Patent application number | Description | Published |
20090210886 | Method and system for defining financial transaction notification preferences - A method and system for defining financial transaction notification preferences is disclosed. A computer-implemented method for defining notification preferences using a financial transaction notification message served to a user on a mobile device and using properties of the financial transaction includes the steps of serving the financial transaction notification message, the financial transaction notification message being related to a financial transaction performed by the user, receiving a notification preference response message from the user, and defining at least one notification filtering rule based on the notification preference response message and the properties of the financial transaction. A system operable to implement the computer-implemented method includes a transaction notification module operable to serve the financial transaction notification message, the financial transaction notification message being related to a financial transaction performed by the user, a notification preference receiver module operable to receive a notification preference response message from the user, and a notification preference processor module operable to define at least one notification filtering rule based on the notification preference response message and the properties of the financial transaction. | 08-20-2009 |
20090259499 | Method and system employing a mobile device for soliciting user experience sharing - A method and system employing a mobile device for soliciting user experience sharing is disclosed. The method and system electronically solicit a user's experience relating to a product or service purchased from a merchant or service provider. A financial transaction notification message is sent by a financial institution to a user's mobile device following a purchase of the product or service from the merchant or service provider. The financial transaction notification message is related to the financial transaction performed by the user to purchase the product or service and serves to prompt the user to share their experience related to the product or service purchased. The user provides a response using the mobile device that includes an experience annotation reflecting the user's experience. The experience annotation may be provided to the merchant or service provider and/or published to an online service. | 10-15-2009 |
20110010232 | MOBILE COMMUNICATION TECHNIQUES TO FACILITATE COMMERCIAL TRANSACTIONS - The present invention is directed to a method, implemented on an electronic communication network including a mobile telecommunications device, for providing financial incentives by associating the mobile telecommunications device with an incentive account; and messaging with the mobile telecommunications device in response to a predetermined trigger, with the messaging including information corresponding to a financial incentive provided through a financial account associated with the incentive account upon an occurrence of a desired commercial transaction satisfying predetermined criteria, and correlating information related to the financial account, incentive account, and occurrence of the desired commercial transaction, for further determination and action in awarding or withholding the financial incentive in accordance with the predetermined financial incentive criteria. Also disclosed is a system that operates in accordance with the method. | 01-13-2011 |
Patent application number | Description | Published |
20090210847 | SYNCHRONOUS TO ASYNCHRONOUS LOGIC CONVERSION - Apparatus, systems, and methods may operate to generate a synchronous netlist from a synchronous circuit design representation, automatically substitute asynchronous components taken from an asynchronous standard cell component library for corresponding standard cell synchronous components in the synchronous netlist to form an asynchronous core, and convert the synchronous netlist to an asynchronous circuit design representation. Additional apparatus, systems, and methods are disclosed. | 08-20-2009 |
20100205571 | SYNCHRONOUS TO ASYNCHRONOUS LOGIC CONVERSION - Apparatus, systems, and methods may operate to generate a synchronous netlist from a synchronous circuit design representation, automatically substitute asynchronous components taken from an asynchronous standard cell component library for corresponding standard cell synchronous components in the synchronous netlist to form an asynchronous core, and convert the synchronous netlist to an asynchronous circuit design representation. Additional apparatus, systems, and methods are disclosed. | 08-12-2010 |
Patent application number | Description | Published |
20130346229 | Lighting Infrastructure and Revenue Model - Methods, devices, and systems for implementing lighting infrastructure application frameworks and networks and associated revenue models. In one embodiment, a computing device may receive a request from a first device to access data from a lighting infrastructure application framework, and the data from the lighting infrastructure application framework may include data from lighting node platform(s). In an embodiment, the computing device may perform authorizations related to providing access to data, as well as transmit responses to requests for data. Costs and revenues associated with applications may also be performed based on usage of platforms, sensors, and controllers within a lighting infrastructure. In an embodiment, software, applications, and other instructions may be transmitted by a computing device in response to receiving requests. In another embodiment, a computing device may process received data (e.g., sensor data from lighting node platforms) to detect trends or events relevant to applications. | 12-26-2013 |
20140084795 | NETWORKED LIGHTING INFRASTRUCTURE FOR SENSING APPLICATIONS - A network using existing streetlights is described. Each street light becomes a node in the network, and each includes a power terminal for receiving electrical power, a light source coupled to the power terminal, a processor coupled to the power terminal, a network interface coupled between the processor and the network of lighting systems, and a sensor coupled to the processor for detecting a condition at the node, and in response providing information about that condition to the processor. | 03-27-2014 |
20140222510 | Lighting Infrastructure and Revenue Model - Methods, devices, and systems for implementing lighting infrastructure application frameworks and networks and associated revenue models. In one embodiment, a computing device may receive a request from a first device to access data from a lighting infrastructure application framework, and the data from the lighting infrastructure application framework may include data from lighting node platform(s). In an embodiment, the computing device may perform authorizations related to providing access to data, as well as transmit responses to requests for data. Costs and revenues associated with applications may also be performed based on usage of platforms, sensors, and controllers within a lighting infrastructure. In an embodiment, software, applications, and other instructions may be transmitted by a computing device in response to receiving requests. In another embodiment, a computing device may process received data (e.g., sensor data from lighting node platforms) to detect trends or events relevant to applications. | 08-07-2014 |
Patent application number | Description | Published |
20110241833 | HANDHELD DEVICE FOR ON-SITE DATACENTER MANAGEMENT - In various exemplary embodiments, a system and associated method to provide management of a plurality of electronic elements in a datacenter is disclosed. The system includes a datacenter management system coupled to a wireless network to receive information regarding a spatial location of a handheld device within the datacenter. The datacenter management system provides information to the handheld device related to each of the plurality of electronic elements. The datacenter management system includes a management processor to process information related to each of the plurality of electronic elements and a database to store information related to each of the plurality of electronic elements. | 10-06-2011 |
20130311539 | PROVISIONING OF DEVICES - A provisioning machine may receive a request that an application be executed while distributed according to a distribution constraint among various devices. The provisioning machine may access a topological model that represents multiple devices configured as a single cloud-based application server and defines a first group of devices that have the same redundancy status (e.g., active or backup). In addition, the topological model may define a second group of devices that have the same functional role (e.g., executing a particular component of the application). A device may be a member of both the first group and the second group. The provisioning machine may determine a size of the first group according to the distribution constraint. Based on the determined size of the first group, the provisioning machine may configure (e.g., provision) the first group of devices as a subset of the multiple devices of the server. | 11-21-2013 |
20130346493 | MULTIPLE SERVICE CLASSES IN A SHARED CLOUD - In various exemplary embodiments, a system, article of manufacture, and method for providing, a cloud computing infrastructure on a system infrastructure comprising, a first virtual computing environment associated with a first class of service, the first class of service defining, in one embodiment, a first set of obligations, restrictions, and/or capabilities; providing, in the same cloud, a second virtual computing environment associated with a second class of service, the second class of service defining a second set of obligations, restrictions, and/or capabilities different from those of the first class of service; and executing the first virtual computing environment according to the first class of service and the second virtual computing environment according to the second class of service, the first virtual computing environment having a different access to the hardware platform than the second virtual environment based on the respective class of service. | 12-26-2013 |
20140089293 | QUERY LANGUAGE TO TRAVERSE A PATH IN A GRAPH - A query language used to traverse a path in a graph-based model is provided. The system comprises a parsing module to parse a query comprising query phrases. The respective query phrases composed of an object-type identifier and a filter where the object-type identifier corresponds to respective repositories and the filter is used to identify at least a portion of the objects associated with the object-type in the respective repositories. A planning module identifies the respective repositories corresponding to the object-type identifier within each of the one or more query phrases and generates an execution plan describing data to be retrieved according to the respective repositories and results of a preceding query phrase within the query. A translation module translates the respective query phrases into respective translated queries that are readable by the respective repositories and including the filter. An execution module implements the execution plan using the translated queries. | 03-27-2014 |
20140351406 | HANDHELD DEVICE FOR ON-SITE DATACENTER MANAGEMENT - In various exemplary embodiments, a system and associated method to provide management of a plurality of electronic elements in a datacenter is disclosed. The system includes a datacenter management system coupled to a wireless network to receive information regarding a spatial location of a handheld device within the datacenter. The datacenter management system provides information to the handheld device related to each of the plurality of electronic elements. The datacenter management system includes a management processor to process information related to each of the plurality of electronic elements and a database to store information related to each of the plurality of electronic elements. | 11-27-2014 |
20150317360 | QUERY LANGUAGE TO TRAVERSE A PATH IN A GRAPH - A query language used to traverse a path in a graph-based model is provided. The system comprises a parsing module to parse a query comprising query phrases. The respective query phrases composed of an object-type identifier and a filter where the object-type identifier corresponds to respective repositories and the filter is used to identify at least a portion of the objects associated with the object-type in the respective repositories. A planning module identifies the respective repositories corresponding to the object-type identifier within each of the one or more query phrases and generates an execution plan describing data to be retrieved according to the respective repositories and results of a preceding query phrase within the query. A translation module translates the respective query phrases into respective translated queries that are readable by the respective repositories and including the filter. An execution module implements the execution plan using the translated queries. | 11-05-2015 |
Patent application number | Description | Published |
20100074441 | Data processing systems with format-preserving encryption and decryption engines - A data processing system is provided that includes format-preserving encryption and decryption engines. A string that contains characters has a specified format. The format defines a legal set of character values for each character position in the string. During encryption operations with the encryption engine, a string is processed to remove extraneous characters and to encode the string using an index. The processed string is encrypted using a format-preserving block cipher. The output of the block cipher is post-processed to produce an encrypted string having the same specified format as the original unencrypted string. During decryption operations, the decryption engine uses the format-preserving block cipher in reverse to transform the encrypted string into a decrypted string having the same format. | 03-25-2010 |
20100284532 | SYSTEMS FOR EMBEDDING INFORMATION IN DATA STRINGS - A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a character set that is larger than a character set being used by a data string. A data string may be converted into a larger character set, analogous to converting a number from a lower base to higher base. Such a conversion may shorten a data string, allowing information to be embedded as appended characters. | 11-11-2010 |
20110103579 | FORMAT PRESERVING ENCRYPTION SYSTEMS FOR DATA STRINGS WITH CONSTRAINTS - Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted to ciphertext by repeated application of a format preserving encryption cryptographic algorithm. Following each application of the format preserving cryptographic algorithm, the resulting version of the string may be analyzed to determine whether desired string constraints have been satisfied. If the string constraints have not been satisfied, further applications of the format preserving cryptographic algorithm may be performed. If the string constraints have been satisfied, the current version of the string may be used as an output for the cryptographic engine. | 05-05-2011 |
20140108813 | DATA PROCESSING SYSTEMS WITH FORMAT-PRESERVING ENCRYPTION AND DECRYPTION ENGINES - A data processing system is provided that includes format-preserving encryption and decryption engines. A string that contains characters has a specified format. The format defines a legal set of character values for each character position in the string. During encryption operations with the encryption engine, a string is processed to remove extraneous characters and to encode the string using an index. The processed string is encrypted using a format-preserving block cipher. The output of the block cipher is post-processed to produce an encrypted string having the same specified format as the original unencrypted string. During decryption operations, the decryption engine uses the format-preserving block cipher in reverse to transform the encrypted string into a decrypted string having the same format. | 04-17-2014 |
20150134972 | FORMAT PRESERVING ENCRYPTION SYSTEMS FOR DATA STRINGS WITH CONSTRAINTS - Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted to ciphertext by repeated application of a format preserving encryption cryptographic algorithm. Following each application of the format preserving cryptographic algorithm, the resulting version of the string may be analyzed to determine whether desired string constraints have been satisfied. If the string constraints have not been satisfied, further applications of the format preserving cryptographic algorithm may be performed. If the string constraints have been satisfied, the current version of the string may be used as an output for the cryptographic engine. | 05-14-2015 |
20150143133 | Systems For Embedding Information In Data Strings - A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a character set that is larger than a character set being used by a data string. A data string may be converted into a larger character set, analogous to converting a number from a lower base to higher base. Such a conversion may shorten a data string, allowing information to be embedded as appended characters. | 05-21-2015 |
Patent application number | Description | Published |
20090261172 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR SUPPORTING MULTIPLE CONTACTLESS APPLICATIONS USING DIFFERENT SECURITY KEYS - Systems, methods, and computer program products for supporting multiple contactless applications using different security keys on a wireless smart device are disclosed. According to one aspect, the subject matter described herein includes a method for supporting multiple contactless applications using different security keys on a wireless smart device. The method includes, at a wireless smart device configured to communicate with a wireless smart device reader, the wireless device including a plurality of contactless applications and a contactless application memory for use by the plurality of contactless applications, initializing a portion of the memory such that access to the portion of memory requires the use of a shared secret key known to the plurality of contactless applications. The method includes reserving the portion of memory for use by one of the plurality of contactless applications by using the shared secret key to set access privileges for the portion of memory such that access to the portion of memory requires the use of a application-specific secret key associated with the one application and not known to the other applications. | 10-22-2009 |
20100043061 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR PROVIDING FOR SECURE OFFLINE DATA TRANSFER BETWEEN WIRELESS SMART DEVICES - According to one aspect of the subject matter described herein, a method for registering wireless smart devices for secure offline data transfer is provided. The method includes, for an application configured to execute on a wireless smart device and that requires access to information regarding an account that does not reside on the wireless smart device, register, at a server having access to the information regarding the account, a first wireless smart device has an account owner device (AOD) for operating in an online mode for obtaining the information regarding the account from the server and for operating in an offline mode for transferring the information regarding the account to at least one additional device via a secure offline data transfer using near field communications (NFC). The method further includes registering, at the server, at least one second wireless smart device as an account sharer device (ASD) for operating in an offline mode for receiving the information regarding the account from the first wireless smart device via the secure offline data transfer using NFC. | 02-18-2010 |
20110244796 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR PERFORMING MULTIPLE TRANSACTIONS THROUGH A SINGLE NEAR FIELD COMMUNICATION (NFC) TAP - The subject matter described herein includes a method of performing multiple transactions through a single near field communication (NFC) tap. The method includes storing, at a linking application in a wireless device, a plurality of application identifiers (AIDs) that identify a plurality of applications to be processed in a single NFC tap. The method can further include detecting, by a wireless device reader, a linking application AID in the wireless device that identifies the linking application upon interfacing the wireless device with the wireless device reader through the single NFC tap. The method can include accessing, by the wireless device reader, the plurality of AIDs using the linking application. The method can further include processing the plurality of applications associated with the plurality of AIDs through the single NFC tap. | 10-06-2011 |
20120064828 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SECURE NEAR FIELD COMMUNICATION OF A NON-SECURE MEMORY ELEMENT PAYLOAD - According to one aspect, the subject matter described herein includes a method for secure near field communication (NFC) of a non-secure memory element payload. The method includes receiving, at an NFC enabled mobile device and from a content provider, a payload. The method also includes storing the received payload in a non-secure memory element of the NFC enabled mobile device. The method further includes transferring the stored payload from the non-secure memory element of the NFC enabled mobile device to a secure memory element of the NFC enabled mobile device, wherein transferring the stored payload includes loading the stored payload into a secure reloadable payload instance. The method further includes establishing a NFC link between the NFC enabled mobile device and an NFC reader. The method further includes communicating, via the NFC link, the transferred payload from the secure reloadable payload instance to the NFC reader. | 03-15-2012 |
20120109764 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR UTILIZING ONE OR MORE PREFERRED APPLICATION LISTS IN A WIRELESS DEVICE READER - The subject matter described herein includes systems, methods, and computer readable media for utilizing one or more preferred application lists in a wireless device reader. A transaction terminal designates compatible application identifiers, where each of the compatible application identifiers is respectively associated with a transaction application that is compatible with the transaction terminal. A proximity payment system environment (PPSE) application is configured to store user preferred application identifiers, where each user preferred application identifier is respectively associated with a to transaction application stored on the mobile wireless device. A wireless device reader for receives the compatible application identifiers from the transaction terminal, and stores the compatible application identifiers in preferred applications lists (PALs). | 05-03-2012 |
20120159149 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DESIGNATING A SECURITY LEVEL FOR A COMMUNICATIONS LINK BETWEEN WIRELESS DEVICES - A content issuer entity designates a transport security level for each of a plurality of electronic certificates and provides the electronic certificates to a first wireless device. A second wireless device establishes a communications link to transfer electronic certificate data associated with one or more electronic certificates stored on the first wireless device to the second wireless device via a wireless transaction and determines, for each stored electronic certificate, a transport security level previously designated at the content issuer entity. At the first wireless device, a highest transport security level is determined from among the respective transport security levels associated with the stored electronic certificates. The electronic certificate data is transferred from the first wireless device to the second wireless device via the communications link in accordance with a security measure that corresponds to the highest determined transport security level. | 06-21-2012 |
20130124349 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVISIONING AND UTILIZING AN AGGREGATED SOFT CARD ON A MOBILE DEVICE - Methods, systems, and computer readable media for utilizing and provisioning an aggregated soft card are disclosed. In one embodiment, the method includes receiving a request for an aggregated soft card from a mobile device, wherein the aggregated soft card includes a primary component soft card and at least one secondary component soft card. The method also includes requesting component soft card data associated with each of the primary component soft card and the at least one secondary component soft card from a plurality of issuing system servers. The method further includes generating aggregated soft card data by establishing a link among the component soft card data received from the plurality of issuing system servers and sending the aggregated soft card data to the mobile device. | 05-16-2013 |