52nd week of 2014 patent applcation highlights part 64 |
Patent application number | Title | Published |
20140379559 | CLOSED-LOOP STORED VALUE PAYMENT INSTRUMENT BROKERAGE - Closed-loop stored value payment instruments may be issued, sold and managed on behalf of a merchant through a third party electronic commerce system. Upon purchase of a closed-loop stored value payment instrument through the third party electronic commerce system, a payment aggregator may be notified of the purchase and the closed-loop stored-value payment instrument may be activated. A printer or other manufacturer may also notified of the purchase so that a closed-loop stored value payment instrument embodied in a physical card, may be created on demand in response to the purchase and then shipped to the purchasing customer on behalf of the merchant. | 2014-12-25 |
20140379560 | Automatic interest conversion program - A computer implemented method is provided for automatically converting bank account interest transactions into additional principal payments on mortgage accounts. The method further allows the customer to overlay an increase factor, on the interest amount, to increase the amount of the additional mortgage principal payment. The method further includes automatically debiting the product of the interest transaction and the increase factor (if applicable) from each enrolled interest bearing account, summing each amount and crediting the total to a customer's mortgage account in the form of an additional principal payment. | 2014-12-25 |
20140379561 | FRAUD MONITORING SYSTEM WITH DISTRIBUTED CACHE - Systems and methods for fraud monitoring in a payment service are disclosed. An exemplary system includes a first server being located at a first locale and routing a first series of transaction requests. The system includes a second server being located at a second locale and routing a second series of transaction requests. The transactions requests may or may not be associated with a single payment service user account. The system includes a distributed cache storing a set of transaction details of the two series of transaction requests. The system includes a risk service having access to the set of transaction details from the distributed cache. The risk service generates a fraud warning based on a result of a comparison of at least one transaction detail in the set of transaction details and at least one transaction detail of a new transaction request received by the first server. | 2014-12-25 |
20140379562 | INTERMEDIARY PAYMENT AND ESCROW SYSTEM AND METHOD - A method for enabling consumers in a commercial or gaming context to push funds from a traditional open loop account to a closed loop account, and back. At the request of a consumer, funds are transferred to an open loop account of an intermediary payment system that holds or keeps track of virtual closed loop accounts for each consumer and virtual open or closed loop accounts for individual electing merchants or gaming establishments. The consumer may elect to open and use an associated closed loop card to acquire goods or services at the electing private label merchant's or to place a bet at the private label gaming facility or device that will cause funds to be transferred from the consumer's virtual closed loop account to the merchant or gaming establishment's closed loop account. Thereafter, the funds are transferred from the intermediary payment system to an open loop account belonging to the commercial or gaming merchant. The system allows for many unique functionalities so that the consumer does not need a bank account, but can through card features selected, use one or more accounts like a bank account, including for international transactions, linking of cards (as an example for money transfers to students), and make purchases free of digital tracking to the account holding consumer. The method further benefits merchants and others involved in their use through the ability to structure non-traditional fee structures and loyalty or other rewards. | 2014-12-25 |
20140379563 | APPARATUS AND METHODS FOR WEB INITIATED PHONE PAYMENTS - A method and apparatus is disclosed for completing transactions initiated on online internet websites and completed with payments over phone. The process allows users an easy, convenient and secure method for making online payments without using credit or debit cards. | 2014-12-25 |
20140379564 | CLOUD SERVICE INTEGRATION PAY TRADING SYSTEM - A cloud service integration pay trading system includes a trust certificate platform, an identity provider platform, at least one user terminal and a cloud platform. Each user terminal can log in the cloud platform to purchase services from the trust certificate platform by using a cloud account being registered in the identity provider platform. When in transaction, the request for consumption from the trust certificate platform is transmitted by the identity provider platform to the cloud platform, allowing the user terminal to use the money flow service of the cloud platform to pay the amount charged. | 2014-12-25 |
20140379565 | METHOD AND SYSTEM FOR PAYMENT THROUGH MOBILE DEVICES - Processing payment through a mobile device includes: receiving a command; generating a payment request based on the command and send the payment request to be processed by a lower layer payment program; and monitoring the payment request sent from the localhost address of the mobile device via the predetermined port; in response to the payment request, providing an input interface for payment information in and receive the input payment information; using the lower layer payment program to connect with a payment server and pass the payment information over a network to the payment server; using the lower layer payment program to transfer a payment processing result received from the payment server, to the upper layer application program; and after the upper layer application program has been unblocked, presenting to a user an indication of whether the payment has been successfully processed. | 2014-12-25 |
20140379566 | INFORMATION PROCESSING SERVER, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM PRODUCT, RECORDING MEDIUM ON WHICH INFORMATION PROCESSING PROGRAM PRODUCT IS RECORDED, PORTABLE TERMINAL, INFORMATION PROCESSING METHOD EXECUTED BY HANDHELD COMPUTER, PROGRAM PRODUCT FOR PORTABLE TERMINAL, AND RECORDING MEDIUM ON WHICH PROGRAM PRODUCT FOR PORTABLE TERMINAL IS RECORDED - The purpose of the present invention is to transfer value, the balance of which is managed by a server, to a terminal that does not have online connection function. An electronic money server | 2014-12-25 |
20140379567 | SYSTEM AND METHOD FOR AUTOMATIC PROVISIONING OF APPLICATIONS - A method and system for automatic provisioning of applications are described herein. The method can include the step of offering a plurality of applications for download to electronic devices in which each of at least some of the applications may be formatted for one of a plurality of operating environments. The method can also include the steps of receiving a request for at least one application in which the request can be associated with a first electronic device and selecting an application for delivery to the first electronic device. The selected application can be an application that may be formatted for the operating environment of the first electronic device and may be among the offered applications that are formatted for differing operating environments. | 2014-12-25 |
20140379568 | TRANSACTION SYSTEM, TRANSACTION SUPPORT APPARATUS, AND USER APPARATUS - A transaction system, comprising: a user apparatus; and a transaction support apparatus, the user apparatus and the transaction support apparatus being connected via a network; and a transaction apparatus connected to the user apparatus via short-rang radio communication, wherein upon receiving a request for transmission of electronic money from the transaction apparatus, the user apparatus is configured to transfer the received request for transmission to the transaction support apparatus; and upon receiving electronic money from the transaction support apparatus, the user apparatus is further configured to transfer the received electronic money to the transaction apparatus, and wherein the transaction support apparatus is configured to store electronic money, and when the request for transmission of electronic money is transferred from the user apparatus to the transaction support apparatus, the transaction support apparatus is configured to transmit the stored electronic money to the user apparatus in accordance with the request for transmission. | 2014-12-25 |
20140379569 | METHOD AND APPARATUS FOR COMBINING DIFFERENT KINDS OF WALLETS ON A MOBILE DEVICE - A method and an apparatus for combining different wallets on a mobile device are provided. The method of combining a plurality of wallet applications for a commercial transaction service using a mobile device includes acquiring wallet data including at least one of payment information or non-payment information provided by each of the plurality of wallet applications; combining the wallet data according to predetermined regulation information; and providing the combined wallet data through a combination application. | 2014-12-25 |
20140379570 | INFORMATION PROCESSING SYSTEM, MOBILE TERMINAL, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM CONTAINING SAID PROGRAM - Provided are a mobile terminal, information processing method, information processing program, and computer-readable recording medium storing the program whereby, when in a locked state, a specific function is unusable but another function is usable, thereby improving user convenience. When this mobile terminal is in a state where lock function is enabled, a function where a terminal function unit accesses an IC chip to perform settlement processing using electronic money is unavailable, but a function where the terminal function unit accesses the IC chip to perform auto-charge process using electronic money is available. As a result, when the mobile terminal is locked, a function to perform settlement processing as a specific function is unusable but a function to perform auto-charge process as another function is usable, thereby improving user convenience. | 2014-12-25 |
20140379571 | PRE-PAID PAYMENT INSTRUMENT PROCESSING - Methods, systems, and apparatus, including computer program products, in which a method includes attributing a value to a pre-paid payment instrument, determining an expiration time associated with the pre-paid payment instrument, and automatically return an un-used portion of value associated with the pre-paid payment instrument at the expiration time to the purchaser. | 2014-12-25 |
20140379572 | SYSTEM AND METHOD TO ALLOW ACCESS TO A VALUE HOLDING ACCOUNT - Example systems and methods that allow access to a value holding account are described. In one implementation, a method receives a first request for a second account code after activation of a selector on an account access object associated with a value holding account. The second account access code is associated with a first account access code that is associated with the value holding account. The first account code allows access to the value holding account for a first determinable period. The method generates a second request for the second account code and communicates the second request to the value holding account. The second account code is received from the value holding account and allows access to the value holding account for a second determinable period that differs from the first determinable period. The method provides the second account code to a user of the account access object. | 2014-12-25 |
20140379573 | COMPUTER SYSTEM FOR CONTROLLING MACHINE BASED TRANSACTIONS - According to one aspect the disclosure relates to a terminal for providing at least one machine based transaction facility for a customer. The terminal comprises: a user interface configured to receive input from a user for conducting transactions and to present to the user a request help option; a first communication interface operable to transmit a user request from the terminal when the request help option is selected to cause an alert to be activated at a separate device; and a second communications interface configured to detect a connection request from a controlling computer and to establish a communications link with the controlling computer by means of which the controlling computer can control operations of the terminal to assist the customer in effecting a transaction. According to another aspect the disclosure relates to a computer system for delivering transactions to a customer. | 2014-12-25 |
20140379574 | SYSTEM AND METHOD FOR DETERMINING A COST IN ELECTRONIC COMMERCE TRANSACTIONS - A method for determining a cost in an electronic commerce transaction between a first user and a second user includes at least the steps of continuously or periodically assigning one or more values, based on a set of rules, to at least one entity selected from the group consisting of: first user, second user, and a transaction between the first user and second user, receiving a first user acceptance of a transaction identifying the second user and a first cost and a number of benefits if any, and calculating a second cost based on the first cost, the number of benefits if any, and one or more values corresponding to at least one entity selected from the group consisting of: the first user, the second user, and the transaction between the first user and second user. | 2014-12-25 |
20140379575 | CONTROLLING TRANSACTIONS USING NEAR FIELD COMMUNICATIONS DEVICE - Systems, methods, devices, and non-transitory media for controlling transactions using near field communications devices are described. A method includes accessing, in secure memory or a mobile communication device, data representing at least one transaction restriction associated with an authorized user of the mobile communication device; using the at least one accessed transaction restriction, determining whether a transaction data set representing terms of a proposed transaction is authorized; and if the transaction is authorized, transmitting to a networked payment processing resource data representing terms associated with the transaction data set and a payment request. | 2014-12-25 |
20140379576 | TRANSACTION APPROVAL FOR SHARED PAYMENT ACCOUNT - A primary user of a payment account may designate one or more secondary users who may access and utilize the primary user's payment account. When a secondary user is making a transaction using the payment account, the primary user may be notified in real time. The transaction may be delayed for a specified period of time until approval from the primary user is received. The transaction may be processed if approval from the primary user is received within the specified period of time. On the other hand, the transaction may be canceled or denied if the primary user disapproves the transaction or if the specified period of time has expired without receiving approval from the primary user. | 2014-12-25 |
20140379577 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR PROVIDING FINANCIAL TRANSACTIONS - The present invention relates to computer-implemented methods, systems and computer-readable media for providing financial transactions. The method steps comprise initializing at least one transaction from a customer held device, wherein initializing comprises entering a network provider code, an acquiring institution number, a merchant identification number, a terminal identification number and sending a transaction request to an issuing institution. The method further comprises authenticating said transaction by said issuing institution, wherein authenticating comprises confirming said transaction by said issuing institution, sending said confirmation transaction to an acquiring institution and routing the confirmation to said terminal identification number by said acquiring institution and terminating said transaction at a merchant held device. | 2014-12-25 |
20140379578 | METHOD AND SYSTEM FOR CONDUCTING ON-BEHALF ELECTRONIC FINANCIAL TRANSACTION - A method of conducting an electronic financial transaction over a payment network on behalf of a customer is provided using a payment application stored in a mobile device of a facilitator, the method including: receiving transaction details of the electronic financial transaction in the payment application from the customer; generating a transaction request for the electronic financial transaction based on said the transaction details received; and forwarding the transaction request to a payment gateway for processing to carry out the electronic financial transaction over the payment network, the payment gateway having stored therein account details of a payment card linked to the facilitator from which funds are authorized to be deducted or to which funds are authorized to be credited based on the transaction request to pay for or receive funds from the electronic financial transaction on behalf of the customer in exchange for the facilitator receiving cash payment from or providing cash to the customer. There is also provided a system for conducting an electronic financial transaction on behalf of a customer, and a computer program product, embodied in a non-transitory computer-readable storage medium, including instructions executable by a computing processor to perform the above method. | 2014-12-25 |
20140379579 | SYSTEM AND METHOD FOR TRANSFERRING MONEY - A system to transfer money is disclosed. The system may have a voucher having a back facing, the back facing includes a removable covered area and a plurality of instructions, the removable covered area is scratched off and a plurality of personal identification numbers are disposed underneath the removable covered area and are exposed when the removable covered area is scratched off. The system also may have a money transfer non-transitory storage medium that generates a system payment screenshot and a payment options screenshot. The system also includes a method for transferring money from a first account to a second account. The system may have one or more unique PIN numbers processes payment to transfer or deposit a predetermined money amount or to pay one or more bills or products or services. | 2014-12-25 |
20140379580 | INTEGRATED ONLINE AND OFFLINE PURCHASE AUTHORIZATION - Method, systems, and apparatus for integrated online and offline purchase authorization. A card risk management system uses data of past transactions to expedite subsequent transactions. The data of past transactions can include records of past authorization, at a physical store, a purchase transaction by a buyer using a purchase card. The system records information on the purchase card and a user name, as provided by the user at the physical store, for authorizing the purchase transaction. A subsequent transaction can be an online transaction, by an online user having an online user account. The system can match the user name and the online user account in a unified authorization data store. If the match is successful, and upon determining that a purchase card used in the online transaction is the same as used in the physical store, the card risk management system can expedite authorization of the online purchase. | 2014-12-25 |
20140379581 | DYNAMIC PAIRING SYSTEM FOR SECURING A TRUSTED COMMUNICATION CHANNEL - A system, method, and computer-readable medium for securing a mobile financial transaction are provided. A table matches each one of a plurality of transaction risk levels to a corresponding one of a plurality of required user trust scores, correspondingly. A financial transaction risk level associated with a financial transaction is computed. A user trust score associated with the user is computed based on user identification data associated with the user. The financial transaction risk level is matched to a corresponding one of the plurality of transaction risk levels stored in the table. The one of the plurality of required trust scores that corresponds to the corresponding one of the plurality of transaction risk levels stored in the table is identified. If the user trust score is greater than or equal to the identified one of the plurality of required trust scores, then the financial transaction is authorized. | 2014-12-25 |
20140379582 | SYSTEM AND METHOD FOR PROCESSING FINANCIAL TRANSACTIONS USING A MOBILE DEVICE FOR PAYMENT - A method for processing a financial transaction includes: storing, in a database, a plurality of wallet data entries, wherein each wallet data entry includes at least a mobile device identifier and payment details associated with at least one payment account; receiving, by a receiving device, an authorization request for a financial transaction, wherein the authorization request includes at least a mobile device identifier and transaction data; transmitting, to a mobile computing device associated with the mobile device identifier, at least the transaction data; receiving, from the mobile computing device, an indication of a payment account for funding of the financial transaction; identifying, in the database, payment details associated with the indicated payment account in a wallet data entry including the mobile device identifier included in the authorization request; and transmitting, to an issuer associated with the indicated payment account, at least the payment details and the transaction data. | 2014-12-25 |
20140379583 | SMART CARD LOADING TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card. | 2014-12-25 |
20140379584 | ANTI-FRAUD FINANCIAL TRANSACTION METHOD - An anti-fraud financial method that enables a strong initial registration process for registering a financial payment instrument such as a credit card, debit card, money transfer, or checking account with a financial institution without external storage of private keys, so that only the registrant has the private key, and enables a strong financial transaction authentication and authorization process that is verifiable in real-time before the financial transaction is complete, that is computationally difficult to forge, cannot be replayed or otherwise altered after the financial transaction, and is backward compatible with existing financial transaction processing systems. | 2014-12-25 |
20140379585 | ELECTRONIC SIGNATURE SYSTEM FOR AN ELECTRONIC DOCUMENT USING A PAYMENT CARD - A system for the advanced electronic signature of an electronic document by a user, wherein a signature certificate is held by a third-party Authority, provided to sign said electronic document, the electronic document comprising an authentication field adapted to contain a set of signature data (blob), the method comprising an authentication step of the user at said Authority, by means of a third-party authentication circuit such as a bank circuit and/or a mobile phone channel, an acquisition step of a unique identifier ID associated to the user by said third-party authentication circuit, and an input step of said unique identifier (ID) in said set of signature data by said Authority. | 2014-12-25 |
20140379586 | SYSTEMS AND METHODS FOR PROVIDING SHELL COMMUNICATION IN A CLOUD-BASED PLATFORM - Embodiments of the present disclosure include systems and methods for implementing an Iconizer in a cloud-based platform such as cloud based platform (e.g., cloud-based collaboration platform or cloud-based platform providing collaborative and/or file sharing services). The iconizer can facilitate the display on a graphical user interface (GUI) of certain features of the storage operation and synchronization to a user. Some embodiments contemplate methods for representing Unicode text in the file system operations in either Normal Form Composed (NFC) or Normal Form Decomposed (NFD). Various disclosed embodiments facilitate operations using either or both formats, or a combination of the two. | 2014-12-25 |
20140379587 | PROXIMITY BASED INTERACTIONS WITH WALLBOARDS - Proximity-based interactions with wallboards and mobile devices create an interactive and effective communication model, efficiently utilizing space and opportunities for communication between a contact center and its agents and supervisors. The system provides a dynamic, proximity-based location service including displays for agents and real-time message capabilities for supervisors. | 2014-12-25 |
20140379588 | SYSTEM AND METHOD FOR WASTE MANAGMENT - A method for waste management, including recording an image of content within a waste container; extracting a set of content parameters from the image; characterizing the content within the waste container based on the set of content parameters; and routing a waste removal vehicle based on the content characterization. | 2014-12-25 |
20140379589 | SYSTEM AND METHOD FOR DISPUTE RESOLUTION - The invention provides a dispute resolution platform comprising servers, software, data, and communication capabilities providing a user interface and systems enabling live settlement, live decisions, and live feedback from a group of users who are not a party to the dispute. The present invention provides an online dispute resolution platform enabling parties to describe their dispute, upload evidence, comments, testimony, affidavits and comments from witnesses through a system which identifies opportunities for settlement and prompts users. The system allows the parties to settle their dispute prior to a live hearing, during a live hearing, or after a live hearing, | 2014-12-25 |
20140379590 | Intellectual Asset Portfolio Evaluation Methods And Systems - A computer implemented method for evaluating intellectual property assets includes identifying a source portfolio of intellectual property assets, identifying a comparable portfolio of intellectual property assets, determining an outstanding business use statistical control limit (OBUSCL) for a plurality of parameters associated with the intellectual property assets and determining a strength of the source portfolio based on the OBUSCL. | 2014-12-25 |
20140379591 | SYSTEM AND METHOD FOR IDENTIFICATION OF LAW CHANGES BETWEEN JURISDICTIONS - A request is received to identify laws in two or more jurisdictions that are associated with a behavior, a substance, an item, and/or a device. A first law associated with the behavior, the substance, the item and/or the device in a first jurisdiction is identified. A second law associated with the behavior, the substance, the item, and/or the device in a second jurisdiction is identified. Information is generated that is associated with the first law or the second law based on the respective jurisdiction. This information is presented to the user to assist the user in being compliant with the laws in the different jurisdictions. | 2014-12-25 |
20140379592 | PROPERTY TRANSACTION - Methods, devices, and systems are provided for property transactions. One device embodiment includes a processor, a memory coupled to the processor, and user interface coupled to the memory and processor. The device includes program instructions storable in memory and executable by the processor to associate real property map grid data, having page and section identifiers with property data for the real properly; record an assignment of a section associated with the map grid data to a listing agent; and record at least one indicator, having a number of levels representing a party's interest in a transaction involving real property in the section. | 2014-12-25 |
20140379593 | MANAGING TRUSTED RELATIONSHIPS AMONG PARTIES ASSOCIATED WITH A LICENSE FOR USING A COMPUTER PRODUCT - Techniques are provided for managing multiple trusted relationships within a computer product licensing environment. In one example, a partner affiliated with a vendor and a customer of the vendor's products associate with each other. A vendor license manager monitors the license consumption of a customer using the vendor's products and periodically sends a consumption report to a license manager of the associated partner. If a customer's license consumption exceeds the bounds of a given license, the vendor license manager notifies the customer and the partner, and the partner assists the customer in maintaining compliance with the license. | 2014-12-25 |
20140379594 | RECORDING AND MAINTAINING ACCEPTANCES OF LICENSES FOR USING COMPUTER PRODUCTS - Techniques are provided for generating license agreements specific to a computer product (e.g., software or hardware). In one example, vendor license manager receives an order from a customer for a computer product having a product identifier. Upon identifying an agreement corresponding to the product identifier, the license manager further embeds terms and conditions based on specifications of the customer order. After the customer reviews the agreement and accepts, the license manager associates the product-specific agreement, the acceptance, and the order to a logical customer account. | 2014-12-25 |
20140379595 | ASSOCIATING LICENSES OF A COMPUTER PRODUCT WITH A PURCHASER OF THE COMPUTER PRODUCT VIA AN N-TIER CHANNEL - Techniques are provided for associating license entitlements to a customer of computer software or hardware in a multi-tiered distribution channel. A partner of a vendor places an order for computer products on behalf of the end user customer. The order may go through several distribution channels before the vendor receives the order. Upon receiving the order, a vendor license manager generates entitlements based on the order and prompts the partner to provide a customer identifier corresponding to a customer account maintained on the vendor cloud. Once the license manager receives the customer identifier, the license manager provisions the license entitlements to the customer account. | 2014-12-25 |
20140379596 | CLOUD-BASED AUDITING AND MANAGEMENT OF LICENSES TO USE COMPUTER PRODUCTS - Techniques are provided for auditing and managing licenses for use of computer products. A license manager of a vendor receives an identifier of a computer product and a report of a set of licensed features enabled on the computer product. The license manager identifies a customer account associated with the identifier. The customer account includes a pool of entitlements acquired by the customer. The license manager compares the report with the entitlements in the pool, and with the customer's use of other computer products which draw entitlements from that pool, to generate a comparison result. An authorization decision of “in compliance” or “out of compliance” may be returned to the requesting computer product. | 2014-12-25 |
20140379597 | AUTHENTICITY VERIFYING SYSTEM FOR VERIFYING PRODUCT AUTHENTICITY - The present disclosure provides an authenticity verifying system capable of generating renewed database and updating unlock number upon occurrence of information leak, and comprises product ( | 2014-12-25 |
20140379598 | METHOD AND SYSTEM FOR REGULATING CONTENT POSTED ON SOCIAL MEDIA SITES - Method and system for regulating an employee's posting of company information on social media, for example to ensure that the content complies with disclosure rules relating to company financial or investment information. The employee designates a compliance officer, who is not required to be a member of the social media community (SMC) or to log into the community, to pre-approve postings by the company employee. A compliance module connects with the company's internal email system providing a mechanism for communication pre-approval requests of content to the officer and for storing the approved posts in order to comply with regulated company's record-keeping requirements. | 2014-12-25 |
20140379599 | SYSTEM AND METHOD FOR GENERATING AND TRANSMITTING DATA WITHOUT PERSONALLY IDENTIFIABLE INFORMATION - A system and method for generating and transmitting data without personally identifiable information. The method may include receiving a set of one or more unique identifiers (IDs) and a first set of data associated with a subscriber. The method may send the IDs to a third party provider of datasets. The method may receive a second set of data associated with the subscriber identified using the unique IDs. The method may generate aggregated viewing data based on the first and second sets of data. The set of unique IDs may be based on a one-way hash of personally identifiable information associated with the subscriber. In this way, the unique IDs may be appended with the data from third party providers so additional information regarding the household is available to clients, but the personally identifiable information is unavailable to any of the parties. | 2014-12-25 |
20140379600 | AUTHENTICATION SYSTEMS AND METHODS FOR ON-DEMAND PRODUCTS - In one embodiment, a method includes receiving, from a requestor, a request for an on-demand identity product in relation to an identity of a consumer, the request comprising personally identifying information (PII) of the consumer. The method also includes executing, using the PII, a partial registration of the consumer for the on-demand identity product, the partial registration omitting satisfaction of at least one security requirement. The method additionally includes determining whether delayed authentication is enabled for the on-demand identity product. Moreover, the method includes, responsive to a determination that delayed authentication is enabled for the on-demand identity product: conditionally suspending the at least one security requirement; initiating provision of the on-demand identity product to the requestor; and restricting the requestor's access to determined sensitive data resulting from the initiated provision at least until the at least one security requirement is satisfied. | 2014-12-25 |
20140379601 | SYSTEM, APPARATUS, DEVICE, METHOD AND COMPUTER-READABLE MEDIUM - A system includes a database configured to store pieces of data each of which corresponds to learning materials; an apparatus configured to: obtain order information defining relationship between a plurality of learning items and learning order for the plurality of learning items, identify which learning item among the plurality of learning items each of the pieces of data relates to, and determine order relation between the pieces of data based on order of each the identified learning item in the order information; and a device configured to access the pieces of data each of which corresponds to the learning materials based on the determined order relation. | 2014-12-25 |
20140379602 | SKILL-DRIVEN EDUCATION MARKETPLACE - A method and apparatus for presenting education opportunities, careers, and/or job opportunities to a particular user based, at least in part, on the user's identified skill set. The system produces, based, at least in part, on a person's set of skills, one or more careers and/or job opportunities for which the person is currently qualified and/or for which the person may qualify with the acquisition of one or more additional skills. Further, the system identifies and presents educational courses that would help the user to acquire the skills that the user lacks to qualify for particular desired opportunities. | 2014-12-25 |
20140379603 | METHODS AND SYSTEMS FOR ITEM SHIPMENT BASED ON INCOMPLETE INFORMATION - Methods and systems for coordinating shipping services for items. Generally, the methods and systems assist a user in determining the cost of shipping items where the user does not have all of the information typically required by a carrier. The method includes receiving an inquiry for a shipping cost with a generic description of the one or more items, where the generic description omits a value for at least one physical characteristic of an item. The method includes identifying, responsive to receiving the generic description, an estimate for the omitted value using a knowledge base, and generating a shipping cost. In some implementations, a server receives, from a second party, an improved description of the item including a more accurate value for the omitted characteristic of the item, and the server then updates the knowledge base, storing the second value for the characteristic of the item. | 2014-12-25 |
20140379604 | METHODS AND SYSTEMS FOR ITEM SHIPMENT BASED ON AN ITEM IMAGE - Methods and systems for coordinating shipping services for items. Generally, the methods and systems assist a user in determining the cost of shipping items where the user does not have all of the information typically required by a carrier. The method includes receiving an inquiry for a shipping cost with a generic description of the one or more items, where the generic description omits a value for at least one physical characteristic of an item. The method includes identifying, responsive to receiving the generic description, an estimate for the omitted value using a knowledge base, and generating a shipping cost. In some implementations, a user supplies an image of the item. In some implementations, the generic description is automatically generated from the image. In some implementations, a user purchases shipping services based on an image of the item to be shipped. | 2014-12-25 |
20140379605 | AUTOMATIC SUPPLY-CHAIN MONITORING - The present invention provides a system and method for automatic valuation of the quality of a shipment process in terms of environment conditions and in terms of logistics. The system and method performs automatic statistical analysis on the collected data to facilitate identification of anomalies or inefficiencies in the process. At least one or more information on the shipment is used when shipment is closed. | 2014-12-25 |
20140379606 | APPARATUS AND METHOD FOR END USER FREIGHT TRANSPORTATION MONITORING - A method is disclosed for an improved consumer oriented secure surveillance system directed to a freight hauling. The method disclosed includes that an authorized tractor driver (e.g., contractor) and/or authorized tractor and the trailer (provided by the consumer) utilize a specified authorization code. A location tracking device is attached to the trailer and stores the specified authorization code. Location information of the location tracking device and the authorized tractor driver and/or an authorized tractor are monitored by an end-user along a destination route. The consumer can control usage of unauthorized tractor driver(s) (e.g., subcontractor(s)) and/or and unauthorized tractor(s) (e.g., subcontractor's tractor(s)) for freight shipment; thus, freight integrity can be controlled, optimized, and maintained to a desired consumer confidence level. | 2014-12-25 |
20140379607 | DELIVERY MANAGEMENT APPARATUS AND RECORDING MEDIUM - A delivery management apparatus includes a delivery information reception unit that receives from a sender information about a shipping deposit location relating to a delivery item, and receives from a recipient information about a receipt location relating to the delivery item; a delivery person determination unit that communicates at least the information about the shipping deposit location and the information about the receipt location to users in order to recruit a user desiring to perform delivery, and determines a delivery person from applicant users; and a delivery procedure communication unit that at least communicates to the delivery person information used for pickup of the delivery item from the shipping deposit location or from a relay storage location and information used for storage in the relay storage location or in the receipt location, and communicates to the recipient information used for pickup of the delivery item from the receipt location. | 2014-12-25 |
20140379608 | CARTON INVENTORY OPTIMIZATION - Computer program products, methods, systems, apparatus, and computing entities for carton inventory optimization are provided. An example method comprises: (a) receiving historical shipping data corresponding to a time period, the historical shipping data comprising items that were shipped during the time period and their respective dimensions; (b) associating a rank to each of a plurality of carton sizes for each item; (c) associating a highest ranked carton size for each item at least in part on step (b); and (d) determining whether a desired level of optimization has been reached. Another example method may further comprise: (e) after determining that the desired level of optimization has not been reached, identifying at least one carton size; and (f) re-associating items that were associated with the at least one identified carton size to the next highest ranked carton size for each item. | 2014-12-25 |
20140379609 | METHOD AND SYSTEM FOR INSTANT PROCESSING OF AN SMS RELATED TO A BUSINESS - The present invention provides a method, system and computer program product for instant processing of business related operations. This invention is not restricted to any particular type of business. The system provides for means to interpret the business requirements at run time from an SMS sent by a user, and instantly get the business requirement executed and acknowledgment response sent to the user. | 2014-12-25 |
20140379610 | Cannabis Product Updated User Feedback System and Method - A cannabis product updated user feedback system and method that informs users of the anticipated psychological and physiological effects of a cannabis product. The system includes the creation of an effects graph associated with the cannabis product that may be distributed with the cannabis product or presented on a website. The effects graph includes one or more line graphs depicting the effects and interactions experienced by all reporting users of the product. The system includes a website in which the feedback information regarding a particular cannabis product is collected. The administrator of the website then reviews the feedback information and provides updated line graph data. Each line graph shows the intensity of user-reported effects graded from 0 to an upper limit on the y axis over a time presented on the x axis. The effects graph may include icons that visually portray what a user consumed and how they felt. By viewing the line graph, a user can anticipated the effects, the intensity, when they occur and the duration. | 2014-12-25 |
20140379611 | RETIREMENT PLANNING SYSTEM - A retirement planning system uses employee age and salary information from an employer's employee information system, along with other information such as funds from other sources, to determine a target retirement account value for the employee, along with a periodic contribution amount that is expected to yield the target retirement account value upon retirement. The system may allocate an additional amount to serve as a shock absorber fund. The system may automatically enroll the employee in a retirement plan using the determined contribution level, and it may monitor the plan's value and make automatic adjustments to the contribution amounts to keep the employee on track toward retirement goals. When the employee reaches retirement, the system may manage distributions to the then-former employee. If the account value dips below an expected amount at any time, it may use the shock absorber funds to help maintain an account balance. | 2014-12-25 |
20140379612 | Leveraging to Minimize the Expected Inverse Assets - The question of how much should be placed at risk on a given investment, relative to the total assets available for investment, is basically that of determining the optimal leverage. The approach taken by the method described in this specification is to optimize the expected future inverse assets, conditioned on the assets having some estimated linear return distribution. The expected inverse assets is shown to outperform the Kelly Criterion, an existing well known method for calculating optimal leverage, using a simple cross evaluation method, whereby the optimum leverage according to one method is measured using the other method's utility function. The expected inverse assets measure outperforms the Kelly Criterion in the two analytic scenarios considered, a Gaussian distribution of log-returns and a Bernoulli distribution of linear returns. Example usage of the expected inverse asset utility or objective function is provided by the specification of a system of processing histograms that represent the forecast return distributions of investments. It is also shown how this system can be applied specifically to leveraging with market equities, leveraging with debt, leveraging in insurance, and leveraging in a retirement portfolio. | 2014-12-25 |
20140379613 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM - There is provided an information processing device for measuring a dimension of an object to be measured in a low-load calculation processing. A handy terminal includes a depth map sensor block for generating a depth map of an object to be measured by use of a depth map sensor, and a coordinate transformation/side length calculation unit that measures a dimension of the object to be measured based on the depth map. The handy terminal may further includes a delivery fee calculation unit that calculates a delivery fee of the object to be measured based on the dimension. | 2014-12-25 |
20140379614 | SYSTEM AND METHOD FOR DETERMINING A LEVEL OF CONFIDENCE THAT A MEDIA ITEM IS BEING PRESENTED - A system, computer-readable storage medium storing at least one program, and a computer-implemented method for determining a level of confidence that an identified media item is currently being presented to a user is presented. A media item being presented to a user on an output device coupled to the client device is identified, the client device including an input device usable by a user of the client device to instruct the client device to acquire and present media items from a plurality of media devices. A level of confidence that the identified media item is currently being presented to the user is calculated. A determination is made that at least one predetermined event has occurred. A level of confidence that the identified media item is currently being presented to the user is adjusted based on the at least one predetermined event. | 2014-12-25 |
20140379615 | DYNAMICALLY EVOLVING COGNITIVE ARCHITECTURE SYSTEM BASED ON PROMPTING FOR ADDITIONAL USER INPUT - A dynamically evolving cognitive architecture system based on prompting for additional user input is described. A system forms an intent based on a user input, and creates a plan based on the intent. The plan includes a first action object that transforms a first concept object associated with the intent into a second concept object and also includes a second action object that transforms the second concept object into a third concept object associated with a goal of the intent. The first action object and the second action object are selected from multiple action objects. The system executes the plan, and outputs a value associated with the third concept object. | 2014-12-25 |
20140379616 | System And Method Of Tuning Item Classification - Systems and methods are disclosed herein for tuning an item classification. In one aspect, a method may include receiving, by a computing device, a classification request. The computing device may determine an item type of the item using a plurality of classifiers, and generate information of item type determination corresponding to the item. In response to a determination that a confidence score associated with the determined item type is less than a predetermined threshold, the computing device may provide the information of item type determination for analysis. | 2014-12-25 |
20140379617 | METHOD AND SYSTEM FOR RECOMMENDING INFORMATION - Embodiments of the present application relate to a method for recommending information, a system for recommending information, and a computer program product for recommending information. A method for recommending information is provided. The method includes determining a set of specific first users comprising at least one specific first user who complies with a first preset condition, the determination being based on operating behavior information of a set of one or more first users recorded in a system, looking up, in the set of specific first users, targeted specific first users having a similarity to a current user who complies with a second preset condition, and providing recommendation information to the current user based on the operating behavior information of the targeted specific first users. | 2014-12-25 |
20140379618 | DOCUMENT RECOMMENDATION - Embodiments of the present disclosure provide a method and apparatus for document recommendation by obtaining a plurality of first data for a source recommendation task from activities related to a source user using a plurality of first documents; obtaining a plurality of second data for a target recommendation task from activities related to a target user using a plurality of second documents; performing the target recommendation task based on the plurality of first data, the plurality of second data, and knowledge transferred from the source recommendation task to obtain a target recommendation model; and conducting document recommendation to the target user using the target recommendation model. | 2014-12-25 |
20140379619 | Automated System For Generative Multimodel Multiclass Classification And Similarity Analysis Using Machine Learning - A sample of data is placed within a directed graph that comprises a plurality of hierarchical nodes that form a queue of work items for a particular worker class that are used to process the sample of data. Subsequently, work items are scheduled within the queue for each of a plurality of workers by traversing the nodes of the directed graph. The work items are then served to the workers according to the queue. Results can later be received from the workers for the work items (the nodes of the directed graph are traversed based on the received results). In addition, in some variations, the results can be classified so that one or models can be generated. Related systems, methods, and computer program products are also described. | 2014-12-25 |
20140379620 | SYSTEMS AND METHODS FOR AUTOMATIC SEGMENT SELECTION FOR MULTI-DIMENSIONAL BIOMEDICAL SIGNALS - Systems and methods for automatically analyzing and selecting prominent channels from multi-dimensional biomedical signals in order to detect particular diseases or ailments are provided. Such systems and methods may be applied in different ways to obtain numerous benefits, such as lowering of power and processing requirements, reducing an amount of data acquired, simplifying hardware deployment, detecting non-trivial patterns, obtaining, clinical episode prognosis, improving patient care, and/or the like. | 2014-12-25 |
20140379621 | SYSTEM, METHOD AND COMPUTER READABLE MEDIUM FOR DETERMINING AN EVENT GENERATOR TYPE - Human interaction with a webpage may be determined by processing an event stream generated by the client device during the webpage interaction. A classification server receives the event stream and compares components of the event stream, including components of an event header message, with prerecorded datasets. The datasets include prerecorded event streams having a known interaction type. Training clients may be provided for generating the prerecorded datasets. | 2014-12-25 |
20140379622 | SYSTEMS AND METHODS FOR RULE-BASED CONTENT OPTIMIZATION - A content optimization system includes a content generation module, a content evaluation module, and a rule management module. The content generation module is adapted to generate a content configuration, wherein the content configuration comprises a plurality of content elements and one or more relationships among the plurality of content elements, wherein the one or more relationships are in accordance with a set of rules on content generation. The content evaluation module is adapted to evaluate content performance of a piece of content assembled from the content configuration. The rule management module is adapted to amend the set of rules based on the evaluated content performance. | 2014-12-25 |
20140379623 | APPARATUS AND METHODS FOR PROCESSING INPUTS IN AN ARTIFICIAL NEURON NETWORK - Apparatus and methods for processing inputs by one or more neurons of a network. The neuron(s) may generate spikes based on receipt of multiple inputs. Latency of spike generation may be determined based on an input magnitude. Inputs may be scaled using for example a non-linear concave transform. Scaling may increase neuron sensitivity to lower magnitude inputs, thereby improving latency encoding of small amplitude inputs. The transformation function may be configured compatible with existing non-scaling neuron processes and used as a plug-in to existing neuron models. Use of input scaling may allow for an improved network operation and reduce task simulation time. | 2014-12-25 |
20140379624 | INCREASED DYNAMIC RANGE ARTIFICIAL NEURON NETWORK APPARATUS AND METHODS - Apparatus and methods for processing inputs by one or more neurons of a network. The neuron(s) may generate spikes based on receipt of multiple inputs. Latency of spike generation may be determined based on an input magnitude. Inputs may be scaled using for example a non-linear concave transform. Scaling may increase neuron sensitivity to lower magnitude inputs, thereby improving latency encoding of small amplitude inputs. The transformation function may be configured compatible with existing non-scaling neuron processes and used as a plug-in to existing neuron models. Use of input scaling may allow for an improved network operation and reduce task simulation time. | 2014-12-25 |
20140379625 | SPIKE TAGGING FOR DEBUGGING, QUERYING, AND CAUSAL ANALYSIS - Embodiments of the invention relate to spike tagging for a neural network. One embodiment comprises a neural network including multiple electronic neurons and a plurality of weighted synaptic connections interconnecting the neurons. An originating neuron of the neural network generates a spike event and a message tag that includes information relating to said originating neuron. A neuron of the neural network receives a spike event and a message tag from an interconnected neuron. In response to one or more received spike events, a receiving neuron spikes and sends a message tag selected from received message tags to an interconnected neuron. | 2014-12-25 |
20140379626 | INFORMATION PLATFORM FOR INDUSTRIAL AUTOMATION STREAM-BASED DATA PROCESSING - An apparatus to predict future behavior of devices in an industrial automation environment is provided. The apparatus includes a non-transitory computer-readable storage medium configured to store program instructions, and program instructions stored on the non-transitory computer-readable storage medium. The program instructions direct a processor within a stream-based processing system to receive a first raw data stream from a first manufacturing data source, and to analyze the first raw data stream with respect to behavior data corresponding to the first manufacturing data source. The program instructions also direct the processor to predict future behavior of one or more device associated with the first manufacturing data source, based on the analysis of the first raw data stream and the behavior data corresponding to the first manufacturing data source, and to perform an action based on the predicted future behavior of the one or more device. | 2014-12-25 |
20140379627 | DOMAINS FOR KNOWLEDGE-BASED DATA QUALITY SOLUTION - The subject disclosure relates to a knowledge-driven data quality solution that is based on a rich knowledge base. The data quality solution can provide continuous improvement and can be based on continuous (or on-going) knowledge acquisition. The data quality solution can be built once and can be reused for multiple data quality improvements, which can be for the same data or for similar data. The disclosed aspects are easy to use and focus on productivity and user experience. Further, the disclosed aspects are open and extendible and can be applied to cloud-based reference data (e.g., a third party data source) and/or user generated knowledge. According to some aspects, the disclosed aspects can be integrated with data integration services. | 2014-12-25 |
20140379628 | PRIVACY RISK METRICS IN LOCATION BASED SERVICES - The present disclosure relates generally to mechanisms for the estimation of location privacy risk, comprising: building one or more trajectory models from auxiliary information (e.g., one or more maps, one or more routes); capturing common behavioral patterns (e.g., shortest route(s),/fastest route(s)); identifying, given unlinked trajectories for a plurality of users, most likely linkages using the trajectory model(s); eliminating one or more unlikely linkages based on deviation from the shortest route(s) and/or the fastest route(s); measuring privacy as the percentage of linkages correctly identified; and outputting the measured privacy. | 2014-12-25 |
20140379629 | METHOD AND APPARATUS FOR PROVIDING A PHARMACOKINETIC DRUG DOSING REGIME - A system and method for providing a therapeutic plasma protein dosing regime includes determining a pharmacokinetic profile of a patient using a Bayesian model of pharmacokinetic profiles of sampled patients. The example system and method also include determining a first dosing regime for a first specified dosing interval including (i) a first dosage and (ii) a first therapeutic plasma protein level in the patient over a time period based at least upon the pharmacokinetic profile and determining a second dosing regime for a second specified dosing interval including (i) a second dosage and (ii) a second therapeutic plasma protein level in the patient over the time period based at least upon the pharmacokinetic profile. The example system and method further include displaying the first dosing regime and the second dosing regime on a client device such that the first dosing regime is displayed in conjunction with the second dosing regime. | 2014-12-25 |
20140379630 | DISCOVERING ADVERSE HEALTH EVENTS VIA BEHAVIORAL DATA - Aspects of the subject disclosure are directed towards processing search logs and/or other large scale data sources to detect medical related-effects. For example, an anomalous number of queries regarding a particular symptom and a drug may indicate the existence of a previously unknown side-effect of the drug. Side effects of drug interactions may also be found by processing behavioral data such as queries and social network posts. Also described is the generation of symptom spectra data that is processed to detect anomalies and the like in user behavior corresponding to medical related-effects. | 2014-12-25 |
20140379631 | TRANSACTIONAL KEY-VALUE DATABASE WITH SEARCHABLE INDEXES - During a search technique, indexes associated with user accounts of users that are using the communication application are opened in memory from a transactional key-value database. These indexes encompass messages (such as emails) communicated using the communication application, and each of the users has at least one separate, associated index. When a search query associated with a target user account is received from the communication application, a search based on the search query is performed by reading the associated index in the memory from the transactional key-value database without managing the index using a file system. Then, a result for the search query is returned. | 2014-12-25 |
20140379632 | SMARTER BIG DATA PROCESSING USING COLLABORATIVE MAP REDUCE FRAMEWORKS - Map reduce processing is performed holistically, to yield map reduce results data, on an aggregated group of data sets, which had been generated and maintained with “splits” separating the separate date sets, rather than being performed separately on the split data sets and then aggregating (or attempting to aggregate) the map reduce processing results. | 2014-12-25 |
20140379633 | Electronic Document Approval - This invention discloses a method, process, and system for displaying electronic documents that require approval from at least one party, and includes auditable tracing of approvals. The system can be centralized in a web-based or other electronic location, or be integrated as plugin, widgets, or other types of entities in other systems that provide APIs or other methods of integration. The invention presents approval by a person or group as an indication on the original document or as a separate indication. The recipients that are needed to approve the document are sent a notification that there is a document waiting for approval. Approvals are stored for auditing. | 2014-12-25 |
20140379634 | APPLICATION-TO-REPOSITORY DATA MAPPING IN DATA REPOSITORIES, AND RELATED METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA - Application-to-repository data mapping in data repositories is disclosed herein. Related methods, systems, and computer-readable media are also disclosed. In this regard, in one embodiment, a method for providing application-to-repository data mapping in a data repository is provided. The method comprises receiving, by a data repository, a definition of a named data object from an application. The method further includes generating a mapping of the named data object to a data element stored in the data repository. The method also comprises storing the mapping as application metadata in a predefined data structure in the data repository. The method additionally comprises providing, to the application, access to the data element based on the mapping of the named data object to the data element. The data repository thus provides a metadata architecture minimizing the impact of changes to the data repository, while also simplifying sharing of data among applications. | 2014-12-25 |
20140379635 | System and Methods of Data Migration Between Storage Devices - A method of migrating data includes calculating a datetime span within a date range, the datetime span having a start datetime and an end datetime calculated based upon a width value; searching a database for migration candidates from the one or more data records, the searching performed from the start datetime to the end datetime of the datetime span; if the searching the database for candidates between the start datetime and the end datetime of the datetime span returns at least one candidate, migrating the candidates to a second device; and if the searching the database for candidates within the datetime span does not return a candidate, incrementing the width value. | 2014-12-25 |
20140379636 | AUTOMATED RESOLUTION OF DATABASE DICTIONARY CONFLICTS - Copying data in a table from a source database to a target database is performed by copying the table into a conflicts schema. A first INSERT/SELECT statement is executed to copy data from the table. Then, in response to a determination that the table definition for the table in a source database dictionary is not compatible with a table definition for the table in a target database dictionary, the INSERT/SELECT statement execution is rolled back in response to a determination that the data from the first INSERT/SELECT statement did not fit in a table in the target schema of the target database. A second INSERT/SELECT statement is executed including a WHERE clause to copy data from the table to the target schema of the target database. In response to a determination that the second INSERT/SELECT statement did not copy data from the table to the target schema of the target database, a third INSERT/SELECT statement is executed forcing the data to fit. | 2014-12-25 |
20140379637 | REVERSE REPLICATION TO ROLLBACK CORRUPTED FILES - The present invention extends to methods, systems, and computer program products for reverse replication to rollback corrupted files. When a computer system detects that a copy of a file includes inappropriate content, the computer system can coordinate with other computer systems (e.g., in replicated storage system) to determine that a viable (e.g., clean) copy of the file exists. The computer system can access the viable copy and replace the copy that includes the inappropriate content with the viable copy. As such, a computer system can “reverse replicate” a file rather than break a synchronization relationship. Reverse replication can be used to rollback a copy of an infected file to another (possibly earlier) copy of the file that is not infected. Embodiments of the invention can be used to rollback data files, such as, for example, pictures, videos, documents, etc. | 2014-12-25 |
20140379638 | CONCURRENT REQUEST HANDLING FOR DATABASE TRANSACTIONS - A request handler may receive transaction requests for transactions to be executed using data of a database, and may classify a first transaction request of the transaction requests as a simple transaction request, and a second transaction request of the transaction requests as a complex transaction request. A key-value store engine may execute a first transaction satisfying the first transaction request, using a key-value store of pre-calculated results determined prior to receipt of the first transaction request, and based on the data, and may update a key-value delta reflecting a change, if any, of the key-value store caused by the first transaction. A relational store engine may cause the at least one processor to execute a second transaction satisfying the second transaction request, using a relational store including a subset of the data, and may update a relational delta reflecting a change, if any, of the relational store caused by the second transaction. A synchronizer may execute a synchronization of the key-value store and the relational store, based on the key-value delta and the relational delta. | 2014-12-25 |
20140379639 | System and Methods of Managing Content in one or more Repositories - A method of managing documents in an active repository that includes receiving one or more documents having metadata from a plurality of cache repositories; registering the metadata in a registry; storing the one or more documents in the active repository; and replicating the stored one or more documents and the registered metadata to a backup system. | 2014-12-25 |
20140379640 | Metadata Replication for Non-Dicom Content - A method of replicating metadata from a publisher device to a subscriber device includes storing a clip having content and associated metadata, determining the content on the stored clip, gathering metadata associated with the content on the stored clip, packaging the gathered metadata in a payload, and transferring the payload to the subscriber device for replication of the gathered metadata in the subscriber device. | 2014-12-25 |
20140379641 | Method and Apparatus for Peer-to-Peer File Authoring - Co-authoring of a digital content file using content contributed by peer devices in a peer-to-peer communications network is described. A local copy of the digital content file is stored in each of plural peer communications devices disposed in a multi-node communications network. The contents of the local copies of the digital content file stored in at least two peer communications devices are compared and in an event the local copies of the digital content file stored in a peer communications device is missing content that is contained in the other compared peer communications devices, the missing content is merged into the local copy of the digital content file stored in the peer communications device. | 2014-12-25 |
20140379642 | Gathering Statistics Based on Container Exchange - A method of tracking statistics related to a container of data is disclosed. A container created by an author may be stored on a network. Other users aside from the author may be permitted to search for containers. The other users may be permitted to obtain a copy of a selected container and statistics related to a number of copies of the container obtained may be stored. | 2014-12-25 |
20140379643 | PRESERVING CONTENT ITEM COLLECTION DATA ACROSS INTERFACES - Systems, methods, and computer-readable storage media for preserving collection data across interfaces are disclosed. The system can generate, for a collection of content items stored in multiple user accounts in a synced online content management system, an index of the content items in the collection. The index can store, a content item identifier and a file location, for each content item. Upon detecting that a content item in the collection is moved to a new file location, the system can retrieve a collection identifier from metadata associated with the content item. The system can then locate the index for the collection associated with the collection identifier based on the collection identifier retrieved from the metadata associated with the content item. The system can then update the file location stored at the index for the content item to identify the new file location. | 2014-12-25 |
20140379644 | DATABASE MANAGEMENT METHOD - A lower-level master node sends, to a higher-level master node, a table-based write set as a bundle of combinations of a shadow copy of the database and a heap tuple map expanded in a memory, and the higher-level master node that received the write set verifies whether the update has already been executed and sends the record of this update to the lower-level master node as a transaction log including a table number, whereby the database can be updated efficiently and consistently from the lower-level master node to the higher-level master node, and from the higher-level master node to the lower-level master node under its control. | 2014-12-25 |
20140379645 | SYSTEMS AND METHODS TO RETAIN AND RECLAIM RESOURCE LOCKS AND CLIENT STATES AFTER SERVER FAILURES - A method, system, and computer program for high-availability database systems. The method commences by replicating (e.g., from a first server to a second server) a data structure having entries describing resource locks and client states. The replication can be performed to any number of servers. Upon detecting a failure of a connection between the first server and a client to which the first server is connected, the system establishes a new connection between the second server and the client by updating the replicated data structure to describe new connection between the second server and the client and updating the entries of the replicated data structure to reflect the new connection and the then current aspects of the resource locks and client states. The client can be a database instance, and the act of replicating can be accomplished using a broadcast channel. The servers can be organized in a computing cluster. | 2014-12-25 |
20140379646 | Replication of Updates to DICOM Content - A method of replicating a content update includes determining if metadata associated with the content update matches a previously registered metadata in a first system; if a match is identified, determining if the content update contains a metadata differing from a previously stored metadata in the first system; and if the content update is determined to contain a metadata differing from the previously stored metadata, replicating the content update to a second system. | 2014-12-25 |
20140379647 | MAINTAINING AND UPDATING FILE SYSTEM SHADOWS ON A LOCAL DEVICE BY A SYNCHRONIZATION CLIENT OF A CLOUD-BASED PLATFORM - Systems and methods for maintaining and updating file system shadows by a synchronization client of a cloud-based platform. In some embodiments, an executor of the synchronization client can execute an action on an item in the local file system which changes the state of the item from an old state to a new state. The synchronization client updates the file system shadows with the new state of the item via an interface to facilitate generation of a synchronization event for the change to the item, that would otherwise go undetected if the change to the item was immediately reversed. In some embodiments, methods for providing shadow consistency and enhancing concurrent access to shadows are implemented by the synchronization client in maintaining and updating the file system shadows. | 2014-12-25 |
20140379648 | SYSTEMS AND METHODS FOR MANAGING UPGRADES, MIGRATION OF USER DATA AND IMPROVING PERFORMANCE OF A CLOUD-BASED PLATFORM - Techniques for populating a new synchronization (“sync”) folder during an upgrade of a sync client of a cloud-based platform includes transferring synced items stored at a first location to an archive location in response to an indication to upgrade the sync client, detecting an instruction to populate the new sync folder at a second location with an item, determining that the synchronization client is in migration mode and transferring a local copy of the item from the archive location to the new sync folder to populate the new sync folder at the second location when the local copy of the item has the same state as a remote copy of the item at the cloud-based platform. Also disclosed are techniques for accommodating autoupdate operations, monitoring performance of sync operations and providing a tray icon that provides a high level overview of the state of a sync operation. | 2014-12-25 |
20140379649 | DISTRIBUTED STORAGE SYSTEM AND FILE SYNCHRONIZATION METHOD - A distributed storage system receives a file from a client, stores the file into different storage units in the system, creates a system log in an access entry and creates a unit log in each storage unit. The system log records information of all files stored in the system, and the unit log in each storage unit records information of all files stored in the storage unit. When a file stored in a first storage unit is lost or destroyed, the system determines a second storage unit that stores the same file as the first storage unit according to the information recorded in the system log and the unit logs, and repairs the file in the first storage unit by copying the same file from the second storage unit to the first storage unit. | 2014-12-25 |
20140379650 | MANAGING A FILE-BASED VERSIONING SYSTEM - Techniques for managing a file-based versioning of data objects include receiving, from a back-end computing system, a transport request that includes an updated transport object, the updated transport object including serialized database content of a data object; converting the serialized database content of the updated transport object to file-based content; storing the file-based content of the updated transport object in a repository over a previously-stored version of the transport object; and updating a database that includes a change history of the data object based on the storage of the file-based content in the repository. | 2014-12-25 |
20140379651 | Multiple Subscriber Support for Metadata Replication - A system of replicating metadata of content in a networked environment includes an archive device, a publisher subsystem, and a plurality of subscriber subsystems. The publisher subsystem gathers metadata stored in the archive device, packages the metadata into a payload, and transmits the payload to the plurality of subscriber subsystems for replication. | 2014-12-25 |
20140379652 | METHOD, SYSTEM AND COMPUTER PRODUCT PROGRAM FOR GOVERNANCE OF DATA MIGRATION PROCESS - Embodiments include a method, system and computer product program for governance of data migration process in an enterprise from at least one source to at least one target. The method includes receiving, using a rules engine, the source information and the target information in response to a request for the data migration. The method also includes, identifying, using the rules engine, at least one business rule governing the data migration process based on the received source information and the target information. The method further includes instructing to initiate the data migration process by migration engine based on the identified business rule. | 2014-12-25 |
20140379653 | METHODS AND APPARATUS FOR SYNCHRONIZING CLOSED HETEROGENOUS SYSTEMS - Methods, systems, and computer program products for synchronizing a first closed system with a second closed system are disclosed. A first transaction synchronization function on a first computing device receives a first plurality of user transactions and stores corresponding transaction records in a first synchronization file in a common format. The first transaction synchronization function submits the first plurality of user transactions to the first closed system via a first vendor interface for application to a first database. A second computing device accesses the first synchronization file, translates the transaction records in accordance with a second vendor interface, and submits the translated transaction records to a second closed system via a second vendor interface for application to a second closed system. | 2014-12-25 |
20140379654 | OPTIMIZING DATA SYNCHRONIZATION BETWEEN MOBILE CLIENTS AND DATABASE SYSTEMS - Mechanisms and methods are provided for optimizing data synchronization between clients and database systems. These mechanisms and methods provide optimizations for synchronization requests, by either breaking a synchronization request into multiple smaller requests, or by executing different code routines for differing client types, or by pre-caching data that a user is anticipated to want at a future point. Such optimization techniques can enable clients with varying capacities (e.g., mobile client vs. full desktop client) to optimally utilize their respective device capabilities. | 2014-12-25 |
20140379655 | OPTIMIZING DATA SYNCHRONIZATION BETWEEN MOBILE CLIENTS AND DATABASE SYSTEMS - Mechanisms and methods are provided for optimizing data synchronization between clients and database systems. These mechanisms and methods provide optimizations for synchronization requests, by either breaking a synchronization request into multiple smaller requests, or by executing different code routines for differing client types, or by pre-caching data that a user is anticipated to want at a future point. Such optimization techniques can enable clients with varying capacities (e.g., mobile client vs. full desktop client) to optimally utilize their respective device capabilities. | 2014-12-25 |
20140379656 | System and Method for Maintaining a Cluster Setup - Methods and systems are directed to a maintenance procedure in a production environment comprising a primary database and a secondary database. Production data may be stored in the primary database and failover data may be stored in the secondary database. Data from the primary database may be replicated to the secondary database. The maintenance procedure may provide for modification of the primary database and the secondary database to conform to one or more modified requirements of a modified version of the application. During the maintenance procedure, data in the databases may be duplicated, data structures may be modified, and modification of certain data elements may be prohibited. | 2014-12-25 |
20140379657 | Document Provenance Scoring Based On Changes Between Document Versions - A computer-implemented method, system and computer program product is provided for optimizing a document change or provenance scoring system by weighting sections of a document, scoring the changes for each section, and then combining the change scores for each section to generate an overall change score. An associated report may also be generated that catalogs all of the various scoring elements. The weighted score is stored in a document management system and provides a human document reviewer a level of detail to evaluate document changes. Accordingly, the weighted score reveals whether a document's changes require a brief or detailed review before the document's changes are approved for a next document version. | 2014-12-25 |
20140379658 | Constraint-based consistency with snapshot isolation - Efficient processing of concurrent atomic transactions is provided by identifying the constraints that need to be satisfied for correct application behavior. With these constraints identified, commit processing for a transaction can then refer to the constraints to see if committing the current transaction causes a problem with the constraints. If there is a conflict with the constraints, the transaction aborts. If there is no conflict with the constraints, the transaction commits. | 2014-12-25 |