25th week of 2012 patent applcation highlights part 70 |
Patent application number | Title | Published |
20120158561 | SYSTEM AND METHOD FOR REAL ESTATE INVESTMENT MANAGEMENT AND ANALYSIS - A computer system and method evaluates reports financial data pertaining to real estate investments via an investor access portal. The investor access portal may be accessed over the Internet. Real estate investors, having a financial investment in each of a plurality of properties, may review accounts payable and accounts receivable data from each of the plurality of properties, managed by a plurality of property managers. Accounts receivable and accounts payable funds may be managed via the investor access portal, so that funds are centrally received and transmitted, and that data about said transmissions and receptions may be maintained and accessed by real estate investors via the investor access portal. The real estate investors may compare the data against other properties, including those managed by the same property manager, those managed by other property managers, or both, so as to reduce operating and utility costs for the properties. | 2012-06-21 |
20120158562 | Method and system for restructuring debt - A method and system for restructuring debt are disclosed. The method restructures debt by transferring ownership of defined debt packages from debt holders to third-party debt buyers who function as financial bridges between the debtors and the debt holders. The method accelerates the debt resolution process by executing the debt-restructure agreement early in the debt resolution period, thereby eliminating the need for the debtor to accumulate debt settlement funds in an escrow fund prior to the initiation of settlement negotiations (as is the case in debt settlement), and erasing delinquent debt as soon as the debt-restructure agreement is executed. The method is designed and adapted to execution on a computer network system. | 2012-06-21 |
20120158563 | MULTIDIMENSIONAL RISK-BASED DETECTION - A computerized method is established to detect suspicious and fraudulent activities in a group of subjects by defining and dynamically integrating multidimensional risks, which are based on the characteristics of the subjects, into a mathematical model to produce a set of the most up-to-date representative risk values for each subject based on its activities and background. These multidimensional risk definitions and representative risk values are used to select a subset of multidimensional risk-weighted detection algorithms so that suspicious or fraudulent activities in the group of subjects can be effectively detected with higher resolution and accuracy. A priority sequence, which is based on the set of detection algorithms that detect the subject and the representative risk values of the detected subject, is produced to determine the priority of each detected case during the investigation process. | 2012-06-21 |
20120158564 | SYSTEM AND METHOD FOR ACCOUNT MANAGEMENT BASED ON OPEN APPLICATION PROGRAMMING INTERFACE USING RESTFUL WEB SERVICES - A Represental State Transfer (REST) based account management system and method is provided. The REST based account management system includes an open type service application server configured to provide an interface with respect to a client that uses a RESTful web service, manage an access right of the client and call an account management open type interface from an open type service gateway, the open type service gateway configured to provide the open type service application server with account management resources through a RESTful web service, and a billing server configured to charge the RESTful web service while interoperating with the open type service gateway. | 2012-06-21 |
20120158565 | System and Method for Financial Budgeting - A systems, methods, and devices for enabling a credit holder to securely transmit credit data and set temporary credit limits, distinct from limits set by a lending institution, are provided. One embodiment of the method provides for encrypting credit data over a network through a multiple encryptions prior to enabling a user access to personally set credit limits. | 2012-06-21 |
20120158566 | TRANSACTION RATE PROCESSING APPARATUSES, METHODS AND SYSTEMS - The TRANSACTION RATE PROCESSING APPARATUSES, METHODS AND SYSTEMS (“TRP”) transforms merchant transaction-related information, merchant performance metrics, merchant security/management information, merchant risk-based information, and merchant industry-based information inputs via one or more of security-equipment-based adjustment component(s) (SEAC), security-process-based adjustment component(s) (SPAC), risk-tierage adjustment component(s) (RTAC), growth-rate incentive adjustment component(s) (GRIAC), transaction-volume incentive adjustment component(s) (TVIAC), high-risk assessment adjustment component(s) (HRAC), and merchant-industry adjustment component(s) (MIAC) into generated merchant transaction rate and merchant transaction rate incentive outputs that are distributed to individual merchants. | 2012-06-21 |
20120158567 | HYBRID TRADING SYSTEM FOR CONCURRENTLY TRADING THROUGH BOTH ELECTRONIC AND OPEN-OUTCRY TRADING MECHANISMS - A system and method of allocating orders in an exchange configured for trading by a combination of electronic and open-outcry trading mechanisms is provided. One method includes permitting multiple quotes to be disseminated to the market, and providing market making rights of varying degrees to entities having a physical presence on the floor of the exchange and entities remotely located away from the trading floor. The system includes a trade engine configured for receiving orders from market makers on and away from the trading floor. The system also includes executable instructions for allocating to designated primary market makers a portion of an incoming order remaining after first trading against public customer orders. | 2012-06-21 |
20120158568 | SYSTEMS AND METHODS FOR FACILITATING ELECTRONIC SECURITIES TRANSACTIONS - A method for facilitating securities transactions is shown. In one embodiment, the method provides for pricing shares of stock traded between anonymous parties without requiring pricing negotiations between parties. The method can include matching, via an electronic trading system, a first party and a second party in response to receiving contra binding orders for a security from the parties, transmitting, to each of the parties, an indication of the matching, receiving, via an electronic trading system, a first trade confirmation from the first party, determining, for the security, a midpoint of a price spread at the time the first trade confirmation was entered, receiving, via the electronic trading system, a second trade confirmation for the security from the second party, and executing, via the electronic trading system, a transaction for the security between the first and second parties, wherein the security price is determined in response to the determined midpoint. | 2012-06-21 |
20120158569 | Implied Market Trading System - A computer based trading system implies spread markets from multiple real or implied spread markets. In particular, one aspect of the invention permits implication of a spread market from a combination of inter-commodity and inter-calendar spread orders. Furthermore, another aspect of the invention allows use of nontradeable implied or bridge markets to combine with other implied or real markets to create further tradeable implied markets. The method described herein thereby permits the creation of all implied markets that are inherent in the combination of futures, calendar spread and inter-commodity spread real orders. | 2012-06-21 |
20120158570 | System, Method, And Program Product For Foreign Currency Travel Account - Systems, program product, and methods for securing or procuring destination currency funds for a traveler to be used for travel in a destination country commencing at a scheduled future travel date, are provided. A system can include a domestic financial institution server including foreign destination currency transaction account program product. The system provides for establishing an interest-bearing foreign destination currency transaction account having a user-selected maturity date coinciding with a preselected travel date, and near, but prior to the preselected travel date, providing to the traveler a travel debit card having access to the balance of foreign destination currency funds including both principal and accrued interest. | 2012-06-21 |
20120158571 | METHOD AND SYSTEM FOR THE INTEGRATION OF FIXED INCOME FINANCIAL INSTRUMENTS - An electronic trading platform for cash and cash futures (options) is provided in which the cash and cash futures (options) markets are combined together in a single platform. The cash and cash futures (options) markets can be traded on the same screen. The electronic trading platform also brings the cash futures (options) in line with the cash markets. In another aspect, the electronic trading platform for cash and cash futures (options) enables the automatic matching of bids and offers. In another aspect, an OTC cash future (option) can be provided. | 2012-06-21 |
20120158572 | Determining the Probability of an Action Being Performed by a Party at Imminent Risk of Performing the Action - A computer implemented method, a data processing system, and a computer readable storage medium having a computer program product encoded thereon for determining a probability of an action being performed by a party at risk of performing the action. Input information that is pertinent to determining whether the party is at risk of performing the action is received by a data processing system. The data processing system forms an incentive structure for the party based on the received input information, the incentive structure comprising a probability of the party performing the action, and determines an optimal probability of the party performing the action based on the formed incentive structure. | 2012-06-21 |
20120158573 | COMPUTER SYSTEM TO PRODUCE AND COMMUNICATE OUTPUT DATA TO CARRY OUT A FINANCIAL TRANSACTION COMPRISING A MORTGAGE LOAN - A machine for producing and communicating output data, via a link over a network, to carry out a financial transaction including a mortgage loan, the machine including a computer configured to receive input data corresponding to a financial transaction including a mortgage loan which includes a financial term, the financial term being a financial term which is subject to change before the financial term has a set value triggered, according to information elicited regarding a potential customer who contemplates the mortgage loan, by a current market rate, produce output data from the input data, store the produced output data in memory, and communicate the produced output data from the memory, via a link over a network to, at least one of a consumer's computer, a broker's computer, a lender's computer, a seller's computer, a securities exchange computer, a trading desk computer, a buyer's broker computer, and an investor's computer so as to carry out the financial transaction including the mortgage loan. | 2012-06-21 |
20120158574 | SYSTEMS AND METHODS FOR DETECTING BUST OUT FRAUD USING CREDIT DATA - Systems and methods are disclosed for predicting bust out fraud using credit bureau data. In one embodiment, credit bureau scoring models are created using credit bureau data to detect bust out fraud. The credit bureau scoring models may be then applied to consumer data to determine whether a consumer is involved in bust out fraud. | 2012-06-21 |
20120158575 | SYSTEMS AND METHODS FOR DETERMINING THIN-FILE RECORDS AND DETERMINING THIN-FILE RISK LEVELS - In some embodiments, systems and methods are disclosed for generating filters to determine whether a consumer is likely to have a scoreable credit record based on non-credit data, and to determine a potential risk level associated with an unscoreable credit record based on non-credit data. Existing scoreable and unscoreable records are compared to determine factors correlated with having an unscoreable record, and a multi-level filter is developed. Unscoreable records having at least one entry are compared to determine whether they are “good” or “bad” risks, factors correlated with either condition are determined, and a filter is developed. The filters can be applied to records comprising demographic data to determine consumers that are likely to have unscoreable records but represent good risks. | 2012-06-21 |
20120158576 | SYSTEM AND METHOD FOR RISK MONITORING OF RATED LEGAL ENTITIES - Methods and systems for risk monitoring and reporting impacts of credit ratings on rated legal entities are provided. In a method of reporting an impact of credit ratings on a rated legal entity, a plurality of credit rating terms related to a rated legal entity are converted to at least one logical trigger comprising one or more logical expressions. The credit rating terms may impact performance of a legal right or obligation associated with the rated legal entity. The trigger(s) are stored in a computer database. At least one trigger is retrieved from the database. A status for one of the retrieved triggers is evaluated based on predetermined values of the logical expression(s) of the retrieved trigger. Status information for at least one rated legal entity is displayed based on the evaluated status of the retrieved trigger(s). | 2012-06-21 |
20120158577 | SYSTEM AND METHOD FOR CREATING A SECURE TRUSTED SOCIAL NETWORK - A system for a plurality of users to share resources with access, control and configuration based on pre-defined relationships of trust between the users of the system. A computer-based authority provides the services of authentication, identification and verification of each user within network. Processes are described that leads to the formation of an electronic community, which facilitates electronic communication and transactions in a defined manner. | 2012-06-21 |
20120158578 | HIGHLY GRANULAR CLOUD COMPUTING MARKETPLACE - A system and method may provide for defining a usage policy for an available resource of a personal computing system, and transmitting the usage policy to a market broker. The market broker may identify a match between the usage policy and a request from another computing system, and generate a notification of the match. In addition, funds may be transferred from an account associated with the other computing system to an account associated with the personal computing system based on a remote usage of the available resource by the other computing system. | 2012-06-21 |
20120158579 | SYSTEM AND METHOD FOR CREATING AND MAINTAINING INVESTOR COMMUNITY NETWORK - A system is disclosed for raising investment funding of an enterprise. | 2012-06-21 |
20120158580 | System, Method and Apparatus for Mobile Payments Enablement and Order Fulfillment - A system, method and apparatus are provided for enabling mobile payments for purchases from selected merchants via a client device. A client application installed on a client device can make payments and submit shipment information when making purchases. The client application securely stores user-related payment information locally on the client device, where such information only needs to be entered once upon initialization of the client application. The client application facilitates payment transactions by forwarding user-related payment information for purchases to a payment server when authorized by a user. When making a purchase, a user can enter an identification code into the client application that identifies a product or service, where the identification code and user-related payment information are forwarded to the payment server. The payment server uses the code to retrieve details about the purchase and performs operations to complete the purchase using the received user payment-related information. | 2012-06-21 |
20120158581 | Automatic Electronic Payments Via Mobile Communication Device With Imaging System - A graphical payment identifier is used to facilitate the automatic processing of an electronic payment. A graphical identifier payment system receives a request from a payment processing entity for a onetime use graphical payment identifier. In response, a onetime use graphical payment identifier to be displayed by the payment processing entity is generated. A request for user payment information by the payment processing entity is encoded in the graphical payment identifier, which is transmitted to the payment processing entity for display. The graphical payment identifier being displayed by the payment processing entity is captured by a registered user operated computing device. In response, the requested user payment information is transmitted to the payment processing entity, such that the electronic payment is executed automatically, without the user manually entering the requested payment information or providing a credit card. | 2012-06-21 |
20120158582 | PAYMENT SYSTEM USING IMAGES - A method for making a payment using an image includes receiving an image from a camera. The image is analyzed using a processor. A payee indicator that is included in the image is determined. Payee information from a database is retrieved using the payee indicator. A request to make a payment to a payee is sent over a network using the payee information. Thus, a payer may take an image that includes a payee indicator and the method will use that payee indicator to retrieve payee information that may include a current payment due to the payee and a due date for that payment, and the payer may quickly and easily send a request to make that payment to a payment service provider to ensure that the payment is made to the payee. | 2012-06-21 |
20120158583 | AUTOMATED BANK TRANSFERS USING IDENTIFIER TOKENS - Disclosed are methods and systems for automated bank transfer using an identifier token. The methods and systems involve generating an invoice with an identifier token at a payee, the identifier token including bank transfer information of the payee, updating an invoice repository with the invoice and the identifier token and on updating the invoice and the identifier token, generating a notification to the payer, the notification including the identifier token. | 2012-06-21 |
20120158584 | DIGITAL WALLET - A digital wallet that facilitates fast, convenient, and secure commerce using a mobile electronic device (or non-mobile electronic device) and stores information associated with transactions, such as purchase confirmations and receipts. The digital wallet can store information for use in transactions, including information associated with one or more financial accounts, user information, and shipping information. To complete an online purchase, the digital wallet can interact with a merchant's website to obtain information regarding the purchase. The digital wallet provides a user interface for the user to review and confirm the purchase information. The user interface also allows the user to select from multiple payment options, customize shipping information, or provide information requested by the merchant. The digital wallet can transmit user confirmation to the merchant's website and receive a receipt for the purchase. The digital wallet can store the receipt and synchronize the receipt with a remote storage location. | 2012-06-21 |
20120158585 | ITERATIVE PROCESSING OF TRANSACTION INFORMATION TO DETECT FRAUD - A fraud management system is configured to store rules for detecting fraud, receive a transaction from a merchant, process the transaction using a first subset of rules to generate a fraud score for the transaction, and output information regarding the fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. The fraud management system is further configured to receive, after outputting the information regarding the fraud score to the merchant, additional information relating to the transaction, re-process the transaction using a second subset of rules to generate an update fraud score, and output information regarding the updated fraud score to the merchant to assist the merchant in determining whether to accept, deny, or fulfill the transaction. | 2012-06-21 |
20120158586 | AGGREGATING TRANSACTION INFORMATION TO DETECT FRAUD - A fraud management system is configured to receive a transaction from a merchant; select rules to use to process the transaction; process the transaction using the selected rules to generate a set of alarms; and generate an alarm score for each of the alarms. The fraud management system is further configured to combine the alarms with alarms from one or more other transactions to form a combined set of alarms; sorting alarms, in the combined set of alarms, into groups based on attributes of the transaction; generate a group score, for each group, based on at least one of the alarm scores for at least one alarm in the group; generate a fraud score, for the transaction, based on one or more of the group scores; and output information regarding the fraud score to the merchant to notify the merchant whether the transaction is potentially fraudulent. | 2012-06-21 |
20120158587 | TELLER TERMINAL AND RECEPTION PROCESS METHOD - A teller terminal for handling a deposit/withdrawal request from a customer. The teller terminal is comprised of a scanner, an identifying unit, a determining unit, and a display unit. The scanner generates a check image based on check received from the customer and generate a slip image based on a slip related to the check. The identifying unit extracts check information from the check image and extracts slip information from the slip image. The determining unit determines whether or not corresponding pieces of information between the check information and the slip information match each other. The display unit displays the determination result determined by the determining unit. | 2012-06-21 |
20120158588 | RECEPTION PROCESS SYSTEM AND METHOD - A system is provided for processing a deposit/withdrawal request from a customer. A bank terminal includes an identifying unit that extracts check information from the check image and extracts slip information from the slip image, an input unit that receives an input information, and a confirmation determining unit that determines, based on at least one of the check information, the slip information, and the input information from the input unit, whether or not a reconfirmation for at least one of the information is necessary. A communication unit transmits the check information, the slip information, and the determination result to a center terminal having a second display unit. The second display unit displays the check information and the slip information and displays information determined necessary to be reconfirmed in a way so as to be distinguished from information determined not necessary to be reconfirmed. | 2012-06-21 |
20120158589 | Social Media Payment Platform Apparatuses, Methods and Systems - The SOCIAL MEDIA PAYMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS (“SocialPay”) transform message posts to social networks via SocialPay components into payment transaction receipts social merchant-consumer bridging offers. In one implementation, the SocialPay obtains a user social pay initiation trigger, and obtains user social data from a social networking site. The SocialPay identifies a social pay command within the user social data. In one implementation, the SocialPay, in identifying the social pay command within the user social data, parses the user social data, and extracts a social pay command string within the user social data. The SocialPay determines a payor identifier, a payee identifier, and a payment amount using the social pay command string. Based on the identified social pay command, the SocialPay initiates a funds payment transaction. | 2012-06-21 |
20120158590 | Financial fraud prevention method and system - According to an embodiment of the present invention a method for detecting fraudulent use of credit cards is herein described. In the case when possible fraudulent use is detected the issuer or other responsible party, such as a third-party mediator, temporarily blocks the credit card account. This can be accomplished, for example, by making an artificial excess of credit limit of the credit card or otherwise temporarily closing a credit card account. In some embodiments an issuer or responsible party may send a warning message and/or alert to a client's mobile phone informing of an upcoming temporary block of client's credit card. | 2012-06-21 |
20120158591 | CONSUMER AUTHENTICATION SYSTEM AND METHOD - A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized. | 2012-06-21 |
20120158592 | TELLER TERMINAL AND CHECK CASHING METHOD - A teller terminal is provided to handle check cashing. The teller terminal is comprised of a storage unit, a scanner, an identifying unit, a charge setting unit, and a display unit. The storage unit stores bank information and charges associated therewith. The scanner generates a check image based on a check received from a customer. The identifying unit extracts bank information and amount information from the check image. The charge setting unit determines, based on the extracted bank information, a charge related to check cashing by referring to the storage unit. The display unit displays a withdrawal amount calculated based on the extracted amount information and the determined charge. | 2012-06-21 |
20120158593 | SYSTEMS AND METHODS FOR FACILITATING SECURE TRANSACTIONS - Various embodiments are directed to methods for generating proxy account data for a financial account and authorizing payment from an account of a customer based on proxy account data. Example methods may comprise selecting a serial number for a first customer and storing an association between the serial number and an account of the first customer. The methods may further comprise encrypting the serial number and consolidating the encrypted serial number with checkable data. An association between the encrypted serial number and the checkable data may be stored and the consolidated encrypted serial number and checkable data may be encrypted to generate proxy account data. | 2012-06-21 |
20120158594 | TRANSFER METHOD OF ELECTRONIC CASH - A card to card transfer method used in the financial system is provided in the present invention, and comprises an initializing step, a transferring step and a transaction confirming step, wherein the initializing step includes the steps of calculating and obtaining the public key certificate and checking the amount of the transaction and so on, and the transferring step includes the steps of performing the transaction and so on. The present invention can achieve the function of transferring the electronic cash between two cards and can prevent the risk of repeatedly transferring the money into the card for transfer-in by using the card for transfer-out and so on. | 2012-06-21 |
20120158595 | OPERATOR EXTERNAL SERVICE PROVISIONING AND CHARGING - Presented is a system and methods for allowing a user, through their end user device, to online purchase a service from a service provider and provide online payment for the service from the operator network associated with the end user device. The service provider and the operator network can authenticate each other through encrypted data appended to HTTP communications associated with interacting on the internet. | 2012-06-21 |
20120158596 | STOCK KEEPING UNITS FOR CONTENT PROCESSING - A system may create a workflow that includes work units, assign values to parameters of the work units, create a specification that associates the work units and the parameter values, generate a work order associated with the stock keeping unit specification, convert the specification into the work units based on the work order, instantiate tasks that correspond to the work units, and execute the tasks by one or more processors. | 2012-06-21 |
20120158597 | Methods, Devices, and Computer Program Products for Providing Enhanced Customer Service - Enhanced customer services is provided. Customer information regarding a product or service is received from a communication device. The received information is associated with a particular customer. Entry information indicating entry of the particular customer within an area associated with a retail premises is received, and a customer profile associated with the particular customer is retrieved. A customer service agent is selected for providing service to the particular customer based on the received customer information regarding the product or service and the retrieved customer profile. The customer information regarding the product or service and the retrieved customer profile are provided to a customer service agent terminal associated with the selected customer service agent for providing service to the particular customer. | 2012-06-21 |
20120158598 | Modeling and mapping comparable properties - Modeling and mapping appropriate comparable properties comprises accessing property data corresponding to a geographical area, and then weighting comparable properties based upon the appropriateness of each of the plurality of comparable properties as comparables for a subject property. For example, the weighting may be based upon economic distance from the subject property, geographic distance from the subject property, and age of transaction. Using this information, a map image of the geographical area is displayed, with indicators on the map image indicative of the subject property and at least one of the comparable properties. | 2012-06-21 |
20120158599 | SYSTEM AND METHOD FOR ANALYZING OFFICE ACTION OF PATENT APPLICATION - In a method for analyzing an office action of a patent application using a computing device, an office action of a patent application that is downloaded from a patent office website is parsed using predetermined regular expressions (RE). The patent information of patent application is extracted from the office action according to predetermined keywords of the patent information if the office action fails to be parsed by the regular expressions. A regular expression of the extracted patent information is generated according to determined rules, and is stored into the storage system, to parse another office action using the generated regular expression. | 2012-06-21 |
20120158600 | PROPERTY TRANSACTION - Methods, devices, and systems are provided for property transactions. One device embodiment includes a processor, a memory coupled to the processor, and user interface coupled to the memory and processor. The device includes program instructions storable in memory and executable by the processor to associate real property map grid data, having page and section identifiers with property data for the real property; record an assignment of a section associated with the map grid data to a listing agent; and record at least one indicator, having a number of levels representing a party's interest in a transaction involving real property in the section. | 2012-06-21 |
20120158601 | Defining And Monitoring Business Conduct - A code of business standards can be defined for an entity according to at least one predetermined abstract business standard. The defining can include assigning, in the code of business standards, at least one threshold level of activity relating to the predetermined abstract business standard. Activity instances in the at least one area of activity involving the entity can be monitored, for example by identifying an activity instance in violation of the defined code of business standards. The identifying can include detecting that the activity instance exceeds the at least one threshold level of activity. A solution for resolving the identified activity instance can be generated and promoted. Related methods, system, and computer program products are also described. | 2012-06-21 |
20120158602 | INTRA-ENTERPRISE INGREDIENT SPECIFICATION COMPLIANCE - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for measuring intra-enterprise ingredient specification compliance. In one aspect, a method includes receiving a document pertaining to particular shipment of an ingredient from a supplier, automatically determining, from the document, a value or a range of values for each of one or more attributes associated with the ingredient, accessing a specification that indicates a value or a range of values for each attribute, comparing, for each attribute, the value or range of values from the document to the specification value or range of values for the attribute, to identify an extent to which the attribute in the particular shipment of the ingredient satisfies the specification; and automatically taking action on the shipment based on the extent to which the shipment satisfies the specification. | 2012-06-21 |
20120158603 | MAPPING AND AGGREGATION OF ENERGY CONSUMPTION FOR PRODUCTION - The present description refers to a computer implemented method, computer program product, and computer system for receiving a production route associated with the production of one or more products using one or more machines, each of the machines to perform one or more production steps on one or more of the products, receiving a plurality of tuples from a plurality of energy meters, wherein one or more of the tuples includes a machine ID identifying one of the machines, a time stamp information identifying a time period, and an energy consumption value identifying energy consumed by the identified machine during the time period to perform a corresponding production step on one of the products, assigning one or more of the energy consumption values to one of the products based on the tuples and the production routes, and aggregating the energy consumption values assigned to one or more of the products. | 2012-06-21 |
20120158604 | SYSTEMS AND METHODS FOR MANAGING REGULATORY INFORMATION - Systems, methods, and articles of manufacture are provided for managing regulatory data pertaining to a healthcare product. For example, the system may include a network interface for receiving, from a client terminal, a request for regulatory data related to regulatory activity about a product as it pertains to a regulatory authority. The system also includes interconnected information stores for storing regulatory data associated with the product, where the information stores may include: contact records associated with respective contacts with the regulatory authority; commitment records associated with respective commitments made to the regulatory authority; and product information records associated with respective documents associated with the product. The system also includes a processing module for identifying, in response to the received request, each contact record, commitment record, product information record, and central files record associated with the product related to the received request. | 2012-06-21 |
20120158605 | CREATING A DYNAMIC ACCOUNT STORING AGGREGATED SOCIAL DATA TO ASSIST CUSTOMER KNOWLEDGE - A method, system and computer program product for assisting customer knowledge using social media data. Responses to text-based posts regarding compatibility of an updated product with respect to other products/components in a complex product environment are aggregated and used to create what is referred to herein as a “dynamic account.” The dynamic account contains information regarding the compatibility of an updated product from a particular vendor/company with other products from other vendors/companies, where these products are used in combination in a complex product environment. This knowledge base may be used by users of a social network system who are customers of these companies to keep them informed regarding compatibility issues when an update to a product occurs. | 2012-06-21 |
20120158606 | SYSTEM FOR DELIVERY OF GOODS ORDERED VIA THE INTERNET - The system for delivery of goods ordered via the Internet utilizes a delivery box having a front door with an electronic lock and electronic key reader for receipt of goods ordered via the Internet. Goods are shipped in a transport box having an interior space and a device for controlling the temperature within the interior space. The delivery box has at least one interior transport box receptacle where a transport box containing goods is placed on delivery. A power and data interface is established between a delivery box control circuit and a transport box control circuit. The transport box is placed into one of the receptacles, so that the delivery box control circuit can power the transport box control circuit and environment-controlling device. A security code is downloaded from an Internet merchant site to the delivery box and stored onto a keycard when an order is placed. | 2012-06-21 |
20120158607 | METHOD, SYSTEM, AND APPARATUS FOR TRACKING A HAZARDOUS WASTE SHIPMENT WITH A MANIFEST - A system and method of tracking a shipment using a manifest is presented. The method includes composing and producing a uniquely numbered manifest containing a description of the materials that make up the content of the shipment. The method further includes creating a work order, responsive to obtaining information about materials intended to be shipped, and associating the work order with a manifest record comprising a unique number and information to be supplied for the header of the manifest. The method further includes adding to the manifest record lines of information describing the material to be shipped. At a subsequent time, for instance when a transporting vehicle arrives to pick up the material, information in the manifest record can be further edited. The method further includes producing a manifest based on the manifest record. | 2012-06-21 |
20120158608 | FLEET DISPATCH PLAN OPTIMIZATION - One embodiment is a fleet dispatch plan optimization system and method that provides a planning and assignment mechanism for assigning shipments of goods, supplies, cargo, or any other type of delivery to a driver and equipment. The method may include, for example, receiving as an input a plurality of shipments of items or goods that need to be assigned and a plurality of drivers available to handle the shipments. The drivers can include those from the private fleet or from a common carrier. The method may then include determining, using a simulation engine for example, the most cost effective assignment of one of the drivers to at least one of the shipments. | 2012-06-21 |
20120158609 | Method to Manage Rail & Intermodal Fuel for Shippers - A process for managing intermodal fuel costs. The process entails receiving, compiling, and storing transaction information at a Network Administrator. The transaction information is associated with at least one shipper who has arranged for an intermodal shipment of goods from an origin to a destination; and at least one carrier that has agreed to complete at least one leg of the intermodal shipment. The transaction information includes the mode of transportation, the distance traveled, the pick-up and drop-off locations, and the contemporaneous market cost of fuel, for each leg of the shipment. This information is transmitted from the Network Administrator to the shipper. The information is used by the shipper to calculate an appropriate fuel payment to each carrier on each leg of the intermodal shipment. | 2012-06-21 |
20120158610 | Methods of monitoring propofol through a supply chain - Methods of monitoring Propofol through a supply chain are disclosed herein. Consequently, the methods perform authentication of propofol as it is transported through the supply chain to the end user whereby propofol manufacturers and distributors can achieve data and product integrity and ultimately minimize cost. | 2012-06-21 |
20120158611 | ADAPTIVE RATING SYSTEM AND METHOD - The present invention is embodied in adaptive rating methods and systems. The adaptive rating method includes receiving a first rating for a first product from a user, receiving a second rating for a second product from the user, identifying a conflict with a processor by comparing the first rating and the second rating, soliciting feedback from the user to remedy the conflict, and adjusting at least one of the first or second ratings with the processor responsive to feedback from the user. The steps of the method may be embodied in computer executable instructions stored on a non-transient machine readable medium that cause a processor to perform the method when executed by the processor. The system includes a processor configured to perform the steps of the method. | 2012-06-21 |
20120158612 | System and method for providing financial products - Disclose are methods, systems and products for providing financial payments to investors who live longer than a specified survival age. Premium payments are received ( | 2012-06-21 |
20120158613 | PREDICTING ECONOMIC TRENDS VIA NETWORK COMMUNICATION MOOD TRACKING - A method of investigating public mood from a multi-dimensional model approach and a method to predict economic market trends above chance level based on the multi-dimensional model approach are provided. The text-content of several large-scale collections of daily network communications are analyzed via mood assessment tools, measuring various mood dimensions. A Granger Causality analysis investigated the correlation between daily changes in public mood states via results of the daily mood time series of the mood assessment tools with changes in value of the Dow Jones Industrial Average (“DJIA”) over time. Based on the above investigation, a Self-Organizing Fuzzy Neural Network model was trained to predict next-day DJIA value based on a combination of past DJIA values and public mood state measurements across several specified mood dimensions, such as calm and a combination of calm and happy. | 2012-06-21 |
20120158614 | Executing a Leveraged Long/Short Strategy for an ETF - An ETF uses a leveraged long/short strategy that involves buying fully funded equities that are expected to overperform in the market, selling short equities that are expected to underperform, and buying additional equities that are expected to overperform using proceeds generated from the short sales. This is achieved for an ETF by creating and redeeming ETF shares, wherein the ETF fund manager specifies in a portfolio composition file which equities to buy and which equities to sell short. To create shares of the ETF, an authorized participant transfers these specified positions to the fund manager “in kind” in exchange for ETF shares. To redeem shares of the ETF, the authorized participant transfers the shares back to the fund manager and in return receives these specified positions in-kind from the fund manager. This avoids the need for the ETF fund manager to initiate the short sale. | 2012-06-21 |
20120158615 | ARTIFICIAL INTELLIGENCE SYSTEM - An artificial intelligence system and method for interpreting input from a user and generating a response to the user. The input is converted into an array of concepts which are compared to a database of interrelated concepts. A response is generated based on the concepts in the database and their relationship to the concepts in the input array. The system and method may be implemented in a number of electronic or computer devices to interact with humans or computer systems. | 2012-06-21 |
20120158616 | SYSTEMS AND METHODS FOR A HEALTH-RELATED SURVEY USING PICTOGRAM ANSWERS - In some embodiments, a non-transitory processor-readable medium includes code to cause a processor to send a signal representing a first question and a set of pictogram answers associated with the first question and a second question, different from the first question, and a set of pictogram answers associated with the second question. The first question and the second question can define a health-related survey such as a health-risk assessment. The non-transitory processor-readable medium includes code to receive a user selection of a pictogram answer associated with the first question and receive a user selection of a pictogram answer associated with the second question. The non-transitory processor-readable medium includes code to define a health-related user profile based on the user selection to the first question and the second question. | 2012-06-21 |
20120158617 | METHODS FOR ORGANIZING INFORMATION ACCESSED THROUGH A WEB BROWSER - Methods are provided for assisting in the organization of information accessed through a web browser. At least one item of information accessed through the web browser is captured and visually represented in a defined organizational area of a display. A relevance index is calculated for each item of information that is visually represented to a current web-browsing behavior. The relevance index is conveyed for each item of information to the current web-browsing behavior to a user of the web browser. | 2012-06-21 |
20120158618 | REMOTE NON-INTRUSIVE OCCUPANT SPACE MONITORING SYSTEM - A system for remote non-intrusive occupant space monitoring. The system may have sensors and other mechanisms for non-intrusively obtaining information by capturing utility and communication signals, images, light, sound, environmental factors, background information, and so on, about a space and its occupants. The obtained information may be locally or remotely analyzed and modeled by a processor. Models of buildings, behavior, and power systems from the processor may be compared with pre-defined models to infer further information about the space and its occupants. Also, behavioral information may be obtained, inferred and/or learned. The models may be updated with the obtained, inferred and learned information. | 2012-06-21 |
20120158619 | OPTIMAL RULE SET MANAGEMENT - Systems, methods, and computer products for optimally managing large rule sets are disclosed. Rule dependencies of rules within a set of rules may be determined as a function of rules execution frequency data generated from applying the rules over a data set. The rules within the set of rules may be clustered into rules clusters based on the determined rule dependencies, in which the rules clusters comprise disjoint subsets of the rules within the set of rules. Cluster frequency data for the rules clusters may be used to arrive at an optimal ordering. | 2012-06-21 |
20120158620 | HUMAN-ASSISTED TRAINING OF AUTOMATED CLASSIFIERS - Many computing scenarios involve the classification of content items within one or more categories. The content item set may be too large for humans to classify, but an automated classifier (e.g., an artificial neural network) may not be able to classify all content items with acceptable accuracy. Instead, the automated classifier may calculate a classification confidence while classifying respective content items. Content items having a low classification confidence may be sent to a human classifier, and may be added, along with the categories identified by the human classifier, to a training set. The automated classifier may then be retrained using the training set, thereby incrementally improving the classification confidence of the automated classifier while conserving the involvement of human classifiers. Additionally, human classifiers may be rewarded for classifying the content items, and the costs of such rewards may be considered while selecting content items for the training set. | 2012-06-21 |
20120158621 | STRUCTURED CROSS-LINGUAL RELEVANCE FEEDBACK FOR ENHANCING SEARCH RESULTS - A “Cross-Lingual Unified Relevance Model” provides a feedback model that improves a machine-learned ranker for a language with few training resources, using feedback from a more complete ranker for a language that has more training resources. The model focuses on linguistically non-local queries, such as “world cup” (English language/U.S. market) and “copa mundial” (Spanish language/Mexican market), that have similar user intent in different languages and markets or regions, thus allowing the low-resource ranker to receive direct relevance feedback from the high-resource ranker. Among other things, the Cross-Lingual Unified Relevance Model differs from conventional relevancy-based techniques by incorporating both query- and document-level features. More specifically, the Cross-Lingual Unified Relevance Model generalizes existing cross-lingual feedback models, incorporating both query expansion and document re-ranking to further amplify the signal from the high-resource ranker to enable a learning to rank approach based on appropriately labeled training data. | 2012-06-21 |
20120158622 | INTERACTIVE RECOMMENDATIONS - An interactive recommendation system generates one or more recommendations (e.g., recommended products, travel destinations, etc.) for a user based on a recommendation model. The recommendation model includes one or more criteria that are used to analyze a datastore of user characteristics (e.g., a user's age, location, past online behavior, etc.) and generate one or more recommendations based thereon. The interactive recommendation system further presents a user interface that allows the user to interactively modify the criteria of the recommendation model and to apply the modified recommendation model to the datastore in order to generate one or more modified recommendations. In this manner, for example, the user can customize the recommendations he or she receives by interacting with the recommendation system to modify the recommendation model used to generate such recommendations. | 2012-06-21 |
20120158623 | VISUALIZING MACHINE LEARNING ACCURACY - The claimed subject matter provides a method for visualizing machine learning accuracy. The method includes receiving a plurality of training instances for the machine learning system. The method also includes receiving a plurality of results for the machine learning system. The plurality of results corresponds to the plurality of training instances. The method further includes providing an interactive representation of the training instances and the results. The interactive representation supports identifying inaccuracies of the machine learning system attributable to the training instances, the features used to obtain a featurized form of the training instance, and/or a model implemented by the machine learning system. | 2012-06-21 |
20120158624 | PREDICTIVE MODELING - A predictive analysis generates a predictive model (Padj(Y|X)) based on two separate pieces of information,
| 2012-06-21 |
20120158625 | Creating and Processing a Data Rule - A data rule is created and processed by receiving an expression defining a logic of a rule and at least one logical variable, creating a rule definition including the expression and the at least one logical variable for binding each logical variable of the rule with at least one column, associating a characteristic enabling comparison of columns with a first logical variable of the rule definition, and storing the characteristic as part of the rule definition. | 2012-06-21 |
20120158626 | DETECTION AND CATEGORIZATION OF MALICIOUS URLS - This document describes techniques for using features extracted from a URL to detect a malicious URL and categorize the malicious URL as one of a phishing URL, a spamming URL, a malware URL or a multi-type attack URL. The techniques employ one or more machine learning algorithms to train classification models using a set of training data which includes a known set of benign URLs and a known set of malicious URLs. The classification models are then employed to detect and/or categorize a malicious URL. | 2012-06-21 |
20120158627 | FRAMEWORK FOR OPTIMIZED PACKING OF ITEMS INTO A CONTAINER - One embodiment is directed to a method of optimally packing items into at least one resource. The method includes receiving at least one of items, resources, and parameters, and setting up a set partitioning mixed integer programming (MIP) using the received items, resources, and parameters. The method further includes solving liner programming (LP) relaxation of the MIP, generating new packings, and checking whether new packings have been generated. When no new packings have been generated, solving the final MIP and creating a model of at least one resource packed according to the final MIP. | 2012-06-21 |
20120158628 | Method and System for Detecting Missing Rules with Most General Conditions - A technique for detecting missing rules (mr) with most general conditions in a rule project ( | 2012-06-21 |
20120158629 | DETECTING AND RESPONDING TO UNINTENTIONAL CONTACT WITH A COMPUTING DEVICE - A computing device is described herein for detecting and addressing unintended contact of a hand portion (such as a palm) or other article with a computing device. The computing device uses multiple factors to determine whether input events are accidental, including, for instance, the tilt of a pen device as it approaches a display surface of the computing device. The computing device can also capture and analyze input events which represent a hand that is close to the display surface, but not making physical contact with the display surface. The computing device can execute one or more behaviors to counteract the effect of any inadvertent input actions that it may detect. | 2012-06-21 |
20120158630 | INFORMATION PROPAGATION PROBABILITY FOR A SOCIAL NETWORK - One or more techniques and/or systems are disclosed for predicting propagation of a message on a social network. A predictive model is trained to determine a probability of propagation of information on the social network using both positive and negative information propagation feedback, which may be collected while monitoring the social network over a desired period of time for information propagation. A particular message can be input to the predictive model, which can determine a probability of propagation of the message on the social network, such as how many connections may receive at least a portion of the message and/or a likelihood of at least a portion of the message reaching respective connections in the social network. | 2012-06-21 |
20120158631 | ANALYZING INPUTS TO AN ARTIFICIAL NEURAL NETWORK - Systems, methods, and associated software are described for receiving first inputs and first outputs, providing the first inputs and first outputs to an artificial neural network (ANN) for training, creating a boundary such that the first inputs fall within the boundary or on a boundary line defining the boundary, wherein additional inputs are considered to be valid if they fall within the boundary and are considered to be invalid if they fall outside the boundary, receiving second inputs, separating the valid second inputs from the invalid second inputs, determining a percentage of the second inputs that are invalid, and when the percentage exceeds a predetermined threshold, retraining the ANN and redefining the boundary such that the second inputs fall within the boundary. | 2012-06-21 |
20120158632 | CLASSIFICATION OF DIGITAL CONTENT BY USING AGGREGATE SCORING - Aggregate scoring is used to help classify digital content such as content uploaded to multi-user websites (e.g., social networking websites). In one embodiment, specific categories are used that relate to a social implication of content. For example, text, images, audio or other data formats can provide communication perceived to fall into categories such as violent, abusive, rights management, pornographic or other types of communication. The categories are used to provide a raw score to items in various groupings of a site's content. Where items are related to other items such as by organizational, social, legal, data-driven, design methods, or by other principles or definitions, the related items' raw scores are aggregated to achieve a score for a particular grouping of items that reflects, at least in part, scores from two or more of the related items. | 2012-06-21 |
20120158633 | Knowledge graph based search system - Methods, computer program products and systems for developing and implementing a Knowledge Based Search System for an entity. Entity related data are analyzed as required to develop an entity knowledge and one or more knowledge graphs. The knowledge graphs are used to support the retrieval of relevant search results. | 2012-06-21 |
20120158634 | ARTIFICIAL INTELLIGENCE SYSTEM - An artificial intelligence system and method for interpreting input from a user and generating a response to the user. The input is converted into an array of concepts which are compared to a database of interrelated concepts. A response is generated based on the concepts in the database and their relationship to the concepts in the input array. The system and method may be implemented in a number of electronic or computer devices to interact with humans or computer systems. | 2012-06-21 |
20120158635 | STORAGE EFFICIENT PROGRAMMABLE STATE MACHINE - A state machine includes a rule selector. The rule selector receives input data, and one or more transition rules. The one or more transition rules including a next state. The state machine also includes a character classifier communicatively coupled to the rule selector. The character classifier includes a plurality of base classes. The character classifier receiving the input data, and sending one or more of the plurality of base classes to the rule selector in response to receiving the input data. The rule selector selects one of the one or more transition rules in response to determining that the input data and one of the plurality of base classes correspond to the transition rule. The current state of the state machine is then set to the next state of the selected one of the one or more transition rules. | 2012-06-21 |
20120158636 | EFFICIENT PROBABILISTIC REASONING OVER SEMANTIC DATA - A semantic reasoning engine is described for performing probabilistic reasoning over a semantic graph in a time-efficient and viable manner. The semantic reasoning engine includes a data store that provides the semantic graph, where the semantic graph is formed by a plurality of concepts connected together via probabilistic assertions. The semantic reasoning engine operates by providing an answer to a query by recursively collapsing the semantic graph based on at least one collapsing rule. | 2012-06-21 |
20120158637 | Dynamic Online Communities - Methods, systems, and computer programs for triggering interaction with a Dynamic Online Community (DOC) are presented. In one embodiment, a method includes an operation for monitoring online activity of a user, which includes tracking user input on a web browser. The method further includes operations for detecting that the user is interested in a subject based on the online activity, and for determining whether there is a DOC topic that is associated with the subject. The DOC has members that have shown an interest in the DOC topic. In another operation, the method assigns the user to be a member of the DOC if the determination indicates that there is a DOC topic associated with the subject. The user is automatically recommended to join the DOC. DOC related information is provided to the user after the user is assigned to the DOC. In one embodiment, the online activity of the user is searching in a search provider's website. | 2012-06-21 |
20120158638 | CLASSIFICATION RECOMMENDATION BASED ON SOCIAL ACTIONS - Embodiments are directed towards employing a classifier to determine a classification for target media content using nominally factored social interaction attributes, the classifier being trained using a training dataset that includes at least one nominally factored social interaction attribute. The trained classifier determines a classification of the target media content based on nominally factored social interaction attributes obtained during a monitored social interaction with the target media content and one or more users. The classification may include identifying at least one genre for the media content, as well as predicting whether the media content will go viral or not. The classification may also be used to provide recommendation to the one or more users of other media content. | 2012-06-21 |
20120158639 | METHOD, SYSTEM, AND COMPUTER PROGRAM FOR INFORMATION RETRIEVAL IN SEMANTIC NETWORKS - A method, system, and computer software for information retrieval in semantic networks, has the steps of: acquiring a graph of interest, assuming a novel metric regarding the acquired graph, specifying a query node of interest on the obtained graph, calculating a shortest-path distance from the query node of interest to a plurality of other nodes on the acquired graph, obtaining a ranked list of nodes based on the calculated shortest-path distance, and displaying for a user the retrieved information. | 2012-06-21 |
20120158640 | METHOD AND SYSTEM FOR CREATING A DYNAMIC SYSTEMS BASED HYBRID MODEL FOR REASONING SYSTEMS - A method for creating a dynamic systems based hybrid model for reasoning systems is described. The method receives, at a server, a plurality of expert identified deal attributes. The method presents a conjoint analysis questionnaire for input by one or more respondents. The conjoint analysis questionnaire includes questions based on the plurality of expert identified deal attributes. The method receives responses of the one or more respondents to the conjoint analysis questionnaire. The method then defines an expert reasoning model based on the responses of the one or more respondents to the conjoint analysis questionnaire. The method accesses historical deal information of one or more deals, the historical deal information including one or more deals, each deal including a plurality of expert identified deal attributes and a part-worth associated with each of the deal attributes. Finally, the method validates the expert reasoning model based on the historical deal information. | 2012-06-21 |
20120158641 | CONSTRUCTION OF RULES FOR USE IN A COMPLEX EVENT PROCESSING SYSTEM - A method for specifying complex event processing (CEP) system rules. A rule construction interface is provided for constructing rules for a rule set of the complex event processing system, where the rules include definitions of one or more detected events and corresponding actions. In response to an identification of a new event or action during the rule construction process via the rule construction interface, a corresponding event or action logical construct is generated for representing the event or action in the complex event processing system. An intermediate logical construct is generated to provide a data connection for the event or action logical construct. The event or action logical construct is linked to a corresponding action or event logical construct via the intermediate logical construct so as to enable data flow between the objects. | 2012-06-21 |
20120158642 | ENTERPRISE RESOURCE PLANNING (ERP) SYSTEM CHANGE DATA CAPTURE - A device receives, from a data warehouse, a request for incremental data, creates one or more temporary tables based on the request, and extracts incremental data from tracking tables of an enterprise resource planning (ERP) system. The device also stores the extracted incremental data in the one or more temporary tables, and joins the one or more temporary tables with one or more regular tables, where the one or more regular tables include data associated with the incremental data stored in the one or more temporary tables. The device further retrieves data from the joined one or more temporary tables and the one or more regular tables, and stores the retrieved data in the data warehouse. | 2012-06-21 |
20120158643 | Data Mining in a Business Intelligence Document - A business intelligence document provides functionality for testing a hypothesis on aggregated data in a business intelligence document (e.g., a spreadsheet-like document), wherein one or more of the input data values and transformation properties are designated as constrained (e.g., invariant or constrained within a range, set, enumeration, or domain). The hypothesis, which is articulated as a data mining assertion, is input through the user interface of the business intelligence document (e.g., via an expression interface or properties of a row, column, or cell) and solved over the aggregated data. The solution is then presented through the user interface of the spreadsheet-like document, such as in a table, graph, histogram, etc. | 2012-06-21 |
20120158644 | DATA FEED HAVING CUSTOMIZABLE ANALYTIC AND VISUAL BEHAVIOR - A data marketplace infrastructure allows a data source company or a third party to associate to a data feed with a customizable preview application having analytic and visual features (e.g., business logic and a user interface). A potential customer can use discovery services of the data marketplace infrastructure to identify one or more data feeds offering sample data in a domain of interest of the potential customer. The data feed can transmit the customizable preview application to allow the potential customer to interact with the data from the data feed before purchasing the data. The potential customer may also customize the preview application so as to change the default application behavior in a manner that improves the potential customer's understanding and appreciation of the data feed. | 2012-06-21 |
20120158645 | WORK UNITS FOR CONTENT PROCESSING - A system may create work units, each work unit including at least one of an input port or output port, each work unit configured to modify data that is received via the input port. In addition, the system may compose a workflow by connecting an output port of a first of the work units to an input port of a second of the work units, receive a work order, select the workflow in response to the work order, decompose the workflow into constituent work units, instantiate tasks that correspond to the constituent work units, and execute a work unit process for each of the tasks. | 2012-06-21 |
20120158646 | WORK ORDER OPTIMIZATION - A method may include receiving an order associated with processing a media file, generating a work order associated with fulfilling the order and identifying tasks associated with the work order. The method may also include accessing information identifying previously processed orders and determining whether at least one stored asset associated with one of the previously processed orders is usable when processing the first order. The method may further include retrieving, when a first one of the stored assets is usable, the first stored asset, and using the first stored asset when processing the work order. | 2012-06-21 |
20120158647 | Block Compression in File System - Individual blocks of data associated with a file are compressed into sub-blocks according to a compression type. For block compression type, an entire block of data is compressed and stored in the sub-block. For substream compression type, a block of data is first divided into multiple substreams that are each individually compressed and stored within the sub-block. | 2012-06-21 |
20120158648 | METHOD AND SYSTEM FOR DYNAMICALLY ROTING AN ENDITY'S ATTRIBUTE BY RECEIVING VALIDATION VALUE FROM AN ATTRIBUTE OF A QUALIFYING ENTITY - This invention is a method and system for dynamically rating a target entity's attribute by receiving validation value from an attribute of a qualifying source entity. The validation value involves either a user assigning weights to selected attributes or selected attributes taking weight values from attributes assigned to the user. The validation value is used for updating the rating of a target entity's attribute. Individual weighted attributes are used to define compositional attributes for things such as goods, services, ideas, terms, and quality. Compositional attributes can be comprised of supporting individual component attributes, a mix of supporting individual component attributes and supporting compositional attributes, or a mix of supporting compositional attributes. Thus, compositional attributes can also be used to support another compositional attribute. These component and weighted attributes are agreed upon by other users to form communities on the Internet by filtering content that is most relevant to the users through the use of ratings. Further, a system and method is used for qualifying attributes, both supporting and composite attributes, through transferring value from an attribute of the qualifier. The qualifying of content, goods, and services facilitates a pay subscription supported model of using relative value of content, goods, and services according to each user as a price point. | 2012-06-21 |
20120158649 | ELECTRONIC DEVICE AND METHOD OF PREVENTING DELETION OF FILE - An electronic device and a method of preventing a deletion of a file are provided. If a deletion command is input from a computer with respect to at least one file stored on a storage unit, the electronic device determines whether the corresponding file is to be deleted by referring to a deletion prevention area. Accordingly, the electronic device maintains a deletion prevention function even when the deletion command is input from the computer. | 2012-06-21 |
20120158650 | DISTRIBUTED DATA CACHE DATABASE ARCHITECTURE - System, method, computer program product embodiments and combinations and sub-combinations thereof for a distributed data cache database architecture are provided. An embodiment includes providing a scalable distribution of in-memory database (IMDB) system nodes organized as one or more data fabrics. Further included is providing a plurality of data granularity types for storing data within the one or more data fabrics. Database executions are managed via the one or more data fabrics for a plurality of applications compatible with at least one data granularity type. | 2012-06-21 |
20120158651 | CONFIGURATION OF ASYNCHRONOUS MESSAGE PROCESSING IN DATAFLOW NETWORKS - Managing a concurrency based system. A method includes determining a defined number of concurrent operations for a concurrency based management system. An operation queue is accessed. The operation queue stores or has therein zero or more asynchronous operations. An asynchronous operation is an operation that returns an object representing the asynchronous completion of the operation. The method further includes, as long as the queue is not empty, scheduling asynchronous operations from the queue until a number of asynchronous operations equal to the defined number has been reached. | 2012-06-21 |
20120158652 | SYSTEM AND METHOD FOR ENSURING CONSISTENCY IN RAID STORAGE ARRAY METADATA - A system and method for ensuring consistency in RAID storage array metadata is disclosed. In one embodiment, the RAID storage array metadata residing in one or more drives is consolidated onto a metadata base volume that is in sync with the current RAID storage array metadata. Further, a point-in-time (PIT) image of the consolidated RAID storage array metadata in the metadata base volume, a system configuration (SC) file, and customer support data (CSD) are obtained. The PIT image, the SC file and CSD can be obtained based on a predetermined time interval and/or upon a change on the RAID storage array metadata. Furthermore, a delta change between two substantially sequentially obtained PIT images, SC files and CSD are determined. In addition, a consistency check (CC) is performed on the RAID storage array metadata based on the determined delta change. | 2012-06-21 |
20120158653 | ON DEMAND MULTI-LOCATION LARGE DATABASE SYNCHRONIZATION SYSTEM - Systems and method for distributing updates on demand to synchronize a remote client database with a source database are provided. A client can request an online update from the database content provider and the database provider can stream database updates to the client over a network connection in real time, or the database content provider can stream database updates to the client at scheduled times based on a licensing agreement with the client. This allows the client database to be kept in synch with the source database without requiring that the database provider generate a set of database updates on physical media and ship the physical media to the client for processing. | 2012-06-21 |
20120158654 | RECEIPT STORAGE IN A DIGITAL WALLET - A digital wallet that facilitates fast, convenient, and secure commerce using a mobile electronic device (or non-mobile electronic device) and stores information associated with transactions, such as purchase confirmations and receipts. The digital wallet can store information for use in transactions, including information associated with one or more financial accounts, user information, and shipping information. To complete an online purchase, the digital wallet can interact with a merchant's website to obtain information regarding the purchase. The digital wallet provides a user interface for the user to review and confirm the purchase information. The user interface also allows the user to select from multiple payment options, customize shipping information, or provide information requested by the merchant. The digital wallet can transmit user confirmation to the merchant's website and receive a receipt for the purchase. The digital wallet can store the receipt and synchronize the receipt with a remote storage location. | 2012-06-21 |
20120158655 | NON-RELATIONAL FUNCTION-BASED DATA PUBLICATION FOR RELATIONAL DATA - A data publication system is described herein that provides a data replication model that combines benefits of data distribution from non-relational paradigms with the benefits of deeply integrating datasets via relational database paradigms. The system allows the creation of programmatic functions for extracting subsets of data stored in any source model, extracting data from a variety of sources, and republishing that data in a target model built upon the aggregated source data. The target model can provide standard relational paradigms across a set of data from multiple sources, whether or not the original sources were relational in nature. The system applies known paradigms for data replication based upon programmatic functions as a means for data replication and integrates this method for data duplication and replication based upon arbitrary functions with the power of relational database systems to process associated entities of data in highly efficient ways. | 2012-06-21 |
20120158656 | ORDERED LIST MANAGEMENT IN A REPLICATED ENVIRONMENT - Embodiments of the present invention provide a method, system and computer program product for ordered list management in a replication environment. In an embodiment of the invention, a method for ordered list management in a replication environment includes selecting an item for positioning in a replicant of an ordered list by an ordered list manager executing in memory by at least one processor of a computer. The method also includes determining an intent of positioning for the selected item and associating the determined intent in an order number with the selected item in the replicant of the ordered list. Finally, the method includes replicating the replicant with the ordered list by synchronizing changes in the replicant with other changes applied to other replicants of the ordered list. | 2012-06-21 |
20120158657 | ROLE-SPECIFIC ACCESS CONTROL TO SECTIONS OF ARTIFACT CONTENT WITHIN A CONFIGURATION MANAGEMENT (CM) SYSTEM - An artifact having at least one role-specific content section can be stored in a repository by a configuration management system. The role-specific content section can be associated with a specific role value. A request to access the stored artifact can be received. The request can include at least an identifier of a requestor, a role value of the requestor, and a version identifier of the artifact. A copy of the artifact specified in the received request can be created. The artifact copy can be modified to omit role-specific content sections inapplicable to the role value of the requestor. The modified artifact copy can be provided to the requestor. | 2012-06-21 |
20120158658 | AUTOMATIC WIRELESS DEVICE DATA MAINTENANCE - A computer-implemented method includes downloading data elements from a wireless device. The method includes determining whether a user account exists in storage and determining whether the user account currently has stored data elements of the same type as the downloaded data elements associated therewith. The method further includes comparing the downloaded data elements to the stored data elements. This method also includes storing any downloaded data elements not currently existing in the data elements associated with the user account and not in conflict with data elements associated with the user account. The method further includes resolving conflicts between downloaded data elements and currently existing data elements, to establish which of the conflicting elements is representative of a proper version of the element. Finally, the method includes storing the proper version of the element resulting from each conflict resolution. | 2012-06-21 |
20120158659 | HOST BASED SOFTWARE BLOCK LEVEL REPLICATION USING METADATA INDICATING CHANGED DATA OBJECTS AT SOURCE AND SECONDARY NODES - A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary node. A snapshot is then generated at the second time on the secondary node by using the metadata. | 2012-06-21 |
20120158660 | METHOD AND SYSTEM FOR DEDUPLICATING DATA - Methods, computer systems, and computer program products for deduplicating data in a computing environment are provided. A sequence of data is received. The sequence of data is formatted for back-up such that an order of the sequence of data is different than the order of an input sequence of the data. The sequence of data is stored in the same order as the input sequence of the data. | 2012-06-21 |