Patent application number | Description | Published |
20090063333 | Apparatus And Method For Payment Card Account Personalization - Techniques for payment card account personalization include obtaining access to data describing a first set of parameters associated with the payment card account and obtaining indications of a first change in a life situation of an account holder. The first change may be one that has occurred since establishment of the first set of parameters. Presentation of a first menu of updated parameter choices to the holder is facilitated. The presentation of the first menu can be based upon the first change in the life situation of the holder. A holder selection can be obtained from the first menu, including data describing a second set of parameters associated with the payment card account, the second set of parameters being different than the first set of parameters. The payment card account then operates according to the second set of parameters. In some instances, account parameters can be updated across multiple financial institutions, by a service provider. | 03-05-2009 |
20090192875 | METHODS AND SYSTEMS FOR LIFE STAGE MODELING - A method for associating transaction card accounts with life stage segments is described. The method includes analyzing survey results to define the plurality of life stage segments based on at least one of demographics, transaction categories, and card usage. The method further includes creating at least one spending profile for a life stage target group that includes transaction card holders within at least one of the defined life stages for which a marketing campaign is targeted, developing a survey-based life stage model based on the target group and the profiles, creating a transaction data-based life stage model by applying the survey-based life stage model to a portion of the transaction data, applying the transaction-based life stage model to the transaction data to identifies cardholder accounts included within the life stage target group, and ranking the transaction card accounts stored within the database based on a likelihood the accounts are included within the target group. | 07-30-2009 |
20090192876 | METHODS AND SYSTEMS FOR PROVIDING A PAYMENT CARD PROGRAM DIRECTED TO EMPTY NESTERS - A computer-based method for enrolling financial transaction cardholders into a payment card program that includes features that are directed to an empty nester segment of society is described. The method includes creating at least one spending profile representing an empty nester target group. The empty nester target group includes transaction cardholders within the empty nester segment of society targeted for receiving a marketing campaign. The method also includes storing in the database transaction data for transaction card accounts, identifying cardholders included within the empty nester target group by comparing the transaction data to the at least one empty nester spending profile, and offering a payment card program having at least one rewards feature directed to the empty nester segment of society to the cardholders identified as being within the empty nester target group. | 07-30-2009 |
20100088204 | METHOD AND APPARATUS FOR DYNAMIC INTERCHANGE PRICING - A method includes receiving transaction data associated with a payment transaction. The transaction data includes a payment account identifier. The payment account identifier identifies a payment account. The method further includes obtaining a spending history associated with the payment account identified by the payment account identifier. The spending history reflects a total amount of spending transactions charged to the payment account during a period of time. The method also includes providing an indication of the spending history to an acquirer. | 04-08-2010 |
20100121768 | METHOD AND APPARATUS FOR BULK PAYMENT ACCOUNT - An offeror offers a first plurality of payment device holders a first offer including a negotiated deal on a first ware, which is available for a first predetermined period of time. Those certain holders among the first plurality of payment device holders who wish to accept the first offer (“first offer accepting holders”) are registered. Registration includes obtaining at least personal identifying information and corresponding registered payment device account numbers for the first offer accepting holders. A first plurality of transactions are processed in accordance with the negotiated deal on the first ware. The first plurality of transactions are purchases of the first ware, by the first offer accepting holders, during the first predetermined period of time. In some circumstances, the offeror does not require purchase of any product or service other than the first ware for which the negotiated unit price is offered in order for the first offer accepting holders to obtain the negotiated unit price on the first ware. In some cases, monetary amounts of the first plurality of transactions are adjusted to reflect the negotiated deal, contemporaneously with the first plurality of transactions. | 05-13-2010 |
20100161379 | METHODS AND SYSTEMS FOR PREDICTING CONSUMER BEHAVIOR FROM TRANSACTION CARD PURCHASES - A computer-based method for predicting consumer behavior is provided. The method is performed using a computer system coupled to a database. The method includes recording consumer data in the database for each consumer of a global population of consumers including historical purchases made by each consumer using a transaction card, defining a life event by assigning spending variables to the life event, determining a sample group of consumers that are experiencing the life event based on the consumer data stored within the database with respect to the spending variables, generating a predictive model based on historical purchases made by consumers within the sample group, and applying the predictive model to predict each consumer within the global population that will experience the life event. The predictive model is applied using the computer system. A list of consumers predicted to experience the life event within a predetermined time period is output. | 06-24-2010 |
20100258620 | METHODS AND SYSTEMS FOR LINKING MULTIPLE ACCOUNTS - A method for processing a financial transaction using an interchange network computer coupled to a database is described. The transaction is initiated with a transaction card associated with a linked account. The method includes receiving, at the interchange network computer, a linked account data file for the first transaction card. The data file includes data associating the first card with a first secondary account and data linking the first secondary account to a first primary account. The method also includes storing the data file within the database and receiving a first authorization request message for the first transaction. The method also includes determining, based on data included within the first authorization request message, that the first card is associated with the first secondary account and processing the first authorization request message by applying at least one processing code associated with the first primary account to the first transaction. | 10-14-2010 |
20110137795 | AUTOMATED TELLER MACHINE SYSTEM - Exemplary embodiments are directed to processing Automated Teller Machine (ATM) transactions. A transaction request can be received from an ATM. The transaction request can include account information read from a transaction card and a transaction request. The account information corresponds to a first account. The transaction request is incapable of being processed using the first account for which the transaction card was issued. A second account belonging to the account holder of the first account can be identified and can be a different type of account than the first account. The transaction request is capable of being processed using the second account. The transaction request can be processed using the second account to perform the ATM transaction requested. | 06-09-2011 |
20110238540 | FINANCIAL ACCOUNT MANAGEMENT BASED ON SPECIFIED CRITERIA - Exemplary embodiments are directed to account management including reporting financial transactions to an account holder in a transaction reporting statement and automatic payment of open account balances. Consolidating reporting criteria and/or balance management criteria can be specified to customize reporting and/or payment of purchase transactions. The consolidated reporting criteria can be applied to transactions to identify amalgamable transactions, which can be consolidated into a consolidated transaction. The balance management criteria can include scheduling criteria and payment criteria and can be applied to open account balances to facilitate payment of open account balances. | 09-29-2011 |
20140180911 | METHOD AND SYSTEM FOR TRANSACTION MANAGEMENT - A system, method, apparatus, means and computer program products for establishing, monitoring and maintaining spending controls in a payment system are provided. | 06-26-2014 |
Patent application number | Description | Published |
20110197074 | METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD - The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user's selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service. | 08-11-2011 |
20110197265 | METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD - The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user's selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service. | 08-11-2011 |
20110202978 | METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD - The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user's selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service. | 08-18-2011 |
20130019287 | METHOD AND APPARATUS FOR ENABLING A USER TO SELECT AN AUTHENTICATION METHOD - The present invention facilitates access to a restricted service related to secure transactions via a network. The present invention allows a user to select a minimum security level of authentication for its own login to a restricted service. The user's selected minimum security level of authentication may be registered in an authentication method system, so that the user must use the selected minimum security level for authentication in order to gain access to the restricted service. Alternatively, the user may specify that the selected minimum security level for authentication may be over-turned by the user, or optionally re-set to a new authentication method depending on the needs of the user. As such, the present invention allows the user the flexibility to select its own authentication method for accessing a restricted service. | 01-17-2013 |
Patent application number | Description | Published |
20110113244 | STATELESS CRYPTOGRAPHIC PROTOCOL-BASED HARDWARE ACCELERATION - According to one embodiment of the invention, a network device comprises a first processing element and a second processing element. The first processing element is adapted to handle an authentication handshaking protocol, such as the SSL/TLS Handshake, and upon receipt of a Client Key Exchange message, passes control of the authentication handshaking protocol to the second processing element. The second processing element completes the authentication handshaking protocol. | 05-12-2011 |
20110173439 | Stateless Cryptographic Protocol-based Hardware Acceleration - According to one embodiment of the invention, a method comprises an operation of commencing a first phrase and passing control of an authentication handshaking protocol. The first phase is commenced for establishing a secure communication path by a data path processor within a first network device. The first phrase comprises an exchange of data during an authentication handshaking protocol. The passing of control for authentication handshaking protocol by the data path processor to a control path processor is conducted to complete the authentication handshaking protocol. | 07-14-2011 |
20120166804 | VLAN Tunneling - According to one embodiment of the invention, a method is described that is directed to sending, by a network device, information over a first tunnel associated with a first virtual local area network. Also, a second tunnel associated with the second virtual local area network is created by the network device if the information is determined to be received from a network device that is a member of the second virtual local area network differing from the first virtual local area network. Herein, the first tunnel and the second tunnel each encapsulates at least data link traffic. | 06-28-2012 |
20130179678 | Stateless Cryptographic Protocol-based Hardware Acceleration - According to one embodiment of the invention, a method comprises an operation of commencing a first phrase and passing control of an authentication handshaking protocol. The first phase is commenced for establishing a secure communication path by a data path processor within a first network device. The first phrase comprises an exchange of data during an authentication handshaking protocol. The passing of control for authentication handshaking protocol by the data path processor to a control path processor is conducted to complete the authentication handshaking protocol. | 07-11-2013 |
20140153422 | RATE LIMITING MECHANISM BASED ON DEVICE LOAD/CAPACITY OR TRAFFIC CONTENT - The present disclosure discloses a method and network device for a rate limiting mechanism based on device load/capacity or traffic content. Specifically, the system receives a request from a network node, and determines whether a ratio between a current load and a capacity exceeds a threshold. If so, the system determines a wait time period based on current load/capacity ratio, and responds to the network node with a message including the wait time period. Moreover, the system can inspect content of the request to determine a message type, and whether the message type indicates that the request is associated with dependent messages. If so, the system responds to the request with a busy message including the wait time period. Further, the system rejects new session requests if the number of concurrent sessions currently connected to the network device approaches the number of sessions associated with a regression point. | 06-05-2014 |
20140156720 | CONTROL PLANE PROTECTION FOR VARIOUS TABLES USING STORM PREVENTION ENTRIES - The present disclosure discloses a method and network device for control plane protection for various tables using storm prevention entries. Specifically, the disclosed system receives a first packet, and creates an inactive entry in a table. The system then forwards the first packet from a first processor to a second processor for processing. Also, the system associates the inactive entry with a timestamp indicating when the first packet is forwarded to the second processor, and determines a configured interval (CI) associated with the table. Further, the system compares a difference between a current timestamp and the timestamp associated with the inactive entry against the CI upon receiving a second packet. If the difference is longer than the CI, the system associates the inactive entry with the current timestamp, and forwards the second packet to the second processor for processing. Otherwise, the system discards the second packet. | 06-05-2014 |
20140157365 | ENHANCED SERIALIZATION MECHANISM - The present disclosure discloses a method and network device for an enhanced serialization mechanism. Specifically, the disclosed system receives a plurality of packets from a plurality of transport layer flows corresponding to a security association. Also, the system designates one processor of a plurality of processors to be associated with the security association. Moreover, the system assigns a sequence number to each packet, and transmits the plurality of packets from the plurality of transport layer flows such that packets within the same transport layer flow are transmitted in order of their sequence numbers. However, at least two packets from two different transport layer flows may be transmitted out of incremental order of their sequence number. | 06-05-2014 |
20140157376 | SYSTEM AND METHOD FOR MAINTAINING CAPTIVE PORTAL USER AUTHENTICATION - The present disclosure discloses a method and network device for maintaining captive portal user authentication. Specifically, the disclosed system determines an association status between a client and an access point in a wireless network, as well as whether to remove an entry corresponding to the client from a network layer (L3) cache based on the association status. If it is determined that the entry is to be removed, the disclosed system removes the entry corresponding to the client from the network layer (L3) cache. Note that, the association status can be determined based on one or more of an indication by a station management process at the network device, and a detection of radio link activities. | 06-05-2014 |
Patent application number | Description | Published |
20120291098 | Multimode Authentication - Assigning clients to VLANs on a digital network. A client attaching to a digital network through a network device is initially assigned to a first VLAN. This VLAN may have restricted access and is used for authentication. The device snoops DHCP traffic on this first VLAN rewriting DHCP traffic from the client to request a short lease time for the client. A short lease time may be on the order of 30 seconds. The device optionally rewrites DHCP traffic to the client on the first VLAN to assure a short lease time is returned; this rewriting supports DHCP servers which do not issue short leases. Traffic on this first VLAN may be limited to authentication such as captive portals, 802.1x, Kerberos, and the like. If client authentication on the first VLAN does not succeed, when the short lease expires, the client will receive another short lease on the first VLAN. The network device snoops authentication traffic. When authentication succeeds, the device snoops this traffic and derives information such as roles and the target VLAN for the client, saving this information. When the short DHCP lease expires for the client, and the client restarts the DHCP process, the device assigns the client to the target VLAN and all further processing occurs on this target VLAN. | 11-15-2012 |
20130286922 | VIDEO MULTICAST OPTIMIZATION - A network device includes a communication interface and a processor. The communication interface may receive a multicast stream that includes a frame. The processor is coupled to the communication interface and may determine whether to send the frame unicast or multicast. The communication interface transmits the frame unicast or multicast based on the determination by the processor. The determination by the processor may be based on characteristics of the frame. If the characteristics of the frame include characteristics of a key frame such as an I-frame, the processor may determine to transmit the frame unicast. The determination may also be based on a predetermined state of client devices that are to receive the frame. If a client device is in a predetermined state such as a power save state, the processor may determine to transmit the frame unicast to that client device. Other embodiments are also described. | 10-31-2013 |
20140156954 | SYSTEM AND METHOD FOR ACHIEVING ENHANCED PERFORMANCE WITH MULTIPLE NETWORKING CENTRAL PROCESSING UNIT (CPU) CORES - The present disclosure discloses a method and network device for achieving enhanced performance with multiple CPU cores in a network device having a symmetric multiprocessing architecture. The disclosed method allows for storing, by each central processing unit (CPU) core, a non-atomic data structure, which is specific to each networking CPU core, in a memory shared by the plurality of CPU cores. Also, the memory is not associated with any locking mechanism. In response to a data packet is received by a particular CPU core, the disclosed system will update a value of the non-atomic data structure corresponding to the particular CPU core. The data structure may be a counter or a fragment table. Further, a dedicated CPU core is allocated to process only data packets received from other CPU cores, and is responsible for dynamically responding to queries receives from a control plane process. | 06-05-2014 |
20150370723 | System, Apparatus and Method for Prioritizing the Storage of Content Based on a Threat Index - A network sensor that features a data store and a packet processing engine. Communicatively coupled to the data store, the packet processing engine is configured to (i) generate a retention priority for at least a first flow within a first storage region of a plurality of storage regions and (ii) identify, in response to an eviction request, the priority of each of the plurality of storage regions. The priority of the first storage region is partially based on the retention priority associated with the first flow while the priority of a second storage region is based on retention priorities associated with flows stored within the second storage region. The packet processing engine also is configured to identify, through use of the retention priorities of the stored flows within the first storage region, which flows are to be retained and which flows are to be evicted. | 12-24-2015 |
20150372910 | System, Apparatus and Method for Managing Redundancy Elimination in Packet Storage During Observation of Data Movement - A network sensor that features a data store and a packet processing engine. In communication with the data store, the packet processing engine comprises (1) a cache management logic and (2) deduplication logic. The cache management logic is configured to analyze packets to determine whether (a) a packet under analysis include duplicated data and (b) content of the packet is targeted for storage in a same continuous logical storage area as the duplicated data. The deduplication logic, when activated by the cache management logic, is configured to generate a deduplication reference for insertion into the packet prior to storage. | 12-24-2015 |
Patent application number | Description | Published |
20110173682 | System and Method for Wide Area Wireless Connectivity to the Internet - A system and method for managing access to a Wi-Fi system include redirecting an access request, comprising a user credential, from a wireless user device to an authentication server, obtaining, from a first database, a list of a plurality of authentication databases from which users may be authenticated, the list including a protocol required for communication with each of the authentication databases, transmitting a request to each of the listed authentication databases using the identified protocol, and permitting the user access to the Internet through the Wi-Fi system if the user is authenticated by at least one of the listed authentication databases. | 07-14-2011 |
20120311688 | HOSTED MEDIA CONTENT SERVICE SYSTEMS AND METHODS - An exemplary system includes 1) at least one computing device within a first computing subsystem associated with a hosted media content service, the at least one computing device configured to authenticate a user to the hosted media content service and provide at least one encrypted token to a user device associated with the user, and 2) at least one other computing device within a second computing subsystem associated with the hosted media content service, the at least one other computing device configured to store hosted media content associated with the hosted media content service, receive the at least one encrypted token from the user device, validate the at least one encrypted token, and perform, in response to the validation, at least one action on media content as part of the hosted media content service. Corresponding methods and systems are also disclosed. | 12-06-2012 |
Patent application number | Description | Published |
20150127834 | OPTIMIZING PLACEMENT OF VIRTUAL MACHINES - Systems and methods are described for allocating resources in a cloud computing environment. The method includes receiving a computing request, the request for use of at least one virtual machine and a portion of memory. In response to the request, a plurality of hosts is identified and a cost function is formulated using at least a portion of those hosts. Based on the cost function, at least one host that is capable of hosting the virtual machine and memory is selected. | 05-07-2015 |
20160094480 | DISTRIBUTED APPLICATION FRAMEWORK FOR PRIORITIZING NETWORK TRAFFIC USING APPLICATION PRIORITY AWARENESS - A system and a method for prioritizing network traffic using application awareness and network awareness in a network environment is disclosed. An exemplary method can include receiving a network traffic priority for network traffic associated with a job performed by a distributed application; and based on the network traffic priority, assigning the network traffic to a network classification model, such as an access control list, associated with a network element for directing the network traffic in a network. The network classification model is associated with a network traffic priority class having defined quality of service (QoS) features, such that the network traffic traverses the network according to the defined QoS features. | 03-31-2016 |
20160103695 | OPTIMIZED ASSIGNMENTS AND/OR GENERATION VIRTUAL MACHINE FOR REDUCER TASKS - The present disclosure relates to assignment or generation of reducer virtual machines after the “map” phase is substantially complete in MapReduce. Instead of a priori placement, distribution of keys after the “map” phase over the mapper virtual machines can be used to efficiently reducer tasks in virtualized cloud infrastructure like OpenStack. By solving a constraint optimization problem, reducer VMs can be optimally assigned to process keys subject to certain constraints. In particular, the present disclosure describes a special variable matrix. Furthermore, the present disclosure describes several possible cost matrices for representing the costs determined based on the key distribution over the mapper VMs (and other suitable factors). | 04-14-2016 |
Patent application number | Description | Published |
20110217969 | DEVICES WITH MULTIPLE SUBSCRIPTIONS THAT UTILIZE A SINGLE BASEBAND-RADIO FREQUENCY RESOURCE CHAIN - A mobile communication device with multiple subscriptions includes a single baseband-radio frequency (BB-RF) resource chain. A first identity module, such as a subscriber identity module (SIM), a second identity module (e.g., a second SIM), and a controller are communicatively coupled to the single BB-RF resource chain. The first identity module is associated with a first subscription, and the second identity module is associated with a second subscription. The controller may be configured to arbitrate access to the single BB-RF resource chain to perform a first activity that corresponds to the first subscription or a second activity that corresponds to the second subscription. For example, the controller may interrupt a data session processed by the single BB-RF resource chain in response to receiving information indicating that a voice call is to be processed by the single BB-RF resource chain. | 09-08-2011 |
20130012254 | ADJUSTING A SIGNAL-TO-INTERFERENCE RATIO TARGET BASED ON A SIGNAL CHARACTERISTIC - A particular method includes transmitting a message corresponding to a reporting event detected at a mobile device, where the reporting event is associated with a network condition that decreases a likelihood of the mobile device successfully decoding a reply to the message. The method also includes, in response to transmitting the message, increasing a signal-to-interference ratio (SIR) target of the mobile device. | 01-10-2013 |
20130016601 | APPARATUS AND METHOD FOR MAINTAINING A CIRCUIT-SWITCHED VOICE CALL IN A MULTI-RAB WIRELESS COMMUNICATION SYSTEM IN AN AREA OF WEAK COVERAGE - An apparatus and a method are provided for improving user experience in a multi-radio access bearer (multi-RAB) wireless communication system. After a user equipment establishes a circuit-switched communication link and a packet-switched communication link with a core network, it may receive an indication of an error associated with the packet-switched communication link. Here, if the value of a timer such as the RAB re-establishment timer T314 has a predetermined value (e.g., 0), the user equipment may release the packet-switched communication link, and maintain the circuit-switched communication link. The packet-switched communication link may then be re-established. In this fashion, errors that may occur on the data call need not interrupt a voice call. | 01-17-2013 |
20130033990 | SYSTEMS, METHODS AND APPARATUS FOR WIRELESS CONDITION BASED MULTIPLE RADIO ACCESS BEARER COMMUNICATIONS - Systems, devices, and methods for wireless condition based multi radio access based wireless communication are provided. In one aspect, a device configured to communicate via a wireless communication link is provided. The device includes a controller configured to send a request for network resources for packet data transmission. The controller may be configured to suppress the request for network resources based in part on a condition of the wireless communication link and a type of wireless communication that is being transmitted by the device. | 02-07-2013 |
Patent application number | Description | Published |
20120088901 | POLYMER FILM-PRODUCING METHODS AND DEVICES PRODUCED THEREFROM - Described herein are improved methods of forming polymer films, the polymer films formed thereby, and electronic devices formed form the polymer films. The methods generally include contacting a polymer with a solvent to at least partially solvate the polymer in the solvent, exposing the at least partially solvated polymer and solvent to ultrasonic energy for a duration effective to form a plurality of ordered assemblies of the polymer in the solvent, and forming a solid film of the polymer, wherein the solid film comprises the plurality of ordered assemblies of the polymer. | 04-12-2012 |
20120318136 | HOT GAS FILTRATION MEDIA AND FILTERS - A nonwoven felt for hot gas filtration. The fibers have a polyarylene sulfide (PAS) component that contains a zinc compound. In one embodiment, the PAS comprises at least one zinc(II) salt of an organic carboxylic acid. Also a method for filtering hot gases employing a bag made from a PAS component that contains a zinc or a zinc based additive. | 12-20-2012 |
20140046012 | POLYMER FILM-PRODUCING METHODS AND DEVICES PRODUCED THEREFROM - Described herein are improved methods of forming polymer films, the polymer films formed thereby, and electronic devices formed form the polymer films. The methods generally include contacting a polymer with a solvent to at least partially solvate the polymer in the solvent, exposing the at least partially solvated polymer and solvent to ultrasonic energy for a duration effective to form a plurality of ordered assemblies of the polymer in the solvent, and forming a solid film of the polymer, wherein the solid film comprises the plurality of ordered assemblies of the polymer. | 02-13-2014 |
Patent application number | Description | Published |
20140279508 | SELECTIVE OPERATION OF EXECUTABLE PROCEDURES BASED ON DETECTED GESTURE AND CONTEXT - In embodiments, a generic gesture made with a computing device may be detected. In various embodiments, a context of the apparatus and/or a user of the apparatus may be determined. In various embodiments, at least one of a plurality of executable procedures may be selectively operated based on the detected generic gesture and the determined context. | 09-18-2014 |
20140282886 | CONTENT LIST SHARING - In embodiments, a server may receive an indication of a content list to be transferred from a first user equipment to a second user equipment. The content list may include information related to content such as books, music, movies, physical items, software, games, or other physical or non-physical goods or media. The server may identify the content in the content list, and then determine what rights, if any, the user of the second user equipment has to access the content in the content list. In some embodiments, the server may then accept a purchase request from one or both of the first user or the second user, and alter the permissions of the second user in response to the purchase request. Finally, the server may facilitate the transfer of the content list, and the content associated with the content list and accessible to the second user, to the second user equipment. Other embodiments may be described and/or claimed. | 09-18-2014 |
20140337181 | COLLECTIVE ORDER FULFILLMENT - In embodiments, a buyer may place a purchase order, e.g., to a collective fulfillment computing platform, for a quantity of a product to be produced. In various embodiments, the purchase order may include one or more criteria for fulfillment of the purchase order. In various embodiments, notification of the purchase order may be transmitted, e.g., by the platform, to a plurality of potential suppliers of the product. In various embodiments, at least some of the plurality of potential suppliers may place bids to fulfill at least portions of the purchase order. In various embodiments, the platform may be configured to automatically apportion at least an initial payment for the purchase order among the bidding suppliers based at least in part on profiles associated with the first plurality of potential suppliers and the one or more criteria for collective fulfillment of the purchase order. | 11-13-2014 |
20140337267 | GEOGRAPHIC COORDINATES BASED SOCIAL NETWORK - Embodiments relate to methods, apparatuses, and media configured to identify user characteristics based at least in part on the user's association with geographic coordinates or ranges defining locations or areas of Earth's surface. Recommendations may then be provided to the user based at least in part on the identified user characteristics based on geographic coordinates. Other embodiments may be described or claimed. | 11-13-2014 |
20140337305 | GEOGRAPHIC COORDINATES BASED CONTENT SEARCH - Apparatuses, methods and storage medium associated with geographic coordinates based content search are disclosed herein. In embodiments, a search service may be configured to analyze a plurality of contents having non-geographic coordinate content items. The analysis may include determination of whether the non-geographic coordinate content items are associated with a plurality of locations on Earth's surface. The locations may be identifiable by a plurality of geographic coordinates of a geographic coordinate system. For contents with non-geographic coordinate content items recognized to be associated a plurality of locations, the search service may generate and store indices that index the geographic coordinates of the locations to the contents with associated non-geographic coordinate content items. Other embodiments may be described and/or claimed. | 11-13-2014 |
20140372151 | PROVISION OF INSURANCE PRODUCTS - In embodiments, methods, storage media, and apparatuses are described that are associated with provisioning of insurance products. In various embodiments, a request for an insurance product associated with an event may be received. A plurality of insurance underwriters may be identified that agree to automated payment of individual payment amounts upon occurrence of the event. Assets and/or lines of credit of the insurance underwriters may be encumbered to provide for automated taking of the individual payment amounts upon occurrence of the event. Other embodiments may be described and claimed. | 12-18-2014 |
20140372283 | DISTRIBUTED LOAN UNDERWRITING - In embodiments, methods, storage media, and apparatuses are described that are associated with underwriting of loans. In various embodiments, offers to underwrite a loan may be received by one or more loan underwriters. Assets and/or lines of credit of the loan underwriters may then be encumbered such that, upon a requirement to pay the loan balance to a lender, the loan balance may be automatically taken from these assets and/or lines of credit. Other embodiments may be described and claimed. | 12-18-2014 |
20150019404 | CREDITWORTHINESS DETERMINATION THROUGH ONLINE SOCIAL NETWORK ENDORSEMENTS - Embodiments relate to computer-implemented methods and computing apparatuses for technologically determining a creditworthiness metric for a potential borrower are disclosed. In embodiments, a creditworthiness metric for a potential borrower may be determined based at least in part on endorsements of other parties connected to the potential borrowers via an online social network. In embodiments, users of an online social network may make respective endorsements of other users of the online social network. Respective creditworthiness metrics may be determined based on the endorsements, and/or other factors, such as connections, endorsement values, so forth. Other embodiments may be disclosed and/or claimed. | 01-15-2015 |
20150161682 | VIRTUALIZING BUILDINGS/SITES AND AUGMENTING VIRTUALIZED BUILDINGS/SITES METHODS AND APPARATUSES - Apparatuses, methods and storage medium associated with virtualizing a building or a site are disclosed herein. In embodiments, an apparatus for virtualizing a building or a site may include one or more processors, and a building/site interface engine configured to be operated by the one or more processors. The building/site interface engine may be configured to facilitate a representative of a building or site to logically associate a virtual billboard with the building or site, to enable an appearance of the corresponding building or site in a 3D view map be augmented with the virtual billboard. The virtual billboard may include one or more commercials. The 3D view map may include an image of the building or site. Other embodiments may be described and/or claimed. | 06-11-2015 |
20150205820 | GEOGRAPHIC MNEMONICS - Apparatuses, methods and storage medium associated with geographic mnemonics are disclosed herein. In embodiments, an apparatus may include a registration module and a response module. The registration module may be configured to accept a registration of a geographic mnemonics, and store the geographic mnemonics. Acceptance of registration and storage of the geographic mnemonics may further comprise receipt of an address and/or meta data to be associated with the geographic mnemonics, and storage of the address and/or meta data as associated with the geographic mnemonics. The response module may be configured to respond to a query about the geographic mnemonics, with at least the associated address and/or meta data. Other embodiments may be described and/or claimed. | 07-23-2015 |
20150206159 | GEOGRAPHIC MNEMONICS BASED MESSAGING - Apparatuses, methods and storage medium associated with geographic mnemonics based messaging are disclosed herein. In embodiments, an apparatus may include a data collection module configured to collect demographics of users interacting with a geographic mnemonics associated with a location or an area that includes the location. In response to a request from a requestor for the demographics of users interacting with the geographic mnemonics, the data collection module may respond to the requestor with collected demographics of users interacting with the geographic mnemonics, to enable the requestor to select and transmit a message to the client device, based at least in part on the collected demographics of users interacting with the geographic mnemonics. Other embodiments may be described and/or claimed. | 07-23-2015 |
Patent application number | Description | Published |
20110202437 | DOCUMENT MANAGEMENT SYSTEM - A computer-readable medium, computer-implemented method, and apparatus are provided. In one embodiment, a change order for a purchasing document is created, and one or more attributes of the change order are modified. Approval of the change order is submitted and approved, and a change type of the change order is determined. When the change type is external, acknowledgment of the change order is requested and a revision number attribute of the purchasing document is incremented. The purchasing document is updated with the change order and the change order is archived. | 08-18-2011 |
20130254073 | SYSTEM AND METHOD FOR RETURNING INDIVIDUAL LINES OF A PURCHASE REQUISITION FOR CORRECTION AND APPROVAL - Embodiments of the present invention relate generally to methods and systems for processing purchase requisitions and purchase orders in a procurement system and more particularly systems and methods for returning single or individual requisition lines back to the requester without affecting other associated requisition lines under the same requisition. Generally speaking, embodiments allow users of a procurement system to return individual requisition lines instead of returning all the requisition lines in the purchase requisition. In some cases, policies require all or some subset of all lines of a requisition be processed together when possible. Hence, if there are more than one requisition lines, the buyer can be presented with a choice whether he or she would like to return the individual line or whether he would like to return all or some subset of all of the lines allowing a buyer to make a more informed decision. | 09-26-2013 |
20130282535 | REOPENING A FINAL CLOSED PURCHASE ORDER FOR CONTINUATION OF RECEIPT AND INVOICE - A method of calculating accounting encumbrance adjustments for a purchase order associated with a first allocation of a budget includes determining that the purchase order has been closed, where the closure prevents additional processing associated with the purchase order by an invoice processing system; receiving a request to reopen the purchase order, where the request is associated with an additional cost; causing a determination to be made as to whether a second portion of the budget should be allocated, where the second portion of the budget corresponds to the additional cost; and in response to a determination that the second portion of the budget can be allocated: causing the second portion of the budget to be allocated, reopening the purchase order, and sending an indication to the invoice processing system that the purchase order is reopened. | 10-24-2013 |
20130311338 | APPROVAL SYSTEM FOR BUYER-INITIATED REQUISITION MODIFICATIONS - A method of modifying a requisition within approval and budgetary constraints by a procurement organization may include receiving the requisition from a requesting organization, where the requisition may comprise one or more lines, each having been approved by the requesting organization. The method may also include receiving a change to be applied to a first line associated with a first budget allocation, where the change may be received from a buyer in the procurement organization, and the change may be associated with a second budget allocation. The method may additionally include determining that the change violates a threshold, sending the change to the requesting organization for a second approval, receiving, from the requesting organization, an indication as to whether the second approval is granted, and creating a purchase order based on the indication as to whether the second approval is granted. | 11-21-2013 |
20150074641 | FUNCTIONAL RULE AND COMPONENT STORAGE - A method of managing software design specifications with functional rule versioning may include storing references to a plurality of software components in a database system, and storing references to a plurality of functional rules in the database system. In some embodiments, the functional rules may define behaviors that may be assigned to the plurality of software components. The method may also include receiving a selection of one or more software components from the plurality of software components. The one or more software components may define a software product. The method may additionally include receiving assignments of the plurality of functional rules to the one or more software components, and providing an interface for navigating through the one or more software components and editing the assignments. | 03-12-2015 |
20150127494 | REINSTATING ELECTRONIC REQUISITION DEMAND RECORDS - A method of reinstating requisition demands using information from a canceled purchase order in an enterprise accounting computer system may include identifying canceled purchase order distributions in the canceled purchase order. The method may also include generating new requisition distributions based on the canceled purchase order distributions, and generating new requisition lines for the new requisition distributions. The method may further include generating one or more new purchase orders based on the new requisition lines. | 05-07-2015 |
20150228005 | DISTRIBUTION MANAGEMENT FOR PURCHASE REQUISITIONS - Embodiments of the present invention are directed to techniques (e.g., systems and methods) for management and tracking of distribution and schedules of a purchase order associated with a purchase requisition. In certain embodiments, a procurement management system can manage information and relationships between split or new distribution and/or schedule requirements for a purchase order in fulfillment of a purchase requisition. In particular, information about a purchase requisition, such as a requisition identifier (requisition ID), can be stored and used later to manage and track distribution and/or schedules for fulfillment of one or more purchase orders. Using information stored about a relationship between a purchase requisition and the distributions and the schedules for a purchase order, a procurement management system can ascertain details about distribution and schedules of a purchase order for fulfillment of a purchase requisition. | 08-13-2015 |