Patent application number | Description | Published |
20130331930 | SYSTEMS FOR IMPLANTING ANNULOPLASTY RINGS WITH MICROANCHORS - Disclosed systems for implanting annuloplasty rings and other prosthetic devices can comprise a plurality of microanchors, sutures threaded through the microanchors, the sutures passing through the prosthetic device, individual microanchor guides, such as tubes or spears, for each microanchor that contain the microanchors during delivery and allow for positioning and deployment of the microanchors into annular tissue. The systems can also comprise a bracket that is temporarily coupled to the prosthetic device, holds the plurality of microanchor guides in position relative to one another and relative to the prosthetic device, and/or guides the sutures passing through the prosthetic device. The prosthetic device can include suture locking mechanisms to secure the prosthetic device to the sutures and to the implanted microanchors after the deployment devices have been removed. | 12-12-2013 |
20130338763 | DEVICES AND METHODS FOR REDUCING CARDIAC VALVE REGURGITATION - The present invention relates to devices and methods for improving the function of a defective heart valve, and particularly for reducing regurgitation through an atrioventricular heart valve—i.e., the mitral valve and the tricuspid valve. For a tricuspid repair, the device includes an anchor deployed in the tissue of the right ventricle, in an orifice opening to the right atrium, or anchored to the tricuspid valve. A flexible anchor rail connects to the anchor and a coaptation element on a catheter rides over the anchor rail. The catheter attaches to the proximal end of the coaptation element, and a locking mechanism fixes the position of the coaptation element relative to the anchor rail. Finally, there is a proximal anchoring feature to fix the proximal end of the coaptation catheter subcutaneously adjacent the subclavian vein. The coaptation element includes an inert covering and helps reduce regurgitation through contact with the valve leaflets. | 12-19-2013 |
Patent application number | Description | Published |
20140203908 | ALERTING SYSTEM USING DISTRIBUTED NOTIFICATION DELIVERY - A system and a method are disclosed for delivering an alert from a computer system using distributed notification delivery. The method comprises using a computer system to receive an alert initiation request from an alert operator, where the alert initiation request includes metadata of an alert to be delivered. The method extracts the metadata from the alert initiation request and from its persistent storage place and persistently stores the extracted metadata in a first storage place on the computer system. The method further makes an alert initiation request with one or more communication systems based on the extracted metadata of the alert. The method securely delivers the alert initiation request and extracted metadata to one or more communication systems, which store the metadata transiently for the duration of delivering the alert, deliver the alert to multiple alert recipients tracks delivery progress and collect alert responses, reporting these back to the computer system. | 07-24-2014 |
20140282934 | PERSONNEL CRISIS COMMUNICATION MANAGEMENT SYSTEM - Systems and methods are disclosed for providing personnel communications management within an enterprise or group of related enterprises during crisis situations. In particular, the systems and methods provide event management, shared situational awareness, personnel tracking, and unified crisis notification management to multiple users. | 09-18-2014 |
20140379721 | Personnel Crisis Communication Management System - Systems and methods are disclosed for providing personnel communications management within an enterprise or group of related enterprises during crisis situations. In particular, the systems and methods provide event management, shared situational awareness, personnel tracking, and unified crisis notification management to multiple users. | 12-25-2014 |
20150097672 | PREDICTIVE ALERT TARGETING FOR MASS NOTIFICATION SYSTEMS - A system and a method are disclosed for predicting potential reach of an alert to a targeted audience, targeted personal delivery devices and targeted non-personal notification delivery devices in an emergency mass notification system. The method includes receiving recipients and alert delivery devices data which define a targeted audience and devices of an emergency alert. The method further comprises evaluating contact and configuration data targeting quality rating, tracking data targeting quality rating and real-time data targeting quality rating based on the received recipients and devices data and a data sources repository. Responsive to the targeting quality ratings and prediction weighting data (e.g., numeric weights and descriptive thresholds), the method generating one or more predictions of the potential reach of the alert based on the targeting quality ratings. | 04-09-2015 |
Patent application number | Description | Published |
20150081598 | GENERATING APPLICATION MODELS BASED ON DISCOVERY BASED MACHINE LEARNING - Embodiments are directed towards generating application models based on discovery based machine learning. A mobile application may be uploaded to a computer that may be part of a testing platform. A reference mobile computer may be selected and the mobile application maybe installed onto the reference mobile computer. Also, the testing platform may generate an initial application model based on the mobile application. The current active window of the mobile application may be determined and the application model may be updated accordingly. Screenshots may be generated that correspond to each current active window of the mobile application. Also, each user-interface control in the active window may be activated. The results of activating each control may be observed and added to the model. If the activation causes navigation, another active window may be determined. The application model may be used for testing other mobile computers. | 03-19-2015 |
20150082282 | MOBILE APPLICATION TESTING PLATFORM - Embodiments are directed towards testing mobile applications for a plurality of mobile computers. A server computer may be provided a mobile application, a test script, and mobile computer criteria. One or more mobile computers may be filtered from a larger set on the mobile computer criteria. The server computer may install the mobile application on each determined mobile computer. Next, each portion of the test script for the mobile application may be performed and/or executed on each determined mobile computer, wherein a result for each performed portion may be stored. During the test run at least one screenshot may be generated based on at least one performed portion of the test script, wherein the screenshots may be stored. The server computer may generate a displayable report that may include each screenshot and a result for each performed portion of the test script. | 03-19-2015 |
20150082283 | TESTING USER INTERFACE RESPONSIVENESS FOR MOBILE APPLICATIONS - Embodiments are directed towards testing a responsiveness of a graphical user interface (GUI) for an application executing on a computer. During execution of each portion of a test, stimuli may be provided to the application. The stimuli may be provided to the application thread that is associated with rendering graphics for the GUI. Responses from the application to the stimuli may be monitored to determine a responsiveness of the application for at least one portion of the test. The responsiveness may be determined based on a wait time between providing a request and receiving a reply to the request, which may indicate that the application is in a state to accept input through the GUI. Responsiveness may be determined separately for each portion of the test. A displayable report may be generated to include the responsiveness of the application for each portion of the test. | 03-19-2015 |
Patent application number | Description | Published |
20090305632 | Mobile Telephony Presence - Systems and methods for reporting of presence information associated with use of a mobile telephone are presented. In one example, a headset that is paired with a cellular mobile phone relays presence information to a presence application running on a computer. | 12-10-2009 |
20110126034 | POWER MANAGEMENT UTILIZING PROXIMITY OR LINK STATUS DETERMINATION - Methods and apparatuses for power management are disclosed. In one example, proximity of link status of a wireless communication device is used to determine whether a power conservation mode is implemented. | 05-26-2011 |
20120122435 | Mobile Telephony Presence - Systems and methods for reporting of presence information associated with use of a mobile telephone are presented. In one example, a headset that is paired with a cellular mobile phone relays presence information to a presence application running on a computer. | 05-17-2012 |
20120231769 | User Application Initiated Telephony - Systems and methods for initiating telephony calls are presented. In one example, a user selection of a desired application item is received at a computing device and a dial number associated with the desired application item is transmitted from the computing device to a wireless headset. The dial number is received at the wireless headset and a call is responsively initiated by transmitting the dial number from the wireless headset to a mobile phone device. | 09-13-2012 |
20130268793 | Power Management Utilizing Proximity or Link Status Determination - Methods and apparatuses for power management are disclosed. In one example, proximity of link status of a wireless communication device is used to determine whether a power conservation mode is implemented. | 10-10-2013 |
20130297958 | Power Management Utilizing Proximity or Link Status Determination - Methods and apparatuses for power management are disclosed. In one example, proximity of link status of a wireless communication device is used to determine whether a power conservation mode is implemented. | 11-07-2013 |
20130309996 | Mobile Device Data Transfer - Methods and apparatuses for mobile device data transfer are disclosed. In one example, data is received associated with mobile device usage. An action is performed at a computing device responsive to the data. | 11-21-2013 |
20130310049 | Mobile and Landline Call Switching - Systems and methods for transitioning calls are presented. In one example, data is received associated with a connected wireless mobile phone call. The data may include identification data of a far end call participant. A user selection is received to initiate an outgoing call to the far end participant. The outgoing call is initiated over a wired connection to the far end participant. | 11-21-2013 |
20140106667 | User Application Initiated Telephony - Systems and methods for initiating telephony calls are presented. In one example, a user selection of a desired application item is received at a computing device and a dial number associated with the desired application item is transmitted from the computing device to a wireless headset. The dial number is received at the wireless headset and a call is responsively initiated by transmitting the dial number from the wireless headset to a mobile phone device. | 04-17-2014 |
Patent application number | Description | Published |
20110093769 | COMPUTER FORM ACTION ZONE SUMMARY SYSTEM AND METHOD - A system and method for facilitating the entry by a signer user of information into a scaffold electronic document having multiple information entry fields, over the internet or similar network. The system includes a document summary server, in communication with a document execution server, and associated with a scaffold electronic document via network. The document summary server facilitates the entry by a signer user of information into one or more information entry fields in a scaffold document. | 04-21-2011 |
20110093777 | Document Signing Systems and Methods - A system and method for enabling electronic signing of an unsigned electronic document over the internet or similar network. Responsive to receipt of document and signer information from a document sender, a document execution server makes available to all signer users over a network, the unsigned electronic document, together with signature fields in the document. The document execution server receives over the network, from one or more of the signer users, signature data representative of signer user signatures associated with the respective signature fields of the unsigned electronic document. Responsive to receipt of the signature data from one or more of the signer users, the document execution server generates a signed electronic document corresponding to the unsigned electronic document. | 04-21-2011 |
20110093807 | FORM COMPLETION RATE ENHANCEMENT SYSTEM AND METHOD - A system and method for facilitating the entry by a user via a network, of information into a scaffold electronic document. A flag server modifies the scaffold electronic document to include user-entered information in a information entry field and displays a graphic flag at a next one of a succession of information entry fields. | 04-21-2011 |
Patent application number | Description | Published |
20100125546 | SYSTEM AND METHOD USING SUPERKEYS AND SUBKEYS - Systems and methods for providing aggregated transaction level data for a particular user to multiple information requesters are disclosed. Subkeys are assigned to user inquiries from multiple information requesters and a super key is assigned to those subkeys to link them to one or more user identifiers such as a username or Social Security number. Account level data is provided based on the super key and the user identifiers. Duplicate requests for aggregated transaction level data contained in the user inquiries can be deleted. User inquiry response files containing transaction level aggregate data can be sent to the information requesters based on the assigned subkeys. | 05-20-2010 |
20100287099 | RISK ASSESSMENT RULE SET APPLICATION FOR FRAUD PREVENTION - Rules, applied to deny authorization of likely fraudulent transactions, are derived from a modified Patient Rule Induction Method algorithm that uses a target variable and a data set of past transactions each associated with a plurality of input variables and a hyper-rectangle enclosing a multi-dimensional space defined by a representation of the input variable values as points within the multi-dimensional space. While a count of the points within the hyper-rectangle is greater than a minimum support parameter, a first plurality of points proximal to edges of the hyper-rectangle are removed, where each such removing maximizes a mean value of the target variable, and then, while the mean value remains maximized, a second plurality of points proximal to the edges is added, where each adding maximizes or maintains the mean value. The hyper-rectangle is bounded within a minimum bounding box that defines the rules. | 11-11-2010 |
20110066551 | Method and System for Providing Risk Information in Connection with Transaction Processing - A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations. | 03-17-2011 |
20110112954 | Method and System for Providing Risk Information in Connection with Transaction Processing - A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations. | 05-12-2011 |
20110184838 | TRANSACTION DATA REPOSITORY FOR RISK ANALYSIS - Systems and methods are presented for determining risk levels for consumer-to-consumer (C2C) transactions on brokering websites. The risk levels can be based on payment processing network (e.g. Visa) account data as well as external data, such as geo-location using IP addresses, fraud bureau data, and star ratings. The buying and selling consumers can have multiple risk scores for each transaction, such as a fraud, credit, return/chargeback, dissatisfaction, product misuse, nonreturnable, and defect risk scores. The buying and selling consumers can trade their risk levels before proceeding with the transaction. | 07-28-2011 |
20140188697 | METHOD AND SYSTEM FOR PROVIDING RISK INFORMATION IN CONNECTION WITH TRANSACTION PROCESSING - A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations. | 07-03-2014 |
Patent application number | Description | Published |
20110238575 | MERCHANT FRAUD RISK SCORE - Methods and systems are presented for a fraud risk score to be given to a merchant for a proposed transaction with a consumer. The fraud risk score is generated by a payment account service provider, such as a credit card processor, using information from a pending transaction as well as information from other payment accounts that the consumer holds to which the payment account service provider is privy. Various factors, including indicators of elevated risk in other payment accounts, are custom-weighted by the merchant for the score. | 09-29-2011 |
20130346294 | RISK MANAGER OPTIMIZER - Embodiments of the invention broadly described, introduce systems and methods for automatically generating rules. One embodiment of the invention discloses a method for generating a candidate rule. The method comprises receiving transaction data comprising a plurality of fields, wherein each field is associated with one or more field values, constructing a rule graph, wherein vertices in the rule graph correspond to a plurality of the one or more field values, generating a tree, wherein generating the tree comprises selecting an edge from a set of edges connecting a vertex in the tree with a vertex not in the tree, and adding the edge to the tree if the edge has a maximum signal-to-noise value of all edges in the set of edges, and converting the tree into a candidate rule. | 12-26-2013 |
20140095393 | MERCHANT FRAUD RISK SCORE - Methods and systems are presented for a fraud risk score to be given to a merchant for a proposed transaction with a consumer. The fraud risk score is generated by a payment account service provider, such as a credit card processor, using information from a pending transaction as well as information from other payment accounts that the consumer holds to which the payment account service provider is privy. Various factors, including indicators of elevated risk in other payment accounts, are custom-weighted by the merchant for the score. | 04-03-2014 |
20140324699 | SYSTEMS AND METHODS FOR LARGE-SCALE TESTING ACTIVITIES DISCOVERY - Embodiments of the invention relate in part to determining a testing model and providing a testing transaction score for transactions. The testing transaction score may indicate a likelihood that the transaction is a testing transaction. One embodiment of the invention discloses a method comprising receiving a first authorization message for a first transaction using an account, determining a testing transaction score for the first transaction using a testing model, and determining that the first transaction is a testing transaction based on the testing transaction score, wherein the testing transaction score for the first transaction is used for declining a second transaction using the same account conducted after the first transaction. | 10-30-2014 |
20150026061 | REAL TIME ANALYTICS SYSTEM - Improved real-time analytics systems are provided. An analytics system may be used to generate transaction scores for transactions. A method may comprise receiving a scoring request associated with a transaction, sending the scoring request to a plurality of scoring models including a production model, wherein each scoring model is operable to generate a transaction score in response to the scoring request, and wherein each scoring model may be implemented using a virtual machine, receiving a transaction score generated by the production model, and sending the transaction score to a server for approval or denial the transaction. | 01-22-2015 |
Patent application number | Description | Published |
20100057622 | Distributed Quantum Encrypted Pattern Generation And Scoring - Transaction scoring is performed in a distributed manner across a client-server computing system. A computing system for processing a transaction includes a server system and a client system. The server system is arranged to process information associated with the transaction, while the client system communicates with the server system and includes a key engine which is arranged to generate keys. The client system and the server system are arranged to cooperate to make probabilistic determinations associated with the transaction. The client is arranged to send the keys generated by the key engine as a transaction to the server system. | 03-04-2010 |
20100280880 | DETERMINING TARGETED INCENTIVES BASED ON CONSUMER TRANSACTION HISTORY - Systems, apparatus, and methods for determining incentives based on consumer history. When, how, and to whom incentives are sent can be determined. For example, an incentive can be sent to a consumer to encourage a transaction at a time when the particular consumer is predisposed to initiate the transaction. Also, an incentive for a transaction can be sent to a consumer when that transaction has a high likelihood of leading to other transactions. An incentive can also be sent after a consumer initiates a transaction that is known to not have many subsequent transaction correlated to it. | 11-04-2010 |
20100280881 | DEMOGRAPHIC ANALYSIS USING TIME-BASED CONSUMER TRANSACTION HISTORIES - Systems, apparatus, and methods for determining groups of similar consumers and for identifying a trend in consumer behavior are provided. Likelihoods of a transaction being initiated at various times by one consumer can be calculated based on previous transactions of the consumer. The likelihoods for different consumers can be used to determine a group of similar consumers as a demographic. The likelihoods of a transaction being initiated at various times by a consumer of a demographic (or other entity) can be used to forecast trends (such as a demand for a product) and make business decisions, such as for marketing campaigns, inventory levels (e.g. at particular stores or for all stores), pricing, and store locations. Such likelihoods when focused to a particular category of transactions can provide even greater accuracy. | 11-04-2010 |
20100280882 | FREQUENCY-BASED TRANSACTION PREDICTION AND PROCESSING - Methods, apparatus, and systems are provided for tracking and analyzing data of consumer activity. The tracked data can be organized (e.g. as stored in cache, RAM, hard drives) in certain types of tables, where the tables can be associated with certain tags (keys) for efficiently accessing the data. The organization and associations of the data can also provide simple mechanisms for manipulating the data to obtain results specifically relevant for a task, such as detection of fraud or prediction of consumer behavior to provide better customer service or new services. For example, the tables may contain counters that store the number of times that two correlated consumer events occur within specific time intervals of each other. Such time data can provide efficient determination of patterns of consumer activity. | 11-04-2010 |
20100280927 | PRE-AUTHORIZATION OF A TRANSACTION USING PREDICTIVE MODELING - Systems, apparatus, and methods are provided for efficiently authorizing a transaction initiated by a consumer. An authorization can be generated before the consumer actually initiates the transaction. For example, a future transaction can be predicted, and an authorization can be generated for the predicted transaction. In this manner, the authorization can be ready and quickly used when the consumer does initiate the transaction. Previous transactions made by the consumer can be used to predict when the future transaction is likely. In various examples, the authorization can be sent to a specific merchant or to the consumer for use when the consumer initiates the predicted transaction, or saved by an authorization server for use in response to an authorization request from the merchant. | 11-04-2010 |
20100280950 | TRANSACTION AUTHORIZATION USING TIME-DEPENDENT TRANSACTION PATTERNS - Systems, apparatus, and methods for authorizing a transaction initiated by a consumer are provided. A likelihood function can approximate a pattern of previous transactions and provide a measure of how likely it is for a transaction to occur as a function of time. The time of a current transaction can be used to determine a corresponding likelihood value of a likelihood function associated with the transaction. The likelihood value can then be used to determine a score for authorizing the transaction. As the likelihood corresponds to a particular time of a pattern, the score can be tailored to the current transaction and achieve greater accuracy. | 11-04-2010 |
20110054981 | Analyzing Local Non-Transactional Data with Transactional Data in Predictive Models - Systems and methods are provided that empowers various parties to combine transactional data and local non-transactional data using the collective intelligence gathered from a variety of sources to help the parties make more intelligent decisions relating to consumers. For example, the system can help select consumers based on the probability that the consumers will take advantage of an offer, coupon, or other item. In some embodiments, the present invention can be deployed as a part of a system that processes transactions. In this system, information associated with the transactions is analyzed in conjunction with non-transactional data in order to probabilistically determine whether a further action should be taken with the consumer. | 03-03-2011 |
20140006284 | PRE-AUTHORIZATION OF A TRANSACTION USING PREDICTIVE MODELING | 01-02-2014 |
Patent application number | Description | Published |
20130144785 | SOCIAL NETWORK PAYMENT AUTHENTICATION APPARATUSES, METHODS AND SYSTEMS - The SOCIAL NETWORK PAYMENT AUTHENTICATION APPARATUSES, METHODS AND SYSTEMS (“SNPA”) transform social networking user login inputs via SNPA components into notifications of authenticated purchase transactions. In one embodiment, the SNPA obtains an authentication request for a purchase transaction. The SNPA extracts card account data related to the authentication request, and provides the card account data related to the authentication request to a social networking server. The SNPA also provides an indication for a user to authenticate via logging into a social networking service associated with the social networking server. The SNPA obtains an indication from the social networking server that the user is authenticated. In response to obtaining the indication that the user is authenticated, the SNPA initiates completion of the purchase transaction. | 06-06-2013 |
20130218765 | GRADUATED SECURITY SEASONING APPARATUSES, METHODS AND SYSTEMS - The GRADUATED SECURITY SEASONING APPARATUSES, METHODS AND SYSTEMS (“GSS”) transform user virtual wallet activity and historical fraud reports via GSS components into transaction authorization triggers generated pursuant to graduated, transaction risk-appropriate, escalated security protocols. In one implementation, the GSS obtains a current transaction request, the request utilizing a user virtual wallet account for payment. The GSS identifies a transaction risk type associated with the request, and calculates a transaction risk level associated with the transaction risk type. Based on the transaction risk level, the GSS selects a security protocol for processing the current transaction request; and provide a security data request in accordance with the selected security protocol. The GSS also generates an offer, for an entity involved in processing the current transaction request, of a financial incentive in exchange for assuming the transaction risk level associated with the transaction risk type; and provides the offer for the entity. | 08-22-2013 |
Patent application number | Description | Published |
20110307382 | SYSTEM AND METHOD FOR IDENTIFYING A POINT OF COMPROMISE IN A PAYMENT TRANSACTION PROCESSING SYSTEM - A system, apparatus, and method for reducing fraud in payment transactions by identifying a potential point of compromise (POC) that may lead to subsequent fraudulent transactions, or confirming that a suspected point of compromise is in fact responsible for a security breach leading to fraudulent payment transactions. The invention is also directed to a system, apparatus, and method for identifying data or transaction characteristics that may be used to most effectively identify a point of compromise in a payment transaction syst | 12-15-2011 |
20130231974 | SYSTEMS AND METHODS TO QUANTIFY CONSUMER SENTIMENT BASED ON TRANSACTION DATA - A computing apparatus is configured to quantify consumer sentiment at an aggregated or micro level using transaction data that records the transactions processed by a transaction handler of a payment system. A quantification model is generated based on correlating transaction data with respective emotional content indices extracted from data sources, such as regional news, weather, stock markets, movie themes, local sports, employment, traffic conditions, etc. Using the quantification model, consumer sentiment can be evaluated at various granularity levels, based on the granularity of the user group and the time period of the transaction data used in the quantification model. | 09-05-2013 |
20140310086 | SYSTEMS AND METHODS TO PROVIDE LOYALTY PROGRAMS - A computing apparatus includes: a transaction handler to process transactions; a portal to receive from users enrollment input identifying account identifiers of the users and respective loyalty programs; and a data warehouse to store data associating the account identifiers with the respective loyalty programs. In response to an authorization request received in the transaction handler for a payment transaction identifying a first account identifier, the computing apparatus is to use the data warehouse to determine whether the first account identifier is enrolled with a loyalty program; and if the first account identifier is enrolled with a first loyalty program, the computing apparatus is to use the transaction handler to request purchase details from the merchant via a response to the authorization request, and determine benefits to be awarded to the user of the first account identifier. | 10-16-2014 |
20140344068 | SYSTEMS AND METHODS FOR TARGETED ADVERTISEMENT DELIVERY - In one aspect, a computing apparatus is configured to receive a request for a profile to customize information for presentation to a user identified in the request and, responsive to the request identifying the user, provide the profile that is generated based on transaction data of the user. The profile summarizes the transaction data of the user using a plurality of values representing aggregated spending in various areas. The information includes an advertisement selected, prioritized, adjusted, or generated based on the profile. The advertisement includes at least an offer, such as a discount, incentive, reward, coupon, gift, cash back, benefit, product, or service. | 11-20-2014 |
20150058108 | SYSTEMS AND METHODS TO AGGREGATE DEMAND - A computing apparatus includes: a data warehouse to store data associating a plurality of account identifiers with an offer having a predefined purchase requirement and an aggregated purchase requirement for a benefit; and a transaction handler configured to process a plurality of transactions. The transaction handler is further configured to determine whether each of the plurality of transactions satisfies a predefined purchase requirement, identify a set of transactions each satisfying the predefined purchase requirement, and determine whether the set of transactions satisfies an aggregated purchase requirement for the benefit. In one example, the transaction handler is configured to provide the benefit via statement credits when the set of transactions satisfies the aggregated purchase requirement. | 02-26-2015 |
Patent application number | Description | Published |
20090033663 | Surface shading of computer-generated object using multiple surfaces - Objects are modeled and rendered using multiple surfaces to provide attributes used in rendering. In some embodiments, a reference surface for an object is defined, e.g., using conventional modeling techniques. One or more auxiliary surfaces are associated with portions of the reference surface. Some of the surface attributes (e.g., color, surface normal, texture, lighting) are associated with the reference surface, while other attributes (e.g., transparency) are associated with the cards. To render an image, a ray associated with a pixel is traced to its intersection with the reference surface and to its intersection with one of the auxiliary surfaces. The attributes associated with the reference surface are determined based on the intersection point of the ray with the reference surface, and the attributes associated with the auxiliary surface are determined based on the intersection point of the ray with the auxiliary surface. | 02-05-2009 |
20090033673 | Rendering of shadows with hand-painted appearance - Shadows are rendered automatically with a hand-painted appearance. The shadow region is divided into a core and a penumbra. A core perturbation zone is defined between the core and penumbra and a penumbra perturbation zone is defined between the penumbra and an unshadowed region. Within each perturbation zone, a texture is applied to each pixel to map the pixel as being inside or outside the core or penumbra boundary, thereby defining a displaced core boundary and a displaced penumbra boundary. The displaced boundaries can be non-linear and discontinuous. When shadows are rendered using the displaced boundaries, a hand-painted appearance can result. An additional texture can be applied in the penumbra to further enhance the painted appearance. | 02-05-2009 |
20110074778 | METHOD AND SYSTEM FOR CREATING DEPTH AND VOLUME IN A 2-D PLANAR IMAGE - Implementations of the present disclosure involve methods and systems for creating depth and volume in a 2-D image by utilizing a plurality of layers of the 2-D image, where each layer comprises one or more portions of the 2-D image. Each layer may be reproduced into a corresponding left eye and right eye layers that include a depth pixel offset corresponding to a perceived depth. Further, a volume effect may also be applied to one or more objects of the 2-D image by associating a volume pixel offset to one or more pixels of the image. Thus, any pixel of the 2-D image may have a depth pixel offset to provide a perceived depth as well as a volume pixel offset to provide a stereoscopic 3-D volume effect. In this manner, the 2-D image may be converted to a corresponding stereoscopic 3-D image with perceived depth and volume effects applied. | 03-31-2011 |
Patent application number | Description | Published |
20080246355 | Self-Powered Mobile Electrical Power Hub - Self-powered mobile electrical power hubs are provided. In one embodiment, a self-powered electrical power hub comprises an internal combustion engine driven generator that provides electrical power and at least one electrically powered transport driver configured to facilitate movement of the self-powered mobile electrical power hub. The self-powered mobile electrical power hub further comprises an accessible power hub that provides external access to electrical power, wherein a substantial portion of the electrical power from the internal combustion engine driven generator is provided to power the at least one electrically powered transport driver in a transport mode and a substantial portion of the electrical power from the internal combustion engine driven generator is available at the accessible power hub in an idle mode. | 10-09-2008 |
20120154511 | SYSTEMS AND METHODS FOR PROVIDING GEOGRAPHICALLY DISTRIBUTED CREATIVE DESIGN - Systems and methods for providing geographically distributed creative design are disclosed. In one embodiment, a system is provided for providing directional audio in a video teleconference meeting. The system comprises a high resolution display, an interactive stylus and a plurality of sensors that track movement of the interactive stylus over the high resolution display. A creative design controller is configured to display detailed text and figures and display sketches of context in response to movement of the interactive stylus over the high resolution display. | 06-21-2012 |
20140052980 | SECURE NETWORK SYSTEMS AND METHODS - Secure network systems and methods are provided. In an aspect of the invention, a secure network system is provided that includes a computing system that comprises a client system and a specialized NIC (network interface controller) system equipped with the capability to form a secure connection with an endpoint system and encrypt and decrypt communications between the client system and the network to which it is connected. This trusted network interface (TNI), which may present itself as a physical peripheral connected to a physical client system or a virtual peripheral connected to a virtual client system, takes the place of a client system's standard NIC, and the connection that it forms with the trusted network is negotiated and enforced externally to and independent of the client system. | 02-20-2014 |
20140279721 | LEARNING HEALTH SYSTEMS AND METHODS - A learning health system and associated methods are provided. Biochemical assays are conducted at scheduled intervals on blood samples taken from an individual to provide, for each of a plurality of biochemical parameters, a time series of values representing the individual. Clinical parameters associated with the individual are extracted from a knowledge base. Genomic parameters are determined for the individual. An expected time series is calculated for each of a plural subset of the plurality of biochemical parameters from at least the clinical parameters and the genomic parameters. For each of the plural subset of biochemical parameters, the time series of values representing the individual is compared to the calculated expected time series to determine a likelihood of each of a plurality of conditions for the individual. The likelihood of at least one of the plurality of conditions is communicated to a user. | 09-18-2014 |
Patent application number | Description | Published |
20080304044 | HIGH-RESOLUTION THREE-DIMENSIONAL IMAGING RADAR - A three-dimensional imaging radar operating at high frequency e.g., 670 GHz, is disclosed. The active target illumination inherent in radar solves the problem of low signal power and narrow-band detection by using submillimeter heterodyne mixer receivers. A submillimeter imaging radar may use low phase-noise synthesizers and a fast chirper to generate a frequency-modulated continuous-wave (FMCW) waveform. Three-dimensional images are generated through range information derived for each pixel scanned over a target. A peak finding algorithm may be used in processing for each pixel to differentiate material layers of the target. Improved focusing is achieved through a compensation signal sampled from a point source calibration target and applied to received signals from active targets prior to FFT-based range compression to extract and display high-resolution target images. Such an imaging radar has particular application in detecting concealed weapons or contraband. | 12-11-2008 |
20090065697 | Sub-millimeter wave frequency heterodyne detector system - The present invention relates to sub-millimeter wave frequency heterodyne imaging systems. More specifically, the present invention relates to a sub-millimeter wave frequency heterodyne detector system for imaging the magnitude and phase of transmitted power through or reflected power off of mechanically scanned samples at sub-millimeter wave frequencies. | 03-12-2009 |
20100090887 | MULTI-PIXEL HIGH-RESOLUTION THREE-DIMENSIONAL IMAGING RADAR - A three-dimensional imaging radar operating at high frequency e.g., 670 GHz radar using low phase-noise synthesizers and a fast chirper to generate a frequency-modulated continuous-wave (FMCW) waveform, is disclosed that operates with a multiplexed beam to obtain range information simultaneously on multiple pixels of a target. A source transmit beam may be divided by a hybrid coupler into multiple transmit beams multiplexed together and directed to be reflected off a target and return as a single receive beam which is demultiplexed and processed to reveal range information of separate pixels of the target associated with each transmit beam simultaneously. The multiple transmit beams may be developed with appropriate optics to be temporally and spatially differentiated before being directed to the target. Temporal differentiation corresponds to a different intermediate frequencies separating the range information of the multiple pixels. Collinear transmit beams having differentiated polarizations may also be implemented. | 04-15-2010 |
20100328779 | DIELECTRIC COVERED PLANAR ANTENNAS - An antenna element suitable for integrated arrays at terahertz frequencies is disclosed. The antenna element comprises an extended spherical (e.g. hemispherical) semiconductor lens, e.g. silicon, antenna fed by a leaky wave waveguide feed. The extended spherical lens comprises a substantially spherical lens adjacent a substantially planar lens extension. A couple of TE/TM leaky wave modes are excited in a resonant cavity formed between a ground plane and the substantially planar lens extension by a waveguide block coupled to the ground plane. Due to these modes, the primary feed radiates inside the lens with a directive pattern that illuminates a small sector of the lens. The antenna structure is compatible with known semiconductor fabrication technology and enables production of large format imaging arrays. | 12-30-2010 |
20110118556 | Systems and Methods for Diagnostics, Control and Treatment of Neurological Functions and Disorders by Exposure to Electromagnetic Waves - Methods, systems and devices are provided in which electromagnetic waves (EMWs) are applied to a neural target. The neuronal function of at least a portion of the neural target is monitored, and the effect of EMW application on neural properties, neural function, and/or neural disorders is assessed. Embodiments include methods of diagnosis, treatment, drug delivery, cognitive enhancement, and EMW stimulation systems. | 05-19-2011 |