­
­
­
­

Inventi Rapid - SMEs

Patent Watch

  • Compensation system for selected paths in hierarchical networks

    A compensation system is provided which assigns compensations to nodes in specific paths within a hierarchical network. The system receives a task and a compensation method from an original poster and generates an original, uniquely identifiable posting, which can be viewed by various contacts. If any of these contacts is unwilling or unable to achieve the task, then they can generate a derived uniquely identifiable posting based on the original posting, which can then be viewed by one or more of their contacts. This process is repeated until an Nth level contact achieves the task, forming a hierarchical network of contacts with the original poster as a root node of the network. The contacts in the chain of contacts from the original poster to the achieving contact are compensated according to the stated compensation method. Contacts not in the achieving contact path are compensated differently from those in the path.

  • Virtual world property disposition after real-world occurrence

    A method and system provides transactions and arrangements in virtual world environments. A user can participate in transactions to acquire virtual property and related virtual rights. In some implementations, real-world and virtual parties can be involved in possible transfers of various types of virtual property and virtual property rights.

  • System and method for linking multiple entities in a business database

    Embodiments of a system and method are described for determining whether an applicant is a multiple-business owner and for providing information related to multiple-business owners to a financial service provider or other client. According to one embodiment, a computing system is provided to collect and store business data and identify business owners associated with multiple business records.

  • Flexible and adaptive accrual method and apparatus for calculating and facilitating compliance with taxes and other obligations

    A computer-based system and method calculates and facilitates revenue accrual, for making larger, less frequent payments of estimated taxes or other obligations. Payer preferences are applied to satisfy variable payment intervals, amounts, and available resources. The obligation, required payments, and set-aside schedules are recalculated as needed, under payer and/or system control. Excess accruals are minimized; set-aside schedules are configurable. The system may be self-contained, handheld, or accessed remotely. Automatic datalinks move information and command fund transfers from the payer's bank, to accrue funds and make payments to other accounts. A service host may support a plurality of payers to make set-asides and payments at various levels as needed, on an individual or batch basis, including individual taxpayer enrollment for batch file tax payments by service providers. Some embodiments can be embedded to enhance the capabilities of other systems.

  • Robotic prescription filling system

    A self-contained, fully automated system for dispensing medicants into vials. Prescriptions are entered using a built-in workstation. Vials of several sizes are each contained in preloaded cassettes. Upon command from a computer, a vial is released and labeled with the prescription information. A robotic system moves the labeled vial to the output chute of one of many automated dispensing units that has previously been commanded to count a predetermined number of tablets, pills, or capsules. The filled vial is robotically moved to an optional capping station where a cap is applied if needed. The vial is then moved to an output region where it is sorted with other prescriptions for a customer. The prescription may be checked using the built-in computer workstation. Optionally, the automated dispensing system may be linked to pharmacy control software.

  • Flexible and adaptive accrual method and apparatus for calculating and facilitating compliance with taxes and other obligations

    A computer-based system and method calculates and facilitates revenue accrual, for making larger, less frequent payments of estimated taxes or other obligations. Payer preferences are applied to satisfy variable payment intervals, amounts, and available resources. The obligation, required payments, and set-aside schedules are recalculated as needed, under payer and/or system control. Excess accruals are minimized; set-aside schedules are configurable. The system may be self-contained, handheld, or accessed remotely. Automatic datalinks move information and command fund transfers from the payer's bank, to accrue funds and make payments to other accounts. A service host may support a plurality of payers to make set-asides and payments at various levels as needed, on an individual or batch basis, including individual taxpayer enrollment for batch file tax payments by service providers. Some embodiments can be embedded to enhance the capabilities of other systems.

  • Electronic enterprise analysis apparatus

    An automated and interactive system that facilitates efficient capitalization/liquidation and monitoring of private and publicly-traded enterprises through a network-driven marketplace is disclosed. The system may be comprised of a dynamic process for enterprise characterization, a customizable computational engine that utilizes statistical reference information to quantify a multi-factor scoring value for each unique enterprise, a customizable system for investor-users to filter, rank, and screen enterprise prospects, a customizable system for monitoring the performance of enterprises, an integrated internal system for electronic communication between market participants, and an empirical feedback system that provides a dynamic knowledge base of statistical reference information for various computational components of the invention.

  • System, method, and computer program product for automatically posting transactions associated with a transaction account into a general ledger

    A system, method, and computer program product are used to automatically post substantially all transactions associated with a transaction account into a general ledger. Recent transaction data associated with the transaction account is received. The recent transaction data is compared (e.g., matched) to stored and categorized transaction data in the general ledger to determine a new transaction data portion of the recent transaction data. The new transaction data portion is categorized. The categorized new transaction data portion is stored in the general ledger.

  • Dispenser apparatus and a dispensing system for dispensing a liquid from a bottle

    A dispenser apparatus and a dispenser system for dispensing a liquid from a bottle having a neck portion consisting of a housing formed with a flow conduit therethrough in fluid communication with the liquid within the bottle, the flow conduit having an inlet conduit, an outlet conduit and a substantially cylindrical cavity positioned between the inlet conduit and the outlet conduit, a flow wheel positioned in the cavity, the flow wheel having a central axis and a plurality of blade elements extending outwardly relative to the central axis, a flow sensor positioned adjacent to the flow wheel and the cavity for detecting movement of the plurality of blade elements of flow wheel, an electromagnetic valve positioned proximate to the outlet conduit, the electromagnetic valve having an actuation unit outside of the outlet conduit, a valve member inside the outlet conduit, and a spring member biased against the valve member within the outlet conduit, the valve member rotatable between a closed position and an open position upon the actuation of the actuation unit, and a microprocessor operatively connected to the flow sensor, the microprocessor programmed for actuating the actuation unit between the closed position and the open position and for measuring the volume of liquid flowing through the flow conduit via the flow wheel. The dispenser system further consisting of a remote computer unit for communicating a control signal to each of the plurality of dispenser apparatuses, the control signal controlling the volume of liquid to be dispensed from one or more of the plurality of bottles.

  • Colonial storm shutter with improved strength and fabricability

    A colonial storm shutter assembly with improved impact resistance includes shutter blade elements having a corrugated configuration that exhibits superior structural strength and bending resistance while providing an attractive face. Triple, double and single shutter blade elements overlap to provide enhanced structural strength and simplify assembly. Side frame structures include a reinforcing portion on the outside wall which provides increased strength particularly in the miter joint with top and bottom frame structures. A storm bar includes a center storm bar clip which bolts to the side frames of two shutter panels when in the closed configuration to provide enhanced structural rigidity. Center fastening angles are bolted to the side and top/bottom frames at both the top and bottom where the two shutter panels meet in the closed configuration to provide further structural strength and resistance to opening.

  • Method and apparatus for dynamically managing vending machine inventory prices

    The present invention is a method and apparatus for automatically managing a price of a product in a vending machine. The method and apparatus is disclosed for implementing dynamic price adjustments at various times including after stocking, after a sale of a product and at periodic intervals. The method generally includes the steps of updating inventory data, including a quantity of a product, accessing price management data associated with the product, and determining the price of the product. According to the method and apparatus of the present invention, the determined price of the product is based on the price management data and the inventory data. The determined price is then stored in a memory of the apparatus and displayed for customers. The apparatus may be a vending machine, a processing module within the vending machine, or an external module remotely transmitting the dynamically adjusted price to a vending machine.

  • Systems and methods for web site editing interfaces

    A system and method for maintaining a Web site is disclosed that includes browsing to a Web page to be edited, automatically downloading a source file for the Web page including related files associated with display of the Web page, editing the source file, and automatically publishing the edited source file to a file transfer server associated with the Web site including the related files associated with the display of the Web page.

  • XML instrumentation interface for tree-based monitoring architecture

    An interface for providing monitoring information from any monitored component to a central monitoring system in which an XML document is created according to a DTD conforming to a tree-structured monitoring architecture and then is made available to the central monitoring system either by posting it as an HTTP message or filing it in a designated directory, where it can be periodically polled by the central monitoring system. An initial long-form XML document can be used to completely specify the monitoring tree for the monitored component, and then subsequent short-form XML documents can be posted with current data corresponding to the monitoring tree elements themselves. An XML processor at the central monitoring system converts the XML document contents and applies them to a standard interface which has previously been available directly to fully conforming components.

  • Method and system for knowledge based community solutions

    Systems and methods for providing knowledge and online access to knowledge resources to users are disclosed. Features embodied in various embodiments include: 1) linking members of communities with mentors and subject matter experts that can help the member derive value from their online experience; 2) assessing and delivering online knowledge at a participant level; 3) pushing knowledge resources to participants based on the participant profile; 4) creating and updating an online personal growth plan; and 5) tracking value by participant or by community, as required by community leadership.

  • Content-restricted editing

    A system and method are disclosed to restrict editing in a tag-delimited, multi-formatted document comprising parsing the multi-formatted document, identifying a plurality of tags responsive to the parsing, generating a revised document based on the multi-formatted document, inserting one or more restriction tags into the revised document delimiting non-editable content defined by one or more of the plurality of tags, and restricting edit functions of a page editor responsive to the page editor reading the one or more restriction tags.

  • Multithreading implementation for flops and register files

    A processor having a multithreading memory system, including a main memory element, at least one special memory element and a controller. The main memory element may be configured to receive a data signal and a control signal. The at least one special memory element may be associated with the main memory element. Further, the special memory element may be configured to receive an output signal from the main memory element. The controller may be configured to receive an output signal from the at least one special memory element and a scan input signal. Further, the controller may be further configured to select one of the output signal from the at least one special memory element and the scan input signal based on an advance thread signal. The selected one of the output signal from the at least one special memory element and the scan input signal may be forwarded to the main memory element as the control signal.

  • Method and system for optimizing vehicle diagnostic trees using similar templates

    A method and system for optimizing vehicle diagnostic trees using similar templates is provided. Diagnostic trees may be modified to include diagnostic code tips or further suggestions or instructions indicating what tool to use or how to use the tool. The diagnostic tree cab be modified or customized by comparing the diagnostic tree to previously modified diagnostic trees corresponding to similar vehicles, and suggestions within the previously modified tree that are referenced within a library can be linked to the diagnostic trees.

  • SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SERVING AN APPLICATION FROM A CUSTOM SUBDOMAIN

    In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for serving an application from a custom subdomain can enable improved data security, enhanced system performance, optimized resource utilization, etc.

  • BATTERY POWERED DEVICE WITH DYNAMIC AND PERFORMANCE MANAGEMENT

    A computing device operates over a range of voltages and frequencies and over a range of processor usage levels. The computing device includes at least a variable frequency generator, a variable voltage power supply and voltage supply level and clocking frequency management circuitry. The variable frequency generator is coupled to the processor and delivers a clock signal to the processor. The variable voltage power supply is coupled to the processor and delivers voltage to the processor. The voltage supply level and clocking frequency management circuitry adjust both the voltage provided by the variable voltage power supply and the frequency of the signal provided by the variable frequency generator. The computing device includes a temperature sensor that provides signals indicative of the temperature of the processor and the voltage supply level and clocking frequency management circuitry adjusts the voltage and/or the clocking frequency provided by the variable voltage power supply. The computing device may also include a fan controlled by the voltage supply level and clocking frequency management circuitry, the fan adjusting the temperature of the processor when activated. In cold weather applications, the computing device may further include a heater controlled by the voltage supply level and clocking frequency management circuitry that raises the temperature of the processor when activated.

  • DISPERSED STORAGE UNIT SELECTION

    A dispersed storage device for use within a dispersed storage network operates to select a set of dispersed storage units for storage of a data object by slicing an encoded data segment of a data object into error coded data slices, determining slice metadata for the error coded data slices, determining memory characteristics of dispersed storage units capable of storing the error coded data slices and selecting the set of dispersed storage units for storing the error coded data slices based on the slice metadata and the memory characteristics.

  • STARTING VIRTUAL INSTANCES WITHIN A CLOUD COMPUTING ENVIRONMENT

    Embodiments of the present invention provide a system that leverages the Operational Support System(s) (OSS) and Business Support system(s) (BSS) of a (e.g., public) computing Cloud with a service to automate virtual instance restarts. For example, under embodiments of the present invention, a failed virtual instance is detected within the Cloud computing environment, and a request for a new virtual instance is received in response thereto. Upon receiving the request, an entitlement of a user associated with the failed virtual instance will be tested. Specifically, a set of authentication calls and checks are deployed in accordance herewith to ensure the integrity of the requests, as well as the authorization of the requester for the resource use. Assuming testing is passed, a countdown timer associated with the failed virtual instance will be decreased. When the countdown timer reaches a predetermined threshold (e.g., zero), the new virtual instance will be started, the failed virtual instance will be terminated, and the countdown timer will be reset/restarted by instance. Integration with BSS further allows for monitoring and charging of service usage as well as opening the option for pay-as-you-go charges for the restart service itself.

  • Contention Analysis in Multi-Threaded Software

    A contention log contains data for contentions that occur during execution of a multi-threaded application, such as a timestamp of the contention, contention length, contending thread identity, contending thread call stack, and contended-for resource identity. After execution of the application ends, contention analysis data generated from the contention log shows developers information such as total number of contentions for particular resource(s), total number of contentions encountered by thread(s), a list of resources that were most contended for, a list of threads that were most contending, a plot of the number of contentions per time interval during execution of the application, and so on. A developer may pivot between details about threads and details about resources to explore relationships between thread(s) and resource(s) involved in contention(s). Other information may also be displayed, such as call stacks, program source code, and process thread ownership, for example.

  • METHODS AND SYSTEMS FOR AUTHORIZING AN EFFECTOR COMMAND IN AN INTEGRATED MODULAR ENVIRONMENT

    Methods and systems are provided for authorizing a command of an integrated modular environment in which a plurality of partitions control actions of a plurality of effectors is provided. A first identifier, a second identifier, and a third identifier are determined. The first identifier identifies a first partition of the plurality of partitions from which the command originated. The second identifier identifies a first effector of the plurality of effectors for which the command is intended. The third identifier identifies a second partition of the plurality of partitions that is responsible for controlling the first effector. The first identifier and the third identifier are compared to determine whether the first partition is the same as the second partition for authorization of the command.

  • WIRELESS ROUTER SYSTEM AND METHOD

    A wireless router employing a technique to couple a plurality a host services or host systems and a plurality of wireless networks. A method to route data items between a plurality of mobile devices and a plurality of host systems through a common wireless router. A point-to-point communication connection is preferably established between a first host system and a common wireless router, a mobile network message at a mobile device is generated, the mobile network message is transmitted via a wireless network to the common wireless router which in turn routes a data item component of the mobile network message to the appropriate host service.

  • Method For Automating Onboarding Application Developers To Sales Distribution Channel

    A method for automating an onboarding process for a developer onto a service delivery hub operated by a network operator includes providing the developer with information relating to use of the service delivery hub, receiving data relating to the developer, approving the developer, certifying an application provided by the developer, and configuring the application for use. A method for synchronization with the service delivery hub is also provided.

  • Cloud Based Firewall System And Service

    A cloud-based firewall system and service is provided to protect customer sites from attacks, leakage of confidential information, and other security threats. In various embodiments, such a firewall system and service can be implemented in conjunction with a content delivery network (CDN) having a plurality of distributed content servers. The CDN servers receive requests for content identified by the customer for delivery via the CDN. The CDN servers include firewalls that examine those requests and take action against security threats, so as to prevent them from reaching the customer site. The CDN provider implements the firewall system as a managed firewall service, with the operation of the firewalls for given customer content being defined by that customer, independently of other customers. In some embodiments, a customer may define different firewall configurations for different categories of that customer's content identified for delivery via the CDN.

  • SYSTEMS AND METHODS FOR DETECTING AND INVESTIGATING INSIDER FRAUD

    Systems, methods, and apparatus, including computer programs encoded on computer storage media, for detecting insider fraud. One method includes identifying one or more insider threat detection rules for an enterprise and obtaining behavioral data for an enterprise insider from multiple behavioral data sources. The enterprise is associated with a plurality of enterprise insiders, and the behavioral data describes at least one action of the first enterprise insider. The method further includes determining a threat score for the first enterprise insider based on the behavioral data for the first enterprise insider and one or more of the insider threat detection rules and initiating, when the threat score satisfies a threat threshold, one or more protective actions.

  • METHODS AND APPARATUS FOR AUTOMATED WORKFLOW MANAGEMENT

    Methods and apparatus for automated management of workflow that allows for the automatic creation, organization, and updating of workflows upon the receipt or designation of one or more messages.

  • VIDEO COMMUNICATIONS SYSTEM

    A content server for use in a video content storage system for storing and distributing video content to system users, the server comprising: input means for communicating, across a communications network, with a system user at a remotely located terminal; a data store for storing video content; and output means for streaming stored video content across the communications network to a system user upon receipt of a request to viewed the stored content.

  • LONG SHELF LIFE MILK AND MILK-RELATED PRODUCTS, AND A PROCESS AND MILK PROCESSING PLANT FOR THEIR MANUFACTURE

    The present invention relates to long shelf life milk or milk-related products as well as to a method for producing such long shelf life products and a milk processing plant for the implementation of the method. The method of the invention is characterised by the combination of physical separation of microorganisms and a high temperature treatment for at most 200 msec, and the resulting product has been found to have advantageous properties.

  • RIM OR RIM PORTION MADE OF COMPOSITE MATERIAL

    A wheel rim having an axis of rotation, the rim including a first element in the form of a section of a solid of revolution about the axis, made in a single unitary piece from composite material and including a first end and a second end distinct from one another. The first element is made by pultrusion and constitutes, between the first end and the second end, a section of a solid of revolution having an angular arc greater than 350.degree., the composite material of the first element includes fibers embedded in a thermosetting matrix, the fibers constituting at least 50% of the weight of the first element.

  • GENERATING USER INTERFACES

    An interface generator 6 generates a user interface for a mobile communication device 2 by providing, at step S2, a menu of functional components to a website owner 5 and receiving an indication of which of the functional components are selected for inclusion in the user interface from the website owner, at step S3. When the interface generator 6 receives a request for the user interface from the mobile communication device 2, at step S7, it delivers the user interface to the mobile communication device, at step S8, for display by the mobile communication device 2. The generated user interface includes the selected functional components and selection of a functional component included in the displayed user interface by a user of the mobile communication device 2 causes the mobile communication device 2 to carry out a task.

  • PROTECTING FILE ENTITIES

    There is described a computer system to provide a filesystem, and to export a consumer directory of the filesystem for access by a consumer application over a network. The system has a protected directory. Protection controls restrict performance of file management activities on file entities of the protected directory by the consumer application.

  • SYSTEM, METHOD AND COMPUTER PROGRAM FOR PREPARING DATA FOR ANALYSIS

    A method of preparing data for analysis, comprising the steps of receiving an initial data set including a plurality of records, each of the plurality of records including an identifier attribute and an associative attribute that identifies a further one or more records; receiving the further one or more records identified by the associative attribute in each of the plurality of records; and associating the further one or more records with the initial data set to form a final data set.

  • METHOD FOR ACCESS CONTROL TO A SCRAMBLED CONTENT

    A method for access control to a digital scrambled content distributed to a set of installed reception terminals including one master terminal and at least one slave terminal dependent on the master terminal. In the method the slave terminal systematically or occasionally returns at least one item of information about the access condition to the master terminal through a point-to-point link, to enable the master terminal to control access of the slave terminal to the content.

  • WEB APPLICATION PROCESS

    A computer network and corresponding method for providing, as part of a web portal session, access for a user to a web application running on a server. The network comprises first and second traffic managers connected via an intermediate web server. The first traffic manager comprises interface means for receiving from the user, as part of the portal session, a request for access to the web application and for passing the request to the intermediate web server; for forwarding to the second traffic manger. The second traffic manager comprises interface means for receiving the request from the first traffic manager via the intermediate web server and for passing the received request to the web application.

  • Management of Local Applications in Local and Remote Desktops in a Server-Based Computing Environment

    In a computing environment comprising multiple desktop windows displayed to a user of a client computer, a method to manage client application windows associated with applications configured to run on the client computer is provided. The method includes detecting user input regarding movement of a client application window from a client desktop window to a remote desktop window, removing a task bar icon associated with the client application window from a task bar displayed in the client desktop window, instructing the remote computer to generate a drone of the client application window in the remote desktop window and to display the task bar icon associated with the client application window in a task bar of the remote desktop window, and displaying the client application window always on top of all other windows. The method may further include applying appropriate clipping region to the client application window.

  • APPARATUS AND METHOD FOR ANALYSIS OF DATA TRAFFIC

    An apparatus for defining an index in an index file representing a volume of traffic a computer system comprises a data processing module. The data processing module defines an index corresponding to a traffic data sequence and a first parameter of the traffic data sequence in a first record of the index file. An apparatus for evaluating a candidate signature representing a pre-determined class of traffic in a computing system compares a signature data sequence with entries in an index file and determines whether the candidate signature satisfies an evaluation criterion.

  • METHODS AND APPARATUSES FOR DEVICE COMMUNICATIONS

    Apparatuses and methods to establish communications between devices. In one embodiment, a method of sharing data includes, without requiring a proxy device and without requiring a server to enable communications, receiving a request transmitted by a requesting device, authenticating the requesting device, and establishing a connection between the requesting device and a requested device. The requesting device and the requested device are dissimilar communication devices having dissimilar communications standards.

  • SOYBEAN VARIETY A1024238

    The invention relates to the soybean variety designated A1024238. Provided by the invention are the seeds, plants and derivatives of the soybean variety A1024238. Also provided by the invention are tissue cultures of the soybean variety A1024238 and the plants regenerated therefrom. Still further provided by the invention are methods for producing soybean plants by crossing the soybean variety A1024238 with itself or another soybean variety and plants produced by such methods.

  • Targeted television advertisements selected on the basis of an online user profile and presented with television programs or channels related to that profile

    In an automatic, computer-implemented method, a selected television advertisement is presented automatically in association with a television program or channel. A relationship is identified between an online user profile and the television program or channel, and the television advertisement is selected based at least in part on information from the online user profile. The selected television advertisement is presented, in association with the television program or channel that is identified as being related to the online user profile, via a set-top box having a corresponding set-top box identifier that is associated with the online user profile.

  • SYSTEMS AND METHODS FOR PROVIDING CONTENT AND SERVICES ON A NETWORK SYSTEM

    Systems and methods for managing and providing content and services on a network system. Aspects of the invention include location-based determination of network content and services that may be provided to client computers. Other aspects of the invention include authorization and authentication components that determine access rights of client computers. Additional aspects include systems and methods for redirecting client computers to different network content. The disclosed systems and methods may be used in numerous network system applications.

  • WEB-BASED ASSET MANAGEMENT

    The method and system of the present invention provides an improved technique for replacing, implementing and managing computer-related assets. A technician accesses the World Wide Web through a user's computer. The information resident on the computer, including information regarding the computer and the user's preferences, are downloaded to a remote storage medium through the World Wide Web. Once downloaded, all information may be removed from the user's computer. Subsequently, the technician accesses another computer such as, for example, a new computer that has been assigned to the same user. The technician accesses the World Wide Web through the new computer and downloads the information previously stored on the remote storage medium. This information can then be used to install the user's prior applications, settings and preferences on the new computer.

  • Methods for enhancing the production and consumer traits of plants

    The invention provides methods for producing plants, plant materials and seeds that have multiple desirable attributes for consumers of these products, as well as for commercial plant growers, and to improved plants, plant materials and seeds that are produced by these methods. These inventive methods provide hybrid plants, plant materials and seeds having the mutant shrunken-2i (sh2-i) allele incorporated into their genomes, preferably sequentially along with one or more other mutant alleles, such as the sugary-1 (su1), sugary enhancer-1 (se1) and/or shrunken-2 (sh2) alleles, and that have multiple beneficial traits, including an extended sugar retention ability at the post prime eating stage and a significantly enhanced vigor and fitness to the plant, plant material and/or seed during seed germination, seedling emergence from soil, and plant development.

  • PERFORMING SECURITY ASSESSMENTS IN AN ONLINE SERVICES SYSTEM

    A system and method for performing security assessments in an online services system. In one embodiment, a method includes receiving an accepted security assessment agreement from a user, where the security assessment agreement is associated with a software application utilized in an online services system. The method also includes receiving configuration data associated with the software application; receiving scanning data associated with the software application; and sending the configuration data and scanning data to one or more security assessment systems.

  • SYSTEMS AND METHODS TO CONTROL DEVICE ENDPOINT BEHAVIOR USING PERSONAE AND POLICIES

    The creation of multiple personae in mobile devices. Access to personae is controlled based on the persona that is currently active. The creation or existence of different personae helps prevent data leakage or loss, in that any or all of the following characteristics, by way of example, may be manifested: business data and applications are firewalled from applications or other items associated with personal use; connectivity of the device is controlled; resources (such cameras, GPS, other sensors, etc.) on the device are controlled; data are protected even if removable storage or the device itself are lost.

  • SYSTEM AND METHOD FOR OPERATION OF OPEN CONNECTIONS FOR SECURE NETWORK COMMUNICATIONS

    In one embodiment, a system for extending IPSec communication over a wireless mesh network is disclosed. A VPN appliance is operative to establish an end-to-end communication tunnel with at least one of a plurality of wireless mesh gateways. The VPN appliance is configured for secure communication with at least one of the mesh gateways, by establishing an outer tunnel. At least one of the wireless mesh gateways is configured to establish connection with a plurality of wireless routers, where the wireless routers are configured to establish connection with a plurality of intelligent communication devices. Multiple paths exist for routing data packets from the plurality of mesh gateways to the plurality of intelligent communication devices. The VPN appliance is also configured to establish a plurality of inner tunnels nested within the outer tunnel.

  • Securely Accessing An Advertised Service

    In one embodiment, a method includes sending by an endpoint a request for information about available services to a network device; receiving by the endpoint a message from the network device, the message including information associated with a first service provider; determining by the endpoint whether the first address is certified by a trusted third party as being associated with the first service provider; if the first address is certified by the trusted third party, communicating by the endpoint with the first service provider using the information; and, in response to communicating with the first service provider using the information, receiving by the endpoint access to a service from the first service provider through the network device.

  • METHOD FOR PREVENTION OF CROSS SITE REQUEST FORGERY ATTACK

    An improved method for preventing XSRF attack on a web site, which has a URL and is accessible from a port on a server. This invention: determines whether a requestor is legitimate; generates a session token for each session on the web site requested by the legitimate requestor; embeds the session token in a session cookie; additionally generates a security token; embeds the security token in the original request URL; and redirects the web site request to the newly formed URL. The subsequent request of the URL containing the security token allows the server to verify the token and serve the web site to the legitimate requestor. In other words the server's web site for that user for that session is: port/security token/URL/form data.

  • THREE-LAYER WEB MANAGEMENT PROTOCOL DEVICE EMULATION

    A three-layer management protocol device emulator and method that emulates numerous Web management protocol devices using a single virtual machine. A client on a network believes that there are a large number of Web management protocol devices on the network. Embodiments of the emulator and method use a three-layer multiple-endpoint model. A proxy layer is used to emulate multiple devices by building an endpoint pool containing a large number of endpoint pairs corresponding to the emulated devices. The presentation layer is used to specifically translate and parse the Web management protocol, and the logic layer represents the logic for a specific Web management protocol device being emulated. Embodiments of the emulator and method receive a request from a client on the network, use the proxy layer, presentation layer and logic layer to process the request and obtain a response, and then send the response back to the requesting client.

  • POWER AND COMPUTATIONAL LOAD MANAGEMENT TECHNIQUES IN VIDEO PROCESSING

    Techniques for managing power consumption and computational load on a processor during video processing and decoding are provided. One representative embodiment discloses a method of processing a data stream that includes video data. According to the method, one or more protocols used to create the data stream are identified. The various parsing and decoding operations required by the protocol are then identified and managed based on the available electrical power or available processing power. Another representative embodiment discloses a method of processing a data stream that includes video data. According to the method, one or more protocols used to create the data stream are identified. The various parsing and decoding operations required by the protocol are then identified and managed based on a visual quality of the video or a quality of experience.

  • SYSTEM AND METHOD FOR ENABLING CREATION AND EXECUTION OF LOCALIZED APPLICATIONS IN UTILITY NETWORKS THROUGH DEVICE-SPECIFIC PROGRAMMING

    In one embodiment, a system is disclosed for development of computer-executable applications in a network having a central utility with one or more utility-level applications and a plurality of intelligent devices operatively connected to the central utility. Each of the intelligent devices has at least one computer-executable application for causing a computer to perform functions that include core functions for supporting active communication by the intelligent devices upstream to one or more of the utility-level applications at the central utility and/or supporting local communication by the intelligent devices with another one or more of the intelligent devices that are operatively connected via the network. At least one of the utility-level applications is executable at the central utility to communicate data downstream with at least one computer-executable application on the one or more intelligent devices via the network, and also to receive communication data. An application development framework resides at one or more of the intelligent devices, for enabling the development of computer-executable applications to perform distributed computing functions and localized functions other than the core functions associated with the intelligent devices.

  • MAINTAINING A DATABASE OF PATCH DATA

    Methods of maintaining a database of patch data for a system include parsing differences between a posted update and a previously posted update, prioritizing patch data from the posted update and a plurality of additional sources, and supplementing patch data in the database for the posted update based on parsed differences and the plurality of additional sources.

  • Redirection of Information from Secure Virtual Machines to Unsecure Virtual Machines

    The present invention is directed towards methods and systems for redirecting an access request to an unsecure virtual machine. A computing device may execute a hypervisor hosting a secure virtual machine and an unsecure virtual machine. A control virtual machine, hosted by a hypervisor executing on the computing device, may intercept a request to access an unsecure resource. The unsecure resource may include one of: a file, an application and an uniform resource locator (URL). The control virtual machine may further determine that the request originates from a secure virtual machine executing on the computing device. The control virtual machine may redirect, responsive to the determination, the request to an unsecure virtual machine executing on the computing device, whereupon the unsecure virtual machine may provide access to the requested unsecure resource.

  • KNOWLEDGE SYSTEM

    A computer implemented method for disseminating knowledge comprises generating at least one medium based on information associated with at least one participating user. The participating users can be categorized based on their interaction with the mediums. The participating users can further provide a feedback based on which recommendations for modification of content of the mediums are generated. Based at least on the recommending, the knowledge framework is modified.

  • SYSTEM AND METHOD FOR AUTOMATED UNATTENDED RECOVERY FOR REMOTELY DEPLOYED INTELLIGENT COMMUNICATION DEVICES

    In one embodiment, an intelligent communications device for operating in a network is disclosed. The device includes a storage device having a plurality of partitions storing images for performing boot operations. The device also includes a detection module that is operative to detect a boot failure, and a first restoration module that is operative to restore an active image with a first backup image, in response to a detected boot failure from an active image. The device further includes a second restoration module that is operative to restore a second backup image in response to a detected boot failure after restoration from a first backup image. The device also includes a programmable processor that is programmed to cause execution of boot operations and functions performed by the detection module, first restoration module, and second restoration module.

  • DYNAMIC FAULT CONFIGURATION USING A REGISTERED LIST OF CONTROLLERS

    A method and system dynamically configures faults during software testing. During runtime of a service platform, a computer system hosting the service platform receives a request from a test program to register a list of controllers. Each of the registered controllers controls the generation of a different fault. The test program triggers the execution of a service to be tested on the service platform. During execution of the service, a predefined condition is encountered. A fault is generated if one of the registered controllers controls the fault generation associated with the predefined condition. Based on the generation of the fault, the behavior of the service can be verified.

  • ATTRIBUTE INFORMATION PROVIDING SYSTEM

    A system which implements a method for providing attribute data. A request is received from a user device via a network for a virtual ID token relating to attribute information pertaining to a subscriber associated with the user device. A data record including L attributes of the subscriber is read from a database, L being at least 2. The data record is provided to the user device via the network. A selection of M attributes of the L attributes is received from the user device via the network, M being less than L. A virtual record including the M attributes selected from the data record is generated, the virtual record including a virtual ID (VID) for identifying the virtual record. The generated virtual record is stored in the database. The virtual ID token is provided to the user device via the network, wherein the virtual ID token includes the VID.

  • FILE SYSTEM OPERATION AND DIGITAL RIGHTS MANAGEMENT (DRM)

    A file system is configured for use with files protected by digital rights management (DRM) content controls and to interact both with applications that are, and are not, DRM aware. The file system may be configured for use by two applications, in a manner that may provide the second application with protected files if the first application was previously allowed access. In one example, a user context cache of DRM-protected files is created. The files in the cache may have been decrypted in response to a request(s) from the first application. Subsequent requests from the second application may be received for files within the user context cache of DRM-protected files. At least one of the files within the user context cache of DRM-protected files may be provided to the second application if the second application has a joint user context with the first application.

  • MULTILAYER SECURING STRUCTURE AND METHOD THEREOF FOR THE PROTECTION OF CRYPTOGRAPHIC KEYS AND CODE

    An arrangement for the protection of cryptographic keys and codes from being compromised by external tampering, wherein the arrangement is utilized within a multilayered securing structure. More particularly, there is provided a multilayered securing structure for the protection of cryptographic keys and codes, which may be subject to potential tampering when employed in computers and/or telecommunication systems. A method is provided for producing such multilayered securing structures within a modular substrate with the intent to protect cryptographic keys and codes which are employed in computers and/or telecommunication systems from the dangers of potential tampering or unauthorized access.

  • METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR FACILITATING COMMUNICATION IN AN INTEROPERABILITY NETWORK

    Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data corresponding thereto governing interaction with the entity via the interoperability network. A message is transmitted from a first one of the entities to a second one of the entities. The first entity has first policy data corresponding thereto and the second entity has second policy data corresponding thereto. The transmitted message was handled in the network according to combined policy data representing a combination of the first and second policy data.

  • PRIVATE INFORMATION STORAGE DEVICE AND PRIVATE INFORMATION MANAGEMENT DEVICE

    The events experienced are stored automatically, so that the information of higher utility for a user may be taken out with responsiveness and efficiency higher than is possible with a technique of keyword retrieval over a network. A private information storage device and a private information management device are provided in which information pertinent to an event experienced by a user is stored and managed so as to be read out, whereby the information may be taken out with higher responsiveness than with the technique of keyword retrieval over the network, while the selected information may be taken out from the extracted information more efficaciously, and the information taken out is highly useful for the user.

  • PRESENTING ACTIONS AND PROVIDERS ASSOCIATED WITH ENTITIES

    Computer-readable media, computer systems, and computing devices method of facilitating presentation of actions and providers associated with entities. The method includes determining a query intent of a received query. Entity sets having an entity that matches the determined query intent are recognized. Each entity set includes an entity, an action, and a provider. Actions and/or providers associated with the entity that matches the determined query intent are identified. The actions and/or the corresponding providers associated with the entity are provided for integration with a representation of the associated entity on a search results page.

  • RUNTIME ADAPTABLE SECURITY PROCESSOR

    A runtime adaptable security processor is disclosed. The processor architecture provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol layer and may also provide packet inspection through Layer 7. A high performance content search and rules processing security processor is disclosed which may be used for application layer and network layer security. A scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory. An application running on an initiator or target can in certain instantiations register a region of memory, which is made available to its peer(s) for access directly without substantial host intervention through RDMA data transfer.

  • Invoicing and electronic billing system and method

    Systems, methods, and computer program products are provided for invoicing and electronic billing. Methods include receiving invoicing data from a merchant, identifying a user based on the invoice data, receiving payment instructions from the user, where the payment instructions include an alias, and determining that the merchant is a registered payment recipient based on the alias. In specific embodiments, the invoice data is converted into an electronic bill, and the electronic bill is sent to the user.

  • Redemption of Derivative Secured Index Participation Notes

    Techniques are described for securitizing, administrating and trading various index shares securitized by derivative, cash-settled instruments on the underlying index.

  • MONITORING SYSTEM OF COMPUTER AND MONITORING METHOD

    There is provided a monitoring system capable of representing relationships of computer resources that virtual servers use in a tree structure and aggregating the performance statistics of the virtual resources sharing physical resources. The monitoring system has: a virtualization module that makes virtual computers operate; and a monitoring module for monitoring the physical computers and components of the virtual computers. The monitoring module designates the physical computer and the components of the virtualizing module as base resources, manages the components of the virtual computers as virtual resources, generates a platform tree by extracting a tree structure from the virtual resources and the components of the base resources for predetermined platforms, generates a service provision tree by extracting a tree structure having the base or virtual resources as starting points, and establishes a reference relationship for the components contained in the platform tree and also contained in the service provision tree.

  • SYSTEMS AND METHODS FOR RETRIEVING DATA

    A system and method for providing a data collaboration environment that changes dynamically based on the occurrence of events external to the data collaboration environment is provided. The collaboration environment is defined to include roles, activities and external event specifications. Each role defines data access privileges granted to a user during a session, each activity defines with whom the user can share data, and each external event specification defines an event external to the collaboration environment which must occur before an activity is permitted for a defined role during a session. Data sharing privileges granted to a user change dynamically in response to the occurrence of an external event identified in one of the defined external event specifications.

  • INFORMATION COLLECTION SYSTEM

    There is provided an information collecting system capable of collecting general information. An accusation information collecting system 1 is constituted by accusation information providing terminals 2 to be used by accusers, a management server 3 and accusation information browsing terminals 5 to be used by accusation information browsing persons. The accusation information providing terminal 2 has an accusation information transmitting unit 11 for transmitting accusation information to the management server 3 via the Internet 4. The management server 3 has: an accusation information receiving unit 6 for receiving accusation information from the accusation information providing terminal 2; an accusation information database 7 for recording received pieces of accusation information by predetermined kind; an accusation information counting unit 8 for counting recorded pieces of accusation information by predetermined kind; a predetermined number reaching accusation information transmitting unit 9 for transmitting the same kind of accusation information, of which the number of counted pieces reaches a predetermined number, to the accusation information browsing terminal 5; and an accusation service database 10 for recording accusation information, which is to be selected via the accusation information providing terminal 2, as an option template.

  • METHOD AND APPARATUS FOR MONITORING THE DISTRIBUTION OF ELECTRONIC FILES

    A remote server is arranged to respond to a request from a user terminal for the download of a media file to cause a unique water-marked copy of a media file to be generated and sent to the user terminal. At the same time the remote server is arranged to access a seal server, which causes an electronically sealed record of the transaction to be generated and stored in a download database. Subsequently, if a suspect media file is identified the sealed record provides evidence of the original transaction which led to the water-marked copy of the media file being issued and hence the original source of the unauthorised copy of the file. Control of distributed media files can be enforced by imposing penalties in the event that unauthorised copies corresponding to the distributed water-marked media files are identified.

  • ACTIVE POLICY ENFORCEMENT

    A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.

  • CONTENT PROVISION SYSTEM

    The second content provision system determines, in response to a request by a user from a second terminal belonging to a second network, a second content being a same content as a first content, which is provided to the first terminal belonging to a first network or an alternative content for the first content and matching rights of the user. The second content is provided from the second network to the second terminal and can be used by the second terminal. The second content is determined by using content information specifying the first content which is in-use or which the use has interrupted and ownership information indicating the rights of the user and the content provision system acquires the content information and the ownership information from the first content provision system in response to the request from the second terminal.

  • QUERY IDENTIFICATION AND ASSOCIATION

    Apparatus, systems and methods for predictive query identification for advertisements are disclosed. Candidate query are identified from queries stored in a query log. Relevancy scores for a plurality of web documents are generated, each relevancy score associated with a corresponding web document and being a measure of the relevance of the candidate query to the web document. A web document having an associated relevancy score that exceeds a relevancy threshold is selected. The selected web document is associated with the candidate query.

  • INSTITUTIONAL PROVIDED DATA SHARE PLATFORM

    Embodiments of the invention are directed to a system, method, or computer program product for an institution provided data share platform. The institution provided data share platform allows customers and commercial partners to access data the institution may have. Specific platform data access may be limited and/or monitored by the institution to ensure customer safety and privacy compliance. Allowing access to the institution data provides a customer the means to create customized applications utilizing the data in combination with data provided by the customer. In return for access to the platform, the institution may recover fees based on the application the customer creates.

  • TRADEMARK MAP CONSTRUCTION METHOD

    A trademark map construction method is revealed. Firstly, select a range of trademarks intended to be analyzed and take background data of trademark samples required. Then integrate the above data to form a questionnaire having trademark modes and related serial number. Next invite people to divide the trademark samples into groups with similarity according to their subjective judgment and complete a corresponding matrix. Use Multi-Dimensional Scale (MDS) algorithms to process the above data so as to get relative distance between the trademark samples. Thus the distribution of the trademark samples in the trademark map is obtained. Thereby enterprises are provided with a trademark design reference and product recognition, positioning are also achieved.

  • Ad-Hoc and Priority-Based Business Process Execution

    A system and method of executing ad-hoc extensions of a business process instance is disclosed. One or more anchors are provided in a business process definition, where each anchor includes a link to at least one ad-hoc process fragment. User input signals are received to activate or deactivate selected ones of the one or more anchors. One or more ad-hoc process fragments associated with a respective activated or deactivated anchor are respectively inserted into or removed from the business process definition based on the user input signals.

  • Marketing and selling contributed resources in distributed computing

    A method or system for marketing and selling contributed resources of a plurality of separate electronic devices by generating a framework for resource contribution. The assigned contributed resources are the contributed resources that are assigned to credit categories. A credit category model is optimized based the assigned contributed resources using a dynamic availability of the assigned contributed resources and a processing requirement of a task. Resource contributions are tracked based on completed task segments, wherein the completed task segments are distributed task segments derived from the task that have been processed by the assigned contributed resources. And an account is credited based on the tracked resource contribution.

  • INTER-ENTERPRISE INGREDIENT SPECIFICATION COMPLIANCE

    Methods, systems, and apparatus, including computer programs encoded on computer storage media, for evaluating inter-enterprise ingredient specification compliance. In one aspect, a method includes obtaining one or more normalized values that reflect an extent to which a supplier entity has satisfied an expectation of a receiver entity, populating a global ingredient database that references different ingredients, and different supplier entities and attributes associated with each ingredient, with the normalized values, receiving a user's selection of an ingredient, a supplier entity, or an attribute, aggregating one or more of the normalized values that are associated with the selected ingredient, supplier entity, or attribute in the global ingredient database, and outputting a representation of the aggregated values to the user.

  • INTER-ENTERPRISE INGREDIENT SPECIFICATION COMPLIANCE

    Methods, systems, and apparatus, including computer programs encoded on computer storage media, for evaluating inter-enterprise ingredient specification compliance. In one aspect, a method includes obtaining one or more normalized values that reflect an extent to which a supplier entity has satisfied an expectation of a receiver entity, populating a global ingredient database that references different ingredients, and different supplier entities and attributes associated with each ingredient, with the normalized values, receiving a user's selection of an ingredient, a supplier entity, or an attribute, aggregating one or more of the normalized values that are associated with the selected ingredient, supplier entity, or attribute in the global ingredient database, and outputting a representation of the aggregated values to the user.

  • SYSTEM, METHOD AND COMPUTER READABLE RECORDING MEDIUM FOR CHARGING FOR ON-LINE ADVERTISEMENT

    A computer-implemented charging control method includes determining an expected click count for an advertisement provided on a web page; obtaining a generated click count for the advertisement, using the computer, the generated click count including a number of clicks on the advertisement during a period of time; generating an invoice for the advertisement, based on the expected click count and the generated click count; and transmitting the invoice to an advertiser terminal.

  • SPACE SAVING MANUAL SHELF MANAGEMENT SYSTEM

    A manual open bottom shelf allocation and management system for allocating shelf space among rows of products and for moving the rows of products toward the shelf front includes a plurality of adjacent shelf allocating and managing units. Each unit includes a pair of side dividers extending away from a backstop defining an open bottom, wherein at least one row of products may be positioned on the shelf between and laterally supported by the side dividers. Each unit is manually movable to advance products toward the front of the shelf. The side dividers of two adjacent units may be in vertical alignment with one another. A shelf ready packaging unit incorporates a row of products and a shelf allocation and management system and packaging material coupling the shelf allocating and managing unit and the at least one row of products together at least for shipping and stocking.

  • SYSTEM FOR CONCURRENT OPTIMIZATION OF BUSINESS ECONOMICS AND CUSTOMER VALUE

    A computer-implemented system and method to provide options on products to enhance customers' experience. A computer-implemented system is operated that delivers to a customer an option to utilize up to n of m selected products, where m and n are whole numbers and n is less than or equal to m. Information is recorded in a data store, pertaining to said option. In addition, a system is operated to define each of the n chosen products, whereby after each of the n chosen products is defined, the customer can utilize said chosen product. The information pertaining to said defined products is recorded in a data store.

  • COMPUTER IMPLEMENTED METHODS FOR PROVIDING OPTIONS ON PRODUCTS

    A computer-implemented system and method to provide options on products to enhance customers' experience. A computer-implemented system is operated that delivers to a customer an option to utilize up to n of m selected products, where n is less than or equal to m. Information is recorded in a data store, pertaining to said option. In addition, a system is operated to define each of the n chosen products, whereby after each of the n chosen products is defined, the customer can utilize said chosen product. The information pertaining to said defined products is recorded in a data store.

  • SYSTEM FOR CONCURRENT OPTIMIZATION OF BUSINESS ECONOMICS AND CUSTOMER VALUE

    A computer-implemented system and method to provide options on products to enhance customers' experience. A computer-implemented service is operated that delivers to a customer an option to utilize up to n of m selected products, where n is less than or equal to m. Information is recorded in a data store, pertaining to said option. In addition, a system is operated to define each of the n chosen products, whereby after each of the n chosen products is defined, the customer can utilize said chosen product. The information pertaining to said defined products is recorded in a data store. A computer-implemented system and method to award two or more confirmed products to a customer, wherein said customer is allowed to utilize fewer than the awarded products.

  • METHOD FOR PERSONALIZED GUIDANCE FOR REFERENCE DATE DEPENDENT INVESTMENTS

    A system and method is provided to generate personalized savings recommendation and/or needed assignments of reference-date dependent investments. Recommendations and assignments are based on differences between a investor profile and an ideal representative that was used to construct the investments. The system provides a configurable increasing level of financial service based on a Methodology Publisher's configuration for reference date based investments. A forecast simulation system is provided for each investor with various optimizers by the Methodologically Publisher to provide various level of financial services and portfolio recommendations for reference date dependent investments. Reports may be provided to investors illustrating progress toward goals and highlighting distribution of potential risky outcomes. An online inter-active mode may allow an investor to provide further profile information and customize a solution to their needs.

  • Techniques for Combining Statement Level, Procedural, and Row Level Replication

    Techniques for replicating data in database systems are described. In an example embodiment, a set of changes is received at a destination database, where the set of changes has been applied at a source database and is being replicated from the source database to the destination database. The set of changes is analyzed and it is determined that the set of changes includes two or more of: a subset of row-level changes, a subset of statement-level changes, and a subset of procedure-level changes. A set of dependencies is determined at least between the changes that are included in the subsets of changes. The changes, in the subsets of changes, are assigned to two or more processing elements. The set of changes is applied to the destination database by executing the two or more processing elements in parallel to each other and based on the set of dependencies.

  • Techniques for Combining Statement Level, Procedural, and Row Level Replication

    Techniques for replicating data in database systems are described. In an example embodiment, a set of changes is received at a destination database, where the set of changes has been applied at a source database and is being replicated from the source database to the destination database. The set of changes is analyzed and it is determined that the set of changes includes two or more of: a subset of row-level changes, a subset of statement-level changes, and a subset of procedure-level changes. A set of dependencies is determined at least between the changes that are included in the subsets of changes. The changes, in the subsets of changes, are assigned to two or more processing elements. The set of changes is applied to the destination database by executing the two or more processing elements in parallel to each other and based on the set of dependencies.

  • SYSTEMS AND METHODS FOR PROMOTING PRODUCTS AND SERVICES

    Disclosed are systems and methods for promoting products and services in a retail environment.

  • Transportation Information Systems and Methods

    Transportation information systems and methods are disclosed, which facilitate the use of transportation, including trip planning. An exemplary method includes receiving user data associated with public transportation usage. The exemplary method also includes receiving public transportation data including real-time public transportation data. The exemplary method further includes generating scheduling information based on the user data and real-time public transportation data.

  • E-BUSINESS VALUE WEB

    A method and system is provided to manage and track changes in enterprise architectures. The invention provides a hierarchical visual management tool to manage and update relational information within an enterprise in a controlled fashion. The relationship may be maintained in a database and displayed via graphical user interface. Enterprise assets are categorized into such categories as goals, customer values or requirements, capabilities, resources, and the like. A hierarchy is constructed so that relationships between these various categories are identified and captured using the invention. Weights may be assigned to each element of the categories so that any proposed change to an enterprise architecture may be viewed so that a value can be ascertained and compared between other values of other proposed changes. In this manner, tracking and management of evolutionary changes to an architecture may be accomplished using relational information.

  • CONFIGURATION MANAGEMENT SYSTEM FOR SOFTWARE PRODUCT LINE DEVELOPMENT ENVIRONMENT

    A system that includes: a configuration management system configured to receive resource updates submitted by developers of a product line; an update monitor configured, in manual monitoring, to mark each submitted resource update with respective variability data specified as relevant to the update submission, by the developer; and a tracer configured, in automatic monitoring, to trace portions of the updated resource into respective features or products of the product line, to determine variability data relevant to the update submission, wherein when an update request is initiated by the developer, the configuration management system is configured to associate the submitted resource updates with the update request based on common variability data, to provide resource updates on demand, based on variability data, wherein in automatic update, the configuration management system is configured to notify developers on resource updates, based on variability data common to the updated resource and the notified developers.

  • IMAGING PRODUCT SELECTION METHOD

    A method for displaying a collage of digital images on a display, receiving a selection for one of the digital images to be presented on a separate area of the display together with any associated multimedia, wherein one of the digital images has a portion overlapped by another digital image.

  • Contact management system and method

    In an embodiment of a method of providing contact information, the method includes creating a contact record in a contact management system, where a process associated with a subject of the contact record and/or a recipient of data associated with the contact record is included in creating the contact record. A unique serial number is generated corresponding to the contact record and the serial number is conveyed to the recipient. A request by an application is received for the contact record from the contact management system corresponding to the serial number and data associated with the contact record is transmitted to the application.

  • Digital rights management scheme for an on-demand distributed streaming system

    A DRM scheme that may be optionally invoked by the owner. With the DRM protection turned on, the media is encrypted before it is distributed in a P2P network, and is decrypted prior to its use (play back). The peers may still efficiently distribute and serve without authorization from the owner. Nevertheless, when the media is used (played back), the client node must seek proper authorization from the owner. The invention further provides a hierarchical DRM scheme wherein each packet of the media is associated with a different protection level. In the hierarchical DRM scheme of the invention there is usually an order of the protection level. As a result, in one embodiment of the invention, the decryption key of a lower protection layer is the hash of the decryption key at the higher protection level. That way, a user granted access to the high protection layer may simply hold a single license of that layer, and obtain decryption keys of that layer and below. The invention further provides for a process for managing digital rights to a scalable media file wherein a different encryption/decryption key is used to encrypt each truncatable media packet with a base layer without requiring additional storage space to store the key.

  • Digital rights management scheme for an on-demand distributed streaming system

    A DRM scheme that may be optionally invoked by the owner. With the DRM protection turned on, the media is encrypted before it is distributed in a P2P network, and is decrypted prior to its use (play back). The peers may still efficiently distribute and serve without authorization from the owner. Nevertheless, when the media is used (played back), the client node must seek proper authorization from the owner. The invention further provides a hierarchical DRM scheme wherein each packet of the media is associated with a different protection level. In the hierarchical DRM scheme of the invention there is usually an order of the protection level. As a result, in one embodiment of the invention, the decryption key of a lower protection layer is the hash of the decryption key at the higher protection level. That way, a user granted access to the high protection layer may simply hold a single license of that layer, and obtain decryption keys of that layer and below. The invention further provides for a process for managing digital rights to a scalable media file wherein a different encryption/decryption key is used to encrypt each truncatable media packet with a base layer without requiring additional storage space to store the key.

  • Portable consumer device configured to generate dynamic authentication data

    Embodiments of the invention provide a portable consumer device configured to store dynamic authentication data in memory. The portable consumer device also includes an interface for transmitting data to and receiving power from an external device. The dynamic authentication data is read from the memory by a read-write device located on the portable consumer device. The authentication data is updated and the updated data may be written into memory using the read-write device. In some embodiments, an authentication value read from the memory may be used to generate another authentication value based on an algorithm. The portable consumer device is further configured to transmit authentication data to an external device. The process of reading, updating, generating, transmitting, and rewriting the authentication data may occur each time external power is provided to the portable consumer device via the interface. The power for operating the components of the portable consumer device may be drawn exclusively from the power received from the external device (i.e., the external power). In some embodiments, a portion of the external power may be temporarily stored on an energy storage means of the portable consumer device.

  • Methods and architectures for resource management

    Resource management architectures implemented in computer systems to manage resources are described. In one embodiment, a general architecture includes a resource manager and multiple resource providers that support one or more resource consumers such as a system component or application. Each provider is associated with a resource and acts as the manager for the resource when interfacing with the resource manager. The resource manager arbitrates access to the resources provided by the resource providers on behalf of the consumers. A policy manager sets various policies that are used by the resource manager to allocate resources. A resource consumer creates an "activity" at the resource manager and builds one or more "configurations" that describe various sets of preferred resources required to perform the activity. Each resource consumer can specify one or more configurations for each activity.

  • Customization verification

    Results of an execution of a function including customizable steps, may be verified. Multiple of steps of the function, may be determined and may the customizable steps that have been customized. Results may be determined based on an execution of the function, wherein the execution uses values provided as inputs to the function. A result view for verifying the one or more results may be provided, the result view may include the steps of the function, the values corresponding to the inputs, and the results.

  • Terms management system (TMS)

    A method for managing technical terms and data items associated with a product design and its features and requirements. A terms management process and software tool are described which build a repository of technical terms with definitions, data items with attributes, and acronyms with meanings. The central repository can be used by anyone who needs to use or contribute to the data, thus preventing ambiguity and misunderstanding in the use of data items and terms. The process and software tool integrate with a requirements development method and tool, which ensures that all data items and terms are reviewed and approved before being used.

  • Consistent set of interfaces derived from a business object model

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction.

  • Carrier, storage enclosure and methods

    There is disclosed a carrier (50) for a disk drive (100) for inserting a disk drive into a bay (22) of a storage enclosure (10), a storage enclosure and methods relating to the same. The carrier (50) comprises a housing for housing a said disk drive, and a latch member (61) slidably attached to the housing. The latch member has at least one latch part (64) for engaging with a corresponding engagement part of a said bay to latch the carrier (50) into position when the latch member (61) is slid in a latch direction to a latch position.

  • DATA TRANSPORT BUNDLE

    A data transport bundle is presented that is a package of wireless data transport created by a mobile communication network provider. The data transport bundle is available for sale by the mobile communication network provider to enterprises that wish to use wireless data transport. The data transport bundle may include the duration, number of allowed transactions, size associated with each allowed transaction and a price associated with the data transport bundle. The mobile communication network provider may configure the data transport bundle so that it may be partitioned into multiple smaller data transport bundles. In addition, the components of the data transport bundle, such as the duration, number of allowed transactions, and size associated with each allowed transaction may be adjustable to satisfy services for which the enterprise purchases the data transport.

  • FRAMEWORK FOR REALIZATION OF A WEB 2.0 FEATURES

    A method to shape one or more features of Web 2.0 in the form of Web 2.0 solutions, using Web 2.0 realization framework, to the plurality of enterprises is disclosed. The method includes identifying the respectiveenterprises computing infrastructure and a business application needs of the respective enterprises. The respective enterprises current support system is also measured to find the feasibility of implementing the features of the Web 2.0. The method further comprises offering one or more Web 2.0 features to the respective enterprises based on the business activity. The method includes providing the Web Realization Cycle (WRC) for controlled implementation of Web 2.0 features to the respective enterprises.

  • BROAD AND ALTERNATIVE CATEGORY CLUSTERING OF THE SAME, SIMILAR OR DIFFERENT CATEGORIES IN SOCIAL/GEO/PROMO LINK PROMOTIONAL DATA SETS FOR END USER DISPLAY OF INTERACTIVE AD LINKS, PROMOTIONS AND SALE OF PRODUCTS, GOODS AND SERVICES INTEGRATED WITH 3D SPATIAL GEOMAPPING AND SOCIAL NETWORKING

    A technique, method, apparatus, and system to provide related and integrated social networking, real time geospatial mapping, geo-target location and multiple points of interest, receiving current location of user's electronic or mobile device and multiple points of interest, cloud-type configuration storing and handling user data across multiple enterprises, generating user behavior data and ad links, promotions ("social/geo/promo") links on a website for any product, good or service, including social/geo/promo data sets for user customized visual displays showing 3D map presentations with correlated or related broad or alternative categories of social/geo/promo links to be displayed with web page content for view by an end user.

  • SYSTEM AND METHOD FOR PROVIDING SPORTS AND SPORTING EVENTS RELATED SOCIAL/GEO/PROMO LINK PROMOTIONAL DATA SETS FOR END USER DISPLAY OF INTERACTIVE AD LINKS, PROMOTIONS AND SALE OF PRODUCTS, GOODS, GAMBLING AND/OR SERVICES INTEGRATED WITH 3D SPATIAL GEOMAPPING, COMPANY AND LOCAL INFORMATION FOR SELECTED WORLDWIDE LOCATIONS AND SOCIAL NETWORKING

    A technique, method, apparatus, and system to provide sports and sporting events related, integrated social networking, real time geospatial mapping, geo-target location based technologies including GPS and GIS and multiple points of interest, receiving current location of user's electronic or mobile device and multiple points of interest, cloud-type configuration storing and handling user data across multiple enterprises, generating user behavior data and ad links, promotions ("social/geo/promo") links on a website for sports and sporting events related products, goods, gambling, and/or services, including sports related social/geo/promo data sets for user customized visual displays showing 3D map presentations with correlated or related broad or alternative categories of social/geo/promo links to be displayed with web page content for view and interaction by an end user.

  • SYSTEM AND METHOD FOR PROVIDING EDUCATIONAL RELATED SOCIAL/GEO/PROMO LINK PROMOTIONAL DATA SETS FOR END USER DISPLAY OF INTERACTIVE AD LINKS, PROMOTIONS AND SALE OF PRODUCTS, GOODS, AND/OR SERVICES INTEGRATED WITH 3D SPATIAL GEOMAPPING, COMPANY AND LOCAL INFORMATION FOR SELECTED WORLDWIDE LOCATIONS AND SOCIAL NETWORKING

    A technique, method, apparatus, and system to provide educational related, integrated social networking, real time geospatial mapping, geo-target location based technologies including GPS and GIS and multiple points of interest, receiving current location of user's electronic or mobile device and multiple points of interest, cloud-type configuration storing and handling user data across multiple enterprises, generating user behavior data and ad links, promotions ("social/geo/promo") links on a website for educational related products, goods, and/or services, including educational related social/geo/promo data sets for user customized visual displays showing 3D map presentations with correlated or related broad or alternative categories of social/geo/promo links to be displayed with web page content for view and interaction by an end user.

  • GRAPHICAL LANGUAGE FOR OPTIMIZATION AND USE

    The present invention provides novel techniques for graphically modeling, displaying, and interacting with parametric hybrid models used to optimize and control components of industrial plants and enterprises. In particular, a graphical modeling tool of a control/optimization system for controlling a plant or enterprise is configured to transmit a graphical user interface to a user, wherein the graphical user interface enables a plurality of command inputs relating to a plurality of parametric hybrid models based on a security access level of the user. The parametric hybrid models may be displayed by the graphical user interface as nodes of a network with connections connecting the nodes. The user may graphically manipulate the nodes and connections associated with the parametric hybrids models to either modify optimization constraints of the model network, or actually modify the manner in which the parametric hybrid models function (e.g., inputs, outputs, parameters, and so forth, of the parametric hybrid models), depending on the access level of the user.

  • RADIO FREQUENCY RECEIVER SYSTEM FOR WIDEBAND SIGNAL PROCESSING

    Wireless communication is ubiquitous today and deployments are growing rapidly leading to increased interference, increasing conflicts, etc. As a result monitoring the wireless environment is increasingly important for regulators, service providers, Government agencies, enterprises etc. Such monitoring should be flexible in terms of the networks being monitored within the wireless environment but should also provide real-time monitoring to detect unauthorized transmitters, provide dynamic network management, etc. Accordingly, based upon embodiments of the invention, a broadband, real-time signal analyzer (RTSA) circuit that allows for the deployment of RTSA devices in a distributed environment wherein determination of policy breaches, network performance, regulatory compliance, etc. are locally determined and exploited directly in network management or communicated to the central server and network administrators for subsequent action. Beneficially the RTSA exploits a broadband RF front end in conjunction with parallel direct down conversion and FFT techniques.

  • Generating and storing an asset at a PORT apparatus

    A system for providing video intelligence as a service to a plurality of small and medium sized enterprises to distributed video recordation equipment, comprising an apparatus and computer-implemented method. An apparatus comprises a point of recordation terminal apparatus coupled to a public network. A method for operating a system for video intelligence in a public network in a secure manner.

  • CONFERENCE SUPPORTING SYSTEM

    According to one embodiment, a conference supporting system includes: a material-data managing section configured to manage conference material data; a material-data distributing section configured to distribute material data of the material-data managing section according to a distribution request; information terminal sections configured to receive the material data through communication with the material-data distributing section and transmit rendering data generated by participants; and an additional-data managing section configured to manage, as additional data, the rendering data transmitted from the information terminal sections, distribute, to another information terminal section, rendering data transmitted from a specific information terminal section, and determine the distribution of the rendering data according to an instruction to continuously display or not to continuously display the rendering data.

  • Personal Business Service System and Methlod

    A system and method of computerizing companies with customized individual addressable electronic direct marketing, self-service automation, and customer care support. The system contains a private network connecting product companies, manufacturers, stores, educational institutions, travel companies, medical providers, financial institutions, and many others to a specified individual customer. The connection is made to a personal agent device carried or worn by a participating consumer that contains local processing means with an interactive display, security features, optional camera, and wireless communications with the private network. Communications microchips can be placed on products that communicate product information upon interrogation with the personal agent. The invention also includes business professional units in communication with the private network and in-store local wireless communication between personal agents and the business professional unit.

  • METHODS AND APPARATUS FOR THE MANAGEMENT AND VIEWING OF CALENDAR DATA

    The present document describes systems, methods and apparatuses relating to managing and viewing calendar data. A server or a client device, may receive and/or classify calendar data associated with a user, and store the data in a database. Statistics data is generated as a function of classified calendar data. The client device may present personalized views of at least a portion of the statistics data, including statistical and/or analytical information. One or more search categories and a type of data presentation may be received as user input. The server or the client device may generate the statistics data as a function of the received analysis criteria. Calendar data for multiple users may be collected and centrally processed, for example, at the server.

  • AD CREATION INTERFACE FOR AN INTERPERSONAL ELECTRONIC ADVERTISING SYSTEM

    An ad creation interface for use in an interpersonal electronic advertising system is described. The ad creation interface is configured to enable an ad suggester to create interpersonal ads for a product or service for provision to an ad recipient. The suggested ad can lead to a purchase of the product or the service by the ad recipient and in response the system can compensate the ad suggester. The ad creation interface allows an individual to create a suggested ad. In particular, via the interface an individual can 1) specify an ad recipient that is to receive the ad, 2) search for and select a suggested ad to send to the recipient and 3) request the system to send the selected suggested ad including a personal message to the ad recipient.

  • MERCHANT CONFIGURATION THROUGH PAYMENT NETWORK

    Embodiments of the invention are related to systems and methods for applying a discount to an electronic transaction based on control data stored in a portable merchant device. An access device interacts with a portable merchant device associated with a merchant, the portable merchant device storing control data. A processor in the access device generates a message including the control data, and electronically transmits the message to a server computer. The control data causes the server computer to reconfigure for a transaction conducted by the merchant.

  • SYSTEM, METHOD AND PROGRAM FOR EMBEDDING IN LINE ADVERTISEMENTS DURING A MULTI-FACTOR AUTHENTICATION SESSION

    Systems, methods and programs for determining a question posed to a user during a user authentication process are provided. An example of a method for determining the question comprises obtaining user commercial activity, storing the user commercial activity by activity type, generating a set of candidate questions for a user based upon the user commercial activity, each candidate question in the set of candidate questions is associated with a score, selecting one candidate question from the set of the candidate questions based upon a first selection criteria, detecting a vendor placement opportunity in the selected candidate question by analyzing the user commercial activity and adding a vendor name into the selected candidate question based upon the detecting. The user commercial activity can be user purchases of goods and services from corresponding vendors. Lost Opportunities for the placement of an advertisement are detected and recorded.

  • SYSTEMS AND METHODS FOR IMPROVING BUSINESS VISIBILITY ON INTERNET SEARCH ENGINE RESULTS PAGES

    Computerized systems and methods for marketing a business or company on the Internet and for optimizing and improving the business's or company's visibility on search results pages of conventional Internet search engines. The system and method including modules configured to allow the business or company to create an Engagement Site, create and send electronic communications to customers and prospective customers, and publish and store electronic communications on the Engagement Site.

  • SYSTEM AND METHOD FOR MANAGEMENT OF EVENT ATTENDANCE PACKAGES AND EVENT ATTENDANCE INVENTORY

    Provided herein are systems and methods for management of event attendance packages and event attendance inventory. The systems and methods include instantiation of a plurality of inventory items relating to attendance of an event. One or more event attendance packages may then be built using the instantiated inventory items. Once an event package is approved, actual inventory items may be secured, and the inventory items may be allocated to a given package so that they are not available for use by other packages. The systems and methods herein may utilize various graphical user interfaces that enable building of virtual inventory, event package construction, actual inventory acquisition, and inventory/package allocation.

  • CASH HANDLING DEVICES

    A currency receiving device (CRD) includes a currency recycler configured to accept, count, deposit, and withdraw merchant currency inserted into the CRD, a network interface, and a processor in communication with the currency recycler and the network interface. The processor is configured to transmit to a financial institution or a home office, via the network interface, an indication of an amount of merchant currency inserted into the CRD over a predetermined period of time. In some embodiments, the processor determines whether a second predetermined period of time passes during which no merchant currency is inserted into the CRD. In some embodiments, the processor determines an amount of deposited merchant currency does not meet a predetermined minimum deposit corresponding to the predetermined period of time. Alert messages, based on insufficient or untimely deposits, duress, or tampering, are optionally produced.

  • Systems and Methods of Processing and Classifying a Financial Transaction

    The present disclosure generally provides systems and methods of classifying financial transactions. In one embodiment, the present disclosure may generally include a system of classifying financial transactions. The system may include a processor coupled to a database. The processor may be programmed to receive transaction information and a source document associated with a financial transaction. The transaction information and source data associated with the source document may be stored in the database. The stored transaction information and the source data may be retrieved from the database and may form a basis for a determination of a code associated with the financial transaction.

  • SYSTEMS AND METHODS TO QUANTIFY CONSUMER SENTIMENT BASED ON TRANSACTION DATA

    A computing apparatus is configured to quantify consumer sentiment at an aggregated or micro level using transaction data that records the transactions processed by a transaction handler of a payment system. A quantification model is generated based on correlating transaction data with respective emotional content indices extracted from data sources, such as regional news, weather, stock markets, movie themes, local sports, employment, traffic conditions, etc. Using the quantification model, consumer sentiment can be evaluated at various granularity levels, based on the granularity of the user group and the time period of the transaction data used in the quantification model.

  • LEARNING STOCHASTIC APPARATUS AND METHODS

    Generalized learning rules may be implemented. A framework may be used to enable adaptive signal processing system to flexibly combine different learning rules (supervised, unsupervised, reinforcement learning) with different methods (online or batch learning). The generalized learning framework may employ non-associative transform of time-averaged performance function as the learning measure, thereby enabling modular architecture where learning tasks are separated from control tasks, so that changes in one of the modules do not necessitate changes within the other. The use of non-associative transformations, when employed in conjunction with gradient optimization methods, does not bias the performance function gradient, on a long-term averaging scale and may advantageously enable stochastic drift thereby facilitating exploration leading to faster convergence of learning process. When applied to spiking learning networks, transforming the performance function using a constant term, may lead to non-associative increase of synaptic connection efficacy thereby providing additional exploration mechanisms.

  • STOCHASTIC APPARATUS AND METHODS FOR IMPLEMENTING GENERALIZED LEARNING RULES

    Generalized learning rules may be implemented. A framework may be used to enable adaptive signal processing system to flexibly, combine different learning rules (supervised, unsupervised, reinforcement learning) with different methods (online or batch learning). The generalized learning framework may employ time-averaged performance function as the learning measure thereby enabling modular architecture where learning tasks are separated from control tasks, so that changes in one of the modules do not necessitate changes within the other. The generalized learning apparatus may be capable of implementing several learning rules concurrently based on the desired control application and without requiring users to explicitly identify the required learning rule composition for that application.

  • STOCHASTIC SPIKING NETWORK LEARNING APPARATUS AND METHODS

    Generalized learning rules may be implemented. A framework may be used to enable adaptive spiking neuron signal processing system to flexibly combine different learning rules (supervised, unsupervised, reinforcement learning) with different methods (online or batch learning). The generalized learning framework may employ time-averaged performance function as the learning measure thereby enabling modular architecture where learning tasks are separated from control tasks, so that changes in one of the modules do not necessitate changes within the other. Separation of learning tasks from the control tasks implementations may allow dynamic reconfiguration of the learning block in response to a task change or learning method change in real time. The generalized spiking neuron learning apparatus may be capable of implementing several learning rules concurrently based on the desired control application and without requiring users to explicitly identify the required learning rule composition for that task.

  • SYSTEM AND METHOD FOR EVALUATING DEFINED CONTRIBUTION PLANS

    A system and method for comparing retirement plans against a selected group of similar plans is disclosed. In one embodiment, a computer system for evaluating a retirement plan comprises a computer server having a database comprising a plurality of data defining a plurality of characteristics of each of a plurality of retirement plans, software configured for identifying a subset of the plurality of retirement plans having characteristics comparable to characteristics of a selected retirement plan, software configured for permitting the selection of at least one report from a plurality of report types, and software configured for automatically generating the selected at least one report, where the at least one report comprises an evaluation of the characteristics of the selected retirement plan against the characteristics of the subset of the plurality of retirement plans.

  • NAVIGATION LOGIC CONSTRUCT FOR USE IN FORMULATION OF A RETIREMENT OUTCOME FRAMEWORK

    A method for navigating to one or more customized, goals-based retirement outcome solution(s) is provided. The method may include using a receiver to receive essential expense information from an investor. The method may further include using the receiver to receive income information from the investor. In addition to a receiver, the method may also use a processor. The method may include using the processor to calculate: Max(Essential expenses-income,0)=AES where ("AES") represents the annual essential shortfall value ("AES"). The method may further include using the receiver to receive information corresponding to a lifetime real annuity rate. The method may also include using the processor to calculate: AES/lifetime real annuity rate=EG where ("EG") represents an essential gap value.

  • NAVIGATION LOGIC CONSTRUCT FOR USE IN FORMULATION OF A RETIREMENT OUTCOME FRAMEWORK

    A method for the online settling of a transaction in which network communications are established between a user, such as a debtor, and a computing device is presented. The method comprises receiving information, at the computing device, regarding the transaction, seeking available information pertinent to the transaction from at least one source external to the computing device and the user, processing data from the available information using a rules based engine including rules established on behalf of a party to the transaction located at the computing device, and presenting a transaction settlement offer set to the user based on at least one decision made by the rules based engine. While online, the user/debtor may accept one of the offers or engage in further approved negotiation of other offers.

  • BEHAVIORAL TARGETING SYSTEM

    A behavioral targeting system determines user profiles from online activity. The system includes a plurality of models that define parameters for determining a user profile score. Event information, which comprises on-line activity of the user, is received at an entity. To generate a user profile score, a model is selected. The model comprises recency, intensity and frequency dimension parameters. The behavioral targeting system generates a user profile score for a target objective, such as brand advertising or direct response advertising. The parameters from the model are applied to generate the user profile score in a category. The behavioral targeting system has application for use in ad serving to on-line users.

  • Intelligent Job Matching System and Method

    A job searching and matching system and method is disclosed that gathers job seeker information in the form of job seeker parameters from one or more job seekers, gathers job information in the form of job parameters from prospective employers and/or recruiters, correlates the information with past job seeker behavior, parameters and behavior from other job seekers, and job parameters and, in response to a job seeker's query, provides matching job results based on common parameters between the job seeker and jobs along with suggested alternative jobs based on the co-relationships. In addition, the system correlates employer/recruiter behavior information with past employer/recruiter behavior, parameters and information concerning other job seekers, which are candidates to the employer, and resume parameters, and, in response to a Employer's query, provides matching job seeker results based on common parameters between the job seeker resumes and jobs along with suggested alternative job seeker candidates based on the identified co-relationships.

  • Method and System for Flexible Payment Processing

    A system and method are provided that include determining eligibility of customers for flexible payment status and allowing the customers to implement the flexible payment status. The determination for eligibility is based on customer identity, payment date, and payment due date. Flex accrual is calculated if the customer is eligible for flexible payment status. The flex accrual is based on the payment amount, payment date, and payment due date. The system communicates the flex accrual to the customer and the customer is able to utilize the flex accrual by making a late payment without penalty.

  • SYSTEMS AND METHODS FOR RANKING ENTITIES BASED ON AGGREGATED WEB-BASED CONTENT

    Disclosed here are methods, systems, paradigms and structures for ranking entities associated with any given industry. The systems and methods include performing a combination of semantic, citation and numerical analysis to produce a raw measure of each entity's influence/interest that is predictive of financial market movement, consumer demand, consumer-based web chatter and other metrics. The systems and methods further include utilizing the raw measures of influence/interest into a consumer-facing ranking of entities pertaining to a given industry.

  • System For Selling

    A system for selling comprises allowing an item 10 to be purchased by a user, allowing at least one cause to be associated with the item, providing a dispersement indicator 12 to indicate to a user that purchasing of the item liberates a dispersement to at least one cause, and dispersing the dispersement to the at least one cause when the item 10 is purchased by the user. Preferably there is provided a user account for the user which may allow dispersement information to be viewed by the user. Preferably dispersement settings are alterable by the user. Preferably there is provided a link protocol so that user and cause can be linked when a dispersement is made by user to cause. In an alternative embodiment, spontaneous cause creation may be facilitated via the system, with users able to push a cause, dispersing to the cause via otherwise unrelated purchases.

  • Commerce System and Method of Recommending Product for Consumer Based on Preferred Products of Other Consumers

    A commerce system has retailers offering products for sale. Product information is collected associated with a plurality of products. A first shopping list is generated for a first consumer based on the product information. A second shopping list is generated for a second consumer based on the product information. A product preferred by the first consumer is selected as a product recommendation to the second consumer based on similarities of product preferences, characteristics, or demographics between the first consumer and second consumer. The product recommendation can also be based on popularity of the preferred product. The product recommendation is made available to the second consumer on the second shopping list or by wireless communication device. A discount for the product recommendation is offered to the second consumer. A purchasing decision within the commerce system is controlled by enabling the second consumer to select the product recommendation for purchase.

  • INDUSTRY SPECIFIC BRAND BENCHMARKING SYSTEM BASED ON SOCIAL MEDIA STRENGTH OF A BRAND

    A brand monitoring platform (BMP) for brand benchmarking based on a brand's social media strength is provided. The BMP acquires input information on the brand and identifies industries related to the brand and competing brands. The BMP acquires social media information related to the brand and the competing brands from multiple social media sources via a network, dynamically generates categories in one or more hierarchical levels in each of the industries based on an independent analysis of the social media information, and sorts the social media information into the categories using a sorting interface. The BMP generates an aggregate score using an audience score determined by measuring an aggregate reach of the brand and the competing brands based on weighted audience score metric parameters, and an engagement score determined by measuring interaction between the brand and the competing brands and their followers based on weighted engagement score metric parameters.

  • SYSTEM AND METHOD FOR COMPILING INFORMATION FOR RESOLVING TRANSACTIONS

    A system and method for gathering information pertinent to a transaction, such as one of a plurality of debts, is presented. The design comprises a server arrangement configured to seek information to compile a transaction settlement offer set, the server arrangement configured to seek at least one from a group comprising information related to personal data regarding a user, information related to account data regarding a user account, information related to macroeconomic data, and information related to the transaction. The server arrangement seeks all information from a source separate from the server arrangement and the user.

  • Enterprise Workspaces Externalization

    The present disclosure describes methods, systems, and computer program products for externalizing an enterprise workspace to business applications. One computer-implemented method includes indicating data within an application to be included in a new module, initiating a command to create the new module using the indicated data, transmitting the command to create the new module to an external server, receiving from the external server a list of available enterprise workspaces for adding the new module, selecting at least one available enterprise workspace from the list of available enterprise workspaces, transmitting the selected enterprise workspace to the external server, and receiving a confirmation of the new module creation.

  • Open Architecture for Self-Organizing Networks

    A self-organizing network (SON) with an application programming interface (API) common to multiple SON tools is described herein. Through the API, a SON tool may receive one more performance indicators associated with network information. The SON tool may then generate an updated network configuration based at least in part on the one or more performance indicators and provide, though the API, the updated network configuration to configure one or more network components. The SON tool, and other SON tools, may be executed by an SON automation engine, the SON automation engine and the API enabling additional SON tools to be added to the SON.

  • Business Communication System and Method

    A system and method for enabling a customer to utilize a smart phone to communicate with a waiter in a restaurant. The phone connects to a wireless LAN within the restaurant and, in a first embodiment, downloads a location-based communication application, which reports the phone's location to a Website Application Server (AS), which identifies the restaurant. The customer enters a table number, and the Website AS pushes a screen to the phone displaying buttons for requesting services. When the customer presses a button, the Website AS informs the LAN controller, which identifies an assigned waiter and routes the service request to the waiter. In another embodiment, the phone connects to the LAN and the customer enters a web page address. An Access Point routes the request to the LAN controller, which pushes the display screen to the phone, handles service requests, and notifies the assigned waiter.

  • Systems and Methods to Identify Account Information and Customize Offers

    A system and method is provided to allow a user to specify different merchant categories of transactions for offers that allow the user to receive different benefits for transactions in the respective merchant categories.

  • ROAD CONDITION TRACKING AND PRESENTATION

    Systems and methods can discover and present to a user road conditions. A client can include sensors to measure local road conditions. Local road conditions can be measured by a sensor and reported to a server. The server can aggregate road condition information at least by location and time, and return the aggregated information to clients to facilitate presentation of road conditions not discovered locally. Information regarding road conditions at given times and locations can facilitate road maintenance coordination and route planning.

  • Data Enrichment Using Business Compendium

    Embodiments relate to enrichment of a data warehouse utilizing a business compendium. Embodiments may employ a process comprising data standardization and cleansing, de-duplication of entries, and matching and enrichment, followed by manual review of an enriched record by a user. During standardization, data may be transformed into consistent content, placing correct data elements into appropriate fields, removing invalid characters, and/or standardizing names and addresses. Duplicate records are then detected and marked. During matching and enrichment, the existence of an entity (such as a supplier), may be verified by progressive matching against the business compendium. Enrichment may provide additional information regarding the entity (e.g. related to risk, diversity, and bankruptcy). The enriched record is available for manual review, allowing the user to change duplicates, matches, and parent/child linkages. Feedback from the user review may enhance accuracy of subsequent enrichment by self-learning aspects, reducing over time a need for manual review.

  • METHOD AND APPARATUS FOR SUPPLY RANGE BASED FORECASTING

    A method (300) and apparatus (200) perform range based forecasting. The method can include receiving (320) at least one description of an end product to be produced by an entity and a forecast demand range for the end product. The method can include determining (330) at least one intermediate product of the end product, where the intermediate product can represent a sub-component of end product. The method can include determining (340) at least one common intermediate product of the at least one intermediate product, where the at least one common intermediate product can be common to different end products. The method can include sending (350) a supply order request range of values representing at least two request quantity values for one order of one shipment of the common intermediate product.

  • TWO-FACTOR AUTHENTICATION SYSTEMS AND METHODS

    Systems and methods for authenticating defined user actions over a computer network. An authentication service receives an authentication request from an authenticating service to perform an action on behalf of a user. The authentication service then sends a permission request to a mobile device associated with the user, asking the user whether or not the action should be allowed. The user sends a permission response via the mobile device to the authentication service, granting or denying the action. The user may automate future similar responses so long as at least one automation criterion is met (e.g., the physical location of the mobile device), eliminating the need to manually provide a response to future permission requests. Information necessary to determine whether the automation criterion is met is stored locally on the mobile device.

  • PERSONAL IDENTITY CONTROL

    Obtaining authorization from a subscriber to an authorization service provided by an authorization provider in a data communications system. The data communications system includes a plurality of relying parties and a plurality of authorization providers. An authorization request including data identifying is subscriber to an authorization service is received from a relying party. An authorization provider is selected from the plurality of authorization providers on the basis of the subscriber-identifying data. An authorization request is transmitted to the selected authorization provider. An authorization response is received from the selected authorization provider. The authorization response indicates that the subscriber has authorized the request on a telecommunications device with which contact has been initiated by the authorization provider in response to the authorization request. An authorization message is transmitted to the relying party based at least in part on the authorization response received from the selected authorization provider.

  • METHOD AND APPARATUS FOR PROVIDING INTERACTION PACKAGES TO USERS BASED ON METADATA ASSOCIATED WITH CONTENT

    The disclosed embodiments relate to a method, apparatus, and computer-readable medium for providing an interaction package to a user based at least in part on metadata associated with content. An exemplary method comprises processing metadata associated with content, determining information corresponding to an interaction package for a user based at least in part on the metadata, wherein at least a portion of the interaction package is associated with the content, and transmitting the information corresponding to the interaction package to at least one of one or more user computing devices. The disclosed embodiments further relates to a method, apparatus, and computer-readable medium for presenting at least a portion of an interaction package to a user based at least in part on metadata associated with content.