23rd week of 2015 patent applcation highlights part 44 |
Patent application number | Title | Published |
20150154492 | INTERFACE APPARATUS AND METHOD FOR PROVIDING INTERACTION OF A USER WITH NETWORK ENTITIES - An interface apparatus, system and method for providing interaction over a communication network between a user and network entities are described. The interface apparatus includes a front-end communication system configured for receiving user input information and for outputting output signals in response to the input information. The interface apparatus also includes a communication processing system for coding the input information and forwarding it to the network entity. The interface apparatus can also include a front-end monitoring system for generating user state patterns indicative of the state of the user, a decision-making system for processing the patterns and taking a decision as to how to respond thereto. The interface apparatus includes a configuration and control system configured for reconfiguration and control of functionality of the interface apparatus and for reconfiguration and control of functionality of the network entities. | 2015-06-04 |
20150154493 | TECHNIQUES FOR UTILIZING AND ADAPTING A PREDICTION MODEL - A computer-implemented technique of providing relevant search results to a user of a website at a query time. The technique can include receiving, at a computing device having one or more processors, a query from the user, the query corresponding to a description of potential search results desired by the user. The technique can further include retrieving a user history corresponding to previous user interactions with the website and determining a context of the user corresponding to an interaction of the user with the website at the query time. The relevant search results can be determined based on the query, the user history, and the context of the user and a prediction model, and be provided to the user via updating of a webpage presented to the user. The technique can further include adapting the prediction model based on a prediction event and set of corresponding prediction event features. | 2015-06-04 |
20150154494 | METHOD AND SYSTEM FOR CONFIGURING BEHAVIORAL NETWORK INTELLIGENCE SYSTEM USING NETWORK MONITORING PROGRAMMING LANGUAGE - A method and system for configuring a behavioral network intelligence system using a network monitoring programming language are provided. The method includes defining at least one target of a traffic segment to be monitored using at least one application path attribute of an application, wherein the application is accessed via at least one user device connected to a network, wherein the at least one application path attribute is defined respective of an application path keyword and an application path assessment keyword; and defining at least one condition representing the behavior of the at least one application path attribute of the application, the at least one target and the at least one condition can be interpreted by a monitoring system to allow for determining a behavioral impact of the application on the network. | 2015-06-04 |
20150154495 | METHOD, APPARATUS, AND ARTIFICIAL INTELLIGENCE EDITOR FOR IMPLEMENTING ARTIFICIAL INTELLIGENCE BEHAVIOR - Methods, apparatus and artificial intelligence (AI) editors for implementing an AI behavior are provided herein. In an exemplary method, an AI behavior configuration file can be obtained. The AI behavior configuration file can be configured using at least one preset component, and the AI behavior configuration file matches logic of a preset AI behavior. It can be tested whether a result of running the AI behavior configuration file reaches a preset effect. When the result of running the AI behavior configuration file reaches the preset effect, the preset AI behavior can be implemented according to the AI behavior configuration file. | 2015-06-04 |
20150154496 | REAL TIME SAFETY MANAGEMENT SYSTEM AND METHOD - A system and method assesses and manages risk of an operation of a user. A rules engine of computer executable instructions stored in the storage device determines at least one of a safety risk measurement based on key performance indicators, an operational safety risk measurement for the operation as a function of the operational safety risk measurement information stored in a storage device and/or a conditional safety risk measurement for the operation as a function of the conditional safety risk measurement information stored in the storage device. A processor connected to the storage device executes the rules engine. An output interface connected to the processor indicates the determined safety risk for the operation. | 2015-06-04 |
20150154497 | CONTENT BASED SIMILARITY DETECTION - Content Based Similarity Detection. A computer implemented method includes computing a hash of each word in a collection of books to produce a numerical integer token using a reduced representation and computing an Inverse Document Frequency (IDF) vector comprising the number of books the token appears in, for every token in the collection of books. The method also includes creating a token occurrence count vector for each book in the collection and normalizing the token occurrence count vector using the IDF vector to create a Term Frequency-Inverse Document Frequency (TF-IDF) vector. Further, the method includes reducing each TF-IDF vector by using random projections to obtain a final signature representing each book in the collection, reducing each TF-IDF vector by using random projections to obtain a final signature representing each book in the collection and using a trained machine learning algorithm, determining whether each of the list of candidate books is similar to the target book. | 2015-06-04 |
20150154498 | METHODS FOR IDENTIFYING SILENT FAILURES IN AN APPLICATION AND DEVICES THEREOF - A method system and computer program product are disclosed for identifying silent failures in an application, comprising of generating a finite state machine (FSM) model of the application based on an input data, extracting state specific invariants relevant to the generated FSM, performing a localized invariant violation check at each state of the generated FSM and upon detection of an invariant violation at any state of the FSM, logging the violation as a silent failure. | 2015-06-04 |
20150154499 | SYSTEMS AND METHODS TO PREDICT A REDUCTION OF ENERGY CONSUMPTION - A computing device for use with a demand response system is provided. The computing device includes a communication interface for receiving customer data of a plurality of customers, wherein the customer data includes a participation history and historical consumption values for each customer for participating in at least one demand response event. A processor is coupled to the communication interface and is programmed to select at least one customer from the plurality of customers by considering the participation history and the historical consumption values for each of the customers. The processor is also programmed to estimate a future reduction in energy consumption for the customer based on the customer data and to determine whether the estimated future reduction in energy consumption is substantially accurate. | 2015-06-04 |
20150154500 | MATCH ENGINE FOR DETECTION OF MULTI-PATTERN RULES - Methods, systems and computer program products are disclosed for detecting patterns in a data stream that match multi-pattern rules. One embodiment of the invention provides a method of recognizing a specified group of patterns in a data stream. The method comprises identifying a rule for said specified group of patterns in the data stream, and using a first array of finite state machines to scan the data stream for at least some of the patterns in the specified group. For patterns in the specified group that are found in the data stream by the first array of finite state machines, pattern identifiers are sent to a second array of finite state machines. The second array of finite state machines determines if the specified group of patterns is in the data stream in accordance with the identified rule by, at least in part, using said pattern identifiers. | 2015-06-04 |
20150154501 | EVENT DETECTION THROUGH TEXT ANALYSIS USING DYNAMIC SELF EVOLVING/LEARNING MODULE - A system and method for detecting events based on input data from a plurality of sources. The system may receive input from a plurality of sources containing information about possible events. A method for event detection involves pre-processing and normalizing a data input from a plurality of sources, extracting and disambiguating events and entities, associate event and entities, correlate events and entities associated from a data input to results from a different data source to determine if an event has occurred, and store the detected events in a data storage. | 2015-06-04 |
20150154502 | METHOD, APPARATUS, AND ARTIFICIAL INTELLIGENCE SERVER FOR DETERMINING ARTIFICIAL INTELLIGENCE BEHAVIOR - According to methods, apparatus and AI servers for determining an AI behavior, a protocol-requesting command sent by an application logic server can be received. The protocol-requesting command can contain an application identifier, a notification message, and current environment data. From a plurality of preset AI systems, an AI system corresponding to the application identifier can be found. The AI system can be formed by a preset plurality of components that include one or more classifying components. From the AI system, a classifying component corresponding to the notification message can be found. The classifying component can be mounted with at least one behavior component. From the classifying component corresponding to the notification message, a behavior component matching the current environment data can be obtained. An AI behavior can be determined based on the obtained behavior component matching the current environment data. | 2015-06-04 |
20150154503 | IMAGE-BASED POPULARITY PREDICTION - A machine may be configured to access an image of an item described by a description of the item. The machine may determine an image quality score of the image based on an analysis of the image. A request for search results that pertain to the description may be received by the machine, and the machine may present a search result that references the item's image, based on its image quality score. Also, the machine may access images of items and descriptions of items and generate a set of most frequent text tokens included in the item descriptions. The machine may identify an image feature exhibited by an item's image and determine that a text token from the corresponding item description matches one of the most frequent text tokens. A data structure may be generated by the machine to correlate the identified image feature with the text token. | 2015-06-04 |
20150154504 | SUPPORT VECTOR MACHINE ENHANCED MODELS FOR SHORT-TERM WIND FARM GENERATION FORECASTING - Systems and methods for forecasting wind farm power generation are disclosed. Via use of a support vector machine (SVM) enhanced Markov model, short-term wind power generation forecasts may be generated. Exemplary approaches accurately account for wind ramp-up and ramp-down, as well as diurnal non-stationarity and seasonality of wind power generation. Via use of the disclosed forecasting approaches, utilities and grid managers can make improved decisions relating to electrical power generation and transmission, thus reducing costs and reducing pollution. | 2015-06-04 |
20150154505 | INFORMATION PROCESSING SYSTEM AND METHOD FOR MONITORING A COMPLEX SYSTEM - A data processor system for monitoring a complex system, the processor system configured to receive a plurality of pieces of state information and to merge at least the pieces of state information into a piece of failure information, at least one of the pieces of state information being associated with a confidence flag, and the piece of failure information also being associated with a confidence flag. The system performs the merging by implementing a fuzzy logic technique to produce the piece of failure information while taking account of the respective confidence flag of the pieces of state information and to produce the confidence flag associated with the failure information. | 2015-06-04 |
20150154506 | BROWSER-BASED SELECTION OF CONTENT REQUEST MODES - Features are disclosed for generating request decision models for use by client computing devices to determine request paths or modes for content requests. The request modes may correspond to direct requests (e.g., requests made from a client device directly to a content server hosting requested content) or to indirect requests (e.g., requests made from the client device to the content server via an intermediary system). The request decision models may be trained by a machine learning algorithm using performance data (e.g., prior content load times), contextual information (e.g., state information associated with devices at times content requests are executed), and the like. | 2015-06-04 |
20150154507 | CLASSIFICATION SYSTEM - Multi-class classification by training a machine learning system based on training inputs each of which includes features and at least one class label. Each training input is assigned a membership value that can indicate if an entity having the features of the training input is a member of the class corresponding to the class label that is also included in the training input. To determine if an entity having test features is a member of several test classes, test inputs can be constructed where each input includes the test features and a class label corresponding to one of the test classes. The test inputs are processed by the trained machine learning system, which produces as outputs test membership values that represent the likelihood that the entity having the features in the test input belong to the test class corresponding to the test class label also included in the test input. | 2015-06-04 |
20150154508 | INDIVIDUALIZED DATA SEARCH - A machine learning is conducted according to user behavior data to obtain a satisfaction degree of the user behavior data. One or more characteristics are selected from a characteristic of the user and a characteristic of the data object in the user behavior data to obtain a characteristic combination. Individualized model training is conducted according to the satisfaction degree of the user behavior data under each characteristic or characteristic combination to obtain an individualized weight of each characteristic or characteristic combination. One or more data objects searched according to a query word in a search request of the user is ranked based on the individualized weight of the characteristic or characteristic combination. The one or more searched data objects are displayed according to the ranking. The present techniques improve performance of a search platform, increase accuracy of search results, and output reasonable results that satisfies an intention of the user. | 2015-06-04 |
20150154509 | FEATURED CO-OCCURRENCE KNOWLEDGE BASE FROM A CORPUS OF DOCUMENTS - A system for building a knowledge base of co-occurring features extracted from a document corpus is disclosed. The method includes a plurality of feature extraction software modules that may extract different features from each document in the corpus. The system may include a knowledge base aggregator module that may keep count of the co-occurrences of features in the different documents of a corpus and determine appropriate co-occurrences to store in a knowledge base. | 2015-06-04 |
20150154510 | ELECTRONIC DEVICE - According to one embodiment, an electronic device capable of logging in by switching accounts, includes a processor. The processor determines whether the device can communicate with a predetermined external electronic apparatus, and controls switching the accounts based on a result of the determination. | 2015-06-04 |
20150154511 | AVAILABILITY WATCHING - Methods, systems, and computer program products for watching availability-based data maintained in an external cache. Events that change a parameter for a first plurality of travel segment-dates are compared with a standard establishing a parameter value threshold. The events are filtered to produce a filtered set of events meeting the standard. An index correlating a second plurality of travel segment-dates in a travel domain with a plurality of travel solutions in the availability-based data is referenced to determine one or more of the second plurality of travel segment-dates in the index to which the events in the filtered set are applicable. The index is referenced to determine each travel solution correlated with the one or more of the second plurality of travel segment-dates. A notification is sent to the external cache to refresh the availability-based data to reflect each travel solution correlated with the one or more of the second plurality of travel segment-dates. | 2015-06-04 |
20150154512 | METHOD FOR BOOKING TRAVEL ARRANGEMENTS - A method for identifying destinations within a user's travel budget, and booking airfare and accommodations for those destinations. The method may comprise: providing a server configured to host a website and databases for accessing the website; inputting a budget, point of origin, and travel dates; searching the airfare databases for flights based on the point of origin and travel dates; wherein the flights on those travel dates cost less than the budget; storing information of the cheapest flight in the server; searching the accommodations databases for accommodations in each of those destinations; storing matching accommodations in the server; displaying the list of all destinations where the price of airfare and the price of accommodations are within their budget; and allowing the user to book airfare and accommodations. These methods allow a user to search for and book the optimal combination of airfare and accommodations within their travel budget. | 2015-06-04 |
20150154513 | SYSTEMS AND METHODS FOR ENHANCED TICKET SALES - Computing systems and methods for enhanced ticket sales are provided. The enhanced ticket sales may include presentation of community-sourced seat information to a potential ticket buyer that describes the human experience of sitting in each particular seat at a venue. The community-sourced seat information for each particular seat can be photos, comments, or other data that have been gathered by a ticket server from online content posted by people that have attended previous events in that seat. The online content can be gathered from email accounts, social network accounts, or other online sources. In this way, the human experience of some or all of the people who have sat in a particular seat at various events, as recorded in photos, comments, articles or other online data, can be collected, filtered, and provided to a potential purchaser of a ticked for that seat. | 2015-06-04 |
20150154514 | EVENT ORGANISING METHOD AND APPARATUS - A method and apparatus for booking a venue for an event using a networked computer environment is disclosed. The apparatus determines venue requirements and/or supplier requirements, determines venues matching the venue requirements by searching a database for venue details of multiple venues and/or determines and/or supplier requirements by searching a database for venue details of multiple suppliers. The apparatus determines venues matching the venue requirements by searching a database for venue details of multiple venues and/or determines suppliers matching the supplier requirements by searching a database for suppliers' details of multiple suppliers and provides an indication of available venues and/or suppliers to a display of a user interface device via a communications network. A determination of a selection of an available venue from a venue booking request and/or a selection of an available supplier from a supplier booking request is received from a user interface device via the communications network and the selected venue and/or suppliers are booked. | 2015-06-04 |
20150154515 | METHODS AND SYSTEMS FOR BOOKING AN EVENT - Embodiments disclosed herein provide systems and methods for a crowd-funding server for users to pledge to purchase tickets to an event based on a number of users that have pledged to purchase tickets for an event and the gender ratio of the users that have pledged to purchase the tickets for the event. | 2015-06-04 |
20150154516 | METHODS AND SYSTEMS FOR BOOKING AN EVENT - Embodiments disclosed herein provide systems and methods for a crowd-funding server for users to pledge to purchase tickets to an event based on a number of users that have pledged to purchase tickets for an event and the gender ratio of the users that have pledged to purchase the tickets for the event. | 2015-06-04 |
20150154517 | RESOURCE CREW MANAGEMENT - An online booking system caters for the corporate booking of the travel of a number of people to a single destination or multiple destinations by providing a file with details of the trip destination, the people involved and the criteria which override the normal corporate travel criteria. The booking system then merges this with the normal corporate travel criteria and any external profile criteria of the individuals and books individuals to the destination before issuing the bookings. | 2015-06-04 |
20150154518 | AUTHENTICATED CHECKIN VIA PASSIVE NFC - The present disclosure involves a method of verifying user check-ins to a venue. The method includes initializing a digital check-in chain for a venue. The method includes expanding, electronically by a processor, the check-in chain with a plurality of check-in entries that each correspond to a visit to the venue by a respective user. Each check-in entry on the check-in chain is generated in response to one or more preceding check-in entries on the check-in chain. The method includes detecting fraudulent check-in entries in response to a split in the check-in chain. The method includes removing the fraudulent check-in entries from the check-in chain. | 2015-06-04 |
20150154519 | ANALYZING INCOMPLETE TRANSACTIONS - Analyzing incomplete transactions may be used to improve an online retailer's ability to market and sell items, such as products and/or services. A transaction may begin by a user selecting an item to be added to a virtual shopping cart. Data related to the item and the pending transaction may be stored in a data structure. If a transaction is not completed, the data may be used to determine a context of for the incomplete transaction. Based on the context, a report may be generated. In some instances, a feedback feature, such as a pop-up window, may be provided to the user if the user removes the item from the shopping cart. | 2015-06-04 |
20150154520 | Automated Data Breach Notification - A computer-implemented system for data breach compliance comprises memory for storing computer executable program code; and a processor. The code comprises code for receiving electronic breach information (“EBI”), the EBI relating to a data breach, the EBI comprising data type information, geographic information, and data format information; code for analyzing the geographic information to choose an applicable set of regulatory rules; code for applying the rules to determine if a harm analysis is required; if the harm analysis is required, code for performing the harm analysis; code for analyzing the breach information and the volume of harm to determine if the volume of harm exceeds a harm threshold; and code for analyzing the breach information, the rules and the volume of harm to determine whether a consumer must be notified about the data breach. | 2015-06-04 |
20150154521 | METHOD AND APPARATUS FOR ALLOCATING CONFERENCE RESOURCE - Embodiments of the present invention disclose a method for allocating a conference resource, which is used to invoke a conference media resource in a unified manner according to a state of a current conference room, so as to improve resource utilization efficiency and reduce resource waste. The method in the embodiments of the present invention includes: receiving, by a conference server, information about a reserved conference media resource and information about a reserved conference room resource, and associating the information about the reserved conference media resource with the information about the reserved conference room resource; and if a conference state changes, instructing, by the conference server, a media resource management server to change the reserved conference media resource, and instructing a conference room management server to change a reserved conference room resource. | 2015-06-04 |
20150154522 | METHOD OF ESTIMATING RISKS CAUSED BY ACCIDENTAL DROPPED OBJECT LOADS TO SUBSEA PIPELINES OR OTHER SUBSEA ASSETS ASSOCIATED WITH OFFSHORE OIL & GAS AND MARINE OPERATIONS - A method of estimating risk of at least one accidentally dropped object load from at least one crane on a platform or vessel includes providing or generating a schematic representation of a sea level area; identifying a drop area for accidental drops of the at least one accidentally dropped object load from the crane based on image processing of the schematic representation of the sea level area; estimating probability density of risk of accidentally dropped object loads based on a multitude of drop points within the drop area; and representing the sea level area, the subsea area, and estimating probability of risk of accidentally dropped object loads using data representations in the form of at least one of matrix-type data, raster graphic image, or dot matrix data for location, estimated risk values and other statistics. | 2015-06-04 |
20150154523 | INTELLECTUAL-PRODUCTIVITY ANALYSIS APPARATUS AND PROGRAM - An intellectual-productivity analysis apparatus includes a presentation device, an input device, and an evaluation device. The presentation device presents a plurality of questions to a test subject. The input device allows the test subject input an answer to each question. The evaluation device includes a work memory part and an evaluating arithmetic part. The work memory part stores the answering time from a time when a question is presented on the presentation device to a time when the answer is inputted into the input device for each of the plurality of questions. The evaluating arithmetic part calculates an evaluation value on the intellectual productivity of the test subject during a measurement period of measuring the answering time of each of the plurality of questions by extracting a feature amount from the set of the answering time stored in the work memory part. | 2015-06-04 |
20150154524 | METHODS FOR PROCESSING INFORMATION ASSOCIATED WITH SALES FORCE MANAGEMENT, CUSTOMER RELATIONSHIP MANAGEMENT AND PROFESSIONAL SERVICES MANAGEMENT SYSTEMS - System and methods are disclosed associated with processing information and/or initiating workflow in a CRM, Sales Force Automation, time and expense reporting system or professional services provider management system, including aggregating, analyzing and/or otherwise processing data related to real world events. According to some embodiments, event data is classified and event data requiring user input is determined, notifications to provide user input for the event data may be transmitted, and/or various features of follow-on workflow or launching follow-on workflow may be initiated, facilitated or provided. Various implementations also relate to classification, splitting events, merging events, time extensions/exceptions for processing events, processing of corollary events and the provision of chronologically organized historical records of interactions between groups of users and individuals or companies. | 2015-06-04 |
20150154525 | METHOD FOR PREDICTING ASSET AVAILABILITY - The present invention is directed to a method for predicting asset availability in a supply chain, whereby assets are typically reusable assets such as packaging or bins which are expensive components yet hard to track. The present invention provides a mechanism for passively sensing when an asset enters or leaves a particular location in the supply chain and updates a database accordingly. This location and timing information is thereafter used in the present invention to model future movement of the assets for use in predicting whether a sufficient amount of the assets will be present at any particular location in the supply chain at any particular point in the future. An alert is generated if the modeling determines an insufficient amount is modeled to be present at the particular location. This allows a decision maker to make adjustments to ensure a sufficient amount of assets will be present at the particular location. | 2015-06-04 |
20150154526 | System, Method, and Device for managing and Improving Organizational and Operational Performance - The present invention generally relates to systems, methods, and devices for enabling strategic execution of a plan and driving and managing end-to-end processes and activities to achieve the plan. More specifically, the present invention relates to software for driving and managing end-to-end processes including planning, goal setting, engagement, analysis, team management, project approval, implementation, and performance measurement. In one preferred embodiment, the present invention contemplates a software tool configured to enable a user to plan, implement, communicate, execute, and monitor specific activities as they relate to an overall stated goal. The tool has at least four primary components: a lead stage, an engage stage, an act stage and a perform stage. Within each stage a subroutine guides each individual user through the process necessary to achieve that particular stages end-goals based on the desired stated goal. | 2015-06-04 |
20150154527 | WORKPLACE INFORMATION SYSTEMS AND METHODS FOR CONFIDENTIALLY COLLECTING, VALIDATING, ANALYZING AND DISPLAYING INFORMATION - The workplace information system and method described herein provide an improved method of confidentially collecting, storing, processing, validating, analyzing and reporting information. The workplace information system provides a secure communication platform, accessible to workers around the world through electronic devices such as mobile phones. The workplace information systems and methods can be configured for regional languages, and messages can be recorded in local voices. The workplace information system interface allows direct educational messaging to workers. The workplace information system also provides informational messaging to workers designed to advance their health, safety, and overall quality of life on local programs and services such as legal aid, healthcare, micro-insurance, educational scholarships and vocational training. The workplace information system collects accurate, real-time information on working conditions inside factories from workers, aggregated across factories, geographic regions and industry sections to generate actionable, metrics-based streams of information on the supply chains of corporate brands. | 2015-06-04 |
20150154528 | TASK MANAGER FOR HEALTHCARE PROVIDERS - System and method for generating and managing tasks relating to patient office visits with healthcare providers. A priority is assigned to each task based on a desired patient experience or provider efficiency. A set of prioritized tasks is generated, assigned to a user for completion, and dynamically displayed on an interactive user interface to enable the assigned user to access and manage the prioritized tasks and accept user responses for completing the tasks. The user responses are monitored and processed to detect the timing, content or lack of user responses. The related tasks of a workflow may be assigned to users across different provider groups, and their cumulative responses monitored and synchronized for timely completion. At regular or varying time intervals, which intervals can be adjusted based on a user's response history or other factors, the user receives a continuously updated and prioritized list of tasks to enable more efficient completion of the tasks. The system is configured to learn over time which priorities, presentation forms and assigned users best achieve a timely completion of such tasks. | 2015-06-04 |
20150154529 | METHODS AND SYSTEMS FOR CREATING A TASK - Methods and systems for creating a task are provided. A request from a worker is received to perform the task. A task is created in response to the request. The task comprises at least one new sub-task and at least one additional sub-task, wherein the at least one additional sub-task is selected from a set of unfinished sub-tasks associated with one or more previously attempted tasks. The task is communicated to the worker. The worker may receive a bonus remuneration for correctly attempting the at least one additional sub-task. | 2015-06-04 |
20150154530 | METHOD AND COMPUTER PROGRAM PRODUCT FOR TASK MANAGEMENT ON LATE CLINICAL INFORMATION - When standardized messages including additional clinical information are received by a system for task management on clinical information, the system uses the metadata of the standardized messages to automatically verify if a report already exists for the medical procedure where the additional clinical information belongs to. When a report already exists, a workflow engine is triggered to automatically create in the system a task for the author of the report to verify the existing report in view of the additional clinical information received. Thereby, the sending of manually entered notifications by e-mail or sms is avoided. | 2015-06-04 |
20150154531 | Node-Enabled Generation of a Shipping Label Using Elements of a Wireless Node Network - Methods and systems are described for generating a shipping label for an item to be shipped using a wireless node network. The network includes a master node associated with a shipping facility, a node associated with a shipping customer, and a server. The master node receives shipping information from the server, where the shipping information is related to the node associated with the shipping customer and item to be shipped. The master node then detects a signal from the shipping customer's node as it approaches the shipping facility. The master node proceeds to become associated with the shipping customer's node. The master node then causes generation of the shipping label for the item to be shipped when the master node determines the node associated with the shipping customer is within a predetermined range of a location within the shipping facility. | 2015-06-04 |
20150154532 | Methods and Apparatus for Deploying a Plurality of Pickup Entities for a Node-Enabled Logistics Receptacle - Methods, computer-readable medium, and apparatus are described for deploying a plurality of pickup entities to a node-enabled logistics receptacle in a wireless node network. A server in the network receives a message from a node-enabled logistics receptacle. The message identifies a plurality of packages currently maintained within the node-enabled logistics receptacle ready for pickup. In response, the server accesses shipping information from a server memory storage, where the shipping information is related to the identified plurality of packages currently maintained with the node-enabled logistics receptacle. The server then identifies which of the plurality of pickup entities need to be deployed to provide one or more pickup services at the node-enabled logistics receptacle based upon the shipping information. | 2015-06-04 |
20150154533 | SYSTEMS AND METHODS FOR MANAGING INFORMATION ASSOCIATED WITH BOXES USED IN THE DELIVERY OF PACKAGES - There is disclosed methods and systems for managing drop boxes. Events reflecting outputs from one or more sensors are detected. Information that is a function of the detected event is forwarded to a drop box management system. This information, along with additional information received by the drop box management system, is utilized to generate instructions including display instructions for each drop box. Displays of drop boxes are then updated based on the instructions. | 2015-06-04 |
20150154534 | VIRTUAL PRODUCT HIERARCHIES - A base hierarchy of products or the like can be user-modified into a virtual hierarchy that is represented as a collection of changes to the base hierarchy rather than a new hierarchy stored in memory. The collection of changes can be used to enable user interactions such as queries, displays, and writes using the virtual hierarchy as thought it were an actual hierarchy stored in memory, with aspects of the virtual hierarchy dynamically created using a collection of procedures based on the changes and corresponding inverses. The representation of the modified hierarchy can be dynamically displayed to a user or otherwise processed in the same manner as other hierarchies and hierarchical data. | 2015-06-04 |
20150154535 | ASSET INFORMATION SYSTEM - The present invention is directed to a method for predicting asset availability in a supply chain, whereby assets are typically reusable assets such as packaging or bins which are expensive components yet hard to track. When the method predicts a deficiently in the amount of assets or when an asset is lost or destroyed, a decision maker must procure at least one additional asset. The present invention provides a mechanism for storing an engineering specification and related sourcing information in the underlying system to allow a decision maker to efficiently procure additional assets when desired. | 2015-06-04 |
20150154536 | Magnetically Altered Operations of a Node in a Wireless Node Network - A magnetically actuated node apparatus and methods of its operation are described involving interaction with a master node that communicates with a server in a wireless node network. As part of magnetically altering an operation of a node in a wireless node network having a master node operative to communicate with a server, the node detects one or more magnetic field changes in a proximate environment of the node (such as a sensing an altered configuration of a magnetic switch integrated within the node). The node then alters a management function of the node (such as changing a power condition of the node that may override a prior power setting) in response to the detected one or more magnetic field changes. The node further transmits to the master node information about the altered management function (such as a movement alert and/or location information) to be forwarded to the server. | 2015-06-04 |
20150154537 | CATEGORIZING A USE SCENARIO OF A PRODUCT - A method for categorizing a use scenario of a product is disclosed. The method includes extracting, from a text describing the use scenario of the product, at least one feature tuple capable of characterizing the use scenario and performing a latent semantic association analysis on the at least one feature tuple to obtain a latent topic sequence for the use scenario. Further, the method includes determining a product scenario category to which the use scenario belongs according to the latent topic sequence for the use scenario. Additionally, a corresponding apparatus is also disclosed. | 2015-06-04 |
20150154538 | Determining Node Location Based on Context Data in a Wireless Node Network - Methods and systems for determining an improved location of a node in a wireless node network based on context data are described. A network device, such as a master node or server, accesses a first type of the context data related to a proximate environment of the node being located. The first type of the context data includes signal degradation information for a second node (similar to the first node) in a similar environment to the proximate environment of the first node. Based upon this first type of context data, the network device adjusts a communication distance related to the first node, such as a transmission distance or receiver sensitivity range distance. The network device then determines the improved location of the first node based upon the adjusted communication distance that accounts for signal degradation known to affect the similar second node in the similar environment. | 2015-06-04 |
20150154539 | Methods and Systems for Managing Shipment of an Item Using a Wireless Node Network - Methods and systems that manage shipment of an item using a wireless node network are disclosed having at least one ID node, a plurality of master nodes, and a server. The server receives shipping information that registers the ID node and the item. The ID node may be associated to a first master node prior to pick-up, with association information sent to the server. The ID node may be disassociated from the first master node when it associates with another master node along a predicted path traveled by the item and ID node. The disassociation/association information is reported to the server, which tracks the ID node associations and location. The ID node may be disassociated from the second master node when it associates with a final master node along the predicted path traveled by the item and ID node and after a drop-off event of the item. | 2015-06-04 |
20150154540 | Node-Enabled Delivery Notification Using Elements of a Wireless Node Network - Methods and apparatus are described for improved delivery notification using a wireless node network having an ID node, a master node, and a server. The master node detects a signal from the ID node as the ID node approaches the master node located substantially near a delivery point, where the ID node is related to an item being shipped (such as being in or part of the package that holds the item). The master node determines shipping information related to the ID node and an intended recipient of the item being shipped (e.g., via server inquiries), and transmits a notification from the master node to the identified recipient, the notification informing the intended recipient about the item being substantially near the delivery point. In some aspects, the master node may transmit an instruction to the server, which causes the server to transmit the notification to the intended recipient. | 2015-06-04 |
20150154541 | Node-Enabled Shipping Without a Shipping Label Using Elements of a Wireless Node Network - Methods and systems are described for preparing a node-enabled shipment of an item to be shipped using a wireless node network having at least a node and a server. A user access device, such as a laptop computer, smartphone, or tablet, may capture an identification of the node to be related to the item. The user access device enters shipping information related to the item and linked with an identification of the node. The shipping information is stored on the node, and then the node is combined with the item to be shipped. A system may include a node and a server, where the node is specially-adapted via programming to emit the identification of the node to the user access device, receive shipping information from the device, store the shipping information on the node, and then upload the shipping information to the server. | 2015-06-04 |
20150154542 | Node-Enabled Management of Delivery of a Shipped Item Using Elements of a Wireless Node Network - Methods and systems for managing a delivery of an item being shipped are described using a wireless node network having at least an ID node related to the item being shipped, a mobile user access device operative to function as a master node, and a server. The mobile user access device adapted to function as a master node in the network receives shipping information from the server. The shipping information is related to the item being shipped and an identification of the ID node. The mobile user access device then detects a signal broadcast from the ID node as the ID node comes within a communication range of the device. The ID node and mobile user access device are then associated to acknowledge the delivery of the item. Thereafter, the mobile user access device operating as the master node notifies the server about the acknowledged delivery. | 2015-06-04 |
20150154543 | Methods and Systems for Node-Enabled Shipment Merging for a Set of Items Being Shipped - Methods and systems are described for merging of a set of items being shipped using a wireless node network. In an example method, a master node receives ID node identification information from a server in the network. The ID node identification information defines the group of ID nodes. Each of the ID nodes is related to a different item from the set of items being shipped. Next, each of the ID nodes in the group is associated with the master node when the master node detects a signal from each ID node as they respectively approach the master node. When the master node detects a last one of the ID nodes in the group approaching the master node, the master node transmits a notification to the server. Thereafter, the master node receives a shipment merge indication from the server. | 2015-06-04 |
20150154544 | Node-Enabled Packaging Materials Used to Ship an Item - Methods and node-enabled apparatus are described that involve use of node-enabled packaging material as part of a container for an item to be shipped. The method begins by forming at least a part of the container with the packaging material. Next, the method activates a node integrated as part of the packaging material. The node is operative to communicate with one or more network devices (such as an ID node, master node and/or server) in a wireless node network. The method then registers shipping information with a server in the wireless node network via a user access device operated by a shipping customer. The shipping information is related to the container and the node integrated as part of the packaging material of the container. The item to be shipped may be sealed within the container. | 2015-06-04 |
20150154545 | Determining Node Location Using a Master Node Association in a Wireless Node Network - Improved methods and apparatus are described for determining node locations using one or more associations of nodes in a wireless node network. In general, a first node (such as a master node) may broadcast one or more first messages at a first anticipated range distance. The first node identifies which nodes associated with the first node received at least one of the first messages, such as by reports from associated nodes that receives such message(s). The first node then broadcasts one or more second messages at a smaller anticipated range distance (e.g., with a lower output power level), and determines a location of those associated nodes that did not receive any second messages but received at least one of the first messages. Such a location is between the first anticipated range distance from the first node and the second anticipated range distance from the first node. | 2015-06-04 |
20150154546 | Determining Node Location Using a Lower Level Node Association in a Wireless Node Network - Improved methods and apparatus are described for determining node locations using one or more associations of nodes in a wireless node network. In general, a first node (such as a master node) may broadcast one or more first messages at a first anticipated range distance. The first node identifies which nodes associated with the first node received at least one of the first messages, such as by reports from associated nodes that receives such message(s). The first node then broadcasts one or more second messages at a smaller anticipated range distance (e.g., with a lower output power level), and determines a location of those associated nodes that did not receive any second messages but received at least one of the first messages. Such a location is between the first anticipated range distance from the first node and the second anticipated range distance from the first node. | 2015-06-04 |
20150154547 | Node-Enabled Proactive Notification of a Shipping Customer Regarding an Alternative Shipping Solution - Methods and systems are described for proactively notifying a shipping customer using a wireless node network about an alternative shipping solution when shipping a package. A master node in the network related to a shipping facility may detect a signal broadcast by a user access device related to the shipping customer as the device approaches the shipping facility master node with the package to be shipped. The shipping customer's user access device (e.g., smartphone, tablet) is operating as another node in the network. The shipping facility master node then associates with the user access device, and may receive shipping information on the package to be shipped from a server. The shipping facility master node may then provide a proactive notification about an alternative shipping solution to the user access device based upon a shipping status for the shipping facility. | 2015-06-04 |
20150154548 | Node-Enabled Order Pickup Using Elements of a Wireless Node Network - Methods and systems are described for picking up an order using elements of a wireless node network. In one example, a master node receives order information from a server, where the order information identifies the order and a mobile user access device registered to pick up the order. The master node detects a signal broadcast from the mobile user access device identified by the order information when the mobile user access device is operating as an advertising ID node in the network and as the mobile user access device approaches the master node. The master node then associates with the identified mobile user access device. When the master node determines the identified mobile user access device is within a predetermined range of the pickup point, the master node notifies an order management system responsible for the order. | 2015-06-04 |
20150154549 | Node-Enabled Logistics Receptacle in a Wireless Node Network - Methods and an assembly apparatus are described for operating a node-enabled logistics receptacle in a wireless node network having at least a first node related to an item being shipped. The method generally begins with the node-enabled logistics receptacle detecting a signal broadcast by the first node, such as when a package having the first node approaches the receptacle. The method then associates the node-enabled logistics receptacle with the first node. The method continues with the node-enabled logistics receptacle determining a location of the first node, and then altering a current inventory of nodes related to the node-enabled logistics receptacle based upon the location of the first node, such as when the first node is within a vicinity of the receptacle that is an area sufficiently proximate to the node-enabled logistics receptacle to indicate an item and node within the vicinity intends to be shipped. | 2015-06-04 |
20150154550 | Node-Enabled Sharing of Shipment Condition Information in a Wireless Node Network - Methods and systems are described for sharing shipment condition information in a wireless node network having a plurality of network devices and a server. In one method, a first node detects an advertising signal broadcast from a second node, where the first node is a first of the network devices and related to a first package, and the second node is a second of the network devices and related to a second package. The method continues by associating the first node and the second node. The first node then accesses the shipment condition information from a memory in the first node, and transmits or otherwise shares the shipment condition information with the second node if the first node is authorized to share the shipment condition information with the second node. | 2015-06-04 |
20150154551 | Methods and Apparatus for Assessing a Current Location of a Node-Enabled Logistics Receptacle - Methods, computer-readable medium, and apparatus assemblies are described for assessing a current location for a node-enabled logistics receptacle. In the method, the node-enabled logistics receptacle is operative to detect a level of wireless communication signal activity on a communication interface on the node-enabled logistics receptacle as well as receive and temporarily maintain custody of a package being shipped. The receptacle then records the detected level of wireless communication signal activity over a predetermined period of time in a memory disposed in the node-enabled logistics receptacle. Next, the receptacle compares the recorded level of wireless communication signal activity over the predetermined period of time to a user criteria level for the node-enabled logistics receptacle. Using the comparison of the recorded level and the user criteria level, the node-enabled logistics receptacle is thus able to assess that suitability of the current location of the receptacle. | 2015-06-04 |
20150154552 | Methods and Apparatus for Proactively Reporting a Content Status of a Node-Enabled Logistics Receptacle - Methods, computer-readable medium, and apparatus are described for proactively reporting a content status of a node-enabled logistics receptacle in a wireless node network. Generally, the node-enabled logistics receptacle may update the content status stored in memory onboard the node-enabled logistics receptacle based upon whether the node-enabled logistics receptacle has received a package and is temporarily maintaining custody of the package. The receptacle may then broadcast status information related to the updated content status for the node-enabled logistics receptacle. In more detail, a node assembled within the node-enabled logistics receptacle may detect a signal broadcast from a master node in the wireless node network, access the content status stored in memory onboard the receptacle, and broadcast status information to the master node related to the content status for the node-enabled receptacle. | 2015-06-04 |
20150154553 | Detecting a Plurality of Package Types within a Node-Enabled Logistics Receptacle - Methods, computer-readable medium, and apparatus are described for detecting a plurality of package types in the custody of a node-enabled logistics receptacle in a wireless node network. The receptacle detects a first type of package by receiving a signal broadcast from a node within a first node-enabled package prior to sensing a deposit of the first package. The receptacle also detects a second type of package (not a node-enabled package) by sensing a deposit of a second package without receiving a signal broadcast from a node within the second package. The node-enabled logistics receptacle then logs the detections of the first type of package and the second type of package. Then, the node-enabled logistics receptacle notifies another network device within the wireless node network about the logged detection of the first type of package and the second type of package. | 2015-06-04 |
20150154554 | Determining Node Location Using Chaining Triangulation in a Wireless Node Network - Improved methods, systems, and apparatus are described for determining a location using chaining triangulation for one of a plurality of nodes in a wireless node network having a server. A first of the nodes determines a location of the first node, and transmits the location of the first node to the server. A second of the nodes determines a location of the second node, and transmits the location of the second node to the server. The server receives the locations of the first and second notes, and infers a location of a third of the nodes. Thereafter, the server triangulates the location of the one node based upon a determined distance of the one node to each of the locations of the first and second nodes and a determined distance of the one node to the inferred location of the third node. | 2015-06-04 |
20150154555 | MULTI-ENTITY MANAGEMENT OF A NODE IN A WIRELESS NODE NETWORK - Methods and apparatus are disclosed for multi-entity management of an ID node in a wireless node network. The ID node associates with a first entity user access device, which operates as a master node and communicates directly with a server over a first communication path. The first device separately communicates with the ID node over a second communication path, but the ID node is unable to directly communicate with the server. The ID node provides the first device with access to data collected by the ID node if an initial privilege authorizes it. After associating with a shipping entity master node, the ID node provides the shipping entity master node with the data collected based on a transferred privilege from the server. And then after associating with a second entity user access device, the ID node provides access to this second device if authorized by a destination privilege from the server. | 2015-06-04 |
20150154556 | METHODS AND APPARATUS FOR MONITORING A CONVEYANCE COUPLING CONNECTION USING ELEMENTS OF A WIRELESS NODE NETWORK - Methods, apparatus, and systems are described for monitoring at least one signal passing through a coupling connection from a first conveyance to a second conveyance, where the coupling connection has a network device that communicates on a wireless node network. Generally, the network device (e.g., an ID node) integrated in the coupling connection monitors the signal line passing through the coupling connection from the first conveyance to the second conveyance. The network device then detects data on the monitored signal line and records the detected data. Thereafter, the network device in the coupling connection transmits the detected data (e.g., a notification that the conveyances are disconnected, a change in power flowing between the conveyances, etc.) to another entity in the wireless network, such as a server or master node. | 2015-06-04 |
20150154557 | METHODS AND SYSTEMS FOR AUTOMATING A LOGISTICS TRANSACTION USING AN AUTONOMOUS VEHICLE AND ELEMENTS OF A WIRELESS NODE NETWORK - Methods, systems, and node-enabled autonomous transport vehicles are described for automating a logistics transaction using a plurality of nodes and a server in a wireless node network. A first node is associated with a shipping courier and downloads shipment information from the server. The shipment information identifies a package for the logistics transaction, a transaction location, and an identification of a second node associated with the package. The first node provides the shipment information to a third node, which is part of an autonomous vehicle. The third node causes the autonomous vehicle to move from a first location to the transaction location, and conducts the logistics transaction related to the package if the third node on the autonomous vehicle completes a node association with the second node associated with the package. | 2015-06-04 |
20150154558 | COMPUTER SYSTEMS AND COMPUTER METHODS FOR AUTOMATED ON-DEMAND CUSTOMIZABLE ASSEMBLING AND HIGH THROUGHPUT PRINTING OF DOCUMENTS - In some embodiments, the instant invention provides for a computer-implemented method that includes at least the following steps of: periodically receiving investment transactional data identifying investment transactions of a plurality of investors; automatically determining, based on the investment transactional data, a document to be mailed to each investor of the plurality of investors; automatically generating a delivery data for each mailing to be mailed to each investor of the plurality of investors, where the delivery data includes: bucslip data or trade confirmation data, assembling data, and unique production control bar code data generated based on the assembling data and an investment transaction identifier from the investment transactional data; and printing a unique production control bar code based on the unique production control bar code data, where the unique production control bar code is configured to be used for: assembling each mailing envelope, and tracking such mailing envelope. | 2015-06-04 |
20150154559 | SYSTEMS AND METHODS FOR DELIVERING AN ITEM TO A DYNAMIC LOCATION - Various embodiments of the present invention involve systems, methods, and computer program products utilized in facilitating alternative delivery options for customers. In certain embodiments, a consignee may meet a driver and receive an item at a location different from the delivery address associated with the item. The receipt of the item may be prior to the driver attempting to deliver the item to the designated shipping location or after an unsuccessful delivery attempt. The carrier, the driver, the carrier system, the mobile station, and/or the sensors located on the item may communicate with the consignee to arrange a mutually acceptable time and location to accomplish the delivery. In certain embodiments, the consignee may be responsible for arriving at a dynamic delivery location to retrieve the item while the driver is at the location performing other tasks. | 2015-06-04 |
20150154560 | OPTIMAL PRIORITIZATION OF BUSINESS LISTINGS FOR MODERATION - A moderation priority server is operative to prioritize one or more business listings. The moderation priority server may include a business listing database comprising a plurality of business listings and one or more pipelines for processing the various business listings. The moderation priority server may include a moderation priority queue, where business listings to be moderated are prioritized. The business listings may be prioritized based on a publishing value, which may indicate a value of publishing the business listing, and a suppressing value, which may indicate a value of suppressing the business listing. When the publishing value exceeds the suppressing value, the moderation priority server may indicate that the business listing is to be published, and, when the suppressing value exceeds the publishing value, the moderation priority server may indicate that the business listing is to be suppressed. | 2015-06-04 |
20150154561 | DYNAMIC APPLICATION PERSONALIZATION ENGINE FOR ENTERPRISE SOFTWARE - The techniques described herein provide personalized user interfaces and data filters for users of a CRM system using dynamic attributes. In one embodiment, the user interfaces make it easier for users to find the child objects of a parent object without having to continually go back to the main page of the parent. For example, a salesperson may need to view opportunities, contacts or cases related to a single account, and move from one opportunity to another as efficiently as possible. In another embodiment, the user interfaces aggregate data for a summary view of distributed data, while also allowing efficient drill down to list views. For example, a manager can quickly gain access to all accounts, opportunities, contacts or cases that are owned by a sales team member or representative, their entire team as a whole, or those owned by a subset of their team. In yet another embodiment, data is aggregated and sales intelligence is generated based on dynamic attributes. In still another embodiment, data is aggregated in accordance with a corporate hierarchy. | 2015-06-04 |
20150154562 | Methods for Online Collaboration - Systems and methods for creating and editing collaborative music compositions via a computer network, including remote uploading tracks by musicians, and for creating and joining a band, wherein the system and methods provide for at least one musician to join a virtual group of at least one other musician for the purpose of virtual collaborative creating and/or editing music tracks remotely, via an online network and interactive website therefor. | 2015-06-04 |
20150154563 | ONLINE WIZARD FOR FACILITATING METHODOLOGY IMPLEMENTATION - Embodiments of a method for creating a methodology implementation that supplements a business application are described. In one embodiment, a comprehensive customer engagement methodology is maintained on a server and defines processes and disciplines related to the business application. A series of requests is received from a collaborative computing environment. The series of requests collectively represent a request for a collection of documents and related metadata included in the comprehensive customer engagement methodology. The series of requests are then responded to by providing a copy of the collection of documents and related metadata. | 2015-06-04 |
20150154564 | WEIGHTED EVALUATION COMPARISON - A method for facilitating the evaluation of candidates in an evaluation process is provided. The method includes operations of receiving a set of evaluation data from a candidate evaluation system, the set of evaluation data including at least evaluation ratings data and evaluation recommendation data for a set of candidate. The method further includes providing a user interface to a decision maker to display a performance of each of a set of candidates in a two-dimensional graphic representation. The method further includes receiving a first weighting for a first subset of the evaluation data and updating the graphic representation to show a weighted performance of each of the candidates in the evaluation. The updating is based on the first weighting received from the decision maker. | 2015-06-04 |
20150154565 | BENEFIT MANAGEMENT - Methods, devices and systems are provided for benefit management. One system includes a server including an application interface and access to a data store having one or more client files. A client file can include a definable set of business rules for managing and administering benefits and can include fund use rules for accessing and applying funds to claims from one or more accounts. The system includes a program operable on the server to apply the definable set of business rules in connection with processing a claim. | 2015-06-04 |
20150154566 | PRODUCTIVITY BASED MEETING SCHEDULER - Techniques for scheduling a meeting using a productivity based meeting scheduler are described. In one example embodiment, the productivity based scheduler receives selection of two or more participants for a meeting requested by a meeting organizer. The selection received on a calendar application is then executed on one or more client devices. Participant information associated with each selected participant is then determined. A time value of each selected participant is then computed based on the determined participant information. The computed time value of each selected participant is then displayed on at least one display screen of a client device by the calendar application. The productivity based scheduler then receives a request to schedule the meeting based on displayed computed time value of each selected participant. The meeting is then scheduled based on the received request. | 2015-06-04 |
20150154567 | FACILITY MANAGEMENT SYSTEM USING PERSPECTIVE DEFINITION METADATA AND METHOD THEREFOR - A facility management system and a method thereof using perspective definition metadata, and more specifically, to a facility management system and a method thereof using perspective definition metadata, in which a perspective definition metadata structure for interconnecting Building Information Modeling (BIM) and external Facility Management (FM) data considering variability and expandability from the perspective of a user is used to improve expandability of the system by extracting information required for the role of the user from diverse heterogeneous data sources so that management and reusability functions of the system can be maximized even after the system is developed. | 2015-06-04 |
20150154568 | CONSUMER RECYCLING RATE DETERMINATION - Methods, systems, and apparatuses, including computer programs encoded on computer-readable media, for receiving a first plurality of product identifiers associated with products purchased by a consumer to form a purchase record. Each of the first plurality of product identifiers are associated with a consumer identifier. A second plurality of product identifiers associated with products recycled by the consumer is received. The consumer identifier associated with the consumer is received. A record of recycled purchased products by the consumer is authenticated by querying the purchase record of the consumer for each of the second plurality of product identifiers. A record of recycling is authenticated when a product identifier in the second plurality of product identifiers matches a product identifier in the purchase record of the consumer. | 2015-06-04 |
20150154569 | CENTRALIZED FINANCIAL ACCOUNT MIGRATION SYSTEM - Systems and methods for migration of financial account settings are disclosed. One system includes a migration server. The migration server includes a third-party interface directory, including notification data associated with notifying one or more third parties of an account migration. The migration server further includes a transaction analysis module configured to parse transaction histories associated with an existing financial account to identify a third party that has initiated at least one transaction with the existing financial account. The migration server also includes a notification module configured to generate a notification for the identified third party based on notification data associated with the identified third party stored in the third-party interface directory and information associated with a target financial account. | 2015-06-04 |
20150154570 | Multi-Channel Transaction System for Transferring Assets Between Accounts at Different Financial Institutions - Embodiments of a system for providing an integrated financial system to facilitate the transfer of funds among accounts held at different financial institutions and over different networks are described. The system executes a transaction involving a withdrawal of assets from a first account at a first financial institution and a deposit of at least a portion of the withdrawn assets to a second account at a second financial institution. The first account and the second account are maintained by different corporate entities, and may have the same or different account holders. The financial institutions are coupled to one another through different types of networks. The transaction is broken down into separate debit and credit legs. An integrated transfer process selects the optimum network to perform each leg of the transaction based upon constraints associated with the transaction and user preferences, such as cost and speed of the transaction, and restrictions or rules imposed by the networks and/or the financial institutions. | 2015-06-04 |
20150154571 | SYSTEMS AND METHODS FOR DYNAMIC EVENT ATTENDANCE MANAGEMENT - A ticket seller system can offer an enhanced event experience for users of the system by tracking the locations of ticketholders before and during an event to offer ticket resale and seat upgrade opportunities to the users. The locations of users can be harnessed to offer enhanced value to event attendees and to allow event owners to maximize the use of their venue during an event by offering new upgrades and resale options to patrons. Users who might miss an event and otherwise lose all of their ticket value can be detected, based on their location, and offered an opportunity to recoup some of the cost by reselling the tickets. Event attendees who desire to upgrade their seats at an event can be offered the opportunity to purchase upgrade tickets for seats that have been vacated by other attendees that have left the event while the event is ongoing. | 2015-06-04 |
20150154572 | APPARATUS, SYSTEM, AND METHOD FOR EXTRACTING REAL WORLD VALUE FROM A VIRTUAL ACCOUNT - An apparatus, system, and method are disclosed for extracting real world value from a virtual account by receiving point-of-sale information from a consumer, converting a real currency purchase amount to an equivalent virtual value, and processing the transaction. The point-of-sale information comprises a real currency purchase amount and account information, the account information determined from a bank card. Converting the real currency purchase amount utilizes a current real-to-virtual exchange rate associated with a virtual medium. The transaction is processed by debiting a current virtual value balance by the equivalent virtual value, the current virtual value balance associated with an account naming at least the consumer, the account determinable from the account information. Beneficially, the invention provides easy, real-world access to virtual value in a virtual medium. | 2015-06-04 |
20150154573 | DEVICE, CHARGING METHOD, AND SYSTEM - A device includes a display control unit configured to display a Web page on an operations panel, the Web page including a standard script and an extended script for controlling the device, an execution unit configured to cause the device to perform a process according to an instruction indicated by the extended script, and a storing unit configured to store information indicating whether respective instructions indicated by extended scripts require charges. The execution unit is configured to determine whether the instruction indicated by the extended script included in the Web page requires a charge by referring to the information stored in the storing unit, and to update charging information for the process performed according to the instruction indicated by the extended script when the instruction requires the charge. | 2015-06-04 |
20150154574 | Searching For Mobile Content - Methods and apparatus, including computer systems and program products, for searching for mobile content. A method includes receiving, via a user interface, at a computer system independent of the mobile device, information identifying the mobile device to receive computer data; receiving, at the computer system, information identifying the computer data to be downloaded to the mobile device; using the computer system to search computer data offerings from mobile device content providers for the computer data; and wirelessly transmitting to the mobile device data corresponding to a search result. Another method includes an application, on a mobile device, querying a computer system independent of the mobile device for a result of a search for the computer data, and causing the downloading of the computer data. | 2015-06-04 |
20150154575 | Methods for Storage and Delivery of 3D Printing Digital File - Digital files can be gathered, stored and delivered digital files at and through a digital file storage device or computer network for subsequent use in 3D printing. The methods described below are based on the existence of contracts between the owners and/or creators of the 3D printing digital files and the owner/agent of the storage device or computer network designed to gather, store and deliver copies of digital files to individual consumers, in exchange for an agreed upon purchase price | 2015-06-04 |
20150154576 | PROVIDING CONTENT TO A TARGET NETWORK THAT HAS INSUFFICIENT CONNECTIVITY TO A SOURCE NETWORK - Techniques are provided for remotely controlling the distribution of digital assets to users in less-connected venues. When digital assets are cached within the less-connected venues, users within those less-connected venues are better able to consume the assets, and are therefore more likely to purchase rights to consume the assets. Users within a less-connected venue may purchase and consume assets while the target network is completely disconnected from the source network from which the digital asset distribution is controlled. Sessions that are initiated within less-connected venues may be transferred outside those venues, to allow users that have purchased assets to continue to consume those assets after they leave the less connected venues. | 2015-06-04 |
20150154577 | Communication Control and Compensation - Novel tools and techniques to allow users more control over communications directed to that user. In one aspect, for example, these tools can provide a user with compensation for agreeing to receive communications, and in particular (but not limited to) unsolicited communications, and the tools can accommodate a wide variety of different modes of communication, including without limitation voice communications, electronic medications, and/or the like. In some cases, a system can provide a tool to consolidate management of such communications, such as an application that executes on the user device and/or can communicate with a communication server. The communication server, and some aspects, can receive incoming communications for the user and control access to the user according to the user's preferences. | 2015-06-04 |
20150154578 | CENTRALIZED TOLL TRACKING, PAYMENT AND MONITORING SYSTEM USING GEO LOCATION ENABLED DEVICES - The present invention describes the system of centralized toll identification, payment and monitoring, which uses geo-location enabled devices such as mobile phone, pager or wireless connected laptops to do so. The invention receives the series of readings, distributed over the length of the toll road, by Location Based Services (LBS) provided by geo-enabled devices along with geo-location database lookup and statistical algorithms to accurately identify whether the vehicle is travelling on toll road, distance travelled by the vehicle on toll road and accordingly calculate and deduct charge by online mode. Using such system, person can do the payment of toll when passing through toll road area directly from his geo-location enabled devices without any intervention of any attendant and simultaneously police can use the toll data from the centralized toll system for enforcement. | 2015-06-04 |
20150154579 | Compact Payment Terminal - A compact payment terminal for operating upon a purchase made by a customer at a retail device is provided. The customer carries a mobile communication device that includes a payment module and a communication module. The compact payment terminal includes a first interface for interfacing with the retail device, a second interface for interfacing with the mobile communication device of the customer and a processing unit connected to the first and second interface. The compact payment terminal is configured to receive, via the first interface, a payment request from the retail device, cooperate, via the second interface, with the payment module of the mobile communication device for initiating a payment transaction respective to the payment request, and selectably conduct, via the second interface and the communication module of the mobile communication device, a communication session between the processing unit and at least one server. | 2015-06-04 |
20150154580 | SYSTEM FOR AND PROCESS OF FACILITATING FINANCIAL TRANSACTIONS AT POINT-OF-SALE EMPLOYING ELECTRONIC DROP SAFES AND POINT-OF-SALE TERMINALS - An electronic system and process for facilitating a financial transaction comprising a drop safe and a point-of-sale (POS) terminal, disposed at a retailer location, in communication with one another in which the POS terminal receives, from a user, a request to commence a drop request and, in response, instructs the drop safe to commence a drop request, whereupon after acceptance of the drop request the drop safe accepts, via a currency acceptor, currency that is identified and authenticated, and upon completion of the drop, the drop safe ascertains the total amount of accepted currency and transmits the ascertained amount to the POS terminal which then completes the transaction. The drop request may occur during a transaction with a customer for the purchase of goods or services or at other times. Other features are disclosed. | 2015-06-04 |
20150154581 | SYSTEMS AND METHODS FOR DYNAMIC RECEIPT GENERATION WITH ENVIRONMENTAL INFORMATION - A new approach is proposed that contemplates systems and methods to enable an individual to complete a financial transaction by swiping a magnetic stripe card through a card reader connected to a mobile device. The size of the card reader is miniaturized to be portable for connection with the mobile device. The card reader is configured to reliably read data encoded in a magnetic strip of the card with minimum error in a single swipe and provide a signal that corresponds to the data read to the mobile device, which then decodes the incoming signal from the card reader and acts as a point-of-sale device to complete the financial transaction. Such an approach enables a person to become either a micro-merchant (payee) or a buyer/customer (payer) without having to purchase expensive card reader devices or software. | 2015-06-04 |
20150154582 | PRINT CONTROL SYSTEM AND PRINT CONTROL METHOD - A print control system | 2015-06-04 |
20150154583 | SYSTEMS AND METHODS FOR ALLOWING ACCESS TO CONTENT THROUGH MICROPAYMENTS - Systems and methods for allowing access to content through micropayments are disclosed. The systems and methods include a medium, which may be installed on a user's computer or otherwise accessed by a user. When the user wishes to access content provided by a content provider that has registered with the medium, the user may be prompted to approved a micropayment before accessing the content. The micropayment approval may cause a small amount of money, such as, e.g., $0.01, to be transferred from the user's account to the provider's account within the medium. Since the transaction is handled entirely within the medium, it avoids transaction fees that normally make micropayments too costly. Users may only add funds from, and providers may only withdraw funds to, external accounts in amounts that make such transactions cost-effective. | 2015-06-04 |
20150154584 | SYSTEM TO ENABLE ELECTRONIC PAYMENTS WITH MOBILE TELEPHONES WITHOUT RISK OF ANY FRAUD - The invention described herein is a process realized though a set of apparatuses that ensure electronic payment transactions initiated over point-of-sale counters, web retailing and ATMs remain free of fraud. The invention is devised in a manner that electronic transactions are conducted through the use of a smart mobile station and does not involve the use of plastic cards with magnetic strips/embedded chips that are in vogue today. Each transaction initiated by a merchant or user is identified by the user's mobile number and does not carry any sensitive information about the merchant or the user over public networks. The electronic transactions initiated and processed with the said invention are completed within the bank or financial institution's network, thereby precluding the role Credit Card Associations reducing transaction cost as well as providing aforementioned security and privacy. The fool-proof electronic security certificates issued by the bank or financial institution are used to uniquely identify both users and merchants, and are the sole means of authentication and authorization. The said invention protects users from eventualities such as loss or cloning of the mobile stations through a hardened security mechanism; and protects the bank or financial institution from receiving unauthorized transactions. | 2015-06-04 |
20150154585 | Node Association Payment Transactions Using Elements of a Wireless Node Network - Improved methods and systems are described that improve and enhance payment transaction technologies using node association in a wireless node network. In general, a master node related to a payment receiver may detect a signal from an ID node related to a payment provider as the ID node approaches the master node. The master node may then determine if the ID node desires to associate with the master node for a payment transaction based upon a first part of information within the detected signal, such as an identified item being purchased in the transaction. If desired, the master node and the ID node associate for the payment transaction, and the master node then submits payment transaction data to a server. Such payment transaction data is based upon a second part of information within the detected signal, such as an identified payment source for the transaction. | 2015-06-04 |
20150154586 | AUTHENTICATION AND VERIFICATION SERVICES FOR THIRD PARTY VENDORS USING MOBILE DEVICES - A method to provide authentication services to third party vendors by a service provider hosting an authentication, authorization and accounting (AAA) server or a similar device that can authenticate users for some other service. This method enables easy and substantially error-free end-user authentication, which forms the basis for enabling electronic transactions (e.g., web-based) that are less vulnerable to fraud. | 2015-06-04 |
20150154587 | SYSTEM AND METHOD FOR APPLYING CREDITS FROM THIRD PARTIES FOR REDEMPTION AT MEMBER RETAILERS - According to one embodiment of the invention, a credit redemption system allows a registered user to transmits a request to deposit an amount on a gift card directed to a first retail member and, after verifying that the user has established an account with the credit redemption system, the credit redemption system will deposit the amount on the gift card into the sub-account corresponding to the first retail member. The user may further use the account to make purchases from the first retail member and the amount of the purchase will be deducted from the sub-account corresponding to the first retail member. Furthermore, the user may have a plurality of sub-accounts within the user's account with each sub-account corresponding to a separate retail member. | 2015-06-04 |
20150154588 | Reversed User Account Generation Apparatuses, Methods and Systems - The REVERSED USER ACCOUNT GENERATION APPARATUSES, METHODS AND SYSTEMS (“RUAG”) facilitates the generation of user accounts with merchants. The user may be logged into an electronic wallet or issuer account, and may initiate an account generation process with a one-click mechanism. The RUAG may provide information to the merchant in order to facilitate the generation of the account after receiving data from the electronic wallet or issuer. The RUAG may also facilitate favoriting merchants through a similar interface. | 2015-06-04 |
20150154589 | ELECTRONIC SIGNATURE TOKEN AND AUTHORIZATION CHECKING METHOD AND SYSTEM FOR THE SAME - An authorization checking method for an electronic signature token includes: sending by a first electronic signature token an authorization request to a second electronic signature token; generating a corresponding authorization information according to the authorization request, and feeding back the authorization information to the first electronic signature token by the second electronic signature token; determining whether to enter a security state by the first electronic signature token according to the authorization information; and if it is determined that the first electronic signature token has entered the security state, activating a signature function by the first electronic signature token. An electronic signature token and an authorization checking system for the electronic signature token are also provided. | 2015-06-04 |
20150154590 | METHOD AND SYSTEM FOR LEVERAGING TRANSACTION DATA TO FACILITATE MERCHANT OPERATIONS - A method and system for facilitating merchant operations is provided. The method includes receiving payment transaction data associated with a plurality of payment transactions. The payment transaction data includes timestamp data indicative of a time of each payment transaction. The method also includes determining a transaction count for each of a plurality of time periods of interest based on the timestamp data. Each transaction count indicates the number of transactions performed with a merchant during the respective time period of interest. The method also includes generating a transaction matrix for the merchant. The transaction matrix includes a plurality of cells, and each cell is associated with a respective time period of interest. The method also includes populating each cell of the transaction matrix with the transaction count associated with the time period of interest of the cell, and transmitting at least a portion of the transaction matrix to the merchant. | 2015-06-04 |
20150154591 | PRE-TRANSACTION DATA EXCHANGE - A computer implemented method of obtaining account data and merchant data, the method comprising the steps of: receiving a first request message from a user device at a third party, the first request message containing proposed transaction amount data, location data and payment card data; sending a second request message to a card issuer from the third party, the second request message containing a balance inquiry and payment card data; receiving a first response message from the card issuer at the third party, the first response message containing balance data related to the balance inquiry and payment card data; interrogating a database to obtain merchant data based on the location data; and sending a second response message to the user device from the third party, the second response message containing response data, related to the balance data, and the merchant data. | 2015-06-04 |