46th week of 2013 patent applcation highlights part 64 |
Patent application number | Title | Published |
20130304613 | AUTOMATED PRICING SYSTEM - The present invention comprises a method and system for a rapid and automated creation of a price schedule comprising steps and an implementation for providing a set of construction (or other) plans created with an architectural, civil, industrial or other software design tool, such as CAD, and optionally a palette of 2-dimensional and/or 3-dimensional architectural parametric symbols that correspond to respective construction plan elements, such as windows, doors, acrylic glass blocks and/or sky lights. At least one parametric symbol corresponding to a construction plan element is preferably inserted into the construction plans. A cost value for each of the inserted parametric symbols is preferably calculated corresponding to respective plan elements. A price schedule is then optionally created which includes the total cost for all of the inserted parametric symbols corresponding to respective plan elements. | 2013-11-14 |
20130304614 | TICKET-BASED HARVEST LIFE CYCLE INFORMATION MANAGEMENT: SYSTEM AND METHOD - A system and method is presented for gathering data concerning harvests. Data tickets are generated at a point of origination (i.e., the field), local storage, processing, or a customer location. Data tickets may also be generated for supplies delivered to the field. Implements attached to a vehicle in the field (e.g., a tractor) may provide data over a vehicle communication bus about how a field processing task was performed. Data may be extracted from the bus to use in preparing a field processing ticket, possibly in combination with manual entry from field personnel. A harvest data tracking system, based on data tickets, may be used to track the complete life cycle of crop production. | 2013-11-14 |
20130304615 | Methods and Systems for Providing Real-Time Accounting in Interactive, Interest Centric Communications Environment - A method for providing real-time accounting in an interactive communications environment includes providing one or more electronic devices configured to communicate over a communications network. The method includes providing one or more servers configured to provide interactive data to the electronic devices over the communications network and to control the interactive data and to coordinate participant activities via the electronic devices over the communications network, wherein the interactive data comprises at least one of interest items, relationship and resource items and stuff. The method includes authenticating one or more participants by the electronic devices, modifying the interactive data based on one or more modification criteria, providing real-time accounting data based upon the participant's activities and interests, wherein the accounting data is associated with and identifies and distinguishes the relationship and resource items in real-time. The method includes modifying the accounting data based upon alterations to interactions. | 2013-11-14 |
20130304616 | TEXT NOT AVAILABLE - A technique involves modular storage of network service plan components and provisioning of same. A subset of the capabilities of a service design system can be granted to a sandbox system to enable customization of service plan offerings or other controls. | 2013-11-14 |
20130304617 | METHOD OF VALUATION OF GEOLOGICAL ASSET OR INFORMATION RELATING THERETO IN THE PRESENCE OF UNCERTAINTIES - Methods are disclosed for assigning a value to a geological asset or information relating thereto in the presence of private and public sources of uncertainties. The private and public uncertainties associated with a geological asset or information associated therewith are defined, and private uncertainties are assigned a subjective probability representing the best state of knowledge currently available. A multi-dimensional valuation-time lattice is constructed using the subjective probabilities for the private uncertainties and using risk-neutral probabilities for the public uncertainties. A backward recursion through the multi-dimensional lattice is performed in order to generate a present value for the asset given the present information available. During the backward recursion, a tally of delta hedging coefficients is generated and stored in order to provide an operational “map” or “decision pathway” should the project move forward. | 2013-11-14 |
20130304618 | Method, apparatus and system for financial planning incorporating calculated health costs based on actual claims & the actual cost thereof - A financial management tool that includes calculated health care costs and health-based longevity to provide information to retirees to be able to calculate the amount of money that needs to be saved to cover retirement expenditures is provided with actual claims and actual related cost data from a database to increase the cost projection reliability of the tool. | 2013-11-14 |
20130304619 | System for Reducing Information Required to Open a New Account - An existing customer of a financial institution may open a new account with their financial institution using an optimized online interface. Initially, the interface presents a standard application for a new account in which an extensive number of fields for personal and financial information must be completed. A link is provided on this long application for use by existing account holders only. Upon selection of the link, an existing account holder is instead presented with a short application in which only the account holder's name, a portion of their social security number, their existing account number, and their account confirmation identifier are required to be entered. | 2013-11-14 |
20130304620 | USING A VALUE-ASCERTAINABLE ITEM TO OBTAIN CREDIT AT A THIRD-PARTY MERCHANT - Techniques are provided for providing value to a user in exchange for the user's value-ascertainable item. In one technique, the user, while in a merchant's store, uses a mobile device to scan a QR code that triggers a browser application to send a request to an exchange service over a network. The request includes data that is associated with the merchant. The user provides card data of a particular gift card to the exchange service. The exchange service checks the balance of the card and sends an offer for the card to the user. If the user accepts, then the exchange service sends account information and/or a bar code to the user's mobile device. The account information or bar code can be used immediately by the user to purchase one or more items at the store. | 2013-11-14 |
20130304621 | Algorithmic Trading Management System and Method - Embodiments of the invention are directed to a computer-implemented system and method for facilitating electronic market participation of traders. The algorithmic trading management system may comprise an algorithm and/or sequence usage and construction module providing conditional user interface features for allowing traders to construct algorithms or sequences to structure trading orders. The system may additionally include sequence modification components for allowing traders to modify algorithms collected from external sources in order to customize trading orders. The system may further include operator intervention tools for allowing traders to manually influence sequence execution through a user interface. | 2013-11-14 |
20130304622 | METHODS AND SYSTEMS FOR COMPUTING TRADING STRATEGIES FOR USE IN PORTFOLIO MANAGEMENT AND COMPUTING ASSOCIATED PROBABILITY DISTRIBUTIONS FOR USE IN OPTION PRICING - Exemplary methods and systems for creating uncorrelated trading strategies and deriving associated implied probability distributions of the price of an underlying financial instrument at future times are disclosed, applicable to stock market prices, interest rates, currency exchange rates, commodity prices and credit spreads. | 2013-11-14 |
20130304623 | STOCK RANKING & PRICE PREDICTION BASED ON NEIGHBORHOOD MODEL - A system and method of aggregating and ranking stocks based on the earning capabilities of each stock. The novel system and method use a neighborhood model of pricing trend prediction to aggregate a plurality of “neighboring” or related stocks to predict pricing of one stock within the plurality of related stocks. The system facilitates investors trading stocks by using the novel methodology to rank the stocks and by having an easy-to-use interface. | 2013-11-14 |
20130304624 | Method and System for Displaying and Trading Spreads - A trading application can receive price and quantity information for tradeable objects. The trading application can compute implied price and quantity information for spreads of the tradeable objects. Direct and indirect price and quantity information for the spreads can be displayed in a manner that shows the relationship with each other and with the price and quantity information for the tradeable objects. | 2013-11-14 |
20130304625 | MANAGING TRADING ORDERS BASED ON PRIORITY - A system for managing trading orders comprises a memory operable to store a first trading order for a particular trading product, wherein the first trading order comprises a display portion and a reserve portion and is received from a first trader. The memory is further operable to store a second trading order for the particular trading product, wherein the second trading order comprises a display portion and a reserve portion and the second trading order is received from a second trader after the first trading order. The system further comprises a processor communicatively coupled to the memory and operable to receive from a counterparty trader a counterorder for the trading product. The processor is further operable to use the counterorder to fill the display portion of the first trading order. The processor is further operable to use the counterorder to fill the display portion of the second trading order. After filling the display portion of the second trading order, the processor is further operable to exclusively offer at least a portion of the counterorder to the first trader for a configurable period of time. | 2013-11-14 |
20130304626 | SYNCHRONIZED PROCESSING OF DATA BY NETWORKED COMPUTING RESOURCES | 2013-11-14 |
20130304627 | EXCHANGE ORDER PRIORITY RETENTION FOR ELECTRONIC TRADING USING AUTOMATIC BOOK UPDATES - The present invention involves providing a computer based platform for allowing a user to establish a target trading book; evaluating the user's unmatched exchange trades to determine an actual trading book at a point in time; determining a differential between the target trading book and the actual trading book; and identifying at least one exchange trade action to transition from the actual trading book to the target trading book, wherein the exchange trade action is based on preserving at least one unmatched order with the oldest possible entry time stamp. | 2013-11-14 |
20130304628 | TECHNOLGY FOR PRODUCING RELATIVE PERFORMANCE BASED INDEXES WITH CORRESPONDING TRADABLE FINANCIAL PRODUCTS - Technology is described for constructing benchmark-adjusted relative performance indexes that reflect total performance of a traded, target security relative to a benchmark instrument. Derivative instruments, such as exchange-traded futures and options, allow investors to take precise hedging or speculation positions on target security relative to the benchmark instrument. | 2013-11-14 |
20130304629 | SELF FULLFILLED ONLINE FINANCIAL INSTRUMENT - The system provides a method and apparatus for self fulfillment of financial instruments via an online system. The consumer is able to initiate, apply for, and complete a lending transaction completely online with minimal or no offline interaction with financial institutions. An advantage of the system is that it allows a consumer to receive information and offers from one to many lenders online and self-fulfill a loan or other financial instrument online without the need to interact with a traditional loan officer. The systems includes a shopping tool to help a consumer identify and make their own decision in selecting a loan that best fits their needs including an easy to complete online loan application, a rate locking feature that allows a consumer to lock and/or re-price their loan quickly, and an eSigning capability to simplify the signing process. | 2013-11-14 |
20130304630 | Real-Time Approval of Bank Draft Payments for Money Transfer Transactions - Systems and methods which allow for utilizing bank draft payments to contemporaneously fund money transfer transactions while also mitigating for the risk the bank draft payment being returned are provided. One embodiment provides a method for funding a money transfer transaction. The method includes establishing a money transfer transaction between a sending party and a receiving party. Account information corresponding to an account of the sending party is received and a bank draft transaction from the account may be established. With the account information and optionally other transaction information, a determination is made whether to accept the bank draft transaction to fund the money transfer transaction prior to the clearance of the bank draft transaction. In the event that the bank draft transaction is accepted, the money transfer transaction is funded prior to clearance of the bank draft transaction. | 2013-11-14 |
20130304631 | WI-FI HOT-SPOT NETWORKING ECOMMERCE - Methods and systems for using a device as a wireless hotspot service provider are disclosed. An exemplary method for providing a hotspot service provider includes performing a first registration of a first device as a first hotspot service provider in a first coverage are of the first device. The first registration includes identifying an account of an owner of the first device. A second registration of a second device as a hotspot service consumer is also performed. The second registration includes identifying an account of an owner of the second device. A first amount is charged against an account of the owner of the second device based on a resource usage by the second device via the first device. At least a portion of the first amount is credited to the account of the owner of the first device. | 2013-11-14 |
20130304632 | SYSTEMS AND METHODS FOR AN ONLINE PAYMENT SYSTEM WITH A DEMURRAGE CHARGE - A system and method to control an online payment system are disclosed. A user account of the online payment system may be subjected to a demurrage charge and a cash-out charge. In some embodiments, the demurrage charge is based on a percentage of the amount of funds currently deposited in the user account. The demurrage charge may be applied to the user account at a particular time interval or unit of time. The cash out charge may be applied to funds that are transferred out of the user account to an external account that is not controlled by the online payment system. In some embodiments, the demurrage charge may encourage frequency of transactions between users as well as increasing networks of users. Moreover, transactions between users involving transfer of funds between user accounts controlled by the online payment system may not be subject to fees. | 2013-11-14 |
20130304633 | INTERACTIVE SYSTEM - An interactive system for creating, offering and processing a series of partial transactions between one or more nodes in substantially real time to establish a complete transaction between two nodes is disclosed. The system may include a delivery node for offering partial transactions, a central node configured to receive and collate partial transactions from the delivery node and to provide information regarding partial transactions simultaneously to one or more user nodes configured to receive and review partial transactions from the central node, and a parsing module is provided which is configured to amend pre-selected details pertaining to the or each partial transaction delivered to it by the delivery node to generate at least one parsed partial transaction. | 2013-11-14 |
20130304634 | Systems and Methods for Performing Funds Freeze and/or Funds Seizure with Respect to Prepaid Payment Cards - Systems, mechanisms and processes are provided to allow law-enforcement officials, when encountering the potential use of prepaid payment cards in the furtherance of a crime or in relation to criminal activities, to ( | 2013-11-14 |
20130304635 | MOBILE TERMINAL AND CONTROLLING METHOD THEREOF - A mobile terminal and controlling method thereof are disclosed. The present invention supportive of NFC (near field communication) technology includes a controller configured to control an offer of at least one 1 | 2013-11-14 |
20130304636 | System and Method for Payment Reconciliation Against Expressive Contracts - In a computer-implemented method of conducting expressive payment reconciliation, a purchase transaction is stored in a computer storage accessible to a processor. The processor identifies a contract against which the purchase transaction is made and a first payment amount for the purchase transaction. Contract data is stored in the computer storage and the processor determines a second payment amount for the purchase transaction based on at least one good or service associated with the purchase transaction and the data about the contract. In response to a difference in the first and second payments, the processor either stores computer storage a modified invoice with a modified payment amount, stores in the computer storage a reconciliation payment equal to the payment difference; outputs over a computer network an explanation of the modified payment; or outputs over a computer network a dispute notification. | 2013-11-14 |
20130304637 | FRAUD CONTROL INTEGRATED FORM FILLING TOOL - A system and method for fraud prevention is provided. This system and method may comprise a form filing application. Form filling application may comprise enhanced authorization data capture capabilities. A system for transmitting an authorization request and a request for fraud services to a transaction account issuer is disclosed. The transaction account issuer may combine the authorization request and request for fraud services with additional enhanced authorization data to create an authorization response. | 2013-11-14 |
20130304638 | METHOD AND SYSTEM TO PROCESS PAYMENT USING SMS MESSAGING AND A MOBILE-OPTIMIZED WEB FORM - Provided is a method and system for processing payment/information, including receiving, by an electronic circuit of a mobile communication device, a payment/information processing statement for a customer by a short message service (SMS) message, the payment/information processing statement including an online payment/information URL personalized to uniquely identify the customer. Next, the online payment/information URL is extracted from the SMS, and a mobile-optimized web page is accessed using the online payment/information URL. A customer's online payment/information form is then received and completed by the customer, then forwarded to a secure payment form server. | 2013-11-14 |
20130304639 | METHODS AND SYSTEMS FOR GLOBAL INVOICE PROCESSING AND PAYMENT - A computer based method and system for managing payments from a shipper to one or more carriers is described. A web-based interface portal is accessible by a shipper, one or more carriers and an invoice payment service provider to enable data relevant to various characteristics of a shipment of goods to be uploaded into a database. One or more profiles are created with the data to enable a specified shipment to be rated, to enable a carrier's actual invoice for a specified shipment to be compared with a rated invoice for that specified shipment to identify discrepancies between the rated and actual invoices. | 2013-11-14 |
20130304640 | Transaction Split Fees - A transaction fee imposed by a payment provider may be allocated between the parties to an on-line transaction in any way and at any time. This adds flexibility to the transaction and allows the parties to allocate the transaction fee on a per transaction basis that best suits the parties. | 2013-11-14 |
20130304641 | Autonomous Device Interaction - A method, system, apparatus, and computer program product are provided for facilitating autonomous device interaction. For example, a method is provided that includes receiving response configuration information, receiving at least one indication of at least one occurrence of at least one triggering event, and receiving information regarding at least one peripheral device. The method further includes determining, based at least in part on the information regarding the at least one peripheral device and the response configuration information, at least one configured responsive action and performing at least one authorization procedure. The method even further includes determining, based at least in part on the at least one authorization procedure, whether the at least one configured responsive action is authorized, and, in an instance in which the at least one configured responsive action is authorized, causing the at least one configured responsive action to be automatically performed. | 2013-11-14 |
20130304642 | System and Method for Using Intelligent Codes to Add a Stored-Value Card to an Electronic Wallet - A method comprises receiving a request to add a stored-value card to an electronic wallet via interpreting an intelligent code which directs a user to a URL for an electronic wallet website; prompting a user for credentials to enter the electronic wallet website; determining whether the stored-value card already exists in the electronic wallet; and adding the stored-value card to the electronic wallet. A system comprises a computer device to receive a request to add a stored-value card to an electronic wallet via interpreting an intelligent code which directs a user to a URL for an electronic wallet website; to prompt a user for credentials to enter the electronic wallet website, to determine possession of the stored-value card, to determine whether the stored-value card already exists in the electronic wallet, and to add the stored-value card to the electronic wallet. | 2013-11-14 |
20130304643 | MULTIPLE ACCOUNT ADVANCED PAYMENT CARD AND METHOD OF ROUTING CARD TRANSACTIONS - A system of accessing through a financial processing network multiple accounts associated with a single financial card. Data is input to the financial network in addition to the transaction data and the account identification data that in read from the card. This addition data permits the proper account to be accessed. The data may be input at the point of sale as an account selection. In this instance, the selection may be used to route the transaction data through the financial processing network or may be used to read data regarding one of multiple accounts encoded on the card. The data may also be stored as conditional routing rules at transfer points in the financial processing network. In this instance, the transaction is routed to the proper account based on the stored rules. | 2013-11-14 |
20130304644 | Establishing a Financial Account using a Mobile Computing Device - A financial account is established using a mobile computing device. A digital image of an applicant's identification having text based components is captured. The digital image of the identification is processed to recognize at least a portion of the text based components. The portion of the text based components is used to complete an application for the financial account. The digital image of the identification is transmitted to a regulatory body. Verification of the identity of the applicant is received from the regulatory body. The financial account for the applicant is established. | 2013-11-14 |
20130304645 | AUTOMATED FUTURE COLLEGE FUND - An online automated system enables users to automatically receive contributions and/or donations to their own or a beneficiary's college savings account with the click of an online button, which is linked to their college savings account through a secure payment facilitator such as WePay or PayPal. The users account information is set up and saved securely. This allows donations and/or contributions to be easily sent to the beneficiary's college savings account from anyone that clicks the button, such as family members or friends. This method makes it much simpler and automatic with the click of an online button to contribute/donate directly to the college savings account without having to know the account number of the college savings account, write a check, and mail it in. | 2013-11-14 |
20130304646 | METHOD AND SYSTEM FOR IDENTITY AND KNOW YOUR CUSTOMER VERIFICATION THROUGH CREDIT CARD TRANSACTIONS IN COMBINATION WITH INTERNET BASED SOCIAL DATA - A method and system for verifying an identity of a card holder associated with a payment card using a payment device comprising a card reader and a mobile device. The method comprising the steps of initiating verification of identity of the card holder by inserting the payment card in the card reader of the payment device, reading card information from the payment card communicating the card information from the mobile device to a payment server, comparing received card information with stored card information in the payment server and accessing at least one web service. The account activity is analysed in the at least one web service and in that way verifying that the identity of the card holder is the same as the identity associated with the payment card, based on the analysis of information from the at least one web service and from the comparison of card information with stored card information. Terminating the verification process by communicating the result of the verification process from the payment server to the payment device. | 2013-11-14 |
20130304647 | Purchasing Transaction System & Method For Multi-media objects - Methods, apparatuses, and systems facilitating search, discovery, submission and/or distribution of digital objects over networks. In one implementation, the system allows users to search, discover, submit and/or purchase a digitally encoded multi-media object in any number of different formats and direct that content to any device or devices. | 2013-11-14 |
20130304648 | SYSTEM AND METHOD FOR AUTHENTICATION USING PAYMENT PROTOCOL - Methods, systems, and devices are disclosed for using a payment processing network as an authorization engine to access secure physical areas, such as college dormitories, office buildings. A keycard with a cryptogram generator is presented by a user to an access device, and the access device or associated computer sends an access request message formatted like a payment authentication request message to an aggregator/acquirer and payment processing network. The payment processing network validates the cryptogram and returns an access response message, again formatted like a payment authorization response message, indicating that the keycard is authentic. The gate, door, turnstile, or other barrier is then temporarily unlocked to let the user through. | 2013-11-14 |
20130304649 | METHOD AND SYSTEM FOR UTILIZING AUTHORIZATION FACTOR POOLS - One embodiment of the present disclosure provides a system and associated processes for sharing cardholder data (CHD) between a merchant that utilizes tokenization and a second merchant that may or may not utilize tokenization. In one embodiment, the merchant, or an employee of the merchant, can use the system and associated processes to reacquire CHD from a tokenization provider system. In one embodiment, the merchant identifies to the tokenization provider system a desire to share CHD, which is associated with a token, with a second merchant. The merchant and/or the tokenization provider system can then invite the second merchant to register with the tokenization provider system. Once registered with the tokenization provider system, the second merchant can access any CHD that the merchant associated with the second merchant. | 2013-11-14 |
20130304650 | METHOD AND SYSTEM FOR A PAYMENT TRANSACTION ASSOCIATED WITH A DECLARATION OF INTENT - The present invention relates to a method and a system for initiating and/or conducting a transaction that is associated with at least two corresponding declarations of intent, in particular a payment transaction, between at least two transaction parties via a processing unit ( | 2013-11-14 |
20130304651 | SYSTEMS AND METHOD FOR PROVIDING MULTIPLE VIRTUAL SECURE ELEMENTS IN A SINGLE PHYSICAL SECURE ELEMENT OF A MOBILE DEVICE - Methods and systems are disclosed for providing a plurality of virtual secure elements (virtual SEs) to mobile devices with secure elements (SEs). A method generates and forwards a certificate authority security domain (CASD) key for a plurality of virtual SEs to an SE supplier that created the CASD. The method receives a card serial number (CSN) and a card production life cycle (CPLC) key from the SE supplier and forwards these to a mobile device maker. An updated CSN and CPLC data is received from the device maker with an International Mobile Equipment Identity (IMEI) and an issuer security domain key (ISD key) is added to the CSN and CPLC data by a master secure element issuer trusted service manager (master SEI TSM). An application is provisioned to the device that retrieves the CSN, CPLC data, and the IMEI, which are used for to verify and activate the virtual SE. | 2013-11-14 |
20130304652 | CONTENT TRANSACTION MANAGEMENT SERVER DEVICE, CONTENT-PROVIDING SERVER DEVICE, AND TERMINAL DEVICE AND CONTROL PROGRAM - A content transaction management server device includes: a memory storing decryption keys used in decryption of encrypted content data; a communication unit for information; a payment-request reception unit receiving, through the communication unit, a first storage address indicating a storage area where the decryption keys of encrypted content data in the memory are stored and user identifiers identifying users who are purchasers of the encrypted content data; a payment-procedure processing unit implementing payment-procedure processes related to purchase transactions of encrypted content data by a user identified by user identifiers in the payment request; and a decryption-key transmission unit that, after payment-procedure processing based on the payment-procedure processing unit is completed, reads out, from the memory, decryption keys stored in the storage area indicated by the first storage address included in the payment request and transmits, through the communication unit, the decryption keys to the transmission source of the payment request. | 2013-11-14 |
20130304653 | EVALUATING REAL ESTATE PROPERTIES - The present invention is an improved system and method for analyzing multiple real estate properties. The system includes a pool of properties that are searched based on user-defined search criteria. The system identifies comparison properties from the search pool. The comparison properties include attributes that match or are a near match to the search criteria. The system compares each of the comparison properties to at least one average value and demonstrably depicts the comparison to the user. | 2013-11-14 |
20130304654 | AUTOMATICALLY DETERMINING A CURRENT VALUE FOR A REAL ESTATE PROPERTY, SUCH AS A HOME, THAT IS TAILORED TO INPUT FROM A HUMAN USER, SUCH AS ITS OWNER - A facility procuring information about a distinguished property from a user knowledgeable about the distinguished property that is usable to refine an automatic valuation of the distinguished property is described. The facility displays information about the distinguished property used in the automatic valuation of the distinguished property. The facility obtains user input from of the user adjusting at least one aspect of information about the distinguished property used in the automatic valuation of the distinguished property. On a later the day, facility displays to the user a refined valuation of the distinguished property that is based on the adjustment of the obtained user input. | 2013-11-14 |
20130304655 | SYSTEM AND METHOD FOR ACCESS TO, MANAGEMENT OF, TRACKING OF, AND DISPLAY OF LEASE DATA - A system for using real estate lease data has at least one property file stored on a data storage device and representing a property that has at least one leasable space, and a lease deal component operated by at least one processor and receiving data for a plurality of lease deals each with terms of a lease deal. At least one previously established lease deal has data for a lease deal, and is associated to at least one leasable space. This lease deal was established previously to at least one subsequent lease deal. The lease deal component links at least one subsequent lease deal to the at least one previously established lease deal to associate the at least one subsequent lease deal with an amount of leasable space linked to the previously established lease deal. A display displays lease terms or results of financial calculations or both of at least one linked lease deal. | 2013-11-14 |
20130304656 | SUSTAINABILITY CAMPUS OF CO-LOCATED FACILITIES - A system and method for energy use is provided that includes a sustainability campus or district of co-located facilities, with associated facilities such as an energy development center, a source, and a processing or collection facility. The sustainability campus or district incorporates design principles and processes to decrease environmental impact per unit energy usage, increase waste reuse within the sustainability campus or district, and increase the receipt of financial credits. | 2013-11-14 |
20130304657 | LOCATION-BASED CONNECTION SYSTEM FOR REAL ESTATE AGENTS AND CLIENTS THEREOF - A connection system configured to connect real estate agents and clients based on their relative locations allows rapid deployment of real estate services, such as property viewings. The connection system may include one or more connection servers, agent access devices, and client access devices. A set of nearby agents may be determined based on a client's location. The nearby agents that are available to provide a showing of the client's desired property may be presented to the client for selection. The system may provide identification, biographical, and professional experience information to the client to allow an informed selection. A selected agent may the confirm his or her availability and proceed to show the property to the client. | 2013-11-14 |
20130304658 | INFERRING USER PROFILE ATTRIBUTES FROM SOCIAL INFORMATION - User profile information for a user of a social networking system is inferred based on information about user profile of the user's connections in the social networking system. The inferred user profile attributes may include age, gender, education, affiliations, location, and the like. To infer a value of a user profile attribute, the system may determine an aggregate value based on the attributes of the user's connections. A confidence score may also be associated with the inferred attribute value. The set of connections analyzed to infer a user profile attribute may depend on the attribute, the types of connections, and the interactions between the user and the connections. The inferred attribute values may be used to update the user's profile and to determine information relevant to the user to be presented to the user (e.g., targeting advertisements to the user based on the user's inferred attributes). | 2013-11-14 |
20130304659 | INTEGRATED UNEMPLOYMENT AND RE-EMPLOYMENT SYSTEM - The present invention provides a system for accessing unemployment insurance and workforce registration comprising in combination a database containing unemployment insurance benefit data and a database containing workforce registration data. A server having a software employment component is operatively coupled to the database containing unemployment insurance benefit data and is operatively coupled to the database containing workforce registration data. A computer access terminal is operatively coupled to the software employment component. The computer access terminal allows a first user to enter data into the database containing unemployment insurance benefit data and into the database containing workforce registration data. | 2013-11-14 |
20130304660 | Apparatuses, Systems, and Methods for Evaluating Pharmacy Benefits Plan Features - Apparatuses, systems and methods for evaluating variable pharmacy benefits plan features and estimating the costs attributed to those features are disclosed. A proposed pharmacy benefits plan is determined in response to a plurality of user preferences. The proposed pharmacy benefits plan is compared to a current pharmacy benefits plan, where the cost of the proposed and current pharmacy benefits plans are calculated according to variables in the plan features, and the cost of the proposed pharmacy benefits plan is recalculated by varying variables in the plan features. | 2013-11-14 |
20130304661 | CREATING FEDERATED CUSTOMER IDENTIFIERS TO POSITIVELY IDENTIFY CUSTOMERS INTERFACING WITH A BUSINESS ACROSS ACCESS PLATFORMS - Methods, apparatus, systems and computer program products described and claimed that provide for automatically and positively determining that a customer interfacing with one business platform application using a platform-specific customer identifier is the same customer that is interfacing with another business platform application using another platform-specific customer identifier. Once the positive determination of same customer is made, a federated identifier key is generated and applied to all of the platforms, so as to globally identify the customer across multiple enterprise-wide platforms. As such, the present invention eliminates the labor-intensive need to manually analyze customer data to determine if a customer interfacing with one platform is the same customer interfacing with another platform. | 2013-11-14 |
20130304662 | SYSTEM AND METHOD FOR REDIRECTING MAIL - A method for temporarily redirecting a customer's mail from a current mailing address to a temporary mailing address, includes: receiving a request to temporarily redirect the customer's mail; determining a first date to begin mail redirection and a second date to cancel mail redirection; redirecting a first type of mail to a temporary mailing address; instructing a delivery service provider to provide a package to the customer after the customer arrives at the temporary mailing address; instructing the delivery service provider to hold a second type of mail for a time period calculated based on the request; receiving a notification that the customer has arrived at the temporary mailing address; and informing at least one contact specified by the customer that the customer has arrived at the temporary mailing address. | 2013-11-14 |
20130304663 | METHOD AND SYSTEM FOR DETECTING A MAILED ITEM - A method and system of processing a mailing label through a postal service are provided. The method includes causing, by a computer system associated with a postage provider, a mailing label for mailing a mail piece to be generated, the mailing label including a tracking mark; receiving, by the computer system associated with the postage provider an indication that the tracking mark is detected when the mail piece is inducted in the mail stream or during transit of the mail piece in the mail stream; and creating, by the computer system associated with the postage provider, a record of a transaction for an amount of postage based on the received indication that the tracking mark is detected. | 2013-11-14 |
20130304664 | FLEXIBLE MAIL DELIVERY SYSTEM AND METHOD - The principles of the present invention provide the ability to flexibly change the delivery point and time for a mail item, while the item is en route. The recipient, sender, or mailer may flexibly change the delivery point of the item alone or in combination with each other. While an item is en route between the sending point and the delivery point, a notification is sent to indicate that the item is in transit. In response, the delivery of the item may be changed. For example, the destination specified by the sender (e.g., the delivery address written on the item) may be changed or a delivery time may be specified. The item is then delivered to the new delivery point and/or at the specified delivery time. | 2013-11-14 |
20130304665 | Managing Information Exchange Between Business Entities - Techniques for managing information exchange between business entities include presenting an interface through an application of a plurality of applications to a user for an identifiable business context (IBC), the IBC including a unique identifier associated with a first business entity and a plurality of business data attributes associated with the first business entity; receiving, from the application, the IBC for storage in a repository communicably coupled to the application; defining a communication connection between the first business entity and a second business entity; associating the defined communication connection with the IBC; and publishing the IBC unique identifier, the defined communication connection, and at least a portion of the plurality of business data attributes to a registry that is exposed to the plurality of applications. | 2013-11-14 |
20130304666 | Managing Information Exchange Between Business Entities - Techniques for managing information exchange between business entities include identifying, through an application of a plurality of applications on a first business entity computing system, an identifiable business context (IBC) referenced on a second business entity computing system, the IBC including a unique identifier associated with the second business entity and a first plurality of business data attributes associated with the second business entity; identifying a communication connection between the first business entity computing system and the second business entity computing system based on the identification of the IBC; and generating an identifiable business context reference (IBCR) for storage on the first business entity computing system, the IBCR associated with the communication connection and including the unique identifier and a second plurality of business data objects, at least one of the second plurality of business data objects distinct from the first plurality of business data objects. | 2013-11-14 |
20130304667 | Method and System for Promoting Arbitration Between Evaluators and Evaluees - A computer enabled system operating over a network such as the internet, employing software adapted to register both users and recipients of user reviews. The system endeavors to maintain the accuracy of product and service provider ratings by employing a relational database of users and review recipients stored in relational databases in electronic memory. Users input evaluations of providers which may be reviewed by providers and accepted and published or contested. Mitigation services between users and providers are provided to allow restitution to render evaluations acceptable to providers. Electronic identifiers associated with users may be employed to prevent multiple evaluations by supposed different users and prevent skewing ratings of providers. | 2013-11-14 |
20130304668 | AUTOMATED BUSINESS PROCESS MODELING - In a method for generating a business process model project, a computer receives a data file comprising text, descriptive of a business process. The computer searches a sentence in the text for a keyword indicative of existence of a corresponding business artifact stated elsewhere in the sentence. In response, the computer identifies an indicator in the sentence, the indicator designating a name of the corresponding business artifact. The computer identifies a business artifact based on the keyword and the indicator. The computer generates a business process model project based in part on the business artifact. | 2013-11-14 |
20130304669 | SYSTEM AND METHOD FOR POOL RISK ASSESSMENT - A system and method for assessing risk is provided. The method comprises determining an investment index associated with investment by an insurance company in an insurance pool. Next, the method comprises determining a return index associated with an expected return to the insurance company from participating in the insurance pool; and determining a benefit index based on the investment and return indices. The system for assessing risk comprises an assessment module for assessing risks associated with an insurance company's participation in an insurance pool based on at least one of: an investment index associated with the costs of participating in the insurance pool, and a return index associated with the benefits of participating in the insurance pool. | 2013-11-14 |
20130304670 | Computer-Generated Investment Index - A method for generating an investment vehicle index including selecting a universe of investment vehicles and selecting, by a computer, out of the universe of investment vehicles, only those that meet at least one performance criteria, resulting in a first subset. The method also includes selecting, by the computer, out of the first subset, investment vehicles based upon at least one characteristic of the entity associated with each investment vehicles, resulting in a second subset. The method further includes weighting, by the computer, the second subset of investment vehicles based upon their standard deviation of volatility to generate an index of volatility-weighted investment vehicles. | 2013-11-14 |
20130304671 | Factor Risk Models with Multiple Specific Risk Estimates - Construction of factor risk models that more advantageously predict the future volatility of returns of a portfolio of securities such as stocks, bonds, or the like is addressed. More specifically, factor risk models with more than one estimate of specific risk or, alternatively an original specific risk estimate together with a set of specific risk differences derived from more than one estimate of specific risk. | 2013-11-14 |
20130304672 | METHOD AND SYSTEM FOR ANALYZING INVESTMENT INFORMATION - An information processing apparatus and associated method for analyzing investment information. An input unit receives a financial request and one or more investment variables relating to the financial indicator and a description vector unit generates at least two vectors containing the one or more investment variables based on the financial request. A description vector similarity unit then calculates a similarity value by comparing the at least two vectors and an investment analysis unit analyzes the similarity value and the financial request, and determines investment advice based on results of the analysis. | 2013-11-14 |
20130304673 | METHOD AND SYSTEM FOR GENERATING AN INDEX OF SECURITIES - A method for generating an index of securities includes selecting index constituents and weighing the selected index constituents by a measure (“an intangible asset measure”) of quality and/or value of the intangible assets of constituent entities. The index constituents can be selected from a set of potential constituents based on an intangible asset measure of each constituent in the set, and the selected index constituents may then be weighted by a desired measure or methodology or weighted equally, or by an intangible asset measure. Another method for generating an index of securities includes combining groups of constituents, which are selected based on an intangible asset measure, to be index constituents and weighing the index constituents by a desired measure or methodology. | 2013-11-14 |
20130304674 | Property and Casualty Insurance Company with Supporting Membership Entity - A method of providing property, casualty and non-flood insurance includes the steps of establishing a membership entity (“ME”) to provide emergency-related goods and services to members, provide a right to purchase homeowner's property and casualty insurance from a special insurer, enable members of the ME to access the special insurer's network of general contractors for non-claim related repairs at a pre-established price. The insurer establishes internally integrated teams of retained general contractors/adjusters or one person acting as both. Included is a complete inventory, and photographic record of insured's property to minimize the risk of downstream fraud in the adjustment process if a claim occurs. Because of savings to the insurer of the internal contractors/adjusters, the documentation of the insured assets, the access of contractors to construction supplies at warehouses of the ME, the loss ratio of the direct-repair insurer is materially reduced, this markedly lowering the cost of insurance. | 2013-11-14 |
20130304675 | AUGMENTED KNOWLEDGE BASE AND REASONING WITH UNCERTAINTIES AND/OR INCOMPLETENESS - A knowledge-based system under uncertainties and/or incompleteness, referred to as augmented knowledge base (AKB) is provided, including constructing, reasoning, analyzing and applying AKBs by creating objects in the form E→A, where A is a rule in a knowledgebase and E is a set of evidences that supports the rule A. A reasoning scheme under uncertainties and/or incompleteness is provided as augmented reasoning (AR). | 2013-11-14 |
20130304676 | ON-DEVICE REAL-TIME BEHAVIOR ANALYZER - Methods, systems and devices for generating data models in a communication system may include applying machine learning techniques to generate a first family of classifier models using a boosted decision tree to describe a corpus of behavior vectors. Such behavior vectors may be used to compute a weight value for one or more nodes of the boosted decision tree. Classifier models factors having a high probably of determining whether a mobile device behavior is benign or not benign based on the computed weight values may be identified. Computing weight values for boosted decision tree nodes may include computing an exclusive answer ratio for generated boosted decision tree nodes. The identified factors may be applied to the corpus of behavior vectors to generate a second family of classifier models identifying fewer factors and data points relevant for enabling the mobile device to determine whether a behavior is benign or not benign. | 2013-11-14 |
20130304677 | Architecture for Client-Cloud Behavior Analyzer - Methods, systems and devices for generating data models in a client-cloud communication system may include applying machine learning techniques to generate a first family of classifier models that describe a cloud corpus of behavior vectors. Such vectors may be analyzed to identify factors in the first family of classifier models that have the highest probably of enabling a mobile device to conclusively determine whether a mobile device behavior is malicious or benign. Based on this analysis, a a second family of classifier models may be generated that identify significantly fewer factors and data points as being relevant for enabling the mobile device to conclusively determine whether the mobile device behavior is malicious or benign based on the determined factors. A mobile device classifier module based on the second family of classifier models may be generated and made available for download by mobile devices, including devices contributing behavior vectors. | 2013-11-14 |
20130304678 | METHOD FOR PARTIAL LEARNING SHARING OF A SOFTWARE APPLICATION - A method for sharing, by a secondary machine ( | 2013-11-14 |
20130304679 | SYSTEM AND METHOD FOR USING AN ARTIFICIAL NEURAL NETWORK TO SIMULATE PIPE HYDRAULICS IN A RESERVOIR SIMULATOR - A method for implementing a reservoir simulator is described. The method comprises developing training data by performing a calculation on an initial set of input data relating to reservoir conditions to obtain corresponding output data; training an artificial neural network (“ANN”) to perform the calculation using the training data; and using the trained ANN to perform the calculation on a second set of input data to obtain corresponding output data for use by the reservoir simulator in performing simulations. | 2013-11-14 |
20130304680 | PREDICTIVE CORROSION COUPONS FROM DATA MINING - In accordance with aspects of the present disclosure, a computer-implemented method for predicting a material deterioration of a coupon inserted into the well line system is disclosed. The computer-implemented method can be stored on a tangible and non-transitory computer readable medium and arranged to be executed by one or more processors that cause the one or more processors to receive data related to the well line system; determine one or more predictors of material deterioration of a coupon based on the data; and predict a material deterioration of the coupon inserted into the well line system based on a mathematical model of the material deterioration using the one or more predictors. | 2013-11-14 |
20130304681 | METHOD AND APPARATUS FOR STRATEGIC SYNAPTIC FAILURE AND LEARNING IN SPIKING NEURAL NETWORKS - Certain aspects of the present disclosure support a technique for strategic synaptic failure and learning in spiking neural networks. A synaptic weight for a synaptic connection between a pre-synaptic neuron and a post-synaptic neuron can be first determined (e.g., according to a learning rule). Then, one or more failures of the synaptic connection can be determined based on a set of characteristics of the synaptic connection. The one or more failures can be omitted from computation of a neuronal behavior of the post-synaptic neuron. | 2013-11-14 |
20130304682 | Optimally Configuring an Information Landscape - According to an embodiment of the present invention, a system optimizes an information processing environment, and comprises at least one processor. The system collects information pertaining to operational behavior of the information processing environment and including a plurality of parameters. A neural network structure is established to associate the parameters to a desired operational performance characteristic for the information processing environment. The neural network structure is trained with the collected information from the information processing environment to produce a model for the information processing environment. The model is optimized to determine values for the parameters and the information processing environment is adjusted based on the determined parameter values to attain the desired operational performance of the information processing environment. Embodiments of the present invention further include a method and computer program product for optimizing an information processing environment in substantially the same manner described above. | 2013-11-14 |
20130304683 | Artificial Neural Networks based on a Low-Order Model of Biological Neural Networks - A low-order model (LOM) of biological neural networks and its mathematical equivalents including the clusterer interpreter probabilistic associative memory (CIPAM) are disclosed. They are artificial neural networks (ANNs) organized as networks of processing units (PUs), each PU comprising artificial neuronal encoders, synapses, spiking/nonspiking neurons, and a scheme for maximal generalization. If the weights in the artificial synapses in a PU have been learned (and then fixed) or can be adjusted by the unsupervised accumulation rule and the unsupervised covariance rule (or supervised covariance rule), the PU is called unsupervised (or supervised) PU. The disclosed ANNs, with these Hebbian-type learning rules, can learn large numbers of large input vectors with temporally/spatially hierarchical causes with ease and recognize such causes with maximal generalization despite corruption, distortion and occlusion. An ANN with a network of unsupervised PUs (called clusterer) and offshoot supervised PUs (called interpreter) is an architecture for many applications. | 2013-11-14 |
20130304684 | SYSTEMS AND METHODS FOR A COMPUTER UNDERSTANDING MULTI MODAL DATA STREAMS - Systems and methods for understanding (imputing meaning to) multi modal data streams may be used in intelligent surveillance and allow a) real-time integration of streaming data from video, audio, infrared and other sensors; b) processing of the results of such integration to obtain understanding of the situation as it unfolds; c) assessing the level of threat inherent in the situation; and d) generating of warning advisories delivered to appropriate recipients as necessary for mitigating the threat. The system generates understanding of the system by creating and manipulating models of the situation as it unfolds. The creation and manipulation involve “neuronal packets” formed in mutually constraining associative networks of four basic types. The process is thermodynamically driven, striving to produce a minimal number of maximally stable models. Obtaining such models is experienced as grasping, or understanding the input stream (objects, their relations and the flow of changes). | 2013-11-14 |
20130304685 | BEHAVIOUR PATTERN ANALYSIS SYSTEM, MOBILE TERMINAL, BEHAVIOUR PATTERN ANALYSIS METHOD, AND PROGRAM - Provided is a mobile terminal including a movement sensor that detects a movement of a user and outputs movement information, acquires information on a building existing at a current location or information on buildings existing in a vicinity of the current location, analyses the movement information output from the movement sensor, and detects a first behaviour pattern corresponding to the movement information from multiple first behaviour patterns obtained by classifying behaviours performed by the user over a relatively short period of time, and analyses the information on a building or buildings and the first behaviour pattern, and detects a second behaviour pattern corresponding to the information on a building or buildings and the first behaviour pattern from multiple second behaviour patterns obtained by classifying behaviours performed by the user over a relatively long period of time. | 2013-11-14 |
20130304686 | METHODS AND SYSTEMS FOR PERSONALIZING USER EXPERIENCE BASED ON ATTITUDE PREDICTION - The disclosure herein relates to a system and method for personalizing an online experience of a user based on the user's attitude. Attitude models are constructed from user activity data that are able to infer or determine attitudes for a user. Based on the attitudes derived from applying the attitude models, attitude profiles are created for the users. As a users engage in various types of online interactions, the attitude profiles associated with the users can be utilized to personalize the online experience of the user. | 2013-11-14 |
20130304687 | Identifying Categorized Misplacement - The present disclosure provides methods and devices for identifying category misplacement. In one embodiment, an example device obtains a word frequency of each respective word in a product title under a current category, calculates an overall word frequency of the product title under the current category based on the word frequency of each respective word under the current category, and compares the overall word frequency of the product title with a threshold of the current category to determine an existence of category misplacement. The techniques can accurately identify category misplacement and reduce the probability of missing identifying category misplacement. The techniques also require less system resources and improve calculation efficiency. | 2013-11-14 |
20130304688 | APPARATUS, PROGRAM, AND METHOD FOR SOLVING MATHEMATICAL PROGRAMMING PROBLEM - An apparatus and method for solving mathematical programming problems. The apparatus includes a first-time-point-solution generating unit generating at least one solution to a mathematical programming problem, a second-time-point-problem generating unit generating a plurality of mathematical programming problems to be on the basis of the solution to the mathematical programming problem to be solved at the first time point, a second-time-point optimum value calculating unit calculating an optimum value of each of a plurality of mathematical programming problems to be solved at the second time point, a relational expression estimating unit estimating a relational expression between the solution to the mathematical programming problem to be solved at the first time point and an optimum value of a mathematical programming problem to be solved at the second time point, and a correcting unit correcting the mathematical programming problem at the first time point based on the relational expression. | 2013-11-14 |
20130304689 | Personalized Entertainment System - A method of operating an entertainment system includes computer-implemented steps including accessing a remote electronic collection of audio/video recordings. The collection is associated with a user of the entertainment system. The recordings in the collection are analyzed to thereby determine an audio/video preference profile of the user. Electronic audio/video options of the entertainment system that conform to the user's preference profile are selected and offered to the user. | 2013-11-14 |
20130304690 | REDUCING FALSE POSITIVES IN DATA VALIDATION USING STATISTICAL HEURISTICS - To validate data, a plurality of strings that match a predetermined regular expression is extracted from the data. A validated subset of the strings is identified. To determine whether the validated subset has been falsely validated, it is determined whether the validated subset satisfies each of one or more predetermined criteria relative to the plurality of strings. In one embodiment, the subset is determined to be falsely validated if at least one of the criteria is satisfied. In another embodiment, the subset is determined to be falsely validated if all of the criteria are satisfied. The data are released only if the subset is determined to be falsely validated. | 2013-11-14 |
20130304691 | INFERRING USER PREFERENCES FROM AN INTERNET BASED SOCIAL INTERACTIVE CONSTRUCT - In embodiments of the present invention improved capabilities are described for a computer program product embodied in a computer readable medium that, when executing on one or more computers, helps determine an unknown user's preferences through the use of internet based social interactive graphical representations on a computer facility by performing the steps of (1) ascertaining preferences of a plurality of users who are part of an internet based social interactive construct, wherein the plurality of users become a plurality of known users; (2) determining the internet based social interactive graphical representation for the plurality of known users; and (3) inferring the preferences of an unknown user present in the internet based social interactive graphical representation of the plurality of known users based on the interrelationships between the unknown user and the plurality of known users within the graphical representation. | 2013-11-14 |
20130304692 | SYSTEM AND METHOD FOR INFERRING INVISIBLE TRAFFIC - This disclosure is directed to techniques for inferring traffic information or estimating total volume of traffic/data flowing through a target network/entity, wherein only a partial subset of inferred traffic information or volume of data is available to a predictor entity/network that infers such traffic information. In an embodiment, such partial subset of total traffic can either be made available to the entity/network for inferring and estimating total traffic or such partial data can actually flow through the entity/network. | 2013-11-14 |
20130304693 | Cloud Logistics - Implementations of complex software solutions are accompanied with an intrinsic conflict between requirements, such as an ever-growing complexity of enterprise software solutions versus a demand for more and more shortened implementation cycles. Various embodiments include at least one of systems methods and software to address such conflicts. One method embodiment includes receiving a request to assemble a virtual appliance from at least one deployment template, the request including characteristic data representative of at least one virtual appliance functional and deployment requirement. In response to the received request, such embodiments may query a template warehouse to identify and deployment templates from a template warehouse to a data storage device to form a virtual appliance. The virtual appliance may then be packaged into a transport data structure and stored. The transport data structure may then be transported by various means to a target virtual machine and deployed therein. | 2013-11-14 |
20130304694 | REPOSITORY REDUNDANCY IMPLEMENTATION OF A SYSTEM WHICH INCREMENTALLY UPDATES CLIENTS WITH EVENTS THAT OCCURRED VIA A CLOUD-ENABLED PLATFORM - Techniques are disclosed for implementing repository redundancy in a system which incrementally updates remote clients with events that occurred in a cloud-enabled platform. In one embodiment, a method comprises comparing a local timestamp of an event with a remote timestamp of the event. The event is to be stored in a queue in a repository cluster to be read by a remote client. The method further comprises updating the local timestamp of the event if the comparing indicates that the remote timestamp is more recent than the local timestamp. Among other advantages, embodiments disclosed herein ensure that no event in an action log is missed or skipped by any of remote clients in a distributed action log framework system during a switchover from an active but failed server to a backup server, and require zero or minimal down time during the switchover, thereby providing robustness and serviceability to such system. | 2013-11-14 |
20130304695 | METHOD FOR PROVIDING DATABASE MANAGEMENT AND THE DATABASE MANAGEMENT SERVER THEREOF - The present invention provides diagnosis and management of a database system. The method for database management comprises (a) generating a list of at least one database managed by the database system; (b) providing a list of diagnostic items including a plurality of diagnostic items which can be carried out against at least one database selected from the list; and (c) carrying out diagnosis by providing the database system with at least one script related to at least one diagnostic item selected from the list of diagnostic items, wherein the at least one script is configured to have a run time set up differently according to the status of the database system. Database management provides various diagnostic items through remote connection to a particular database system and providing a quantitative analysis of the corresponding diagnosis result, thereby enabling more complete and comfortable database management. | 2013-11-14 |
20130304696 | ONLINE PROPAGATION OF DATA UPDATES - Various embodiments include a system for online propagation of data updates. The system can include: a computer system for storing a plurality of records; and a record update utility configured to: initiate a record update process for any of the records responsive to a modification of a trigger data item, wherein the process is performed while the system is online; create an update process timestamp indicating a time at which the record update process is begun; and determine if a last-modified timestamp associated with any of the records indicates an earlier time than the update process timestamp, and, if so: update the record to reflect the modification to the trigger data item, and modify the last-modified timestamp to reflect a time that is later than the update process timestamp. | 2013-11-14 |
20130304697 | SYSTEM AND METHOD FOR CROSS-PLATFORM SYNCHRONIZATION OF DATA OBJECTS IN A MULTI-TENANT ENVIRONMENT - Methods and systems are provided for synchronizing files in a multi-tenant computing environment of the type including a server, a multi-tenant database, and a local computer connected to the multi-tenant database through a network cloud. The method seamlessly synchronizes data objects in the multi-tenant database with corresponding data objects on the local computing device. The method includes running a client application on a local computing device, updating a first file on the local computing device, and automatically updating a second file in a remote multi-tenant database corresponding to the first file upon updating the first file. | 2013-11-14 |
20130304698 | Global Information Management System and Method - A global information management system (GIMS) includes a collection of standards and methods that allow information management on a global scale. A GIMS computer network includes a central registration database (CRD) and one or more GIMS computer systems connected over a network. Each GIMS computer system includes a relational database having a set of standardized tables. The CRD may provide a GIMS network-unique system ID to each GIMS computer system. Each GIMS computer system uses the GIMS network-unique system ID as part of a primary key for each record generated by and stored in the set of standardized tables of the GIMS database. The GIMS enables global database normalization through the globally unique identification of database records. | 2013-11-14 |
20130304699 | SYSTEM AND METHOD FOR SUPPORTING CONFIGURATION DAEMON (CD) IN A NETWORK ENVIRONMENT - A system and method can support network management in a network environment. The network environment can include a plurality of configuration daemons (CDs), wherein a master CD is an active CD on a switch with a master subnet manager (SM). The master CD operates to perform consistency check on one or more states associated with one or more peer CDs in the network environment, and replicate a configuration file to the one or more peer CDs, wherein the configuration file includes at least one management key (M_Key) value. | 2013-11-14 |
20130304700 | DATA SYNCHRONIZATION USING A COMPOSITE CHANGE CLOCK - A method can include: calculating a maximum sync anchor change number; and creating a sync action entry, the sync action entry having a sync action change number and a composite change clock number, the composite change clock number set: to the maximum sync anchor change number when the sync action change number of the sync action entry is less than the maximum sync anchor change number, and to the sync action change number of the sync action entry when the sync action change number of the sync action entry is less than a sync action change number of a subsequent sync action entry and the sync action change number of the sync action entry is greater than the maximum sync anchor change number. | 2013-11-14 |
20130304701 | BACKUP METHOD AND INFORMATION PROCESSING APPARATUS - The disclosure includes a backup method executed by a computer, and the backup method includes: determining whether or not a previous backup processing was automatically executed; and upon determining that the previous backup processing was automatically executed, merging a previous backup data generated by the previous backup processing into a current backup data. | 2013-11-14 |
20130304702 | CONTROLLING ENTERPRISE DATA ON MOBILE DEVICE VIA THE USE OF A TAG INDEX - A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer. | 2013-11-14 |
20130304703 | JOURNAL MANAGEMENT SYSTEM - A journal output device generates a journal describing a processing definition ID of a processing definition for which a processing is in progress and indicating a progress status of the processing in an application, and writes a journal generated, in a journal file. When a write destination journal file is to be changed among journals having a common processing definition ID, the journal output device describes a write destination change notice in a journal. A recovery device separates the processing definition ID of the journal describing the write destination change notice, from another processing definition ID as a write destination change notice, and concatenates two or more journal arrays having a common write destination change incidence ID, to guarantee the sequential order. In case of the write destination change incidence ID, the recovery device analyzes a journal array which has been sequential-order-guaranteed. Regarding other processing definition IDs, the recovery device analyzes the journal array without sequential order guarantee. | 2013-11-14 |
20130304704 | REMOTE OFFICE DUPLICATION - Remote office deduplication comprises calculating one or more fingerprints of one or more data blocks, sending the one or more fingerprints to one or more backup servers via a network interface, receiving from the one or more backup servers an indication of which one or more data blocks corresponding to the one or more fingerprints should be sent to the one or more backup servers, and if the indication indicates one or more data blocks to be sent to the one or more backup servers, sending the one or more data blocks to the one or more backup servers via the network interface. | 2013-11-14 |
20130304705 | MIRROR FILE SYSTEM - A mirror file system (MFS) is a virtual file system that links two or more folders (e.g., on Windows) or directories (e.g., on UNIX) to form a mirroring pair. The folders or directories can reside on a local memory device of a computing system, on a portable memory device, or in a folder or directory shared by a remote system. A graphical user interface (GUI) or user application creates or opens a file in the Active folder, and the MFS software module creates or opens the same file in a Passive folder which is not mounted on the same mount point as the Active folder. The Active folder receives a file operation from the application of the computer directly. Once the file operation is received by the Active folder, it is automatically replicated to the Passive folder. The MFS software module provides update options of sequential, parallel synchronous and asynchronous. | 2013-11-14 |
20130304706 | SYSTEMS AND METHODS FOR DISTRIBUTED STORAGE - Techniques for distributed storage using a plurality of computing devices connected to a network can include storing an electronic file in a local storage layer of one of the computing devices. The stored electronic file can be asymmetrically transmitted, in portions, over the network to other computing devices to store the file across the other computing devices in a distributed storage layer. The electronic file can be asynchronously transmitted over the network to a cloud storage layer such that the electronic file is mirrored in the cloud storage layer. The local storage layer of each computing device can store, for each electronic file stored in the distributed storage layer, metadata having pointers to locations of the portions the electronic files stored in the local storage layer and distributed storage layer. The electronic files stored in the distributed storage layer can be displayed as stored in a single logical drive. | 2013-11-14 |
20130304707 | Data Archiving Approach Leveraging Database Layer Functionality - A data archiving approach exploits functionality already existing within a database layer, utilizing additional information received from an application layer. Rather than writing archive-eligible records to a separate archive layer, a central module of an application layer receives from the database layer, the name of the database table to which stored records belong. This central module determines primary key fields of the table, and extracts values of those primary key fields. The central module may then leverage an existing capability (e.g. data aging, table partitioning) of the database layer, informing it of the eligible records (identified by table name and primary key values). The database layer may then move the archive-eligible records (e.g. in an asynchronous manner) to an appropriate level within a data storage hierarchy of the database layer. In some embodiments, the eligible records may be moved to lower cost (e.g. read-only) storage medium within the storage hierarchy. | 2013-11-14 |
20130304708 | Method and System for Distributed Data Verification - A method and system of verifying data stored in a database, by polling one or more computing devices. A server generates a poll object for a data item and a poll notification is transmitted to the one or more computing devices, whereupon users of the computing devices may respond to the poll notification and transmit responses. A set of response notifications is received and the server determines if the set of response notifications satisfies a quorum criterion. If the quorum criterion is satisfied, the server determines a data verification result, based on a tally criterion. | 2013-11-14 |
20130304709 | META-CONFIGURATION OF PROFILES - Disclosed are methods for creating, applying, using and retrieving profile information that includes attributes that may be stored separately from, or with, the content to which the profiles are being applied. In this manner, profiles can be shared in various environments and across various applications. Attributes that have corresponding attributes in other content can be applied to the other content, as long as each of the attributes is valid. In computer aided design applications, the profile can be stored in a profile repository embedded within the CAD model. In addition, profile controllers are disclosed which control the attributes of a profile that can be used with selected content and other content and send a notification that a profile is available for use by other content. | 2013-11-14 |
20130304710 | METHOD AND SYSTEM FOR ANOMALY DETECTION IN DATA SETS - A method and apparatus for detecting and segmenting anomalous data in an input data set such as an image is described, which makes use of a normalised distance measure referred to as a zeta distance score. A test data point from an input test data set is compared with its corresponding nearest neighbouring standard data points in standard data sets representing variation in normal or expected data values, and the average distance from the test data point to the standard data points is found. An additional average distance measure representing the average distance between the different nearest neighbouring corresponding standard data points is also found, and a normalised distance measure obtained by finding the difference between the average distance from the test data point to the standard points and the average distance between the nearest neighbouring standard data points themselves. Where the input test data set is an image then a zeta distance score map can be found. By then thresholding the zeta distance scores obtained for the input data set using an appropriate threshold, anomalous data in the data set with a high zeta distance score can be identified, and segmented. | 2013-11-14 |
20130304711 | IDENTIFYING A COMPROMISED ENCODED DATA SLICE - A method begins by processing module in response to a read command, issuing at least a read threshold number of read requests regarding a set of encoded data slices and receiving at least the read threshold number of encoded data slices. The method continues where the processing module selects a unique combination of encoded data slices and decodes the unique combination to produce a recovered data segment. The method continues where the processing module verifies an integrity value for the recovered data segment and indicates whether the unique combination is valid. The method continues where the processing module selects other combinations producing more recovered data segments for further validity verification. The method continues where the processing module utilizes a verified recovered data segment as a response to the read command and identifies a compromised encoded data slice. | 2013-11-14 |
20130304712 | SYSTEM AND METHOD FOR VALIDATION - Systems and methods for validation are disclosed. In an aspect, a method can comprise receiving a selection of a validation rule, the validation rule including a validation element, receiving a selection of a triggering event associated with the validation rule, and validating data using the validation rule and in response to the triggering event. | 2013-11-14 |