PROGRAM - An object of the present invention is to solve the following problems: a problem concerning the node lock license system in which when a license is given to only one hardware device, reissuance of the license is required every time a changeover of the hardware device to be used occurs; a problem concerning the node lock license system in which when a license is given to a plurality of hardware devices, the license fee is increased; a problem concerning the floating license system in which that when a client is in an environment where it cannot connect to the license server, the client cannot use intended software; and a problem concerning the floating license system in which that when a client malfunctions in a possessing state of the license, a procedure for license acquisition needs to be taken once again.2009-05-07
20090119219FRANKING METHOD AND MAIL TRANSPORT SYSTEM WITH CENTRAL POSTAGE ACCOUNTING - In a franking method and a mail transport system, a franking image is calculated before generation thereof on a mail piece. The franking image includes a franking image key, and for each new franking image, the franking image key therefor is derived from a predecessor franking image key according to a first crypto-algorithm. An integrity check code is also generated based on the new franking image key, a key generation number, an apparatus identifier of the franking device, and a second crypto-algorithm. The franking image includes at least the device identifier, the key generation number and the integrity check code. Upon transport of the mail piece to a sorting center, the franking image is scanned and fees for billing are generated based thereon.2009-05-07
20090119220AUTHORIZED SAMPLE RECEIVER - In an exemplary embodiment of the invention, an authorized sample receiver (ASR) comprises a processor that is configured to verify biometric sample data in order to create registered biometric sample data. The ASR may also comprise a communications device configured to receive a transaction request from an RF transaction device, wherein the transaction request comprises transaction biometric sample data, a reload protocol update request, and an RF device identification code. The ASR may also be configured to authorize the transaction request in response to the transaction biometric sample data substantially matching the registered biometric sample data. The ASR may further comprise a reload protocol data file associated with the device identification code, and the reload protocol data file may be configured to be updated in accordance with the reload protocol update request.2009-05-07
20090119221System and Method for Cryptographically Authenticated Display Prompt Control for Multifunctional Payment Terminals - This disclosure provides various embodiments of systems and methods for secure communications. In one aspect, the system for secure communications in a retail environment comprises a first display for presenting content to a customer, a first secure payment module comprising a first data entry device and a first secure processor, and a first controller. In some instances, the first controller is communicably coupled to the first display and the first secure payment module. Additionally, the first controller may be adapted to authenticate the first secure payment module, establish a secure communications link between the first controller and the first secure payment module, receive a first source of content, provide a portion of the content to the first display, and selectively enable or disable the first data entry device.2009-05-07
20090119222E-Bazaar featuring personal information security - Utilization of the E-Metro Community and Personal Information Agents assure an effective and comprehensive agent-rule based command and control of informational assets in a networked computer environment. The concerns of informational privacy and informational self-determination are addressed squarely by the invention affording persons and entities a trusted means to author, secure, search, process, and exchange personal and/or confidential information in a networked computer environment. The formation of trusted electronic communities wherein members command and control their digital persona, exchanging or brokering for value the trusted utility of their informational assets is made possible by the invention. The present invention provides for the trusted utilization of personal data in electronic markets, providing both communities and individuals aggregate and individual rule-based control of the processing of their personal data.2009-05-07
20090119223METHOD AND A SYSTEM FOR FACILITATING AN ELECTRONIC BARTER TRANSACTION BETWEEN BARTERING PARTIES - There is provided a method for facilitating an electronic barter transaction between bartering parties, the method comprising (1) initiating a barter request associated with a first bartering party, said barter request comprising a first data identifying a first set of items to be provided within said barter transaction, said first set of items comprising at least one item, (2) receiving a first barter offer associated with a second bartering party, said first barter offer comprising an offer to acquire said first set of items in exchange of a second set of items, said second set of items comprising at least one item, (3) accepting or refusing said first barter offer, and (4) concluding or declining said electronic barter transaction between said first bartering party and said second bartering party as a function of said accepting or refusing, said concluding or said declining being carried out without negotiation between said parties in connection with said transaction. There is also provided a system for facilitating an electronic barter transaction between bartering parties.2009-05-07
20090119224Algorithmic trading system, a method for computer-based algorithm trading and a computer program product - An algorithmic trading system, comprising 2009-05-07
20090119225METHOD AND SYSTEM FOR PROVIDING A UNIFIED MODEL FOR CANDIDATE SERVICE ASSETS - A computer-implementable method, system and computer-usable medium in which a unified model is utilized to provide candidate service assets. A plurality of assets can be presented to a user in association with a consistent set of properties that demonstrate how a particular asset among the assets Is composed. A single consolidated data model can then be processed that sufficiently describes the particular asset in a manner that provides sufficient information to the user to determine if the particular asset is a possible candidate for subsequent selection and action by the user, thereby permitting the user to perform decisions with respect to the particular asset with a minimal effort.2009-05-07
20090119226Trade Strategy Monitor Platform - Described are methods and systems, including computer program products, for trade strategy monitoring. A back-end server can receive a first input from a first client device indicative of a first trade strategy and a first test parameter. The back-end server can obtain historical data associated with the first trade strategy, execute the first trade strategy on the historical data in accordance with the first test parameter, and transmit the results in a normalized format to the first client device. The back-end server can receive a second input from a second client device indicative of a second trade strategy and a second test parameter. The back-end server can obtain historical data associated with the second trade strategy, execute the second trade strategy on the historical data in accordance with the second test parameter, and transmits the results in a normalized format to the second client device.2009-05-07
20090119227Systems and Methods for Controlling Portfolios - Systems and methods are disclosed which relate to the management of asset invested in a fund. The system includes a computer connected to a network which has constantly updated fund data available to compare a current fund with a plurality of possible new funds. The system automatically transfers from one fund to another according to user predetermined criteria.2009-05-07
20090119228SYSTEM AND METHOD FOR DYNAMIC VALUE ADDED ATTRIBUTION - A system, method and computer program product provides for portfolio analysis in one or more exemplary periods. The method includes determining weight and return measures between a plurality of assets based upon the likely performance of the assets. It also includes determining at least one allocation measure (AM) of the plurality of assets, and decomposing the at least one allocation measure (AM) respectively into at least one of a static allocation (SA) measure and a dynamic allocation (DA) measure.2009-05-07
20090119229Electronic Collateral Management System and Method - A process for allocating specific assets from a pool of assets to secure a liability. Information concerning each of the assets in the pool of assets is received from at least two sources. A set of validation rules is applied to the information for each asset in the pool of assets and those assets which do not meet the validation rules are rejected. A price is assigned to each non-rejected asset. A subset of the non-rejected assets is allocated to the liability as a function to collateralize the liability.2009-05-07
20090119230Commodities Based Securities and Roll Neutrality Therefor - The subject invention pertains to securities, preferably exchange traded funds, or ETFs, relating to commodities subject to futures contracts in a commodities market. More specifically, the invention relates to shipping certificates for commodities that dynamically compensate for commodity “roll neutrality” adjustments by altering the quantity of commodity associated with the shipping certificate, as opposed to a cash adjustment. The subject invention also pertains to the underlying “roll neutrality” adjustment related to a commodities market futures transaction and to the resulting ETF valuation as follows: Σ P2009-05-07
20090119231System and method for pricing a product - A system, method, and program product is described that is constructed to establish a database of market information, relating to a target product and its competitors in the market. The database is processed to allow the user to establish a price for the target process based on customer perceived value and to display the processed information in several useful charts and tables for product value comparison, appraisal, and pricing.2009-05-07
20090119232Parcel franking device and method using same - Parcel-franking apparatus which comprises: a plurality of lockers (2009-05-07
20090119233Power Optimization Through Datacenter Client and Workflow Resource Migration - Systems and methods for power optimization through datacenter client and workflow resource migration are described. In one aspect, the systems and methods estimate how much power will cost for different and geographically distributed datacenters to handle a specific set of actual and/or anticipated workflow(s), where the workflow(s) are currently being handled by a particular one of the distributed datacenters. These estimated power costs are based on current power prices at each of the datacenters, and prior recorded models of power actually used by each of the datacenters to handle similar types of workflows for specific numbers of client applications. If the systems and methods determine that power costs can be optimized by moving the workflow(s) from the datacenter currently handling the workflows to a different datacenter, service requests from corresponding client applications and any data resources associated with the workflows are migrated to the different datacenter.2009-05-07
20090119234INTERACTIVE MACHINE LEARNING ADVICE FACILITY - In embodiments of the present invention improved capabilities are described for helping a user make a decision through the use of a machine learning facility. The process may begin with an initial question being received by the machine learning facility from the user. The user may then be provided with a dialog consisting of questions from the machine learning facility and answers provided by the user. The machine learning facility may then provide a decision to the user based on the dialog and pertaining to the initial question, such as a recommendation, a diagnosis, a conclusion, advice, and the like. In embodiments, future questions and decisions provided by the machine learning facility may be improved through feedback provided by the user.2009-05-07
20090119235SYSTEM AND METHOD FOR EXTRACTING ENTITIES OF INTEREST FROM TEXT USING N-GRAM MODELS - A document (or multiple documents) is analyzed to identify entities of interest within that document. This is accomplished by constructing n-gram or bi-gram models that correspond to different kinds of text entities, such as chemistry-related words and generic English words. The models can be constructed from training text selected to reflect a particular kind of text entity. The document is tokenized, and the tokens are run against the models to determine, for each token, which kind of text entity is most likely to be associated with that token. The entities of interest in the document can then be annotated accordingly.2009-05-07
20090119236NEURAL NETWORKS WITH LEARNING AND EXPRESSION CAPABILITY - A neural network comprising a plurality of neurons in which any one of the plurality of neurons is able to associate with itself or another neuron in the plurality of neurons via active connections to a further neuron in the plurality of neurons.2009-05-07
20090119237 METHOD FOR SOLVING MINIMAX AND LINEAR PROGRAMMING PROBLEMS - A novel method is disclosed for efficiently solving minimax problems, and in particular, for efficiently solving minimax problems wherein the corresponding matrix is large. In particular, the novel method solves minimax problems in O(n2009-05-07
20090119238METHOD AND SYSTEM FOR PREDICTING RESOURCE USAGE OF REUSABLE STREAM PROCESSING ELEMENTS - A method is provided for generating a resource function estimate of resource usage by an instance of a processing element configured to consume zero or more input data streams in a stream processing system having a set of available resources that comprises receiving at least one specified performance metric for the zero or more input data streams and a processing power of the set of available resources, wherein one specified performance metric is stream rate; generating a multi-part signature of executable-specific information for the processing element and a multi-part signature of context-specific information for the instance; accessing a database of resource functions to identify a static resource function corresponding to the executable-specific information and a context-dependent resource function corresponding to the context-specific information; combining the static resource function and the context-dependent resource function to form a composite resource function for the instance; and applying the resource function to the at least one specified performance metric and the processing power to generate the resource function estimate of the at least one specified performance metric for processing by the instance.2009-05-07
20090119239Agent security via approximate solvers - Efficient heuristic methods are described for approximating the optimal leader strategy for security domains where threats come from unknown adversaries. These problems can be modeled as Bayes-Stackelberg games. An embodiment of the heuristic method can include defining a patrolling or security domain problem as a mixed-integer quadratic program. The mixed-integer quadratic program can be converted to a mixed-integer linear program. For a single follower (e.g., robber or terrorist) scenario, the mixed-integer linear program can be solved, subject to appropriate constraints. For embodiments applicable to multiple follower situations, the relevant mixed-integer quadratic program and related mixed-integer linear program can be decomposed, e.g., by changing the response function for the follower from a pure strategy to a weighted combination over various pure follower strategies where the weights are probabilities of occurrence of each of the follower types.2009-05-07
20090119240Network of Networks of Associative Memory Networks for Knowledge Management - Associative memory systems, methods and/or computer program products include a network of networks of associative memory networks. A network of entity associative memory networks is provided, a respective entity associative memory of which includes associations among a respective observer entity and observed entities that are observed by the respective observer entity, based on input documents. A network of feedback associative memory networks includes associations among observed entities for a respective positive and/or negative evaluation for a respective task of a respective user. A network of document associative memory networks includes associations among observed entities in a respective observed input source, such as a respective input document. A network of community associative memory networks includes associations among a respective observer entity, observed entities that are observed by the respective observer entity, and observed tasks of users in which the observer entity was queried. Associations may be observed into and imagined from the network of networks of associative memory networks.2009-05-07
20090119241METHODS AND SYSTEMS FOR A DECISION CLIENT - The present invention is directed to a decision client computer application providing a single point for making decisions in a company. The decision client may comprise a centralized tool to connect employees needing decisions on various aspects of their jobs to decision makers, such as managers. The users of the system can be identified by a digital signature. In one embodiment, when the client application receives a request for decision, it routes the request to the person responsible for the decision. Requests can automatically be passed to an alternative decision maker when an employee is out of the office.2009-05-07
20090119242System, Apparatus, and Method for Internet Content Detection - A method of detecting content communicated via a network is provided consisting of the steps of: classifying the content into a first category and a second category by means of a classification process; detecting one or more behaviour parameters of a user accessing the content, where the behaviour patterns are associated with the content either consisting of first category content or second category content; and further classifying the content into first category content and second category content based on the behaviour parameters detected for the user. The first category content generally consists of restricted or illegal content, and the second category content generally consists of unrestricted or legal content. The classification process consists of a pattern recognition technique that includes a training phase and a testing phase. The training phase provides statistical properties of a plurality of data objects which are labelled prior to testing as either restricted or unrestricted. The testing phase determines whether one or more data objects of content communicated via the network constitute restricted content or unrestricted content. A related system, network apparatus and computer program is provided.2009-05-07
20090119243Multivariate Analysis of Wireless Sensor Network Data for Machine Condition Monitoring - Machine condition monitoring on a system utilizes a wireless sensor network to gather data from a large number of sensors. The data is processed using a multivariate statistical model to determine whether the system has deviated from a normal condition. The wireless sensor network permits the acquisition of a large number of distributed data points from plural system modalities, which, in turn, yields enhanced prediction accuracy and a reduction in false alarms.2009-05-07
20090119244Bootstrap method for oil property prediction - The present invention is a method to determine models to predict physical or chemical properties of a petroleum fluid when such properties of such fluids cannot be measured by conventional analytical methods. The invention includes the steps of determining one or more models that predict one or more predetermined properties from a set of oils whose optical spectra and properties are known wherein a model corresponds to each predetermined property which is related to the spectrum, estimating the quality of the models, estimating the predictive quality for samples with unknown properties, augmenting the spectrum with shape parameters and/or properties that are predicted by the step above, and determining the quality and predictive quality of the models. The models are then used to predict properties of very small samples.2009-05-07
20090119245MANAGING DATA USING R-SMART CRITERIA - Implementations related to managing data on r-smart networks are disclosed.2009-05-07
20090119246AUTOMATED CAPTURE OF INFORMATION GENERATED AT MEETINGS - Meeting information is collected in an automatic or automated manner utilizing user devices among other devices likely to be present at meetings. Devices can detect the occurrence of a meeting and initiate data capture. Subsequently, aggregated data can be processed to facilitate access and/or dissemination of the data. For instance, data can be contextualized and/or indexed. Further, data can be generated in or converted to forms more suitable for information distribution (e.g., summary, points of interest . . . ).2009-05-07
20090119247EFFICIENT HASH BASED FULL-OUTER JOIN - In a database system, a full outer join is computed using a hash-based join.2009-05-07
20090119248SEARCH BASED ON DIVERSITY - An example method of expanding a search is provided. In this example, a query used in the search is initially accessed. Other queries associated with the accessed query are identified, and these other queries include query terms. A diversity of the query terms is measured and the accessed query may be expanded with the query terms based on the measured diversity. Another example method is also provided for expanding a search. In this alternate example, a result set resulting from the search is accessed and a diversity of the result set is measured. The query used in the search may then be expanded based on this measured diversity.2009-05-07
20090119249TRACKING PREMATURE TERMINATION OF A DATABASE QUERY - An apparatus and program product that utilize at least one prematurely terminated processing of a database query to improve the processing of the database query. Due to the difficulty of conventional techniques to improve the execution and/or performance of long processing queries, (e.g., advanced user knowledge, assistance from an expert, etc.), users typically terminate long processing queries. As a result, long processing queries may not be improved, and because of the limited options, users may continue to prematurely terminate long processing queries. However, information related to the premature terminations of a database query may be utilized by a DBMS to generate and/or implement suggestions to improve the processing of the database query, resulting in improved query processing, improved performance, fewer premature terminations, and more satisfied users.2009-05-07
20090119250METHOD AND SYSTEM FOR SEARCHING AND RANKING ENTRIES STORED IN A DIRECTORY - A method and system for searching and sorting or ranking entries from a directory. In one embodiment, the directory comprises a database of business listings and the directory is accessed by users through a telecommunication or voice network. A user utilizes voice commands or requests to specify a search for a business. The system conducts a search based on the request and ranks the located listings based on parameters provided by or associated with the user and/or the business listings. The parameters include proximity of the business to the location of the user, category of the business listing in the directory, or a weighting factor assigned to the business listing.2009-05-07
20090119251Data recording apparatus and data file transmission method in data recording apparatus - [Purpose] The invention has as its object to selectively reproduce on an external apparatus apart of digital data with index that a user wants to reproduce out of the digital data being made up of audio data and/or video data without having to use an application program dedicated for the external apparatus.2009-05-07
20090119252METHOD OF PROVIDING A NUMBER OF SEARCH RESULTS FOR A HANDHELD ELECTRONIC DEVICE, AND SYSTEM AND HANDHELD ELECTRONIC DEVICE EMPLOYING THE SAME - A method provides search results for a handheld electronic device including an input apparatus having a plurality of input members, each of at least a portion of which have a plurality of characters assigned thereto. A type of the input apparatus is sent from the device to a server. The device receives a number of activations of a number of the input members, and sends the received number of activations to the server. The server determines a number of possible combinations of the characters based upon the received input apparatus type and the received number of activations, searches for a number of search results as a function of the number of possible combinations of the characters, and sends the number of search results to the device. The device receives the number of search results, and displays at least a portion of the number of search results.2009-05-07
20090119253Introduced in Website's Price and other Market Search System - This patent presentation refers to an innovator website's price and other market search system that has the subject matter to allow search prices between supermarkets, pharmacies, gas station and others activities. Moreover it's possible to get details about products, suppliers, qualities, guarantees and prices for consumption ends, characterized by software (2009-05-07
20090119254Storing Accessible Histories of Search Results Reordered to Reflect User Interest in the Search Results - Responsive to each user interaction of at least one user interaction with search results to separate network locations returned from a search request, the search results are reordered to reflect predicted user interest in the search results based on the user interactions. The reordered search results are stored. Responsive to a request for the stored reordered search results, the stored reordered search results are presented in a separate interface.2009-05-07
20090119255Methods of Systems Using Geographic Meta-Metadata in Information Retrieval and Document Displays - A computer-implemented method involving a corpus of documents. The method includes accepting search criteria from a user, the search criteria including a domain identifier identifying a domain and including a filter condition specifying a geometric relationship between co-referenced locations; in response to accepting the search criteria from the user, searching among the corpus of documents to identify a set of documents, wherein each document among the set of documents contains anywhere within the document location-related information that refers to a location within the domain and satisfies the filter condition, and wherein the set of documents only includes documents that satisfy the filter condition; and identifying to the user the documents in the set of documents.2009-05-07
20090119256Hosted searching of private local area network information - Hosted searching of different local area network (LAN) information is described. The apparatus for hosted searching of different private LAN information includes a LAN crawler to automatically and repeatedly crawl a LAN having multiple devices, and a hosted on-demand search system including a set of one or more centralized-search servers to create and synchronize a separate private search database for each of the private LANs based on received reports from of different instances of the LAN crawler deployed on the multiple private LANs, at least some of which are operated by different entities.2009-05-07
20090119257Method and apparatus for searching a hierarchical database and an unstructured database with a single search query - Techniques for searching a hierarchical database and an unstructured database with a single search query are described herein. In one embodiment, a single search query is received that has syntax identifying an unstructured search string within a structured search query to automatically cause a search of the inverted index and use of the result to automatically search the hierarchical database. The unstructured search string is extracted from the single search query and an inverted index is searched according to the unstructured search string, wherein the inverted index includes virtual documents created from data stored in the hierarchical database, wherein each virtual document includes a unique identifier from the hierarchical database used to designate the data in the hierarchical database from which that virtual document was created, wherein a result of the inverted index search includes the unique identifiers of the virtual documents that meet the search. For each of the unique identifiers in the result, a separate search query is generated from the single search query by replacing the unstructured search string in the structured search query with that unique identifier and the hierarchical database is searched according to the separate search query. Other methods and apparatuses are also described.2009-05-07
20090119258SYSTEM AND METHOD FOR CONTENT RANKING AND REVIEWER SELECTION - Systems and methods for content ranking and reviewer selection are disclosed. In one aspect of the present disclosure, a method of content review includes receiving submitted content and identifying reviewers based on a set of criteria. The submitted content can be presented to the reviewers and ratings of the submitted content can be received from the reviewers. In another aspect of the present disclosure, a method of rating reviewers includes providing content to a reviewer to be scored no the scale. The score provided by the reviewer user is recorded and the amount of time for the reviewer to score the content is tracked. Reviewer user rating can be adjusted based on the amount of review time.2009-05-07
20090119259SYNDICATING SEARCH QUERIES USING WEB ADVERTISING - Displaying potential search-engine queries in a portion (e.g., a portion allocated for a web advertisement or within an inline frame) of a web page along with the content of the web page is described herein. The potential search-engine queries are determine by first analyzing either the underlying content of the web page (or other web pages) or searching various historic user metrics. Once determined, the potential search-engine queries are displayed within the portion of the web page along with the content of the web page. When a user selects one of the displayed potential search-engine queries, a query is sent to a search engine requesting web content relevant to the selected potential search-engine query.2009-05-07
20090119260Systems And Methods For Printing Content Associated With A Website - Systems and methods for communicating with a network device are provided. In this regard, a representative system, among others, includes a computing device that is electrically coupled to a printing device, the computing device being configured to access a website through a network, the computing device including a print manager in memory, the print manager being configured to: retrieve content associated with the website, receive input data associated with filter criteria, filter the content associated with the website based on the input data associated with the filter criteria, and instruct the printing device to print the filtered content that includes a portion of the retrieved content.2009-05-07
20090119261TECHNIQUES FOR RANKING SEARCH RESULTS - A computer-implemented method is provided, which includes presenting to a user (2009-05-07
20090119262METHOD AND DEVICE FOR DISPLAYING AND BROWSING A MULTI-FACETED DATA SET - This invention aims to provide a method and apparatus for displaying and/or browsing a multi-faceted data set containing hierarchical subject labels. In the present invention, subject labels can be located into a 3D space. Complex information, such as, the relationship between subject labels and weights of respective subject labels can be presented by displaying the 3D space. In this way, the screen size can be reduced and the user experience is improved.2009-05-07
20090119263METHOD AND SYSTEM OF PROMOTING HUMAN-ASSISTED SEARCH - A method and system of promoting service(s) of a search system are disclosed. A monitoring software or a search monitor may be operative on a user device. A user may be notified of an alternate search result(s) when such a result is identified. Condition(s) whereby a notification is presented to a user may be modified based on user action(s) and/or other information.2009-05-07
20090119264METHOD AND SYSTEM OF ACCESSING INFORMATION - A system and method of associating various communication services with a user ID is described. Using the association of a user ID with various communication service(s) and/or device(s), information related to a search request may be provided via any or all devices and/or communication services which are associated with the user ID.2009-05-07
20090119265DISTRIBUTED MULTIMEDIA ACCESS SYSTEM AND METHOD - A distributed media access system and method. The method includes making each of a plurality nodes in a P2P network designate at least one nearest neighbors as a first node candidate and perform at least one random walk to obtain a second node candidate according to the peer list; calculating user preferences of the request node and user preferences of the first and second node candidates according to the first and second node candidates and the preference parameters corresponding to the first and second node candidates so as to obtain a plurality of similarity values; selecting the more similar candidate as buddies of user of the node according to the calculated similarity values; and establishing a buddy list according to the buddies of user and storing the buddy list such that the P2P network can quickly find buddies of the node through the buddy list.2009-05-07
20090119266DISTRIBUTED MANAGEMENT FRAMEWORK FOR PERSONAL ATTRIBUTES - A technique for distributed management of attributes includes propagating attributes based upon attribute-granularity permissions. An example of a system according to the technique may include a server, coupled to a first client and a second client, that includes a module that receives attribute data from the first client; a permissions database where first permissions associated with the first client are set at the individual attribute level for the second client; an engine for updating the permissions database and for validating the first permissions for the second client; and an engine for distributing first client updates based on validated permissions to destinations associated with the one or more second destination stores.2009-05-07
20090119267Aggregation and retrieval of network sensor data - Methods, devices, and systems that aggregate and retrieve network sensor data. In one approach, an exemplary method includes receiving a plurality of instances of correlated sensor data from a plurality of remote data storages, each instance of sensor data respectively correlating to an occurrence. In another approach, an exemplary method includes receiving from an input-selector an input selection corresponding to a target-occurrence having at least one representative feature, and searching stored sensor data for sensor data correlating to the target-occurrence.2009-05-07
20090119268Method and system for crawling, mapping and extracting information associated with a business using heuristic and semantic analysis - A method and system for crawling multiple websites containing one or more web pages having information relevant to a particular domain of interest, such as details about local restaurants, extracting content from such websites, such as hours, location and phone number as well as reviews, review dates and other business specific information, and associating the extracted content with a specific business entity.2009-05-07
20090119269SYSTEM AND METHOD FOR EXECUTING PROGRAM IN LOCAL COMPUTER - Disclosed herein is a method and system for executing a program in a local computer, in which a shortcut index data is indexed and recorded by using the title name of a shortcut file stored in a local computer, a query is received from a user, and then a shortcut file associated with the query is immediately executed. According to exemplary embodiment of the present invention, the system comprises an index component configured to index data associated with a shortcut file stored in a local computer, a shortcut index database configured to record the indexed shortcut index data, an input component configured to receive a query from a user, a retrieval component configured to retrieve the shortcut index data associated with the query from the shortcut index database, and an executing component configured to execute a shortcut file associated with the retrieved shortcut index data.2009-05-07
20090119270ABSTRACT QUERY BUILDING WITH SELECTABILITY OF AGGREGATION OPERATIONS AND GROUPING - Systems and articles of manufacture for query building with selectability of aggregation operations and grouping. Abstract queries are composed on the basis of a data abstraction model abstractly describing data in the database. The abstract queries may include result criterions and aggregation operations to be performed with respect to the result criterions for generating aggregation information. An object is generated containing query entities and allowing a user to selectively (i) generate a first executable query corresponding to the abstract query inclusive of the aggregation operation and aggregation logic; and (ii) generate a second executable query corresponding to the abstract query exclusive of the aggregation operation and aggregation logic.2009-05-07
20090119271METHOD AND APPARATUS FOR PRESENTING A SUMMARY OF SELECTED VALUES - A method, system, and article of manufacture for quickly and easily obtaining information about a list of elements. One embodiment of the invention comprises receiving a selection of at least one desired summary function, generating a configuration file containing the at least one desired summary function, receiving a selection of a list of numbers, copying the list of numbers into a clipboard, parsing the configuration file to extract the least one desired function, calculating the at least one desired summary function using the list of desired numbers to generate summary information, displaying the summary information in a pop-up window, and replacing the selected list of numbers with the summary information. The results window may be a pop-window, a hover-help window, or a clipboard.2009-05-07
20090119272SYSTEM AND COMPUTER PROGRAM PRODUCT FOR NESTED CATEGORIZATION USING FACTORIZATION - A system for information item categorization in which each non-leaf node in a hierarchical organization of nodes represents a category, and each leaf node represents an information item. A number P is associated with each node. For non-leaf nodes, the associated number P is selected from a subset of relatively prime elements chosen from an appropriate Unique Factorization Domain (UFD), such as a set of relatively prime numbers which are a subset of the familiar set of integers. For leaf nodes, P is set to 1. A number M is also associated with each node. For each root node, M is set to the value of P for that node. For each non-root node, M is set to the product of the M's of all parent nodes of the node and the P of that node.2009-05-07
20090119273SERVER DEVICE, CLIENT DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing method of an information processing system including a client device functioning as a client and a server device functioning as a server which are capable of communication via a network, includes the steps of: at the server device, managing format identification information provided so as to be unique for each content data within the range of each data format, corresponding to the contents of each content; at the client device, causing execution of communication via network, for specifying a content, as to the server device; at the server device, transmitting, to the client device, format identification information correlated with a specified content in response to specification of a content via network from the client device; and at the client device, managing the received and obtained format identification information as corresponding to the specified content.2009-05-07
20090119274NAMED ENTITY EXTRACTING APPARATUS, METHOD, AND PROGRAM - A named entity extracting apparatus that extracts a named entity suitable for a user by enabling an order to be set in which the named entity is extracted from texts includes: an extraction order reading unit 2009-05-07
20090119275METHOD OF MONITORING ELECTRONIC MEDIA - Consumer-generated media (CGM) and/or other media are monitored to allow an organization to become aware of, and respond to, issues that may affect how it is perceived by the public. An extract, transform, load (ETL) engine is used to process CGM and other media content, and an analytical engine utilizes a multi-step progressive filtering approach to identify those documents that are most relevant. The filtering approach includes executing broad queries to extract relevant content from different CGM and other sources, extracting text snippets from the relevant content and performing de-duplication, defining organizational identity (e.g., brand name, trade name, or company name) and hot-topic models using a rule-based and statistical-based approach, and using the models together in an orthogonal filtering approach to effectively generate alerts and reports. The methodology is found to be substantially more effective compared to a conventional keyword based approach.2009-05-07
20090119276Method and Internet-based Search Engine System for Storing, Sorting, and Displaying Search Results - A method and Internet-based search engine system for storing, sorting, and displaying search results. In a first step, a search is performed by keywords and will return results that are sorted by keyword score per result. In a second step, when a user clicks on a search result the system displays the subsequent page. In a third and final step, the viewing of the subsequent page may add to the results keyword score resulting in an increase in that listing's score for that particular keyword, depending upon how long the user views it for. The system also determines how long the user is viewing the subsequent page. The keyword score is determined by a result/listing's ability to engage the user who clicked on it. There are two types of sub-scores that determine the keyword score for the listing; the ‘7-score’; and the ‘15-score’.2009-05-07
20090119277DIFFERENTIATION OF FIELD ATTRIBUTES AS VALUE CONSTRAINING VERSUS RECORD SET CONSTRAINING - Embodiments of the invention provide a method for creating value constraints and record constraints for entity based conditions, while (at least in some cases) reducing the amount of time and errors associated with manually composing query language statements (e.g., SQL). When composing an abstract query, a query interface may be provided for a user to input value constraints and record set constrains to create entity based conditions. The entity based conditions may specify a condition which is evaluated against all rows of data for an instance of a given model entity, and a record set constraint allows a user to specify a subset of records against which the entity based condition is applied.2009-05-07
20090119278Continual Reorganization of Ordered Search Results Based on Current User Interaction - Responsive to each user interaction with search results to network locations returned by a search engine, a search result reorganizer predicts user interest in the search results from each dynamic user interaction. Responsive to each prediction of user interest while a user interacts any of the search results, the search result reorganizer reorders the search results to reflect the user interest.2009-05-07
20090119279Graph caching - In a method and apparatus for analyzing nodes of a Deterministic Finite Automata (DFA), an accessibility ranking, based on a DFA graph geometrical configuration, may be determined in order to determine cacheable portions of the DFA graph in order to reduce the number of external memory accesses. A walker process may be configured to walk the graph in a graph cache as well as main memory. The graph may be generated in a manner allowing each arc to include information if the node it is pointing to is stored in the graph cache or in main memory. The walker may use this information to determine whether or not to access the next arc in the graph cache or in main memory.2009-05-07
20090119280Hosted searching of private local area network information with support for add-on applications - Hosted searching of private LAN information is described. The apparatus includes a LAN crawler to automatically and repeatedly crawl a LAN having multiple devices, using a discovery module to discover the devices, a generic-probing module to attempt to collect the descriptive information according to a first set of probing requirements, and multiple specific-probing plug-ins each of which attempt to collect the descriptive information according to a second set of specific probing requirements. In another embodiment, the apparatus also includes a hosted on-demand search system including a centralized-search server to create and synchronize a private search database. The centralized-search server includes an application interface to receive a request to access the private search database from a third-party add-on application, to provide the accessed information to the third-party add-on application, and to receive from the third-party add-on application an application rendered component to be displayed on the user interface.2009-05-07
20090119281Granular knowledge based search engine - The application borrows terminology from data mining, association rule learning and topology. A geometric structure represents a collection of concepts in a document set. The geometric structure has a high-frequency keyword set that co-occurs closely which represents a concept in a document set. Document analysis seeks to automate the understanding of knowledge representing the author's idea. Granular computing theory deals with rough sets and fuzzy sets. One of the key insights of rough set research is that selection of different sets of features or variables will yield different concept granulations. Here, as in elementary rough set theory, by “concept” we mean a set of entities that are indistinguishable or indiscernible to the observer (i.e., a simple concept), or a set of entities that is composed from such simple concepts (i.e., a complex concept).2009-05-07
20090119282DECISION SUPPORT SYSTEM WITH EMBEDDED CLINICAL GUIDELINES - A context-aware decision-support system automatically selects the clinical guideline pertaining to the patient's medical care and automatically deduces the current stage in the guideline (S2009-05-07
20090119283System and Method of Improving and Enhancing Electronic File Searching - The invention is a system and a method for improving and enhancing electronic file searching, the system employing the method, and the method comprising (a) accepting context as input; and (b) reducing context to keywords; and (c) weighting keywords; and (d) searching electronic data store(s) using said weighted keywords; and (e) displaying search results.2009-05-07
20090119284METHOD AND SYSTEM FOR CLASSIFYING DISPLAY PAGES USING SUMMARIES - A method and system for classifying display pages based on automatically generated summaries of display pages. A web page classification system uses a web page summarization system to generate summaries of web pages. The summary of a web page may include the sentences of the web page that are most closely related to the primary topic of the web page. The summarization system may combine the benefits of multiple summarization techniques to identify the sentences of a web page that represent the primary topic of the web page. Once the summary is generated, the classification system may apply conventional classification techniques to the summary to classify the web page. The classification system may use conventional classification techniques such as a Naïve Bayesian classifier or a support vector machine to identify the classifications of a web page based on the summary generated by the summarization system.2009-05-07
20090119285QUERY UTILIZATION - Methods and system for query utilization are described. A rate of a plurality of queries to a data source may be determined for a plurality of time periods. The plurality of queries may be associated with a term. A cost may be associated with a normal-to-deviated query state transition and a deviated-to-normal query state transition. A normal query state or a deviated query state may be assigned to a particular query on a particular time period of the plurality of time periods based on the rate of queries for the particular time period and the cost of the normal-to-deviated query state transition and the deviated-to-normal query state transition. A query burst may be identified during the plurality of time periods based on assignment of the normal query state or the deviated query state to the plurality of queries. The query burst may have the normal query state, the normal-to-deviated query state transition, and the deviated query state during a time period.2009-05-07
20090119286Method and Apparatus for Utilizing User Feedback to Improve Signifier Mapping - An apparatus for finding resources on a network comprises a finder server having access to: (a) a database including: (i) an index of resources available on network of interconnected computers on which a plurality of resources reside; and (ii) information regarding user feedback gathered from previous operations of the apparatus by a user and plural previous users; and (b) a learning system operable to access and learn from information contained on the database. The finder server is operable to locate, in response to entry by the user of a resource identity signifier, a single intended target resource intended by the user to uniquely correspond to the resource identity signifier, from among a plurality of resources located on the network, by: receiving a resource identity signifier from the user; accessing the database to determine, based on the information in the database, which, if any, of the indexed resources is likely to be the intended target resource; and directing a computer of the user so as to cause that computer to connect the user to the address of the resource, if any, determined as likely to be the intended target resource.2009-05-07
20090119287IMAGE PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - The Object of the present invention is providing a filtering function that is easily used for filtering a document whose importance is changed as time passes. For that end, importance of each search condition and a valid period of the importance are set in association with each other. On searching log data matching the set search condition, calculation is performed on a score of log data matching the search condition on the basis of an execution time of a search, importance of the search condition and the valid period of the importance. Log data having the score thus calculated exceeding a predetermined threshold is extracted.2009-05-07
20090119288APPARATUS AND METHOD FOR SEARCHING MEDIA DATA - An apparatus and method of searching media data is provided. The method of searching media data includes selecting attributes from a displayed category, calculating degrees of correspondence between the selected attributes and media data, and generating specified signals in accordance with the calculated degrees of correspondence.2009-05-07
20090119289Method and System for Autocompletion Using Ranked Results - A set of ordered predicted completion strings are presented to a user as the user enters text in a text entry box (e.g., a browser or a toolbar). The predicted completion strings can be in the form of URLs or query strings. The ordering may be based on any number of factors (e.g., a query's frequency of submission from a community of users). URLs can be ranked based on an importance value of the URL. Privacy is taken into account in a number of ways, such as using a previously submitted query only when more than a certain number of unique requesters have made the query. The sets of ordered predicted completion strings is obtained by matching a fingerprint value of the user's entry string to a fingerprint to table map which contains the set of ordered predicted completion strings.2009-05-07
20090119290ON-LINE E-MAIL SERVICE SYSTEM, AND SERVICE METHOD THEREOF - Embodiments of the present disclosure provide a method and system in which contextual information is obtained and inserted into the body of the e-mail. Users may authorize the access and analysis of the contents of their e-mails. Upon recognizing transmission of an email from one of the users, the content of the e-mail is analyzed to determine a topic or uncommon concept. The topic or uncommon concept of the email may be determined, for example, by analyzing the relative popularity or frequency of use of terms used in the e-mail. Information relevant to the e-mail's topic and content is then obtained by searching various sources, such as one or more databases, search servers, or the Internet. The relevant information may be inserted or otherwise included in the body of a reply e-mail or other related e-mail. The relevant information may be inserted in various forms, such as a hyperlink, or other formatted text. An e-mail may also be delivered to the sender to notify the sender of the information included in the reply e-mail. Furthermore, the e-mail and the relevant information may be translated into one or more languages depending on the preference of the sender or the receiver.2009-05-07
20090119291MICROHUBS AND ITS APPLICATIONS - A system and method of crawling at least one website comprising at least one URL includes maintaining a lookup structure comprising all of the URLs known to be on a website; calculating a hub score for each webpage of the website to be recrawled, wherein the hub score measures how likely the to be recrawled webpage includes links to fresh content published on the website; sorting all the to be recrawled pages by their hub scores; and crawling the to be recrawled pages in order from highest hub scores to lowest hub scores. The calculating comprises computing a first value equaling a percentage of a number of new relative URLs on the to be recrawled page; computing a second value equaling a percentage of a previous hub score of the to be recrawled page; and computing the hub score as a sum of the first and the second values.2009-05-07
20090119292PEER TO PEER TRAFFIC CONTROL METHOD AND SYSTEM - A system, apparatus, and method for controlling peer to peer traffic at a network gateway or server. Suspected peer to peer traffic is identified heuristically and collected for content analysis. Content digital fingerprint pattern matching software is received from a remote server. Peer to peer traffic is selectively disposed of.2009-05-07
20090119293Computer Method and System for Determining Individual Priorities of Shared Activities - A computer-implemented method and apparatus determines individual user priorities of collections of resources. The invention system represents collections of shared resources as end-user activities. An engine retrieves the activity access history of the user and the activity records and generates a description of each activity and a priority score. The engine may include a data collection component and a training and ranking component. Based on the activity descriptions and priority scores, the invention system generates and outputs for display an activity list ordered by individual user priority.2009-05-07
20090119294SYSTEM AND METHOD FOR HYPING MEDIA RECOMMENDATIONS IN A MEDIA RECOMMENDATION SYSTEM - Systems and methods for allowing media recommendations to be hyped in a media recommendation system. Recommenders desiring to emphasize a particular media recommendations sent to recipients can “hype” the media recommendation. Hyping is a request for the media recommendation to be used or played sooner by the recipient that it otherwise would if the media recommendation were not hyped. Typically, hyping a media recommendation increases its priority or order of placement in a recipient's media queue, which controls the order of usage or play. The higher the placement, the sooner the media recommendation may be used or played by the recipient. A hype score may be calculated for a hyped media's recommendation to control the order of placement of hyped media recommendations in the recipient's media queue. The hype score may be a function of a hype value and a natural score as if the media recommendation were not hyped.2009-05-07
20090119295ELECTRONIC DEVICE WITH A COPY CONTROLLING FUNCTION AND METHOD OF COPY CONTROLLING - A copy controlling method includes supplying at least two slots for receiving storage devices; determining a first storage device and a second storage device when the two slots are connected with storage devices; determining the free space remaining on the second storage device and if the second storage can accept all files to be copied from the source storage device; copying files from the first storage device to the second storage device, therein the size of the files to be copied is determined based on the free space of the second storage device. An electronic device with a copy controlling function is also provided.2009-05-07
20090119296SYSTEMS AND METHODS FOR HANDLING AND DISTINGUISHING BINARIZED, BACKGROUND ARTIFACTS IN THE VICINITY OF DOCUMENT TEXT AND IMAGE FEATURES INDICATIVE OF A DOCUMENT CATEGORY - A method of enhancing electronic documents received from a plurality of users by a document analysis system for improving automatic recognition and classification of the received electronic documents, is provided. For each page of a received electronic document, the method filters the page to infer binarized-background artifacts resulting from the binarization of the original grayscale or color image source document and which reside in the vicinity of binarized text and binarized image features in the page, so that the binarized text and binarized images may be distinguished from the binarized-background artifacts and extracted from the document. The method then uses the extracted features from the filtered document to automatically recognized and classify a document into a document category.2009-05-07
20090119297ALGORITHM FOR SORTING BIT SEQUENCES IN LINEAR COMPLEXITY - A computer program product and computer system for in-place sorting sequences of binary bits stored contiguously in an array within a memory device of the computer system prior to sorting. Each sequence includes contiguous fields of bits. The algorithm is executed by a processor of the computer system. The in-place sorting executes program code at each node of a linked execution structure. Each node includes a segment of the array. The program code is executed in a hierarchical sequence with respect to the nodes. Executing program code at each node includes: dividing the segment of the node into groups of sequences based on a mask field having a mask width, wherein each group has a unique mask value of the mask field; and in-place rearranging the sequences in the segment, wherein the rearranging results in each group including only those sequences having the unique mask value of the group.2009-05-07
20090119298VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near realtime, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables.2009-05-07
20090119299Online Identity Management and Identity Verification - A user identity verification apparatus and method comprising, via one or more processors, collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources comprising credit bureau information, information from data vendors, and public information, generating a profile of the method user comprising a plurality of subsets of the consolidated user data corresponding to a plurality of access levels, receiving a validation request from a third party source at an unknown user's request; assigning an access level to the validation request; requesting information from the unknown user, matching returned information from the unknown user to that in the subset of the consolidated user data corresponding to the assigned access level, and verifying to the third party source that the unknown user is the method user.2009-05-07
20090119300TECHNIQUE FOR EDITING CENTRALIZED DIGITALLY ENCODED INFORMATION - A technique is disclosed herein for editing centralized digitally encoded content using a stateless client on a client machine. A repository on a central server is accessed by a user. The repository has a plurality of compilation units stored therein. One or more compilation units selected by the user are provided to the user via a stateless client on a client machine. The client is in communication with the repository over a network. Information associated with the one or more selected compilation units is programmatically sent to the repository at spaced time intervals.2009-05-07
20090119301SYSTEM AND METHOD FOR MODELING A SESSION-BASED SYSTEM WITH A TRANSACTION-BASED ANALYTIC MODEL - According to an embodiment of the present invention, a method for deriving an analytic model for a session-based system is provided. The method comprises receiving, by a model generator, client-access behavior information for the session-based system, wherein the session-based system comprises a plurality of interdependent transaction types. The method further comprises deriving, by the model generator, from the received client-access behavior information, a stateless transaction-based analytic model of the session-based system, wherein the derived transaction-based analytic model models resource requirements of the session-based system for servicing a workload. According to certain embodiments, the derived transaction-based analytic model is used for performing capacity analysis of the session-based system.2009-05-07
20090119302Asynchronous client to server updates - Methods and apparatus are provided which enable client-server communication during the execution of a web application to be batched, so as to manage the processing load on server-side components of the web application and the transmission load on the network(s) coupling the client and server. In some embodiments, client-side components of the web application are operable to capture processing events in a change log on the client, and transmit at least a subset of the entries in the change log to the server upon the occurrence of a predetermined event, such as a passage of time since a previous transmission.2009-05-07
20090119303DEVICE FOR MANAGING MEDIA SERVER RESOURCES FOR INTERFACING BETWEEN APPLICATION SERVERS AND MEDIA SERVERS IN A COMMUNICATION NETWORK - The invention concerns a device (D) dedicated to managing media server resources (MSj) in a communication network (CR), adapted to provide sets of media functions for providing the media parts of the requested services to client communication terminals (T) requesting services, comprising at least one media part, managed by application servers (ASi). Said device (D) comprises storage means (BD) storing data representative of media functions matching the media server identifiers (MSj) and managing means (MG) adapted, upon receiving a message from an application server (ASi) dedicated to a service requested by a client terminal (T) and requiring the provision of a set of media functions for providing a media part of the requested service, to determine the identifier of a media server (MSj) having the resources for offering the requested set, in the storage means (BD), then allocate resources of said media server (MSj) so that the message may be transmitted thereto.2009-05-07
20090119304METADATA STRUCTURES AND RELATED LOCKING TECHNIQUES TO IMPROVE PERFORMANCE AND SCALABILITY IN A CLUSTER FILE SYSTEM - A cluster file system is disclosed. A plurality of disk servers, operating as a single distributed disk server layer, are connected to the one or more physical disks. Each disk server stores metadata for each of the files. A plurality of lock servers, having one or more locks for each file and associated file system metadata operates as a single centralized distributed lock server to coordinate access to the files stored by the disk server layer. A plurality of asynchronous file servers, operating as a single distributed file server layer in response to a request for a file from a user program: (i) retrieves the requested file from the disk server layer and at least one lock, associated with the retrieved file, from the lock server, and (ii) retrieves metadata for at least one file that is related to the requested files, and at least one lock, for each file that has had its metadata retrieved.2009-05-07
20090119305ENTERPRISE ASSET MANAGEMENT SYSTEM AND METHOD - A system and method for managing enterprise assets located at geographically distributed sites. The method includes storing in a database information relating to each asset, wherein the stored information includes cost of each asset and cost of service for each asset. The method further includes tracking and storing information relating to servicing of the assets, including the cost of servicing. Information relating to the assets is then displayed to a user of the system.2009-05-07
20090119306TRANSITIONING OF DATABASE SRVICE RESPONSIBILITY RESPONSIVE TO SERVER FAILURE IN A PARTIALLY CLUSTERED COMPUTING ENVIRONMENT - A facility is provided for transitioning a database service from a failing, primary server to another server of a computing environment including a plurality of servers, at least some of which have a common database service capability, but not commonly replicated supporting databases. The facility includes, responsive to detection of failure at the primary server, selecting another server of the plurality of servers to function as database service backup for the primary server, updating at least one configuration file of the computing environment to indicate that the another server is to function as database service backup for the primary, failing server, and dynamically creating at least one database structure at the another server. The dynamically created at least one database structure supports the database service backup function at the another server and corresponds to a database structure of a database supporting the database service at the primary server.2009-05-07
20090119307SYSLOG PARSER - A computerized method performed in a computer operatively connected to storage. Parsing rules are determined for parsing logs output as text and/or symbols from multiple devices in a computer network. The logs are stored in the storage. Multiple log samples are sampled from the logs. The log samples are input into an application running on the computer. The log samples are each sectioned into multiple sections which include variable information separated by static structural text. Each of the log samples is processed by: comparing the sections to a list of regular expressions. The list is maintained in the storage, and upon matching a matched section of the sections to a matched regular expression from the list of the regular expressions, the matched section is tagged with a tag associated with the matched regular expression. The tag associated to the matched regular expression is stored and combined with any unmatched sections and with the static structural text to create a log pattern. The log pattern is stored in a table only if the log pattern is distinct from all log patterns previously stored in the table.2009-05-07
Website © 2025 Advameg, Inc.