Patent application number | Description | Published |
20090254971 | SECURE DATA INTERCHANGE - A secure data interchange system enables information about bilateral and multilateral interactions between multiple persistent parties to be exchanged and leveraged within an environment that uses a combination of techniques to control access to information, release of information, and matching of information back to parties. Access to data records can be controlled using an associated price rule. A data owner can specify a price for different types and amounts of information access. | 10-08-2009 |
20130091573 | SYSTEM AND METHOD FOR A DISTRIBUTED APPLICATION OF A NETWORK SECURITY SYSTEM (SDI-SCAM) - A widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly pools and analyzes information gathered from machines across a network in order to quickly detect patterns consistent with intrusion or attack, singular or coordinated. When a novel method of attack has been detected, the system distributes warnings and potential countermeasures to each individual machine on the network. Such a warning may potentially consist of a probability distribution of the likelihood of an intrusion or attack as well as the relative probabilistic likelihood that such potential intrusion possesses certain characteristics or typologies or even strategic objectives in order to best recommend and/or distribute to each machine the most befitting countermeasure(s) given all presently known particular data and associated predicted probabilistic information regarding the prospective intrusion or attack. If any systems are adversely affected, methods for repairing the damage are shared and redistributed throughout the network. | 04-11-2013 |
20130097664 | SECURE DATA INTERCHANGE - A secure data interchange system enables information about bilateral and multilateral interactions between multiple persistent parties to be exchanged and leveraged within an environment that uses a combination of techniques to control access to information, release of information, and matching of information back to parties. Access to data records can be controlled using an associated price rule. A data owner can specify a price for different types and amounts of information access. | 04-18-2013 |
Patent application number | Description | Published |
20130030981 | Stock Market Prediction Using Natural Language Processing - A method of using natural language processing (NLP) techniques to extract information from online news feeds and then using the information so extracted to predict changes in stock prices or volatilities. These predictions can be used to make profitable trading strategies. Company names can be recognized and simple templates describing company actions can be automatically filled using parsing or pattern matching on words in or near the sentence containing the company name. These templates can be clustered into groups which are statistically correlated with changes in the stock prices. The system is composed of two parts: message understanding component that automatically fills in simple templates and a statistical correlation component that tests the correlation of these patterns to increases or decreases in the stock price. The methods can be applied to a broad range of text, including articles in online newspapers such as the Wall Street Journal, financial newsletters, radio & TV transcripts and annual reports. In an enhanced embodiment of the system statistical patterns in Internet usage data and Internet data such as newly released textual information on Web pages are further leveraged. | 01-31-2013 |
20140095417 | SDI (SDI FOR EPI-DEMICS) - A computer system is adapted to predict the likelihood, temporal (or developmental) state, possible location(s), rate of spread or “infectiousness”, etc. of a potential epidemic. A wide and diverse range of inputs and associated parameters are inputted into the system some of which may be statistically correlatable with certain hidden states including those which are temporally oriented disease stages of progression as well as other types of attributes. A Dynamic Bayesian Belief Network or other adaptive or machine learning method is used for the probabilistic analysis. The system statistically analyzes and reanalyzes the totality of all recently updated information (and within the context of all past information), as can efficiently be modeled by the Dynamic Bayesian Belief Network or other adaptive or machine learning method to provide updated predictions and to suggest a recommended reactive protocol to an epidemic. | 04-03-2014 |
20140237599 | DISTRIBUTED AGENT BASED MODEL FOR SECURITY MONITORING AND RESPONSE - An architecture is provided for a widely distributed security system (SDI-SCAM) that protects computers at individual client locations, but which constantly pools and analyzes information gathered from machines across a network in order to quickly detect patterns consistent with intrusion or attack, singular or coordinated. When a novel method of attack has been detected, the system distributes warnings and potential countermeasures to each individual machine on the network. Such a warning may potentially include a probability distribution of the likelihood of an intrusion or attack as well as the relative probabilistic likelihood that such potential intrusion possesses certain characteristics or typologies or even strategic objectives in order to best recommend and/or distribute to each machine the most befitting countermeasure(s) given all presently known particular data and associated predicted probabilistic information regarding the prospective intrusion or attack. If any systems are adversely affected, methods for repairing the damage are shared and redistributed throughout the network. | 08-21-2014 |
20140324453 | Database for Pre-Screening Potentially Litigious Patients - A database system stores information about potential patients that allows medical professionals to gauge the legal risk presented by the potential patients, giving the medical professionals the opportunity to avoid medical involvement with those individuals most prone to engaging in unwarranted legal actions. The database may also be used by insurance companies, legal services and other professional service providers to screen for potentially litigious customers. Information in the database is processed to provide a risk assessment score for each patient that is used for screening purposes. | 10-30-2014 |
Patent application number | Description | Published |
20130059607 | SYSTEM FOR COLLECTING, ANALYZING, AND TRANSMITTING INFORMATION RELEVANT TO TRANSPORTATION NETWORKS - When individual persons or vehicles move through a transportation network, they are likely to be both actively and passively creating information that reflects their location and current behavior. In this patent, we propose a system that makes complete use of this information. First, through a broad web of sensors, our system collects and stores the full range of information generated by travelers. Next, through the use of previously-stored data and active computational analysis, our system deduces the identity of individual travelers. Finally, using advanced data-mining technology, our system selects useful information and transmits it back to the individual, as well as to third-party users; in short, it forms the backbone for a variety of useful location-related end-user applications. | 03-07-2013 |
20140308978 | SYSTEM FOR COLLECTING, ANALYZING, AND TRANSMITTING INFORMATION RELEVANT TO TRANSPORTATION NETWORKS - When individual persons or vehicles move through a transportation network, they are likely to be both actively and passively creating information that reflects their location and current behavior. In this patent, we propose a system that makes complete use of this information. First, through a broad web of sensors, our system collects and stores the full range of information generated by travelers. Next, through the use of previously-stored data and active computational analysis, our system deduces the identity of individual travelers. Finally; using advanced data-mining technology, our system selects useful information and transmits it back to the individual, as well as to third-party users; in short, it forms the backbone for a variety of useful location-related end-user applications. | 10-16-2014 |
Patent application number | Description | Published |
20150079960 | SYSTEMS AND METHODS FOR DYNAMIC MOBILE APPLICATION PROCESSING - System and methods for dynamic mobile applications are disclosed herein. In one embodiment, a non-transitory computer readable medium storing executable instructions is provided. The instructions, when executed by a processor, cause the processor to authenticate a user and to retrieve a connectivity data. The instructions further cause the processor to connect with at least one external system based on the connectivity data and to retrieve an application programming interface (API) from the at least one external system. The instructions additionally cause the processor to execute the API to customize a graphical user interface (GUI), and to display the GUI on a display of a mobile device | 03-19-2015 |
20150082454 | SYSTEMS AND METHODS FOR LICENSING OF MOBILE APPLICATIONS - System and methods for licensing of dynamic mobile applications are disclosed herein. In one embodiment, a non-transitory computer readable medium storing executable instructions is provided. The instructions, when executed by a processor, cause the processor to communicatively couple to a mobile device and to receive a user login, a user password, and a client identification from the mobile device. The instructions additionally cause the processor to validate a client as a licensed client based on the based on the user login, user password, and client identification and to derive a connectivity data based on the user login, user password, and client identification if the client is a valid licensed client, wherein the connectivity data comprises a first connectivity data configured to communicatively couple the mobile device to a first system; and wherein the mobile device is configured to download a first API from the first system. | 03-19-2015 |