­
­
­
­

Inventi Impact - Business Research & Reviews

Patent Watch

  • Method and system for securely authenticating network access credentials for users

    A method is provided to securely authenticate user credentials. The method includes encrypting a user credential with a public key at an access device wherein the public key is part of a public/private key pair suitable for use with an encryption algorithm. The encrypted network user credential is transmitted from the access device to a decryption server where it is decrypted with a private key, the private key being part of the public/private key pair suitable for use with the encryption algorithm. The decrypted user credential is then transmitted from the decryption server to an authentication server for verification. The decryption server typically forms part of a multi-party service access environment including a plurality of access providers, the method including decrypting the user credential of a user proximate an access provider associated with the user credential. The method can be used in legacy protocols such as Point-to-Point protocol (PPP), Password Authentication Protocol (PAP), Challenge-Handshake Authentication Protocol (CHAP), Remote Authentication Dial In User Service (RADIUS) protocol, Terminal Access Controller Access Control System (TACACS) protocol, Lightweight Directory Access Protocol (LDAP), NT Domain authentication protocol, Unix password authentication protocol, HyperText Transfer Protocol (HTTP), HyperText Transfer Protocol over Secure sockets layer (HTTPS), Extended Authentication Protocol (EAP), Transport Layer Security (TLS) protocol, Token Ring protocol and/or Secure Remote Password protocol (SRP).

  • Television integrated chat and presence systems and methods

    An enhanced television system which enables users to communicate using a television, both via messaging and telephone. Users or the system may create a buddy list. Users may send and receive program information to and from each other, and change programs based on received information. The system may maintain information regarding a user's presence on the system, availability for messaging, and television viewing.

  • Systems and methods for making margin-sensitive price adjustments in an integrated price management system

    Systems and methods for generating margin sensitive pricing quotation in an integrated price adjustment system including: a) selecting products in selected product sets; b) providing pricing data corresponding to the products in selected product sets; c) providing guidance elements for products in selected product sets wherein guidance elements are margin sensitive; d) calculating guidance prices for products based upon guidance elements; e) selecting one of either pricing data or guidance prices; and f) generating a quotation based upon selections made such that margin sensitive pricing adjustments are incorporated into quotations. In some example embodiments, the present invention further includes providing predetermined suggestions for modifying the quotation.

  • Products and processes for vending a plurality of products via defined groups

    Products and processes are disclosed for defining at least one inventory group. This at least one inventory group includes at least two products that are available for sale by a vending machine. The vending machine outputs an indication of products that the at least one inventory group includes. The vending machine receiving, from a customer, a selection of a first product that the at least one inventory group includes. The vending machine processes a sale of a unit of the first product and a respective unit of at least one additional product for a single price.

  • Computer system to generate financial analysis output

    An electronic system, the system for selling fixed income instruments, the system including a second computer having an output device and at least one buyer's computer having an electrically coupled input device and a monitor, the buyer's computer and the second computer being respectively located, the computers being used in cooperation in a multiple computer system in electronically communicating data between the computers.

  • Discovery service for electronic data environment

    A method includes storing, at a discovery service, address information for each of a plurality of information services providers. For each of the plurality of information services, product data of a respective information provider and access right data (defining access rights to the product data) are also stored. At the discovery service, a query is received from an information requester, the query being related to specific product data for a product identifier included in the query. A first information service, of the plurality of information services, is identified as an information provider of the specific product data, and first address information for the first information service is retrieved. The query is routed from the discovery service to the first information service using the first address information. The first information service selectively responds directly to the information requester in accordance with the access right data of the first information service.

  • Systems and methods for a revenue causality analyzer

    A revenue causality analyzer that provides attribution of causality effects for changes in revenue. The analyzer includes a selector for selecting a reference time period and a comparison time period, a receiver configured to receive transaction data including pricing data and volume data about the products at reference and comparison times, a preparer that includes a missing data exchanger and data error corrector, an attributor for attributing causality effects including a price effect, a volume effect, a mix effect an exchange effect, a cost effect, a dividend effect, a loss effect, and an inventory appreciation effect, by analyzing transaction data through a causality equation; and an output. Price effect sums the product of change in price and volume of the products across the products and currencies. Volume effect multiplies change in volume by the revenue per product sold. Mix effect multiplies percent revenue change by the volume of products sold.

  • Econometric engine

    A method for creating a sales model for a plurality of products  is provided. Generally a plurality demand groups are created, where each demand group is a set of at least one product and wherein at least one of the demand groups is a set of at least two products. A sales model is created for each demand group. A market share model is created for each product in each demand group.In addition, an econometric engine for modeling sales as a function of price is provided. An imputed variable generator and a coefficient estimator coupled to the imputed variable generator form the econometric engine, where imputed variables generated by the variable generator are used by the coefficient estimator to create a sales model.

  • System and method for measuring and utilizing pooling analytics

    A system and method for quantifying the working capital benefit of pooling a number of separate cash accounts. The average (mean) cash balance of the pooled account is determined to be the sum of the means of each of the individual accounts. Similarly, the standard deviation of the pooled account is determined to be the square root of the sum of the squares of the standard deviations of the individual accounts. Accordingly, the minimum cash level of the pooled account is 2.3 times the square root of the sum of the squares of the standard deviations of the individual accounts. In order to determine the benefit of pooling, the present invention determines the difference between the minimum aggregate cash required by the separate companies and the minimum cash required in the pooled account. If pooling is to be beneficial, from a working capital perspective, the minimum cash required in the pooled account will be significantly less than the aggregate cash required by the separate companies.

  • Method and device utilizing polymorphic data in e-commerce

    An aspect of the present invention includes a protocol for conveying data during an e-commerce session with a polymorphic response, comprising initiating a session with a message from a buyer application to a broker application and a session identifier assigned by the broker application; conducting the session between the buyer application and a supplier application; and concluding the session with a additional message which includes a schema identifier for the additional message, resolvable in a context of a system identifier; and a polymorphic response comprising a type and a version, wherein the polymorphic response includes additional data elements corresponding to values assigned to the type and version.  

  • System, method, and apparatus for information extraction of textual documents

    A method and system for text extraction employs structured annotations that are embedded within a text document and specify the start and end of a document segment and an associated rhetorical relation. The structured annotations are processed to generate and store variables that represent document segments and associated rhetorical relations. A user interacts with a computer to define query input that specifies at least one rhetorical relation of interest. The query input is processed to query the stored variables to identify document segments associated with a rhetorical relation that matches the rhetorical relation of interest and to return to the user information pertaining to the matching document segments. The rhetorical relation of interest as well as the stored variables can include RST relations whose meaning is dictated by nuclearity of the associated text as well as Speech Act relations whose meaning extends beyond the situational semantics of the associated text.

  • Method and system for managing customer network value

    A method, system and computer program product are disclosed for evaluating a customer network value of a set of customers for a given marketing campaign, said method comprising the steps of storing for each customer static information, collecting for each customer, historical and time cumulative network behavior data, building a customer network map from network behavior data said map describing network relation between nodes, one node representing one customer, computing the social network parameters for the nodes of the network map, selecting the most relevant social network parameters according to the objectives of the given marketing campaign, and, computing for each customer a Customer Network Value Index (NVI) by combining the most relevant social network parameters and static information. When a static information profile is defined for an extended customer population, applying data mining techniques on this population allows estimating a probabilistic NVI for each customer in the extended customer population for which no NVI has been computed.

  • Method to enhance platform firmware security for logical partition data processing systems by dynamic restriction of available external interfaces

    A system and method to reduce external access to hypervisor interfaces in a computer system, thereby reducing the possibility of attacks. In a preferred embodiment, addresses for calls are used to fill a table, where the addresses are specifically selected for a requesting computer. For example, in one embodiment, a routine searches for the adapter type of a requesting computer and populates the table with calls specific to that type of adapter. Other types of calls are not put in the table. Instead, those calls are replaced by routines that will return an error. In other embodiments, the operating system type is used to determine what addresses are used to populate the table. These and other embodiments are explained more fully below.

  • Partial document content matching using sectional analysis

    Monitored content is classified to determine partial matches with fragments of documents. A set of redundant keys, or sliding sectional fingerprints, are computed for every possible alignment of the documents with respect to the monitored content. The keys are stored in repositories according to the classification of the corresponding documents. Sectional fingerprints are computed for the monitored content, and the repositories are searched. If a match is found in a repository corresponding to public content, then the monitored data section is classified as public. If a match is found only in a repository corresponding to private content, then the data section is classified as private. Otherwise, the data section is classified as unknown. In a related aspect, a set of policies are searched for a first match in part according to the classifications of the monitored data sections, and a designated action taken if the first match is found.

  • Computer security intrusion detection system for remote, on-demand users

    An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events. An intrusion detection system controller is associated with one of the data processing hosts. It is adapted to manage and monitor the intrusion detection system agent(s), process agent reports of intrusion activity, and communicate intrusion-related information to the on-demand user (or security provider). The responses to intrusion events can be implemented by the intrusion detection system controller in combination with the intrusion detection system agents, or by any such entity alone.

  • Methods and systems for assigning access control levels in providing access to resources via virtual machines

    A system for granting access to resources includes a client machine, a collection agent, a policy engine, and a broker server. The client machine requests access to a resource. The collection agent gathers information about the client machine. The policy engine receives the gathered information and assigns one of a plurality of levels of access responsive to application of a policy to the received information. The broker server establishes, responsive to the assigned level of access, a connection between the client machine and a computing environment providing the requested resource, the computing environment provided by a virtual machine.

  • Data structures for context information related to business events

    Methods and apparatus, including computer program products, related to data structures for context information related to business events. Data characterizing an event of one or more business processes (e.g., an event corresponding to a business activity in one or more computer-implemented business processes) is received, and a data structure is generated to enable event resolution. The data structure is generated in response to receiving the data and the data structure includes information about the event derived from the data and information to assist retrieving further information related to the event. The data structure may be defined in accordance with a declarative programming language. A business process to include events that are resolved with the use of a data structure including context information and a data structure (e.g., a designtime data structure) may be modeled in a visual modeling tool.

  • Method and system for integrating the existing web-based system

    The present invention provides a service-oriented system comprises: a service inlet for receiving a service request containing an input data set submitted by a user; a service proxy interface formed by integrating an existing web-based application, for transforming the input data set in the service request submitted by the user into input parameters recognizable by the requested service and loading a model definition document corresponding to the service according to the service request submitted by the user, the model definition document being formed by integrating the existing web-based application; and an execution engine for interacting with an external resource according to the input parameters transformed by the service proxy interface and returning the information obtained from the external resource to the service proxy interface.

  • Estimating resource usage system for allocating resources to tasks based upon the rating value of tasks and resources mapping

    A method for allocating resources of a group of resources to tasks of a group of tasks, the method comprising: forming a resource set comprising a resource record for each of the resources of the group of resources, each resource record having one or more fields representative of attributes of the respective resource; forming a task set comprising a task record for each of the tasks of the group of resources, each task record having one or more fields, each field holding data representative of an attribute of the respective task; condensing the task set by one or more iterations of the steps of: i. selecting two or more tasks of the task set; ii. adding to the task set an aggregate task record having one or more fields, each such field corresponding to a field of each of the task records of the selected tasks and holding data representative of the collective attributes of the task records of the selected tasks in those fields; and iii. removing the task records of the selected tasks from the task set; forming at least two mappings of some or all of the members of the resource set on to one or more members of the task set; calculating, for each of the mappings, a rating value dependent on the allocation of resources to the or each aggregate task in that mapping; comparing the rating values of the mappings; and selecting one of the mappings for further processing in dependence on the result of the said comparing step.

  • Mashup delivery community portal market manager

    A computer-implementable method and system for managing a mashup web-based community portal. A network-based community portal having a mashup platform integrated therewith can be provided and one or more pre-negotiated bartering agreements designated, in response to a particular user input by one or more users of the network-based community portal. A management module (e.g., a "Market Manager") can be associated with the network-based community portal in order to permit the users of the network-based community portal to describe to the mashup platform the pre-negotiated bartering agreement(s), in order to permit the network-based community portal to manage the utilization of mashup applications associated with the mashup platform and one or more widget contained by the mashup applications.

  • Method and apparatus for testing of business processes for web services

    A method for unit testing of business processes for Web services, including steps of mapping the Web service description language (WSDL) elements of a process under test and its partner processes into equivalent Object-Oriented language (OO) elements, and performing testing on the process under test based on Object-Oriented unit testing frameworks. Each Web service interface of the process under test and its partner processes is mapped into an equivalent OO interface, partner stubs are generated on basis of the OO interfaces of the partner processes, WSDL binding and service port information are defined for the generated partner stubs, test cases are formed which contain test logic describing the service invocations between the process under test and its partner processes, and the test cases are executed, wherein the partner stub and its associated mock object collectively implement the service of a corresponding partner process.

  • Business process diagram visualization using timeline-based heat maps

    System and method for displaying information regarding a business process. A diagram of the business process may be displayed on a display. The diagram may include a plurality of icons connected by lines, where each of the icons represents a respective step in the business process and the lines indicate flow paths between the steps. Historical data regarding the business process may be received. The historical data may be analyzed to determine information regarding steps and/or flow paths in the business process. Graphical indications associated with one or more icons and/or lines in the diagram may be displayed. The graphical indications may visually indicate characteristics of corresponding steps and/or flow paths in the business process. For example, the graphical indications may indicate lengths of time, costs, or other characteristics associated with various ones of the steps. The graphical indications may indicate path traversals of ones of the flow paths.

  • Method and system for remotely managing business and employee administration functions

    A method for managing human resource services, including determining a profile of a first business, where the profile comprises a plurality of attributes of the first business; identifying a second business matching the profile of the first business; receiving a first human resource service requirement of the second business and a second human resource service requirement of the second business; sending the first human resource service requirement and the second human resource service requirement to a plurality of third party providers; receiving a plurality of products from the plurality of third part providers; generating a first benefits package comprising a first subset of the plurality of products, where the first benefits package satisfies the first human resource service requirement and the second human resource service requirement; and installing the first subset of products.

  • CHANGE ANALYSIS ON ENTERPRISE SYSTEMS PRIOR TO DEPLOYMENT

    A computer ("patch analysis computer") retrieves from a website, metadata describing one or more patch files to be used to change software in one or more computers ("target computers"). Prior to installation of the patch files in a target computer, the patch analysis computer performs analysis on the patch files and on the target computer and on application of the patch files to the target computer. The analysis is based on the retrieved metadata and based on configuration data of the target computer. Subsequent to performing the analysis, the management computer displays a report resulting from the analysis including one or more operations to fix issues found during analysis, and receives input from a human on specific patch files and operations. In response to receipt of human input, the patch analysis computer performs operations approved by the human and applies the patch files to the target computer.

  • UNIFIED ELECTRONIC FORMS MANAGEMENT SYSTEM

    A unified electronic forms management system that comprises a network-based software implemented process that is designed to provide its users with access to a unified system and process of managing form data and the creation, storage, update and distribution of electronic forms. The unified electronic forms management system may include a centralized and unified electronic forms management system remote server, which communicates over a network with a remote form designer used by a user to create a form, a remote form viewer used by a form user, a database that stores the form data associated with the remote server, and external database(s) that optionally receive data transmitted by the unified system. Form recipient(s) have the option of receiving over the network the form for approval and/or to provide additional information.

  • Providing Software Validation as a Service

    In one embodiment, a method includes accessing an event-driven application input by a user, the event-driven application comprising source code, one or more use cases input by the user for the event-driven application, and one or more functional requirements input by the user for the event-driven application; parsing the use cases and the functional requirements according to the predefined syntax to construct one or more validation modules for validating the event-driven application without any modification to the source code of the event-driven application for validation purposes; formally validating the event-driven application using the validation modules without relying on assertions inserted into the source code of the event-driven application for validation purposes; and if the formal validation finds one or more defects in the event-driven application, generating output for communication to the user identifying the defects.

  • Cloud Based Firewall System And Service

    A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats. In various embodiments, such a firewall system and service can be implemented in conjunction with a content delivery network (CDN) having a plurality of distributed content servers. The CDN servers receive requests for content identified by the customer for delivery via the CDN. The CDN servers include firewalls that examine those requests and take action against security threats, so as to prevent them from reaching the customer site. The CDN provider implements the firewall system as a managed firewall service, with the operation of the firewalls for given customer content being defined by that customer, independently of other customers. In some embodiments, a customer may define different firewall configurations for different categories of that customer's content identified for delivery via the CDN.

  • Method For Automating Onboarding Application Developers To Sales Distribution Channel

    A method for automating an onboarding process for a developer onto a service delivery hub operated by a network operator includes providing the developer with information relating to use of the service delivery hub, receiving data relating to the developer, approving the developer, certifying an application provided by the developer, and configuring the application for use. A method for synchronization with the service delivery hub is also provided.

  • INFORMATION INPUT ASSISTANCE DEVICE, COMPUTER-READABLE MEDIUM, AND INFORMATION INPUT ASSISTANCE METHOD

    An information input assistance device includes an identification unit, a generation unit, and a processing unit. The generation unit acquires attribute information corresponding to a user identified by the identification unit from a first memory, acquires rule information corresponding to a transmission destination of input information and a class of input information from a second memory, and generates the input information corresponding to the identified user on the basis of the acquired attribute information and the acquired rule information. The processing unit performs processing that transmits the input information generated by the generation unit to the transmission destination.

  • METHOD AND SYSTEM FOR INTEGRATING TELEVISION BRAND ADVERTISING WITH PROMOTIONAL MARKETING

    A method for integrating television brand advertising with promotional marketing includes providing an image to be displayed in different television commercials for products from different advertisers, the image indicating a website; and providing at the website coupon offers for the products from the different advertisers. The image will alert a viewer of the television commercial that a special coupon offer is available at a website. The viewer will go to the website and be able to select from one or more coupon offers available to consumers in their market area. The consumer then prints the coupons, or adds credit to a coupon card, which is then redeemed at the retailer. The system allows for Point Of Sale (POS) redemption, or more traditional redemption through a coupon clearinghouse. The television commercials may be encoded with information to be used at a television signal processing location for selecting the images, and different images may be provided to television signal processing locations associated with different market areas.

  • SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DISPLAYING DATA UTILIZING A SELECTED SOURCE AND VISUALIZATION

    In accordance with embodiments, there are provided mechanisms and methods for displaying data utilizing a selected source and visualization. These mechanisms and methods for displaying data utilizing a selected source and visualization can enable enhanced data display, improved data display development, increased time savings, etc.

  • UNIFIED ELECTRONIC FORMS MANAGEMENT SYSTEM

    A unified electronic forms management system that comprises a network-based software implemented process that is designed to provide its users with access to a unified system and process of managing form data and the creation, storage, update and distribution of electronic forms. The unified electronic forms management system may include a centralized and unified electronic forms management system remote server, which communicates over a network with a remote form designer used by a user to create a form, a remote form viewer used by a form user, a database that stores the form data associated with the remote server, and external database(s) that optionally receive data transmitted by the unified system. Form recipient(s) have the option of receiving over the network the form for approval and/or to provide additional information.

  • CONTENT ADMINISTRATION SYSTEM

    A content administration system receives user identification information from a terminal device via the Internet. The content administration system then specifies content administration information storage means corresponding to the received user identification information. The content administration system acquires object path information correlated to sharing permission information from a content administration information storage means of another unspecified user. The content administration system then acquires an icon image from the icon image storage means. The content administration system then makes display control information for the content administration screen containing the icon leading to the object based on the acquired icon image and the acquired object path information. The content administration system transmits the made display control information to the terminal device via the Internet. As a result, an administrator of a web site does not have to add a content path corresponding to an HTML file when adding content to a web site administered by themselves or when sharing content with another web site.

  • RESOURCE-AWARE SYSTEM, METHOD AND PROGRAM PRODUCT FOR MANAGING REQUEST TRAFFIC BASED ON A MANAGEMENT POLICY

    Under the present invention, the performance of a set of system resources is monitored in response to incoming request traffic. When a system resource is approaching an overload condition, a corrective action is identified and implemented. Overload thresholds for each system resource and appropriate corrective actions are contained within a management policy. Based on a performance history of the corrective actions, the management policy can be changed/revised.

  • REAL-TIME AUTOMATED VIRTUAL PRIVATE NETWORK (VPN) ACCESS MANAGEMENT

    Provided is a method for managing virtual private network (VPN) access to a network that is partitioned into a plurality of subnetworks (subnets). The method includes providing first information associated with hardware hosted on one or more subnets of the network; providing second information associated with users for VPN access, where the VPN access for each user is determined by a list of hardware each user has permission to access; detecting a hardware triggering event corresponding to a modification of the first information; and responsive to the detection of the hardware triggering event, automatically updating the second information based on the modification of the first information.

  • MULTIPLE CRITERIA BUYING AND SELLING MODEL

    A multiple criteria buying and selling system and method is provided. A seller initially establishes a deal structure for a product, which provides seller defined selling criteria information relating to the purchasing of the product, such as volume per unit price, quality, delivery time and warranty information. A buyer will be able to review a list of deals if the seller's selling criteria matches a buyer defined buying criteria. The deal structure is preferably set up so as to provide buyers with both price and non-price criteria information that the buyer's would consider important in a purchase of the type of product being offered by the seller. The deal structure is electronically made available to potential buyers of the product. For example, the deal structure may be displayed on an Internet site.

  • System and Method for Improved Distribution of Market Information

    A data distribution system and method are described herein to improve the distribution of market information to subscribing client devices. Market information updates are provided to subscribing devices over a communication link every time a change in the market occurs. If a bandwidth limitation is reached on the communication link, the preferred embodiments switch to a second mode of transmission such that the market information updates are provided only at predetermined intervals. The preferred embodiment monitors the bandwidth consumption to determine what mode of transmission to apply, and in response, it can dynamically change between modes of transmission. By dynamically adjusting the mode of transmission to comport with the current network bandwidth, the preferred embodiments may provide a network friendly, data intensive, and fast response market information feed.

  • AUCTION WITH INTEREST RATE BIDDING

    A method, apparatus, system and non-transitory machine-readable medium are provided for declining auctions with interest bidding. According to one embodiment, offers are received from respective bidders in a bid receiving process to transact a financial instrument, the offers being expressed as offered interest rates at which the corresponding respective bidders are willing to transact the financial instrument. The bid receiving process is utilized in a declining auction characterized by a reducing a published interest rate at which the financial instrument is offered for sale. The reducing of the published interest rate is performed automatically and responsive to a lack of bidding activity. Further there is a determining whether at least one of the offers satisfies transaction criterion.

  • ORDER RISK MANAGEMENT FOR DERIVATIVE PRODUCTS

    Systems and methods are provided for processing derivative product orders at an exchange. Traders provide derivative product order risk data to the exchange. The order risk data may include maximum delta, gamma and/or vega utilization values for derivative product contracts based on the same underlying product. Before executing a trade, a match system analyzes the trader's current utilization state and the utilization that would result after the trade. The match system may then execute all or a portion of the trade.

  • SYSTEM AND METHOD FOR USING REAL-TIME KEYWORDS FOR TARGETING ADVERTISING IN WEB SEARCH AND SOCIAL MEDIA

    As the result of a keyword search, real time and social news stream Web search results are retrieved and analyzed to build a topic model of n-grams. The n-grams of the topic model are treated as ad-based keywords to determine advertisements to be displayed in conjunction with the real time Web search results. The real time Web search results and the advertisements are then be presented or displayed for user consumption or review.

  • SWAP INDEX

    A set of indices is provided which allows accurate tracking of interest rate swap (IRS) markets. The indices are calculated using market data and synthetic purchasing and selling of synthetic interest rate swaps utilizing the present market data. The value of the synthetic interest rate swaps are the basis for the value of a particular index. The purchasing and selling of the synthetic interest rate swap occurs at a frequency to minimize effects of shortening terms on the index. One subset of the IRS indices reflects a plain-vanilla swap for a specific term of years. Another subset of the IRS indices reflects a spread between two specific terms of years. A third subset of the IRS indices reflect two spreads, sometimes referred to as a butterfly, between a middle term of years and a shorter term of years and the same middle term of years and a longer term of years.

  • Method And Apparatus For Measuring Business Transaction Performance

    A method for measuring business transaction performance, includes the steps of, at a top-level component, assigning a correlation tag and original time stamp to a server request, passing the original time stamp with any server requests from the top-level component to one or more subsequent components, and computing an aggregate latency over a predetermined interval at the top-level component and at each subsequent component based on the original time stamp.

  • Systems and Methods to Provide Market Analyses and Alerts

    In one aspect, a computing apparatus includes: a transaction handler configured to process payment transactions between issuer processors on behalf of account holders and acquirer processors on behalf of merchants; a data warehouse configured to store transaction data recording the payment transactions and environmental data identifying market activities and events occurring shortly before, concurrently with, or shortly after the respective payment transactions; an analytic tool coupled with the data warehouse and configured to correlate the transaction data and the environmental data to establish at least one predictive model and configured to predict a market activity based on the predictive model; and a gateway to provide information about a prediction of the market activity to a user via a report or a mobile alert.

  • SYSTEM AND METHOD FOR PROCESSING COMPOSITE TRADING ORDERS

    A system for processing a composite trading order comprises a memory operable to store market data received from one or more market centers. The system further comprises a processor operable to generate a composite value based at least in part on the market data. The processor is further operable to receive a composite trading order associated with at least a portion of the composite value. The processor is further operable to generate a plurality of constituent trading orders that, when filled, combine to satisfy the composite trading order.

  • METHOD AND SYSTEM TO ALLOW INDIVIDUAL SELLERS TO AUTOMATICALLY CLEARANCE ONE-OF-A-KIND LISTINGS

    A method and system for conducting electronic commerce that provides for an "auto-clearance" function in which, after expiration of a pre-determined listing period for an item for sale, the item is automatically placed on sale or "clearance" at a reduced price. The present invention allows an online seller of a unique, one-of-a-kind item to automatically place the item on clearance after a period of time.

  • CREATING REVENUE SOURCES USING ALLOCATION SOURCE

    Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for creating new and/or reoccurring revenue sources using an allocation source.

  • SYSTEM FOR AN INCENTIVE-BASED DISTRIBUTION OF A MARKETING MATERIAL

    The teachings are generally related to a system for an incentive-based distribution of a marketing material to a user, where the system can include, for example, multiple incentives for the user to view and understand the marketing material, such as gaming, competition, social networking, and rewards.

  • SYSTEM AND METHOD FOR ESTIMATING AND OPTIMIZING TRANSACTION COSTS

    A method and system for forecasting the transaction cost of a portfolio trade execution that may be applied to any given trade strategy or an optimal trade strategy that minimizes transaction costs. In preferred embodiments, a server comprises one or more computers that act as an automated forecaster whereby it accepts user-defined input variables from customers and generates a transaction cost estimation report based on those variables. The server is programmed with specific transaction cost estimation and optimization algorithms that model the transaction costs of a specific trade execution based on the user's trading profile and market variables.

  • SECURITY LEVEL DETERMINATION OF WEBSITES

    A site analysis system to determine a security level of a website comprises a communication transceiver and a processing system. The communication transceiver is configured to receive content information associated with the website describing a current state of the website, receive historical event information associated with the website, and receive external information associated with the website from a source external to the website. The processing system is configured to process the content information to determine a content score for the website, process the historical event information and the external information to determine a reputational score for the website, and process the content score and the reputational score to generate a final score for the website.

  • INVOCATION OF THIRD PARTY'S SERVICE

    Invoking a computer implemented service includes receiving a request from a first user to access a service associated with a second user. The request is associated with a security token for the first user and an identity token for the second user. The acceptability of the security token is determined to authenticate the first user, and the acceptability of the identity token is determined to securely identify the second user. The first user is able to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable.

  • APPARATUS AND METHOD FOR DETECTING, PRIORITIZING AND FIXING SECURITY DEFECTS AND COMPLIANCE VIOLATIONS IN SAP.RTM. ABAPtm CODE

    A static code analysis (SCA) tool, apparatus and method detects, prioritizes and fixes security defects and compliance violations in SAP.RTM. ABAP.TM. code. The code, meta information and computer system configuration settings are transformed into an interchangeable format, and parsed into an execution model. A rules engine is applied to the execution model to identify security and compliance violations. The rules engine may include information about critical database tables and critical SAP standard functions, and the step of applying the rules engine to the execution model may include the calculation of specific business risks or whether a technical defect has a business-relevant impact. In particular, an asset flow analysis may be used to determine whether critical business data is no longer protected by the computer system. Such critical business data may include credit or debit card numbers, financial data or personal data.

  • ENHANCED MULTI FACTOR AUTHENTICATION

    In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises logic instructions which, when executed by the processor, configure the processor to receive, via a first communication channel, a primary authentication request transmitted from a user from a first device, process the primary authentication request to determine whether the user is authorized to access one or more resources, in response to a determination that the user is authorized to access one or more resources, initiate, a secondary authentication request, and transmit the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel.

  • SECURITY LEVEL DETERMINATION OF WEBSITES

    A site analysis system to determine a security level of a website comprises a communication transceiver and a processing system. The communication transceiver is configured to receive content information associated with the website describing a current state of the website, receive historical event information associated with the website, and receive external information associated with the website from a source external to the website. The processing system is configured to process the content information to determine a content score for the website, process the historical event information and the external information to determine a reputational score for the website, and process the content score and the reputational score to generate a final score for the website.

  • METHODS AND APPARATUS TO DISCOVER AUTHENTICATION INFORMATION IN A WIRELESS NETWORKING ENVIRONMENT

    Example methods and apparatus to discover authentication information in a wireless networking environment are disclosed. A disclosed example method involves transmitting, during network discovery, a Generic Advertisement Services (GAS) request to a network access point, the GAS request requesting authentication information, the authentication information being indicative of a credential required from a wireless terminal. In addition, a response to the GAS request is received from the network access point. The response includes the authentication information.

  • SYSTEMS AND METHODS FOR PERMISSION ARBITRATED TRANSACTION SERVICES

    Systems and methods disclosed allow a permitting party to share personal information with a receiving party. The receiving party may use the information to authenticate the permitting party, assess the permitting party, determine if the permitting party is compatible with one or more other users associated with the receiving party, or validate the permitting party. The permitting party may define how much of the permitting party's personal information is shared, and/or limit the use of the information for one or more specific purposes. A requesting party may also set up criteria for the types of information it wants to review along with the intended use of the information. The systems and methods disclosed also enables permitting parties the ability to grant requesting parties access to requested information.

  • SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS

    A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.

  • Enforcing Universal Access Control in an Information Management System

    A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • CONTENT BROADCASTING

    The invention provides a content broadcasting system comprising a communications satellite and a satellite control arrangement for controlling the communications satellite to transmit a satellite broadcast signal. The satellite control arrangement is arranged to control the satellite to transmit the satellite broadcast signal to a first geographical area during a first time interval and to transmit the satellite broadcast signal to a second geographical area during a second time interval. The broadcast signal is not transmitted to the first geographical area during at least the second time interval and the broadcast signal is not transmitted to the second geographical area during at least the first time interval. This enables broadcast content to be provided to a large geographical area, while increasing the radio frequency spectrum efficiency of the system and minimising the continuous power consumption of the satellite required for the broadcast.

  • INTERACTIVE TELEVISION PROGRAM GUIDE WITH PASSIVE CONTENT

    A hybrid passive-interactive program guide is generated by combining the features of an interactive program guide with the passive video portion of a passive program guide. The interactive guide may replace passive listings with interactive listings, replace passive features with interactive features, provide supplemental advertisements, or replace passive tagging information with interactive tagging information. Users may be provided with an opportunity to purchase a program or product being advertised, to view listings for segments aired in the video portion of the passive guide, to schedule reminders for listings or video segments that are displayed by the passive guide, or to schedule video segments and related information for recording.

  • Targeted television advertisements selected on the basis of an online user profile and presented with television programs or channels related to that profile

    In an automatic, computer-implemented method, a selected television advertisement is presented automatically in association with a television program or channel. A relationship is identified between an online user profile and the television program or channel, and the television advertisement is selected based at least in part on information from the online user profile. The selected television advertisement is presented, in association with the television program or channel that is identified as being related to the online user profile, via a set-top box having a corresponding set-top box identifier that is associated with the online user profile.

  • Delivering Advertisements Based on Digital Television System and Mobile Communication Device

    A system for delivering advertisements based on a digital television system and a mobile communication device is disclosed. The television system and the mobile device are connected in ad hoc manner when a program is broadcasted by the television system. When a user is attracted by an advertisement, an instruction is sent from a remote control device of the television system or from the mobile device to trigger the processor of the television system to send a data file including a product identifier related to the product being advertised to the mobile device. An icon is displayed on a display screen of the mobile device to represent the received data file. When the icon is selected, the mobile device is connected to a data manager in the Internet to deliver more product information to the user.

  • EVENT-DRIVEN AUTO-RESTORATION OF WEBSITES

    An event-driven auto-restoration system for websites comprises a processing system. The processing system is configured to detect an event associated with a website indicative of a change in the website to an undesired state. The processing system is further configured to dynamically generate a restoration process and employ the restoration process to restore the website to a desired state. The processing system is further configured to employ a verification process to verify that the website has been restored to the desired state.

  • SYSTEMS AND METHODS FOR PERFORMING ACCESS ENTITLEMENT REVIEWS

    Embodiments of the invention relate to risk assessments and, more particularly to performing access risk assessments based on identified outliers.

  • FIREWALLS FOR SECURING CUSTOMER DATA IN A MULTI-TENANT ENVIRONMENT

    Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to locate and raise an alert for suspect query plans. Security also can be enhanced using a firewall system sitting between the application servers and the client systems that records user and organization information for each client request received, compares this with information included in a response from an application server, and verifies that the response is being sent to the appropriate user. Security also can be enhanced using a client-side firewall system with logic executing on the client system that verifies whether a response from an application server is being sent to the appropriate user system by comparing user and organization id information stored at the client with similar information in the response.

  • Method And Apparatus Of Automated Discovery In A Communication Network

    An automated method is provided for mutual discovery between a network entity and a client entity that cooperate for providing a service in a machine-to-machine environment. In an embodiment, the network entity receives an identifier in a communication from a server on behalf of the client entity. At some point in time, the network entity receives a communication containing the identifier from the client entity. Before or after receiving the client entity communication, the network entity discovers itself to the client entity. Some time after receiving the client entity communication, the network entity authenticates the client entity, establishes a permanent security association with the client entity, and initiates the service.

  • SOFTWARE APPLICATIONS DISTRIBUTION METHOD AND APPARATUS

    The present invention provides for a method and apparatus for distributing digital information, such as software applications, to application users. By providing the digital information on unused memory space of a computer system, and providing a process for authorizing access to the information, the information can be efficiently and cost effectively transferred to users. Traditional inventory and distribution channel difficulties are avoided.

  • TECHNIQUES TO REMOTELY ACCESS OBJECT EVENTS

    Techniques to remotely access object events are described. An apparatus may comprise a processor and a memory communicatively coupled to the processor. The memory may be operative to store a remote event bridge having a surrogate object that when executed by the processor is operative to allow an observer object for a first process to subscribe to an event of a subject object for a second process using the surrogate object. In this manner, the remote event bridge and the surrogate object operates as an interface between subject objects and observer objects without any modifications to either class of objects. Other embodiments are described and claimed.

  • INTERACTION MANAGEMENT

    In a system, at least one web server provides an interface to a web-enabled application to a first computing device, with the web-enabled application and the at least one web server belonging to a first domain. An interaction routing module routes a contact event to the first computing device. At least one application server receives and responds to an Hypertext Transfer Protocol (HTTP) request for requested information related to the contact event. The HTTP request is generated by the web-enabled application. An integration module receives the HTTP request from the at least one application server and translates the HTTP request to an application programming interface call to interface with a second computing device storing the requested information in a second domain. A messaging module provides the requested data to the web-enabled application.

  • METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR SELECTING A RESOURCE BASED ON A MEASURE OF A PROCESSING COST

    Methods and systems are described for selecting a resource based on a measure of a processing cost. Resource information is received identifying a first resource and a second resource for processing by a program component. One or more of a first measure of a specified processing cost for the processing of the first resource and a second measure of the processing cost for the processing of the second resource is determined. One of the first resource and the second resource is selected based on at least one of the first measure and the second measure. The selected one of the first resource and the second resource is identified to the program component for processing.

  • SOYBEAN VARIETY A1015881

    The invention relates to the soybean variety designated A1015881. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1015881. Also provided by the invention are tissue cultures of the soybean variety A1015881 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1015881 with itself or another soybean variety and plants produced by such methods.

  • METHOD AND SYSTEM FOR META-TAGGING MEDIA CONTENT AND DISTRIBUTION

    A unique application within Video that allows for user generated Meta-tagging to be delivered in real time to individual clips is provided. This meta-tag creates its own tail based upon the user generated words population, which is searchable via a "spider network" that runs invisible behind the web pages of the site. These same "tagged" words are broadcast over various delivery networks including but not limited to live feeds from SMS, MMS, News Feeds within Community Web Sites, Video Sharing Web Sites, Widget applications any other forms of electronic communication that will be dropped in real time to identified users and friends of users.

  • INTEGRATED INTERACTIVE MESSAGING SYSTEM AND METHOD

    Disclosed is a system and method for organizations to develop, test, execute and analyze messaging programs defining a message application server comprising (a) a dialog designer (104) configured to provide a user interface to allow rapid program creation, to schedule programs for execution, to upload messaging user data into lists, to download program result data, to test programs, to provide reports on messaging programs, (b) a dialog server (106) configured to execute messaging programs to manage simultaneous programs to store messaging user results and message delivery status, to maintain state and session context across message invocations for messaging users within a messaging program, and (c) a message exchange (108) configured to route messages to and from messaging service providers, to manage service addresses, to perform message billing and connected to messaging service providers, whereby organizations can execute messaging programs with messaging users by means for said messaging service.

  • SYSTEM AND METHOD FOR ACCESSING INFORMATION PROCESSOR SERVICES FROM A MOBILE COMMUNICATION DEVICE

    A system is for pushing information from a host system to a mobile data communication device upon sensing a triggering event. A redirector program operating at the host system enables a user to continuously redirect user-selected data items from the host system to the user's mobile data communication device upon detecting that one or more user-defined triggering events has occurred. The redirector program operates in connection with event generating applications and repackaging systems at the host system to configure and detect particular user-defined events, and to repackage the user-selected data items in an electronic wrapper prior to pushing the data items to the mobile device.

  • System and Method for Content Development

    This invention relates to a system and methods for developing content. In general, in one aspect, a method for developing content includes electronically distributing a specification for content to a distributed community of content developers, receiving submissions from each of a subset of the community of content developers in response to the distributed specification, holding a first vote in which a group of voters rank a first number of submissions and identify the order in which they predict the submissions will be ranked by others, selecting the highest scoring submissions in the first vote, holding a second vote to evaluate the submissions that receive the highest score in the first vote; and selecting a winner based on the second vote.

  • ARCHITECTURE FOR A SYSTEM OF PORTABLE INFORMATION AGENTS

    A method and system for providing enhanced intelligent agents that are moveable by a user from a browser application to a desktop. In specific embodiments, agents provide advanced interactive graphics and communications back to a server.

  • Data analytics system

    A data analytics system for manipulating and analyzing data and usable in preventing instances of incompatibility as desired, is disclosed.

  • Reality alternate

    Among other things, we describe a reality alternative to our physical reality, named the Expandaverse, that includes multiple digital realities that may be continuously created, broadcast, accessed, and used interactively. In what we call an Alternate Reality Teleportal Machine (ARTPM), some elements of the digital reality(ies) can be implemented using and providing functions that include: devices, architectures, processing, sensors, translation, speech recognition, remote controls, subsidiary devices usage, virtual Teleportals on alternate devices, presence, shared planetary life spaces, constructed digital realities, reality replacements, filtered views, data retrieval in constructed views, alternate realities machine(s), multiple identities, directories, controlled boundaries, life space metrics, boundaries switching, property protection, publishing/broadcasting, digital events, events location/joining, revenues, utility(ies), infrastructure, services, devices management, business systems, applications, consistent customizable user interface, active knowledge, optimizations, alerts, reporting, dashboards, switching to "best", marketing and sales systems, improvement systems, user chosen goals, user management, governances, digital freedom from dictatorships, photography, and entertainment.

  • Temporally Sequenced Recommendations and Associated Explanations in Subscription-based Systems

    A computer-implemented method and system for temporally sequenced recommendations and associated explanations in subscription-based systems delivers to users of a subscription-based system multiple recommended objects that are arranged in a temporal sequence. The delivered recommended objects are in accordance with user subscriptions and inferences of preferences that are based, at least in part, on usage behaviors. Variations of the system and method include delivering recommended objects in accordance with the contents of the objects and user direct feedback with regard to the objects. Information as to why objects were delivered to users is provided to the users.

  • MANAGEMENT OF MARKETING COMMUNICATIONS

    A computerized publication management system and method of use are provided for managing the marketing communications development process for healthcare and other highly regulated entities. The method involves receiving a number of inputs that define a desired marketing communication via a graphical user interface of the publication management system. Based on an analysis of the inputs, the publication management system may determine a number of tasks to be completed over the course of a marketing communications project and assign each of the tasks to appropriate personnel and/or service groups within the entity. The tasks may include, for example, obtaining appropriate approvals, copywriting, editing and proofing, print vender selection and management, and so on. Using the tasks and their assignments, the system may determine a workflow path and timeline for the project and track and manage the completion of the project as it progresses through the workflow path. The system may also automate certain processes associated with the development of marketing communications. For instance, the system may generate or select model documents and may implement an automated process for customizing versions and/or individual instances of any given marketing communication.

  • SEMANTICALLY RICH COMPOSABLE SOFTWARE IMAGE BUNDLES

    A composable software bundle is created by retrieving a semantic representation of a set of software modules. A functional representation of a set of operations is retrieved. Each operation in the set of operations is to be performed on the set of software modules during at least one virtual image life-cycle phase in a set of virtual image life-cycle phases. A set of artifacts including a set of executable instructions associated with the set of operations is identified. The semantic representation, the functional representation, and the set of artifacts, are stored in a composable software bundle.

  • DESIGNING AND BUILDING VIRTUAL IMAGES USING SEMANTICALLY RICH COMPOSABLE SOFTWARE IMAGE BUNDLES

    A virtual image is created by receiving a selection of at least one composable software bundle. The at least one composable software bundle includes a first set of metadata and a first set of artifacts comprising a first set of executable instructions associated with a first set of operations. A virtual image asset is selected and received. The virtual image asset includes one or more virtual image disks, a second set of metadata, and a second set of artifacts including a second set of executable instructions associated with a second set of operations. A new virtual image asset is created based on the at least one composable software bundle and the virtual image asset. The new virtual image asset includes a third set of metadata that is based on the first set of metadata and the second set of metadata.

  • METHOD AND APPARATUS FOR ELECTRONIC LITERARY MACRAME COMPONENT REFERENCING

    An expansion of the construction and organization of the electronic literary macrame (ELM), the knowledge transfer tool (KTT), or any document of similar type to enrich the connections and associations for their readers, providing for manual author- or editor-defined links and directives for hypertext handling and navigation, easy-to-use indexing capabilities, structuring and presentation of information in a visually-organized form such as a table, list, matrix, tree, pyramid, or other two-dimensional arrangement, with all features integrated into an unobtrusive, and enriched referencing mechanism to assist authors, editors and readers of an ELM, KTT, or other electronic document of similar type.

  • CATEGORIZATION OF A MOBILE USER PROFILE BASED ON BROWSE AND VIEWING BEHAVIOR

    A system for categorization of a mobile user profile based on a browse and viewing behavior of a user includes (a) using data of a wireless provider to ascertain a plurality of web browser activities as performed on a mobile communication facility of the user; (b) storing the plurality of mobile web browser activities relating to the user; (c) accessing from the wireless provider a viewing history of television content of the user, wherein the wireless provider has provided the television content; (d) analyzing the plurality of mobile web browser activities and the viewing history of television content to determine a relationship thereamongst; (e) creating a category of user profile based at least in part on the analysis; (f) associating the category of user profile with the user; and (g) transmitting content corresponding to the category of user profile to the mobile communication facility for display thereon.

  • Geoengineering Method Of Business Using Carbon Counterbalance Credits

    A business method for providing an emissions trading approach value to products and services that provide active cooling of the Earth that provides a sustainable means for global cooling strategies to achieve commercial value, in order to drive development and real-world application of these approaches, comprising the steps of manufacturing a light-scattering nanoparticle (527), deploying the stratospheric nanoparticles for reducing solar radiation incident on the Earth (537), receiving Carbon Counterbalance Credits in exchange for the local, national, regional, or international benefits derived from said deployment (547), and derives income from selling said credits in order to create a sustainable and viable business (557). Systems, devices, and agents for deployment in accordance with the business method are also disclosed.

  • TRANSACTIONAL SERVICES

    Methods and systems are provided for supporting electronic transactions, including transactions that are provided with per-user, per-device and per-domain security across domains of multiple service providers.

  • ENTERPRISE RISK ANALYSIS SYSTEM

    A system is provided in which multiple sub-organizations are part of a parent organization and participate in common risk management. The system includes a first sub-system whereby each sub-organization provides a risk assessment, a second sub-system whereby the risk assessment of each sub-organization is converted into a risk assessment of the parent organization and a third sub-system whereby the respective risk assessments of the sub-organizations and the parent organization are employed for additional analysis.

  • System for Determining Presence of and Authorizing a Quorum to Transact Business over a Network

    A system for determining presence of and authorizing a quorum to transact business over a network includes a first set of machine-readable instructions resident on a digital medium accessible to a computing machine, the instructions causing the machine to monitor a network for active presence of individual ones of communications devices associated with members of an authorized team of individuals from which the quorum may be determined, a second set of machine-readable instructions resident on the medium for causing the computing machine to make a confirmation of the quorum against a set of rules, and to authorize one or more of the individual communications devices making up the quorum to perform one or more tasks based on quorum consensus, and a user configuration, scheduling, and notification application resident on the digital medium for enabling a user to configure, schedule, and notify team members of a pending quorum event.

  • SYSTEM AND METHOD FOR TRANSFERRING A LINE OF CREDIT BALANCE TO A CASH ACCOUNT

    The present invention provides an automated system configured to facilitate transfers of cash value from one or more lines of credit to one or more deposit accounts or payment systems. An automated system ensures that requested funds are available in a customer's one or more lines of credit and electronically deposits the requested funds into one or more designated deposit accounts or payment systems. An automated system provides a means for customers to manage lines of credit, setup transfer transactions, define rules governing transfers and view transactional history. The automated system, in network connection with the lending organization's backend systems, may authenticate customer identities and credit accounts as well as insure that the requested funds are available for transfer into a deposit account.

  • TRANSACTION PREDICTION MODELING METHOD

    The present invention provides database systems configured for creating and utilizing a transactions predictive model using a computer, the database system including: a database management system (DBMS) for handling transactions in the database system, the DBMS including a prediction component for generating the transactions predictive model; a database workload table for capturing commands associated with the transactions, the commands utilized for generating the transactions predictive model; database data for providing data in response to the transactions; and a prediction model database for storing the transactions predictive model, where the prediction component is configured for generating a generalized statement for each statement corresponding with the transactions, identifying a sequence of transactions of the transactions, creating a transaction class based on the sequence of transactions, identifying a current transaction, and then calculating probabilities between transactions, where each statement includes at least a database command.

  • System And Method For Managing Records Using Information Governance Policies

    An invention for creating and managing, within an Information Governance framework, a Master Classification of Record Classes (MC-RC) and associated file plans within an entity and across jurisdictions where its sub-entities operate. The file plans are used to organize the records of the entity and apply governance rules to them, for example, retention and disposition. The invention may use two integrated modules. The first is an Information Governance Policy Module (IGPM) which may be used to create a MC-RC for the entity and corresponding governance rules for each of the Record Classes. The second is an Information Governance Control Module (IGCM) which allows administrators in the sub-entities to create and manage file plans using the Record Class definitions in the IGPM, associate these file plans with jurisdictions, and manage the sub-entity's records within them.

  • SYSTEMS AND METHODS FOR ONLINE SECURITIZATION OF ILLIQUID ASSETS

    A system for online securitization of illiquid assets is disclosed. The system includes a physical storage media storing instructions for administering online securitization of illiquid assets and a processor. The processor is configured to execute the instructions for performing a method of receiving, over a network and from an owner of an illiquid asset, information relating to the illiquid asset. The processor is further configured for analyzing the information relating to the illiquid asset; securitizing the illiquid asset; generating an offer for purchasing an interest in the illiquid asset. The processor is further configured for transmitting the offer to an investor over the network; receiving payment from the investor, the payment being provided in consideration for the interest in the illiquid asset; and executing a transaction to transfer the interest in the illiquid asset to the investor.

  • USING ACCOUNTING DATA BASED INDEXING TO CREATE A PORTFOLIO OF FINANCIAL OBJECTS

    A system, method and computer program product creates an index based on accounting based data, as well as a portfolio of financial objects based on the index where the portfolio is weighted according to accounting based data. A passive investment system may be based on indices created from various metrics. The indexes may be built with metrics other than market capitalization weighting, price weighting or equal weighting. Non-financial metrics may also be used to build indexes to create passive investment systems. Additionally, a combination of financial non-market capitalization metrics may be used along with non-financial metrics to create passive investment systems. Once the index is built, it may be used as a basis to purchase securities for a portfolio. Specifically excluded are widely-used capitalization-weighted indexes and price-weighted indexes, in which the price of a security contributes in a substantial way to the calculation of the weight of that security in the index or the portfolio, and equal weighting weighted indexes. Valuation indifferent indexes avoid overexposure to overvalued securities and underexposure to undervalued securities, as compared with conventional capitalization-weighted and price-weighted.

  • TRACKING OFF-LINE COMMERCE AND ONLINE ACTIVITY

    Systems and methods for tracking a user's off-line commerce and merging that data with online activity are disclosed. The off-line transaction data is associated with off-line purchases of a user and includes identification information that can be used to identify the user. A scone or modified cookie is created that includes the off-line transaction data. Online activity can also be tracked and merged with the user's off-line commerce data.

  • SYSTEM AND METHOD FOR DATA MANAGEMENT AND FINANCIAL TRANSACTION CATEGORIZATION

    A transaction management system includes a database system configured to receive and store data for a plurality of financial transactions, the data for the plurality of financial transactions being associated with a plurality of financial accounts of a user. The system further includes a server system coupled to the database system and configured to categorize the plurality of financial transactions into a plurality of categories, the categories including merchant categories and payment method categories, the server system being further configured to provide a plurality of user interfaces to the user, each user interface providing a display of a different portion of the plurality of financial transactions, each user interface configured to enable a user to select a link configured to direct the user to an image of a check associated with one of the plurality of financial transactions; and categorize the financial transaction into a one of the merchant categories.

  • CUSTOMIZABLE FINANCIAL INSTITUTION APPLICATION INTERFACE

    Embodiments of the invention are directed to a system, method, or computer program product for a customizable financial application. This invention allows a user to customize an application, such as an application for a mobile smart phone, to display information or perform actions using data stored by a financial institution, including data about the customer and more general financial data.

  • COMPUTER MANAGED RETIREMENT FUND AND METHOD FOR GENTERATING INCREASED REVENUE STREAM

    A retirement fund program managed by computer software requiring an initial fixed investment and producing an ever increasing revenue stream to a group of participant investors organized by life expectancy and grouped into an investment partnership. A financial portfolio is created from the monies invested by each investor and is used to manage high quality securities to generate income for the partnership. Periodically, the surviving members of the partnership are entitled to receive the revenue generated from the portfolio, which statistically will increase as fewer participant investors survive. The partnership can purchase term life insurance on each participant investor, so that the initial investment can be returned to the estate of a participant investor if the participant investor becomes deceased during the program. Upon termination of the program, all remaining assets will be distributed pro rata among the living participant investors of the investment partnership.

  • FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS

    The FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS ("FMS") transform requests for on-demand and flexible monetization and related services via FMS components into currency transfers, purchase receipt notifications, social networking communications and transaction analytics reports. In some embodiments, the FMS obtains a request from a computing device of a merchant to process a user purchase checkout by a user from a point of sale device. In some embodiments, the request may include a merchant identifier. The FMS may determine that the merchant is authorized to obtain servicing of the request to process the user purchase checkout, by querying a database using the merchant identifier. The FMS may generating a user interface customized to the merchant and the point of sale device, upon determining that the merchant is authorized to obtain the service of the request, and provide the customized user interface to process the user purchase checkout by the use

  • FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS

    The FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS ("FMS") transform requests for on-demand and flexible monetization and related services via FMS components into currency transfers, purchase receipt notifications, social networking communications and transaction analytics reports. In some embodiments, the FMS obtains a request from a computing device of a merchant to process a user purchase checkout by a user from a point of sale device. In some embodiments, the request may include a merchant identifier. The FMS may determine that the merchant is authorized to obtain servicing of the request to process the user purchase checkout, by querying a database using the merchant identifier. The FMS may generating a user interface customized to the merchant and the point of sale device, upon determining that the merchant is authorized to obtain the service of the request, and provide the customized user interface to process the user purchase checkout by the use

  • METHOD FOR THE QUASI REAL-TIME PREPARATION AND CONSECUTIVE EXECUTION OF A FINANCIAL TRANSACTION

    The present invention relates to a method for the quasi real-time preparation and consecutive execution of a financial transaction between a payor and a payee. The method comprises the steps of: receiving a transaction order by a payor selected financial service provider from the payor; identifying the payor's account based on the transaction order; performing a comparison check of the transaction order and the payor's account, wherein when the comparison check is successful executing a balance transformation on the payor's account in accordance with the transaction order; establishing a communication channel with a payee-selected entity; notifying the payee-selected entity of the result of the balance transformation over the communication channel, and completing the financial settlement of the financial transaction.

  • SYSTEM AND METHOD FOR PAYMENT TRANSFER

    A system and method for payment transfer between a paying party and a recipient party. Optionally and preferably, payment transfer is made by using a prepaid card, which has many security and administrative advantages. Other payment methods may also optionally be used. Also, optionally a plurality of micropayments are provided to a plurality of recipients. The paying party is optionally a media content provider while the recipient party is optionally a user who provides content, although many different combinations of paying/recipient parties may optionally be implemented.

  • METHOD AND APPARATUS FOR FACILITATING PAYMENT VIA MOBILE NETWORKS

    A method and apparatus for facilitating payments for transactions, via mobile devices and mobile telecommunications networks, is disclosed. In an embodiment, a product provider is provided with a code, such as a QRcode, which contains or references payment details for purchase of the product. A mobile user of the application scans the code and is connected to their internet banking application. The payment details are transferred to the internet banking application and the mobile user confirms that the transaction should proceed. Payment is made without any secure details being provided to the product provider

  • DEMAND DEPOSIT ACCOUNT PAYMENT SYSTEM

    A method and system for processing DDA payment transactions including generating a private virtual identifier, associating the private virtual identifier with a DDA, and generating a public virtual identifier associated with the private virtual identifier. The method can also include distributing the public virtual identifier to consumers, receiving a DDA payment request from a billing entity including the public virtual identifier, retrieving the private virtual identifier in response to receipt of the public virtual identifier, and processing the DDA payment request using the private virtual identifier to facilitate payment to the billing entity on behalf of the consumer. The method and system also authenticates the identity of a user during a transaction.

  • SYSTEM AND METHOD FOR TRANSFERRING A LINE OF CREDIT BALANCE TO A CASH ACCOUNT

    The present invention provides an automated system configured to facilitate transfers of cash value from one or more lines of credit to one or more deposit accounts or payment systems. An automated system ensures that requested funds are available in a customer's one or more lines of credit and electronically deposits the requested funds into one or more designated deposit accounts or payment systems. An automated system provides a means for customers to manage lines of credit, setup transfer transactions, define rules governing transfers and view transactional history. The automated system, in network connection with the lending organization's backend systems, may authenticate customer identities and credit accounts as well as insure that the requested funds are available for transfer into a deposit account.

  • METHOD AND SYSTEM FOR DEVISING AND TRACKING MEASURES FOR ORGANIZATIONAL VALUE CREATION

    A method and a system disclosed for determining measures being taken across an organization based on the performance specifications of a cross-level value-chain. The method includes designing the value-chain. The value-chain defines various strategic business goals, such as customer goals, financial goals, and differentiator goals of the organization. Once the value-chain is designed, outcome, input, and moderating parameters are identified to realize the strategic business goals. Thereafter, the performance of the value-chain designed to realize the strategic business goals is simulated. The performance of the value-chain is simulated in one or more scenarios to output uncertainties in achieving the strategic business goals. Thereafter, the probability of achieving the strategic business goals is determined. Subsequently, one or more measures to be taken in the organization are generated based on the have been method described above.

  • MULTI-ATTRIBUTE AUCTIONING METHOD AND SYSTEM

    A method and system for auctioning an auction item in a multi-attribute auction. A winning bid is selected by determining a secret value function indicative of acceptable combination of attribute values for the auction owner. The auction owner computing device or the auction server generates alternate combinations of attribute values based at least in part on the secret value function. To generate the alternate combinations of attribute values at least some of the combinations of attribute values are perturbed so as to hinder the bidders from deriving or finding the secret value function. The auction server informs the bidders, via a bidder interface of a client computing device, about the alternate combinations of attribute values and required biding directions. The bidder can offer a bid in a next round based on the alternate combinations of attribute values, in a progressive manner and without knowledge of the secret value function.

  • Process and system for pricing and processing weighted data in a federated or subscription based data source

    A system and method for collecting handling processing and calculating values weights and prices for observations entered by one or a plurality of sources about one or a plurality of targets related to a researchable model or a theory or practice.

  • METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS

    A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component.

  • METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS

    A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component.

  • SYSTEM AND METHOD FOR AUTOMATED GENERATION OF COMMUNICATIONS INVOLVING PRODUCTS OR SERVICES

    Methods and systems for preparing combined communications having a plurality of client communication sections is presented. Initial interest in a product or service offer is received from a client at a computer system. The computer system generates a communications that combine host information and one or more client communication sections, wherein the client communication sections contain a second offer for the product or service.

  • RURAL SERVICES PLATFORM

    A middleware platform is executable by a computer to receive a request for a service, the service provided by a service application in communication with the middleware platform. The middleware platform determines, via a device adaptation component of the middleware platform, capabilities of a device subject to the request. The middleware platform selects an interface having a format that is compatible with the capabilities of the device, and provides the interface to the device in a format corresponding to the capabilities, accesses the service application responsive to the request, processes the request, and returns a response, via the interface, to the device responsive to the processing.

  • DELIVERY CONTROL FOR EMAIL COMMUNICATED AMONG MULTIPLE END USER COMMUNICATION DEVICES

    An exemplary method is implemented by end-user communication devices for processing the receipt of an email wherein a received email comprises a digital packet having a header and a user data segment. The user data segment contains a user message and an acknowledgement command where the acknowledgement command conveys a request from an originating device to acknowledge receipt of the subject email. The received user message is prevented from being displayed on a screen of the first end-user communication device of content until input is entered authorizing a reply to the acknowledgement request. Upon receiving the authorization: a reply email with an acknowledgement is automatically generated by the first end-user communication device and transmitted to the originating device corresponding to the subject email; the content of the corresponding received user message is displayed on the screen of the first end-user communication device; and the first end-user communication device stores a read message indicator having a value that represents that the reply email was authorized and the content of the received email enabled to be displayed.

  • Delivery control for messages communicated among end user communication devices

    An exemplary method implemented by a first end-user communication device originates an electronic communication. User input is received to create information to be conveyed by the transmission of a digital packet having a header segment and a user data segment. The user data segment contains a user message and an acknowledgement command where the acknowledgement command conveys a request to a recipient device to authorize the sending of an acknowledgement reply message. Authorization of the sending of the reply acknowledgement message serving as a condition precedent to the recipient being able to view the corresponding received user message. Displaying a composition screen by which the user inputs the user message and can insert the acknowledgement command in a command field in the user data segment prior to transmission of the digital packet. The digital packet with the user data segment that contains the user message and the acknowledgement command is transmitted to a recipient device. Another embodiment includes a method implemented by a first end-user communication device that receives and processes such electronic communication.

  • Delivery control for messages communicated among end user communication devices

    An exemplary method implemented by a first end-user communication device originates an electronic communication. User input is received to create information to be conveyed by the transmission of a digital packet having a header segment and a user data segment. The user data segment contains a user message and an acknowledgement command where the acknowledgement command conveys a request to a recipient device to authorize the sending of an acknowledgement reply message. Authorization of the sending of the reply acknowledgement message serving as a condition precedent to the recipient being able to view the corresponding received user message. Displaying a composition screen by which the user inputs the user message and can insert the acknowledgement command in a command field in the user data segment prior to transmission of the digital packet. The digital packet with the user data segment that contains the user message and the acknowledgement command is transmitted to a recipient device. Another embodiment includes a method implemented by a first end-user communication device that receives and processes such electronic communication.

  • SYSTEM AND METHOD FOR BENCHMARKING WEB ACCESSIBILITY FEATURES IN WEBSITES

    The disclosed embodiment relates to a system and method for rating the accessibility of websites to disabled users. The method comprises receiving, with a computing device, ratings information from at least one user, the ratings information including ratings values of at least one website based on at least one web accessibility parameter, determining, with a computing device, a web accessibility score for at least one of the websites, wherein the web accessibility score is based on the ratings information received from the at least one user, and creating, with a computing device, a web accessibility index including the web accessibility score of at least one of the websites based on the determined web accessibility score. The disclosed embodiment also relates to a system and computer-readable code that can be used to implement the exemplary methods.

  • SELECTABLE ACTIVATION/DEACTIVATION OF FEATURES OF APPLICATIONS ON END USER COMMUNICATION DEVICES

    Control of access to sets of features implemented by an enhanced services program operating on a first end-user communication device is provided. Predetermined access commands are stored in memory of the end-user communication device where each command has associated stored data that determines a corresponding set of features of the first enhanced services program to which the user is permitted access. On receipt of such a command, first stored data corresponding to the command is identified where the first stored data identifies a first set of features of the enhanced services program to which the user is provided access. The determination of whether to permit user access to a certain feature of the first enhanced services program is based on whether the certain feature is part of the first set of features. Generation of the access command by a server is another embodiment.

  • Automatic expiration of messages communicated to an end user communication device

    An exemplary method is implemented by an electronic device for transmitting a data message to at least a first end-user communication device. Data that forms a user message for conveyance to a first end-user communication device and a first value are received under the control of an enhanced services application program. A digital packet is formed with a header segment and a user data segment. The user data segment is formed under the control of the enhanced services application program and contains a first command and the user message, the first command representing that the user message is to be automatically deleted by the recipient first end-user communication device. The first command includes the first value that represents how long until the user message will be automatically deleted by the first end-user communication device. The digital packet is transmitted to the first end-user communication device.

  • CUSTOMER SERVICE APPLICATION FOR A PORTABLE ELECTRONIC DEVICE

    A customer service application resident on a user's portable electronic device is used to get information about a service and also request the service offered by a store. The customer service application can check for nearby stores when launched. Once the user is deemed to be within the service area of the store, the store host server computer can start sending information about various products, servers, events, or workshops offered by the store. The user can use the customer service application to request product or service help from store employees, register for an event/workshop, reserve a product for pickup, etc.

  • Consistent set of interfaces derived from a business object model

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction.

  • Document destruction management

    A computer implemented method, apparatus, and computer usable code for shredding objects. The apparatus has a number of components including a receptacle that is configured to receive objects. A shredding unit is connected to the receptacle, wherein the shredding unit selectively destroys the objects placed into the receptacle. An object detector is used to detect the presence of an object in the receptacle. An object identifier identifies objects placed into the receptacle. The apparatus also has a memory and a connector. The connector is used to establish a communications link with a data processing system. A controller in the apparatus stores identifications of objects identified by the object identifier in the memory and sends a signal to the shredding unit to control shredding of the objects.

  • Optimizing a language/media translation map

    A mechanism is provided for optimizing a language/media translation map. A user input is received comprising an input language/media selection, one or more output languages/medias selections, and a threshold for at least one of accuracy or throughput of one or more requested language/media translations. For each of the one or more requested language media translations, a determination is made as to whether an accuracy or throughput of a selected one of an automated translation system or a human resource translator is above the threshold for the at least one of accuracy or throughput. Responsive to the accuracy or throughput being above the threshold, either the selected one of the automated translation system or the selected one of the human resource translator is added to a multiple language/media translation map. An optimized multiple language/media translation map is then generated for use by a translation orchestration module in the data processing system.

  • Ensuring security of connection between thin client and client blade

    A method and system for ensuring security and preventing intrusion in a connection between a thin client and a client blade. An encrypted keep-alive protocol is conducted between the client blade and the thin client. The client blade issues keep-alive protocol messages and monitors for keep-alive protocol acknowledgments from the thin client. If a failure in receiving a keep-alive protocol acknowledgment from the thin client is detected and the failure is not due to a momentary glitch in the keep-alive protocol, then a command is generated to enter the client blade in a particular state (e.g., a hard power off state). The command is based on a "privilege mask" which includes code that specifies an action to be performed (i.e., enter a particular state) by the client blade. Based on the action performed by the client blade, the client blade provides different levels of security or protection against intrusion.

  • Method, apparatus, and article of manufacture for solving linear optimization problems including linear programming problems and systems of linear equations

    In accordance with one embodiment of the invention, a method of optimizing a linear equation optimality problem subject to a change of conditions can be accomplished. The method can include determining a first set of conditions for the linear equation optimality problem; initiating processing by a computer to optimize the optimality problem in accordance with the first set of conditions; determining a second set of conditions different from the first set of conditions; continuing processing with the computer to optimize the optimality problem by using the second set of conditions without having to re-initialize the computer.

  • System and method for finding business transformation opportunities by using a multi-dimensional shortfall analysis of an enterprise

    A method and system for determining one or more shortfalls of one or more business components by multiple dimensions for business transformation, in one aspect define a plurality of shortfall types associated with a plurality of business components, define a plurality of dimensions of the plurality of business components, construct a shortfall assessment model for the plurality of dimensions, load a business model associated with the plurality of business components, compute shortfall assessment by performing a daisy chain analysis using the shortfall assessment model and the business model for said plurality of shortfalls and associated shortfall types, and presenting the shortfall assessment using visualization.

  • Using visual techniques to manipulate data

    Various types of data can be collected into a data set and related content and/or related concepts across the data in the data set and/or across search histories can be displayed as a visual representation. The related content/concepts can be presented as a function of incremental revealing of relationships. After reviewing the visual representation, a user can customize the data set and relationships by specifically excluding a related data segment. The visual representation can be applied across multiple searches or other obtained data. Through interaction with the visual representation, a user can drill down into common linkages of the data to more narrowly focus on a subset of the data and/or to refocus a search result and/or to provide annotations.

  • Extended web enabled multi-featured business to business computer system for rental vehicle services

    An Internet enabled, business-to-business computerized transaction system is disclosed in its preferred embodiment for use in providing rental car services for high volume users and comprises an Internet web portal through which the high volume user may access a plurality of service providers including an integrated business computer network for at least one rental vehicle service provider. The rental vehicle services provider computer network is configured to interconnect a geographically diverse plurality of branch offices, cataloguing their available rental vehicles and schedules for same as well as handling all transactional data relating to its business. The Internet web portal provides ubiquitous connectivity and portability for a multi-level business organization who regularly places high volumes of rental purchases with its business partner and also those other service providers who may or may not have the same integrated business computer system and software. Utilizing the method and apparatus of the present invention large volumes of rental transactions may be placed, monitored, altered during performance, and closed out with financial accounting and payment being made virtually without human intervention.

  • Extended web enabled multi-featured business to business computer system for rental vehicle services

    An Internet enabled, business-to-business computerized transaction system is disclosed in its preferred embodiment for use in providing rental car services for high volume users and comprises an Internet web portal through which the high volume user may access a plurality of service providers including an integrated business computer network for at least one rental vehicle service provider. The rental vehicle services provider computer network is configured to interconnect a geographically diverse plurality of branch offices, cataloguing their available rental vehicles and schedules for same as well as handling all transactional data relating to its business. The Internet web portal provides ubiquitous connectivity and portability for a multi-level business organization who regularly places high volumes of rental purchases with its business partner and also those other service providers who may or may not have the same integrated business computer system and software. Utilizing the method and apparatus of the present invention large volumes of rental transactions may be placed, monitored, altered during performance, and closed out with financial accounting and payment being made virtually without human intervention.

  • User interfaces for efficient trade entry and management

    A plurality of user interfaces for facilitating efficient order management and post-trade processing in an electronic trading system are disclosed. A first user interface comprises a plurality of client buttons and a broker button. Selection of a client button shifts the user interface to a client-perspective mode in which all actions and views are from the selected client's point of view. Selection of the broker button shifts the user interface to a client-neutral mode in which the broker may enter orders in the market without specifying any particular client. An analogous user interface for use by a trader is also described. A second user interface, referred to as a blotter, is also provided that comprises four distinct views for displaying "pending," "completed," "all," and "annulled" trades. Preferred embodiments for utilizing the disclosed user interfaces to process different classes of pending trades are also described.

  • Techniques for bar code assisted positioning

    A method and apparatus for generating a bar code and for using a bar code to assist with positioning are provided. The method for generating a bar code to assist with positioning includes obtaining Global Positioning System (GPS) assistance data, generating a bar code with the GPS assistance data encoded therein, and displaying the bar code. The method for using a bar code to assist with positioning includes scanning a bar code, obtaining GPS assistance data from the scanned bar code, receiving and locking onto one or more GPS signals by using the GPS assistance data, and determining a position using the received one or more GPS signals.

  • System and method for improved SAP communications

    Improved SAP communications are provided by a terminator node that acts as termination on one end of the communication channel and links to the SAP server on the other end. A server device is also provided that optionally implements this terminator node and monitors communications between the SAP server and a client. The server device optionally condenses SAP application screens. The server device also simulates certain required responses to the SAP server to allow for a persistent session between a client and the SAP server when the actual connection may be intermittent. The server device also records required records for a transaction and provides them to a client for offline processing and then synchronizes stored offline transaction data from the client with the SAP server. The system may include a client device that optionally implements the terminator node to communicate with the server device or the SAP server.

  • Managing consistent interfaces for automatic identification label business objects across heterogeneous systems

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to an automatic identification label, an automatic identification label device, and/or an automatic identification label device observation business object

  • Document management system and method

    A document management system includes a document. One or more of a plurality of map-files of the document correspond(s) with a step of a multi-step workflow associated with the document. A random nonce is generated for each of the steps of the multi-step workflow except for an initial step of the multi-step workflow. Each of the random nonces i) is incorporated as a map-file entry into a respective one of the plurality of map-files corresponding with a step of the multi-step workflow that directly precedes the step of the multi-step workflow for which the random nonce is generated and ii) is used to perform a nonce-based initiating operation a respective one of the plurality of map-files corresponding with the step of the multi-step workflow for which the random nonce is generated.

  • Distributed globally accessible information network implemented to maintain universal accessibility

    A distributed information network is constructed for gathering information from sites distributed across a globally accessible computer network, i.e., the Internet. The distributed information network preferably includes a root server that stores a list of multiple distributed sites each represented by metadata. A network browser delivers an information search request to the root server, which in response develops a profiled information search request. The information provider of each of the distributed sites stores metadata corresponding to information content that is retrievable in response to the profiled information search request for search results derivable from the information content to which the metadata correspond. A profiled information communication link between the root server and each of the multiple distribution sites enables formation of a path for delivery of the search results to a destination site, from a site or sites represented by the metadata of the profiled information search request.

  • Business Network Access Protocol for the Business Network

    The present disclosure describes methods, systems, and computer program products for providing access to business network data. One method includes identifying a logical graph from business network linked graph data to be transformed into a resource graph, the logical graph including at least two nodes and at least one edge connecting a pair of nodes and defining a connection between the nodes. Each node is converted into a resource. A resource graph associated with the logical graph can be generated, where generation comprises, for each identified node, associating at least one attribute associated with the identified node as a resource attribute of the corresponding resource, adding at least one node connected to the identified node via an edge in the logical graph as a resource attribute of the corresponding resource, and dissolving at least one connection between the identified node and at least one other entity in the logical graph.

  • ELECTONIC PROCESSING OF CONTEXT-AWARE BUSINESS EVENTS

    Various embodiments of systems and methods for electronic processing of context-aware business events are described. According to one aspect, business events are enriched with more business semantics by encapsulating business contexts that define the events' producing environment. The produced context-aware events include a structure of context items describing with system and application parameters the producing environment when the events originally happened. During reconstruction of the structure of context items, the contextual business information is retrieved and can be included in the business events to provide the event consumer with more information about the business event.

  • BUSINESS TRANSACTION CAPTURE AND REPLAY WITH LONG TERM REQUEST PERSISTENCE

    Business transaction capture and replay with long term request persistence, including: creating, in response to a request for execution of a business transaction, an original business object representing the request for execution of the business transaction, the original business object comprising a data structure supported by the business transaction; executing the business transaction including: executing, in dependence upon the original business object, one or more business processes of the business transaction, including, for each business process, storing results of the business process as an interim business object; maintaining, in a failed request business object, the original business object and each interim business object; identifying a failure of a business process; and including, in the failed request business object, error information describing the failed business process; and re-executing the business transaction using the failed request business object.

  • TRACING SOFTWARE EXECUTION OF A BUSINESS PROCESS

    Various embodiments of systems and methods to trace an execution of a business process are disclosed. Business rules and corresponding business objects required to execute the business process are identified and rendered to receive an input. Based upon detecting a trigger to execute the business process, the business rules and the corresponding business objects are processed to compute a process-resultant for the business process. A process-path of the computed process-resultant is traced by tracing key-strings corresponding to the business objects involved in computing the process-resultant, to generate a trace-resultant. The trace-resultant is parsed by determining versioned business objects and business information of the key-strings, to derive a business definition for the traced business objects involved in computing the process-resultant. Based upon the business definition, a comprehensive trace-map comprising a compilation of the process-resultant to execute the business process is generated.

  • WEB BROWSER-BASED BUSINESS ACTIVITY MONITORING

    A system including: at least one computing device adapted to monitor business activities, by performing actions including: collecting business activity data at a first web browser, the business activity data indicating at least one aspect of a business transaction conducted at a second, distinct web browser; sorting the business activity data according to one or more sorting parameters; and providing a report including the sorted business activity data at a uniform resource locator (URL) accessible to both the first web browser and the second, distinct web browser.

  • BUSINESS CONTENT HIERARCHY

    A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy.

  • BUSINESS CONTENT HIERARCHY

    A harvesting method and system is provided. The method includes extracting from a plurality of documents, content. The content is published in external glossaries. The content is arranged in a business content hierarchy and the business content hierarchy is published in a specified format. The business content hierarchy is enabled with respect to a plurality of projects. The content and business content hierarchy are updated and the updated content is arranged in the updated business content hierarchy.

  • QUERY LANGUAGE BASED ON BUSINESS OBJECT MODEL

    Methods and apparatus, including computer program products, are provided for providing a query language based on a model. In one aspect, there is provided a computer-implemented method. The method may include receiving a first query; generating, based on a model including metadata representing a data structure, a second query specific to the data structure stored in a database; and sending the second query to the database. Related apparatus, systems, methods, and articles are also described.

  • COMMUNICATION SYSTEM AND METHOD BETWEEN A HOME BUYER, SELLER, STRATEGIC BUSINESS SOURCE, AND LENDER

    A computerized system and method are presented for exchanging information between a buyer, a seller, a lender, and a strategic business source. The system permits sellers, lenders and strategic business sources to input buyers that are then submitted for activation. The buyers use the system to obtain information about items, while the sellers, lenders, and strategic business sources make consistent contact with the buyer in order to work with the buyer. Information about the buyers is shared with the sellers, lenders, and strategic business sources. A business plan is input into the system for the financial institution employing the lender while another business plan is input for the seller institution employing the seller. Activity on the computerized system is calculated for compliance with the business plan. Feedback is provided to management relating to whether the business plan is being met.

  • COMMUNICATION SYSTEM AND METHOD BETWEEN A HOME BUYER, SELLER, STRATEGIC BUSINESS SOURCE, AND LENDER

    A computerized system and method are presented for exchanging information between a buyer, a seller, a lender, and a strategic business source. The system permits sellers, lenders and strategic business sources to input buyers that are then submitted for activation. The buyers use the system to obtain information about items, while the sellers, lenders, and strategic business sources make consistent contact with the buyer in order to work with the buyer. Information about the buyers is shared with the sellers, lenders, and strategic business sources. A business plan is input into the system for the financial institution employing the lender while another business plan is input for the seller institution employing the seller. Activity on the computerized system is calculated for compliance with the business plan. Feedback is provided to management relating to whether the business plan is being met.

  • Mobile and Web Commerce Platform for delivery of Business Information and Service Status Management

    Described in this invention are the methods and system platform for businesses and organizations to publish and communicate to consumers business information and real-time dynamic service information in a central and intuitive place on mobile devices and computers that is based on a generic, configurable, extensible, and vendor-independent mobile-commerce and electronic-commerce cloud based Software as a Service solution. The consumer and service providers use mobile device application client software and computer-based web browser client application software that are part of the platform solution to access and manage the information stored on the platform. The platforms allow service providers to perform functions such as: publish business information, real-time dynamic service status information, manage loyalty programs, manage customer marketing programs, and take online reservations. The platform allows consumers to perform functions such as: search for the business or service near a geo-location, obtain for the above-mentioned information, and subscribe for the programs.

  • FEDERATED BUSINESS CONFIGURATION AND SCOPING

    Methods and apparatus, including computer program products, are provided for scoping a software installation. Related apparatus, systems, methods, and articles are also described.

  • System and Method of Business Risk Based Authorization

    A system and method of authorizing access in a computer system. The method includes receiving a request to use the computer system, reading authorization data associated with the user, and denying the request according to the authorization data. The method further includes determining a business process risk associated with the request and comparing a characteristic of the request and the business process risk. The method further includes authorizing the request to use the computer system by the user when the business process risk exceeds the characteristic. In this manner, the delay involved in performing the normal access provisioning process is avoided for situations in which the business risk exceeds the cost of the delay

  • System and Method of Business Risk Based Authorization

    A system and method of authorizing access in a computer system. The method includes receiving a request to use the computer system, reading authorization data associated with the user, and denying the request according to the authorization data. The method further includes determining a business process risk associated with the request and comparing a characteristic of the request and the business process risk. The method further includes authorizing the request to use the computer system by the user when the business process risk exceeds the characteristic. In this manner, the delay involved in performing the normal access provisioning process is avoided for situations in which the business risk exceeds the cost of the delay

  • METHOD AND APPARATUS FOR IMPROVING BUSINESS PROCESS MANAGEMENT SYSTEMS

    A business process management system comprises a core process model and a highly configurable extension component. The extension component includes extension process elements and functionality that are configured to operate in connection with a subset of core process elements so as to execute a particular business process management function on the subset. The extension process elements and functionality are entirely separate from and are not a part of the process flow containing the subset of core process elements such that the business process management function does not affect or influence the core process flow. Examples of business process management functions configurable for such purposes include service level agreements, business process monitoring and KPI collection, policy compliance and trend prediction.

  • BUSINESS PROCESS CHANGE CONTROLLER

    The present disclosure involves computer-implemented methods, software, and systems for managing a transition between business process models. A computer-implemented method includes in parallel with a first business process model, instantiating, using at least one hardware processor, a second business process model, instantiating a temporary exit process step of a set of temporary exit process steps associated with the first business process model and a temporary entry process step of a set of temporary entry process steps associated with the second business process model, coupling an exit transition rule of a set of exit transition rules associated with the first business process model to the first business process model, and activating the exit transition rule after activating the second business process model.

  • COMMUNICATION SYSTEM AND METHOD BETWEEN A HOME BUYER, SELLER, STRATEGIC BUSINESS SOURCE, AND LENDER

    A computerized system and method are presented for exchanging information between a buyer, a seller, a lender, and a strategic business source. The system permits sellers, lenders and strategic business sources to input buyers that are then submitted for activation. The buyers use the system to obtain information about items, while the sellers, lenders, and strategic business sources make consistent contact with the buyer in order to work with the buyer. Information about the buyers is shared with the sellers, lenders, and strategic business sources. A business plan is input into the system for the financial institution employing the lender while another business plan is input for the seller institution employing the seller. Activity on the computerized system is calculated for compliance with the business plan. Feedback is provided to management relating to whether the business plan is being met.

  • BUSINESS TO BUSINESS NETWORK MANAGEMENT EVENT DETECTION AND RESPONSE SYSTEM AND METHOD

    A network management system includes an automatic reconnaissance (resolution) component which, in one embodiment, includes four main operational components, namely a real-time parse/analysis component, a data merge component, a data analysis component, and a response capability component. These four components interact to provide real-time event recognition and response. The network management system efficiently receives, parses, and comprehends a large amount of event and statistical data that could be indicative of a network systems operation failure with resultant response actions initiated through such an infrastructure improving mean time to recovery.

  • BUSINESS TO BUSINESS NETWORK MANAGEMENT EVENT DETECTION AND RESPONSE SYSTEM AND METHOD

    A network management system includes an automatic reconnaissance (resolution) component which, in one embodiment, includes four main operational components, namely a real-time parse/analysis component, a data merge component, a data analysis component, and a response capability component. These four components interact to provide real-time event recognition and response. The network management system efficiently receives, parses, and comprehends a large amount of event and statistical data that could be indicative of a network systems operation failure with resultant response actions initiated through such an infrastructure improving mean time to recovery.

  • BUSINESS MANAGEMENT DEVICE

    The invention provides a system that not only calculates incomes and expenses on a really existing in-house organization (for example, Amoeba (trademark)), but also calculates incomes and expenses on a virtual in-house organization that is predetermined for each product or each service. Compensation-for-cooperation data generating means 4 refers to a compensation-for-cooperation table 8 to determine a specific virtual in-house organization that is identified in given income data, a specific really existing in-house organization that conducts corporative buying and selling with the specific virtual in-house organization, and a monetary value of the corporative buying and selling. Compiled management data generating means 6 compiles compensation-for-cooperation data and accounting data including income data and expense data on a really existing in-house organization basis to calculate a profit, thus to generate first compiled management data on a really existing in-house organization basis. In addition, the compiled management data generating means 6 compiles the compensation-for-cooperation data and the accounting data including the income data and the expense data on a virtual in-house organization basis to calculate a profit, thus to generate second compiled management data on a virtual in-house organization basis.

  • EXTERNALLY AUGMENTED ASSET MANAGEMENT

    A system for externally augmented asset management is disclosed. According to one embodiment, information from a first reporting source about an asset is received. In addition, information from a second reporting source about the asset is also received. Information from a third reporting source about at least one environmental condition is also received. A database is then populated with the information from the first reporting source, the information from the second reporting source and the third reporting source such that information from the first reporting source, the information from the second reporting source and the third reporting source can be collected or accessed from the database.

  • EXTERNALLY AUGMENTED ASSET MANAGEMENT

    A system for externally augmented asset management is disclosed. According to one embodiment, information from a first reporting source about an asset is received. In addition, information from a second reporting source about the asset is also received. Information from a third reporting source about at least one environmental condition is also received. A database is then populated with the information from the first reporting source, the information from the second reporting source and the third reporting source such that information from the first reporting source, the information from the second reporting source and the third reporting source can be collected or accessed from the database.

  • VIRTUAL BADGE, DEVICE AND METHOD

    A system, method, and device comprising a virtual badge are disclosed. A virtual badge can be displayed on a cell phone or in another linked portable device, and for security purposes, has images which can be scanned, and the capability to alternate colors and/or self-destruct on a pre-set schedule. Whether for after a disaster or for daily use, the system uses cell phones or mobile devices loaded with specialized software. Using plugin technologies, the system optionally can enable field collected photos and notes on customizable forms to be mapped, tracked, and time/date stamped--including in a 100% disconnected environment. A modifiable virtual badge can aid in inventory, accountability, organization, and efficiency. The system can be employed by the "Whole Community"--citizens, businesses, not-for-profits, and government agencies--for social media, business, cleanup, insurance adjusters, or personnel focused on day to day operations or on mitigation, preparedness, response, and recovery.

  • MOBILE TERMINAL MANAGEMENT SERVER, AND MOBILE TERMINAL MANAGEMENT PROGRAM

    A mobile terminal management server in which ERP runs provides a search condition designation screen (for example, a slip search screen) used to designate a search condition in response to the request from mobile terminals; receives a search condition designated through the search condition designation screen on which selection item arrangement circle display regions to display selection item arrangement circles, in each of which a plurality of selection items selectable to designate the search condition are arranged substantially on a circumference, are provided from the mobile terminals; searches for report data satisfying the received search condition by referring to a process flow table; and provides search result data (a search result list display screen) representing the searched report data to the mobile terminals as a search result.

  • ENHANCED BUSINESS PLANNING AND OPERATIONS MANAGEMENT SYSTEM

    In one embodiment, the method includes receiving one or more criteria defined as a planning trigger. In a further aspect, the method includes mapping the one or more criteria to a corresponding action plan. In response to recording criterion defined as a planning trigger, an action plan corresponding to the recorded criterion is invoked. Further, the method includes communicating the action plan to a selected set of contributors. Further, the method involves, receiving data specified in the action plan from the set of contributors and consolidating the business data received from the one or more contributors. In a further aspect, the method involves, extrapolating the received business data for generating extrapolated business data for one or more prognostic scenarios for facilitating business planning and operations

  • ENHANCED BUSINESS PLANNING AND OPERATIONS MANAGEMENT SYSTEM

    In one embodiment, the method includes receiving one or more criteria defined as a planning trigger. In a further aspect, the method includes mapping the one or more criteria to a corresponding action plan. In response to recording criterion defined as a planning trigger, an action plan corresponding to the recorded criterion is invoked. Further, the method includes communicating the action plan to a selected set of contributors. Further, the method involves, receiving data specified in the action plan from the set of contributors and consolidating the business data received from the one or more contributors. In a further aspect, the method involves, extrapolating the received business data for generating extrapolated business data for one or more prognostic scenarios for facilitating business planning and operations

  • INTEGRATED INCIDENT MANAGEMENT FOR HYBRID LANDSCAPES

    Systems and methods to provide integrated incident management for hybrid landscapes are provided. In example embodiments, an incident ticket is received, at a communication hub, from a first component of a first landscape indicating an incident. A second component in a second landscape is determined to which to route incident information including the incident ticket. The determination of the second component is based on an attribute extracted from the incident ticket. The incident information is transmitted to the second component by the communication hub. A solution for the incident ticket is received from the second component based on the second component having the solution or is received from a component of a service backbone based on the component of the service backbone having the solution by the communication hub, and the solution is forwarded to at least one of the first component or the second component

  • MANAGEMENT OF BUSINESS PROCESSES

    First business process data obtained from a first trading participant includes a set of transaction messages having a first data format in accordance with a first protocol for conducting business transactions used by the first trading participant. A virtual trading participant receives fictitious business process data from the first trading participant and acknowledging the fictitious business process data and replying to the first trading participant that the fictitious business process data has been acknowledged. Operational characteristics and a connectivity of a currently trading participant connected to a process management platform accessible via an interconnection fabric are tested, by utilizing the virtual trading participant to determine if the data defining individual business processes is in a uniform format understood by a process management platform. The virtual trading participant is utilized to ensure compatibility with an identified version of the uniform format.

  • ONLINE VEHICLE BUYING SYSTEMS AND METHODS

    A method for online vehicle buying includes: transmitting vehicle inventory data for displaying an inventory of vehicles that are available for purchase from a dealership; in response to input indicating a desire to purchase one of the vehicles from the dealership, transmitting reward redemption data for displaying a first webpage for inputting information regarding an accrued monetary reward; determining an available award amount based on the information input to the first webpage; transmitting affiliation data for displaying a second webpage for inputting information regarding an affiliation with at least one of a manufacturer of the vehicles and a business affiliate of the manufacturer; determining an available discount based on the information input to the second webpage; determining a price for the one of the vehicles based on the available award amount and the available discount; and transmitting sale summary data for displaying the price of the one of the vehicles.

  • METHODS AND APPARATUS TO SAMPLE MARKETS BASED ON AERIAL IMAGES

    Methods and apparatus to sample markets based on aerial images are disclosed. An example method includes identifying a first geographic area to be sampled for a first product, the identifying being based on an aerial image, estimating a density of the first product in the first geographic area, and calculating a sampling rule to be used in sampling the first geographic area for the first product.

  • RISK ASSESSMENT AND MANAGEMENT

    Embodiments of the invention relate to identification of risks in a brand commodity supply chain. Risks are centrally assessed and a single holistic image of the risk assessment is provided. Specifically, risks are assessed vertically and horizontally across the supply chain, brand, and commodity. Risk identification techniques may be applied to the identified risks to reduce supply chain disruption and to enable continued manufacturing. .

  • METHOD AND SYSTEM FOR ASSESSING RISK

    The present disclosure relates to a risk module that determines an important set of a plurality of potential risk events for an organization, each member of the important set of potential risk events having no more than a selected probability of occurring but at least a selected significance of impact on the organization, whether a mitigation strategy exists for each member of the important set of the plurality of potential risk events, when a mitigation strategy exists for a selected member of the important set, determining a corresponding mitigated significance of impact for the selected member of the important set of the plurality of potential risk events, and a more important set of the plurality of potential risk events.

  • GRAPHICAL REPRESENTATIONS OF CORPORATE NETWORKS

    Systems and methods for graphical representation of corporate networks are provided. The graphical representation may be used to present corporate information, e.g., corporate reporting structure, employee keywords, etc. The graphical representation may include nodes whose sizes are based on the corporate data, such as the number of direct reports, or frequencies of keywords appearances. The graphical representation may also include multi-layer corporation information. Further, the graphical representation may present a subset of corporate data in response to user inputs.

  • MOBILE COMPUTING DEVICE

    This is described a method of access control for a mobile computing device having a touch-screen, the method comprising: receiving a signal indicating an input applied to the touch-screen; matching the signal against a library of signal characteristics to identify a user of the mobile computing device from a group of users of the mobile computing device; receiving an additional input to the mobile computing device; using both the signal and the additional input to authenticate the user; and if authenticated, allowing access to the mobile computing device in accordance with configuration data for the authenticated user.

  • DISTRIBUTED DEMAND-BASED STORAGE QUALITY OF SERVICE MANAGEMENT USING RESOURCE POOLING

    A system and method for providing quality of service (QoS) for clients running on host computers to access a common resource uses a resource pool module and a local scheduler in at least one of the host computers. The resource pool module operates to compute an entitlement of each client for the common resource based on a current capacity for the common resource and demands of the clients for the common resource. In addition, the resource pool module operates to assign a portion of the computed current capacity for the common resource to a particular host computer using the computed entitlement of each client running on the particular host computer. The local scheduler operates to allocate the portion of the computed current capacity among the clients running on the particular host computer.

  • CONTENT MANAGEMENT SYSTEM AND METHOD OF MANAGING RETENTION AND DISPOSITION OF CONTENT ITEMS

    In specific embodiments, a content management system operable on one or more microprocessors comprises a content repository storing a plurality of content items and a content usage analyzer. The computer is usable to perform one or more operations on one or more contents items stored in the content repository, and when an operation is performed on a content item, audit data is captured related to the operation. The content usage analyzer is configured to identify an idle content item within the content repository based on the captured audit data.

  • APPARATUS AND METHODS FOR REINFORCEMENT LEARNING IN ARTIFICIAL NEURAL NETWORKS

    Neural network apparatus and methods for implementing reinforcement learning. In one implementation, the neural network is a spiking neural network, and the apparatus and methods may be used for example to enable an adaptive signal processing system to effect focused exploration by associative adaptation, including providing a negative reward signal to the network, which may increase excitability of the neurons in combination with decrease in excitability of active neurons. In certain implementations, the increase is gradual and of smaller magnitude, compared to the excitability decrease. In some implementations, the increase/decrease of the neuron excitability is effectuated by increasing/decreasing an efficacy of the respective synaptic connections delivering presynaptic inputs into the neuron. The focused exploration may be achieved for instance by non-associative potentiation configured based at least on the input spike rate. The non-associative potentiation may further comprise depression of connections that provide input in excess of a desired limit.

  • APPARATUS AND METHODS FOR REINFORCEMENT LEARNING IN ARTIFICIAL NEURAL NETWORKS

    Neural network apparatus and methods for implementing reinforcement learning. In one implementation, the neural network is a spiking neural network, and the apparatus and methods may be used for example to enable an adaptive signal processing system to effect focused exploration by associative adaptation, including providing a negative reward signal to the network, which may increase excitability of the neurons in combination with decrease in excitability of active neurons. In certain implementations, the increase is gradual and of smaller magnitude, compared to the excitability decrease. In some implementations, the increase/decrease of the neuron excitability is effectuated by increasing/decreasing an efficacy of the respective synaptic connections delivering presynaptic inputs into the neuron. The focused exploration may be achieved for instance by non-associative potentiation configured based at least on the input spike rate. The non-associative potentiation may further comprise depression of connections that provide input in excess of a desired limit.

  • DYNAMICALLY RECONFIGURABLE STOCHASTIC LEARNING APPARATUS AND METHODS

    Generalized learning rules may be implemented. A framework may be used to enable adaptive signal processing system to flexibly combine different learning rules (supervised, unsupervised, reinforcement learning) with different methods (online or batch learning). The generalized learning framework may employ average performance function as the learning measure thereby enabling modular architecture where learning tasks are separated from control tasks, so that changes in one of the modules do not necessitate changes within the other. Separation of learning tasks from the control tasks implementations may allow dynamic reconfiguration of the learning block in response to a task change or learning method change in real time. The generalized learning apparatus may be capable of implementing several learning rules concurrently based on the desired control application and without requiring users to explicitly identify the required learning rule composition for that application.

  • ACTIONABLE BUSINESS ENTITY OPERATING MODEL

    Illustrative embodiments include a method, system, and computer program product for creating an actionable business environment model. A business object is instantiated according to a business entity subclass, the business entity subclass representing an asset in a business environment. An event object is instantiated, wherein an event represented in the event object applies to the business object. A decision object is instantiated, wherein the decision object includes logic to take an action in response to the event. An action object is instantiated, wherein the action object includes logic to respond to the event by interacting with the business object. The business object is made actionable by relating the business object with a combination of the event object, the decision object, and the action object using a declarative statement. The actionable business object is added to a model, thereby creating the actionable business model.

  • Trusted Communication Network

    A system includes a processing node configured to send authorized inbound messages to registered enterprise networks. An authorized message is a message that includes trusted source indicia. Trusted source indicia indicates that the message was sent by one or more of the processing node or an authenticated message transfer node associated with one of the registered enterprise networks. The system may further include an administration node configured to maintain registration of a plurality of message transfer nodes associated with the enterprise networks. A method includes receiving outbound messages from an authenticated message transfer node of an enterprise network, screening the messages for threats to determine whether to send the messages to associated recipients, applying a first message identifier to each message, wherein the first message identifier can be used to track the message and, for each message, sending the message to the associated recipient if no threats are detected in the message.

  • SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURE RESOURCES

    A system and method for controlling access to a secure resource in a device are disclosed. In some embodiments, the device may include a processor capable of receiving a first request from a first application of a plurality of applications executable by the processor, where the first request requests access to the secure resource, and the first request identifies the plurality of applications. In response to the first request, the processor is capable of generating a ticket associated with the secure resource and with each of the plurality of applications, and then storing the ticket in a memory. After receiving a second request from a second application requesting access to the secure resource, the processor is capable of granting the second application access to the secure resource, if the ticket associated with the secure resource exists and if the ticket is associated with the second application.

  • Client Side Security Management for an Operations, Administrations and Maintenance System for Wireless Clients

    An Operations, Administration, and Maintenance (OA&M) 16 provides security for managed resources on a wireless client device 10 at many levels of granularity, from the entire device, to subsystems, to software and hardware components, services and applications, down to individual attributes.

  • BREAKPOINT INFORMATION MANAGEMENT METHOD AND BREAKPOINT INFORMATION MANAGER

    Embodiments of the present invention relate to a breakpoint information management method and a breakpoint information manager. The breakpoint information management method includes: obtaining, according to a query parameter obtained from a current application program and stored breakpoint information of at least one application program, breakpoint context information corresponding to the query parameter; calculating interest information according to the breakpoint context information; and returning the interest information to the current application program so that the current application program plays a corresponding electronic file. With the breakpoint information management method and the breakpoint information manager provided in the present invention, breakpoint information is deeply analyzed to obtain interest information, so that the breakpoint information is reused; and electronic files satisfying a user's interest characteristics are played for the user according to the interest information, thereby enlarging the application scope of the breakpoint information.

  • CONSISTENT INTERFACE FOR FINANCIAL INSTRUMENT IMPAIRMENT EXPECTED LOSS ANALYTICAL RESULT

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a financial instrument impairment expected loss analytical result business object.

  • APPARATUS AND METHOD FOR MONITORING AND COMMUNICATING DATA ASSOCIATED WITH A PRODUCT

    A condition monitoring system includes a radio frequency transponder module including an RFID chip having a first memory, and an antenna; at least one sensor module that monitors data related to the condition of a product and includes a second memory for storing the monitored data; and a communication interface that couples the at least one sensor module to the RFID chip of the radio frequency transponder module so that the sensor module is operative to communicate with the RFID chip by way of the communication interface and the RFID chip first memory is operative to store data related to the product.

  • CATALYTIC CONVERTER COMPONENT AND PROCESS FOR ITS MANUFACTURE

    In a process for manufacturing a catalytic converter component, a ceramic unit is used that has been prepared by extruding green ceramic product through a die to form an extrusion having a honeycomb substrate structure in which tubular passages extend along the extrusion, the passages bounded by walls dividing adjacent passages from one another. The unit is obtained by cutting off a length of the extrusion and curing and firing it. The process further comprises flowing insulation material as by injecting mastic insulation from one end of the unit into selected ones of the elongate passages to fill the selected passages throughout their length, the insulating material then being cured. The passages are selected so that the cured insulation material forms an internal thermal insulating barrier between a core zone of the unit and a radially outer zone of the unit.

  • METHOD AND SYSTEM FOR FACILITATING DATA ACCESS AND MANAGEMENT ON A SECURE TOKEN

    A system for facilitating data access and management on a smart card is provided. According to one exemplary aspect of the system, a storage architecture is provided in the smart card which allows data stored thereon to be shared by multiple parties. Access to data stored on the smart card is controlled by various access methods depending on the actions to be taken with respect to the data to be accessed.

  • Method and System to Impose Enterprise Security Mechanisms throughout a Mobile Application Lifecycle

    Particular embodiments provide a method to authenticate a user of an application running on a mobile operating system (OS) installed on a mobile device, wherein the mobile OS invokes callback methods of the application upon making changes to an execution state of the application. Code embedded into the application causes the application to communicate with a management agent installed in the mobile OS upon invocation of a hooked callback method. Upon invocation of the hooked callback method, the embedded code assesses whether the user should be provided an authentication challenge prior to enabling the application to run in the foreground, and presents the authentication challenge if necessary. Finally, the embedded code returns execution control from the management agent back to the application wherein the application executes the at least one callback method prior to running in the foreground.

  • INDEXED SECURITY FOR USE WITH DATABASES

    A computer-implemented method for providing security in a relational database hosted by a first server, and configured to interact with a second server, includes associating a first ownership vector with an object in the relational database, detecting a change to the object, and associating a second ownership vector with the object in response to detecting the change to the object.

  • TESTING DEVICE FOR REMOVING CUSTOMER PERSONAL INFORMATION FROM AN ELECTRONIC DEVICE

    A testing device, system, and method for removing customer personal information (CPI). The testing device includes a user interface for communicating information and receiving user input. The testing device also includes interfaces operable to communicate with the one or more electronic devices. The testing device also includes a memory configured to store a libraries providing information for removing CPI from electronic devices including a number of makes, models, and configurations. The testing device also includes logic operable to utilize the libraries to analyze CPI included on the one or more electronic devices, record an identification of the one or more electronic devices in response to determining the CPI is present on the one or more electronic devices, remove the CPI from the one or more electronic devices in response to determining the CPI is present on the one or more electronic devices, and report the identification and CPI information of the one or more electronic devices in response to determining the CPI was present on the one or more electronic devices.

  • SYSTEMS AND METHODS FOR MANAGING LOCATION DATA AND PROVIDING A PRIVACY FRAMEWORK

    A computer-implemented method includes providing a user interface on an internet-protocol (IP) connected mobile device, the user interface configured to receive a user input corresponding to one or more data privacy parameters for geo-location data, and controlling a transferring of geo-location data to and from each of a plurality of mobile applications on the mobile device based on the user input. A change in one or more of the data privacy parameters can change how geo-location data is provided to each of the plurality of applications and can affect location data accuracy, location data reporting frequency, geo-functions, and more. The user interface can be configured to allow a user to view, manage, and delete a personal location history. Furthermore, one or more profiles can be associated with one or more of the plurality of mobile applications, where each of the one or more profiles is assigned individual data privacy parameters.

  • MANAGEMENT DEVICE, COMPUTER-READABLE RECORDING MEDIUM, AND MANAGEMENT METHOD

    A management device includes an authentication unit and a control unit. If authentication information is received from a first device, the authentication unit included in the management device authenticates the received authentication information by using multiple pieces of authentication information that are stored in the first storing unit. If the authentication performed by the authentication unit is successful, the control unit included in the management device executes a login to the second device by using a single piece of login information that is stored in the second storing unit.

  • GUIDED PAGE NAVIGATION

    Configuring a set of guided documents for operation of a business activity based on a workflow for the activity, industry expertise, and a plurality of models of source data that is relevant to the business activity, wherein points of entry to access the guided documents are organized around one or more industry-specific data dimensions.