Patent application number | Description | Published |
20130124263 | Systems and Methods to Summarize Transaction data - A computing apparatus is configured to summarize transaction data via aggregating transactions according to geographical regions (e.g., based on postal codes) for a plurality of merchant categories, normalize the aggregated spending across the merchant categories for each geographical region, rank the regions for each category based on the normalized spending, generate percentile indicators based on the ranking result, and generate spending indices that are proportional to the normalized spending within each category. The spending indices and percentile indicators of a geographical region across the set of merchant categories represent a spending profile of the region. The spending profile is indicative of the spending preferences of the region but does not reveal the actual spending amounts of any individual, family or region. The spending profile can be used in targeted advertising, and in measuring advertisement audience and campaign performance. | 05-16-2013 |
20130246125 | Service Provider Analytics - A system, apparatus, computer readable media, and method are disclosed for generating analytics on customers of service provider merchants. In an example, a transaction record associated with an account identifier of a customer that purchased a first service from a first merchant may be processed and a service date for the first service may be determined. Other transaction records comprising the account identifier and that satisfy a temporal filter may be identified. Each of the other transaction records may include transaction data associated with at least one of: (1) purchase of another service to be provided within a first predetermined amount of time of the service date, and (2) purchase of a product within a second predetermined amount of time of the service date. A spending profile including information on the first service, the service date, and the transaction data for each of the other transaction records may be generated. | 09-19-2013 |
20130275181 | SERVICE PROVIDER ANALYTICS - A system, apparatus, computer readable media, and method are disclosed for generating analytics on customers of service provider merchants. In an example, a transaction record associated with an account identifier of a customer that purchased a first service from a first merchant may be processed and a service date for the first service may be determined. Other transaction records comprising the account identifier and that satisfy a temporal filter may be identified. Each of the other transaction records may include transaction data associated with at least one of: (1) purchase of another service to be provided within a first predetermined amount of time of the service date, and (2) purchase of a product within a second predetermined amount of time of the service date. A spending profile including information on the first service, the service date, and the transaction data for each of the other transaction records may be generated. | 10-17-2013 |
20140236678 | SYSTEMS AND METHODS TO ENHANCE SEARCH VIA TRANSACTIONDATA - A computing apparatus is configured to: receive a search term from a user; identify a region within which a residence location of the user is located; obtain a spending profile generated based on aggregating transaction data of users residing in the region; and customize a search result based on the spending profile. For examples, spending of users residing in different regions (e.g., identified via zip+4 postal codes) can be aggregated within respective regions, and normalized and/or ranked across the regions to generate spending preference indicators. Further, the average distances between the residence locations of users residing with different regions and merchant locations at which the users make transactions using payment accounts are determined for the respective regions. The spending indicators and the average distance are used to select, prioritize and/or customize search results to reflect the spending preferences of users based on the residence regions of the users. | 08-21-2014 |
20140304130 | SYSTEMS AND METHODS TO ENHANCE SEARCH RESULTS USING TRANSACTION DATA OF MERCHANTS - A computing apparatus includes: a transaction handler configured to process transactions in a payment processing network; a data warehouse configured to store transaction data recording the transactions processed at the transaction handler; a profile generator configured to generate, based on the transaction data, a profile including business activity data configured to identify a time period of active business, and a portal configured to communicate with a search engine to enhance search results using the business activity data. | 10-09-2014 |
Patent application number | Description | Published |
20080229415 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 09-18-2008 |
20080262990 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 10-23-2008 |
20080262991 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 10-23-2008 |
20100042565 | MEZZAZINE IN-DEPTH DATA ANALYSIS FACILITY - A mezzanine adapter based data processing facility provides in-depth data analysis that is presented as a digest of advanced statistics and network measures including latency data, content analysis, bidirectional flow related characteristics, multiple flow related statistics over a count of connections or over a period of time, and the like. | 02-18-2010 |
20110213869 | PROCESSING DATA FLOWS WITH A DATA FLOW PROCESSOR - An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules. | 09-01-2011 |
20110214157 | SECURING A NETWORK WITH DATA FLOW PROCESSING - An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules. | 09-01-2011 |
20110219035 | DATABASE SECURITY VIA DATA FLOW PROCESSING - An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules. | 09-08-2011 |
20110231510 | PROCESSING DATA FLOWS WITH A DATA FLOW PROCESSOR - An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules. | 09-22-2011 |
20110231513 | APPLICATION DISTRIBUTION CONTROL NETWORK APPARATUS - A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups. | 09-22-2011 |
20110231564 | PROCESSING DATA FLOWS WITH A DATA FLOW PROCESSOR - An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules. | 09-22-2011 |
20110231925 | FIREWALL NETWORK APPLICATION APPARATUS - A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups. | 09-22-2011 |
20110238783 | SOURCE-BASED DATA FLOW PROCESSING NETWORK APPARATUS - A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups. | 09-29-2011 |
20110238839 | NETWORK INTRUSION DETECTION APPARATUS - A method and system for distributing flows between a multiple processors. The flows can be received from an external source such as a network, by a front-end processor that recognizes the flow and the associated request, and identifies at least one internal applications processor to process the request/flow. The front-end processor utilizes a flow scheduling vector related to the identified applications processor(s), and the flow scheduling vector can be based on intrinsic data from the applications processor(s) that can include CPU utilization, memory utilization, packet loss, and queue length or buffer occupation. In some embodiments, applications processors can be understood to belong to a group, wherein applications processors within a group can be configured identically. A flow schedule vector can be computed for the different applications processor groups. | 09-29-2011 |
20110238855 | PROCESSING DATA FLOWS WITH A DATA FLOW PROCESSOR - An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules. | 09-29-2011 |
20120017262 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 01-19-2012 |
20120240185 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 09-20-2012 |