­
­
­
­

Inventi Rapid - Microfinance & Banking

Patent Watch

  • Separate secure networks over a non-secure network

    Systems and methods for creating and operating separate secure networks over a non-secure network are described herein. Some illustrative embodiments include a system that includes a router with one or more ports and control logic coupled to the one or more ports (the control logic capable of establishing a plurality of secure data paths with at least one other router across a network), and a plurality of external storage devices (each storage device separate from the router but capable of being detachably coupled to a port of the one or more ports, and each external storage device comprising configuration data defining one or more secure data paths of the plurality of secure data paths). Configuration data stored in a first external storage device of the plurality of external storage devices is different from configuration data stored in a second external storage device of the plurality of external storage devices.

  • Secure method to update software in a security module

    Transmission method of a message containing a program block that avoids the consequences of a possible malicious decryption of this message is proposed. This is achieved through a secure method to update software embedded in a security module, comprising formation of a first updating program block, determination of a target memory zone of said security module, determination, through said security module, of a pre-registered content in said target memory zone, formation of a second program block obtained by the mixing of all or a part of the pre-registered content with the first program block, transmission of the second program block to the security module, reception of the second block by the security module, reading of the target memory zone, obtaining and writing in the target memory zone of the first block by the inverse mixing of all or part of the second block and of the target memory zone content.

  • Systems and methods using cryptography to protect secure computing environments

    Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority--which may be a trusted independent third party--tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)--allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.

  • Apparatus and method for employing cryptographic functions to generate a message digest

    The present invention provides an apparatus and method for  performing cryptographic operations on a plurality of message blocks within a processor to generate a message digest. In one embodiment, the apparatus has an x86-compatible microprocessor that includes translation logic and execution logic. The translation logic receives a single, atomic cryptographic instruction from a source therefrom, where the single, atomic cryptographic instruction prescribes generation of the message digest according to one of the cryptographic operations. The translation logic also translates the single, atomic cryptographic instruction into a sequence of micro instructions specifying sub-operations required to accomplish generation of the message digest according to the one of the cryptographic operations. The execution logic is operatively coupled to the translation logic. The execution logic receives the sequence of micro instructions, and performs the sub-operations to generate the message digest.

  • System and method for creating a trusted network capable of facilitating secure open network transactions using batch credentials

    A system and method for creating a trusted network capable of facilitating secure transactions via an open network using batch credentials, such as batch PKI certificates, is presented. A certificate is bound to a group, or batch, or devices. This certificate is referenced by an activation authority upon processing a request for service by a device. Information regarding the device batch certificate is maintained in a permanent, or escrow, database. A user identity is bound to a device, as a device key is used to sign a user key created on the device in the presence of the user, and a copy of the device key is later used to decrypt the signed user key upon its transmission and receipt.

  • Method and apparatus for preventing rogue implementations of a security-sensitive class interface

    A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object. These one or more methods determine the validity of the credential object by retrieving the encrypted UID from the private class stored in the server runtime environment, decrypting the UID and comparing it to the decrypted UID stored in the private field of the credential object. If the two UIDs match, a determination is made that the credential object was created by the server runtime environment rather than a rogue application. If the two UIDs do not match, or if there is no UID in the credential object, then a false result will be returned by the verification class.

  • Network-based application late binding

    The claimed subject matter provides late network binding functionality to network or web-based applications or services. An application gateway component exposes generic interfaces for different types of network applications allowing client application developers to utilize generic functionality. Client applications can invoke the generic interfaces, at which point the application gateway component can determine contextual information related to the end user. Using the contextual information, the application gateway component can perform late network binding to a network or web-based application or service by generating and transmitting a request thereto based at least in part on the generic interface invocation and user context. The contextual information can include explicit binding information or data that can be utilized to determine or infer binding preferences.

  • Methods and systems for implementing approximate string matching within a database

    A computer-based method for character string matching of a candidate character string with a plurality of character string records stored in a database is provided. The method includes identifying a set of reference character strings in the database wherein the reference character strings are identified utilizing an optimization search for a set of dissimilar character strings and generating an n-gram representation for one of the reference character strings in the set of reference character strings. The method also includes generating an n-gram representation for the candidate character string determining a similarity between the n-gram representations, and indexing the candidate character string within the database based on the determined similarities between the n-gram representation of the candidate character string and the reference character strings in the identified set.

  • Transaction data processing system

    A system (1) has an analysis engine (2) for analyzing transaction data (20) received in real time at an interface (3). A context generation engine--(25) directly receives transaction data (20) from the interface (3) and also macro data (26). Queue listeners (52) pull data from a shared memory queue (50(a), 50(b)) and feed it to transaction processors (53), which call a dynamic procedure (43) of the context generation engine (25) in real time. The transaction processors (53) therefore feeds transaction data and context parameters to a rule processor (61), effectively customizing the rule processor in real time. Each rule processor (61) executes a decision tree to determine the rules to execute in real time.

  • Evolutionary expert systems and methods using meta-rules matching

    In various embodiments, evolutionary expert systems and methods are disclosed. For example, a method for evolving a rule base of an expert system includes creating a set of meta-rules from a set of first rules associated with the expert system, creating a set of one or more generalized virtual rule candidates based on the set of first rules and the set of meta-rules, filtering the set of generalized virtual rule candidates to remove generalized virtual rule candidates that conflict with at least one rule of the set of first rules to form a set of virtual rules, and incorporating at least one virtual rule of the set of virtual rules into the set of first rules to evolve the first set of rules.

  • Method and system for multi-currency escrow service for web-based transactions

    A method and system for escrow service for web-based transactions, such as multi-currency web-based transactions, is web-accessible and accepts registrations from exchanges and/or portal partners. The completion of registration and transactions is allowed to entitled users who access the system via the web. The system maintains an internal banking engine to act as a deal manager, messaging service and accounts sub-ledger and escrows funds entrusted to it. The transaction process is composed of a number of transaction statuses, and reporting of those statuses to users is accomplished online and via web query. The system provides local currency/multi-currency capability and supports several methods of payment, such as credit cards, authorized Automated Clearing House (ACH) or equivalent direct debit/credit and wire transfer payments, and all funds movements are electronic. The system supports transaction level detail through its banking engine accounts; funds movements from its currency accounts, and escrows funds to currency based escrow accounts. Buyers completing goods/services inspections after delivery initiate settlements.

  • Systems and methods for facilitating transactions with different account issuers

    A financial account issuer facilitating transactions between accounts is disclosed. The invention provides sellers with an irrevocable method of receiving funds from a purchaser and for improving purchaser willingness to transact with an unknown party. The invention also includes the options of interest payments, the use of different account issuers, different financial accounts, budget transfers, spend compartmentalization, cost-splitting, adjusting credit limits, loans, gifting, intermediary facilitating the transaction, transaction tracking, rapid funds availability, confidential transfer of funds, immediate initiation of shipment by a seller, releasing funds to a seller only after approval of the goods, services, or other value, demonstrating proof of payment, and recourse against a remote seller.

  • Construction payment management system and method with document tracking features

    A system and method of managing a construction payment process involving a plurality of participants associated with the construction project and at least one document to be transferred between at least two participants of the plurality participants during the course of the construction project. One method can include assigning at least one enforcement action to the at least one document wherein the enforcement action is automatically effected if the document is not transferred between the at least two participants.

  • Method and system for dynamically adjusting discount rates for a card transaction

    According to one embodiment, the present invention relates to a method and a system for dynamically adjusting discount rates for a closed loop transaction. A computer implemented method for dynamically adjusting discount rates for a card transaction comprises the steps of identifying credit worthiness of at least one consumer; assigning a credit level to a line of credit associated with a credit product for the at least one consumer wherein the credit product is accepted at an identified one or more merchants; assigning a financing charge to the line of credit; determining a discount rate based at least in part on the credit worthiness of the at least one consumer; and applying the discount rate when at least one transaction is made with the credit product; wherein the applied discount rate is adjusted based on the credit worthiness of the at least one consumer.

  • Systems for processing transponder-based transactions

    The present invention includes transaction processing systems that process transactions from merchant systems designed to convert the presentation of a transponder device into electronic debits from a checking account. The transaction processing systems also can provide risk assessment, validation or user data and/or MICR data, and/or transaction guarantee services.

  • System and method for payment of medical claims

    A system allows a health care provider to arrange payment at the time of service for a patient responsibility portion of a health care claim amount, even though the provider may not know what the patient responsibility portion will be until after adjudication. A health care debit card is associated with an account of the patient. At the time of service, the patient presents the card to the provider. The provider uses the card to authorize the system to hold an estimate of the patient responsibility amount in suspense in the patient's account. After adjudication, when the actual patient responsibility amount is known, a transaction set is sent to the system. The system then automatically transfers the actual patient responsibility amount from the patient's account and into the provider's bank account. Any remainder of the suspended funds is left in the patient's account. A trace number is provided so that the provider can reconcile bank statement deposits with transaction set information.

  • System and method for providing mobile device services using SMS communications

    An enhanced services platform said platform includes an interface for receiving a communication from a user requesting a desired data. A response module parses the communication and retries the desired data. The platform arranges the desired data into a response message that is sent to the user. A user identifier database module stores information about the users in a user profile that including at least a preferences field and a preference value field identifying relative values of user preferences stored in the preference field, wherein when a preference having a higher ranking in the preference value field is non available, a second preference having a lower ranking in the preference value field is utilized.

  • Banking system controlled responsive to data bearing records

    An automated banking machine operates to carry out financial transfers responsive to data read from data bearing records. The machine includes a card reader that operates to read data from user cards. The card data corresponds to financial accounts. The automated banking machine further includes a cash dispenser and a receipt printer. The machine is operative to dispense cash to an authorized user based on identifying data including card data, and to cause a financial transfer from an account corresponding to card data through communication with at least one remote computer. The machine includes a check acceptor that operates to determine magnetic symbols included on checks. Cash may be dispensed in exchange for a check received through operation of the check acceptor of the machine.

  • Data bearing record based capture and correlation of user image data at a card reading banking system machine

    A banking system operates responsive to data read from data bearing records. Based on user data read by a card reader from a user card, a banking system machine can be used to carry out a transaction. Data read by the card reader is compared by a computer to data stored in an authorized machine user database. The banking system machine is operative to capture images of machine users. The captured user images can be stored in correlation with user transaction data in data bearing records. The banking system machine can produce markup language documents which include the data bearing records. The markup language documents can be communicated to a remote authorized analysis terminal.

  • Global method and system for providing enhanced transactional functionality through a customer terminal

    A global customer activated terminal (CAT) primarily serves traveling customers who require access to their accounts when they are away from their home financial institution and beyond their local regional financial area. The system provides applications that permit users to access their accounts and utilize account profiles and transaction journals within a generic global system approach, and each transaction set provides access to the user's full account profile. The traveling customer is also provided with access to all their accounts linked (as they would locally) to a specific card. The hardware employed in the system supports encryption key downloading, unscrambling and PIN encryption, so that security is instituted at the hardware level. To provide the maximum flexibility at each regional level for product and services offered, regional front end processors and Hosts are the arbitrators of each transaction acceptance and fulfillment, rather than the CAT.

  • Method and system for payment processing

    The present invention provides a method, system, and article of manufacture for providing payment services on a network. Information identifying a network user is received. The network user is assigned a payer status. A request to make a payment to a payee on behalf of the network user is received. If a first payer status is assigned to the network user, the payment will be made no matter the identity of the payee. If a second payer status is assigned to the network user, the payment will only be made if the payee is one of a group of payees that is not determined by the network user. With the second payer status, the network user can only direct payments to the group of payees. The payer status can be changed from one payer status to another payer status.

  • Method and system for payment processing

    The present invention provides a method, system, and article of manufacture for providing payment services on a network. Information identifying a network user is received. The network user is assigned a payer status. A request to make a payment to a payee on behalf of the network user is received. If a first payer status is assigned to the network user, the payment will be made no matter the identity of the payee. If a second payer status is assigned to the network user, the payment will only be made if the payee is one of a group of payees that is not determined by the network user. With the second payer status, the network user can only direct payments to the group of payees. The payer status can be changed from one payer status to another payer status.

  • Marketing systems and methods

    The present invention relates to real-time, automated marketing programs implementing one or more program rules matrix modules that calculate benefits to customers based on one or more customer identifier(s), one or more merchant identifier(s) and one or more customer behavior(s). In one embodiment, program rules matrix modules implement Points Multiplier Program(s) that award benefits in an accelerated fashion, based upon one or more qualifying customer identifier(s), merchant identifier(s), and customer behavior(s). Marketing programs are implemented using a host controller that communicates with a plurality of remote transaction systems to provide real-time, individualized, automated awards and sophisticated multi-variable analysis of transaction data. Another aspect of the present invention relates to systems and methods implementing a plurality of marketing programs, offered by a plurality of merchants or merchant groups, upon presentation of a qualifying identifier, such as a (single) transaction card. Yet another aspect of the present invention provides methods and systems enabling a "single-swipe" transaction, wherein data is selectively packeted and transmitted to one or more institutions following a single electronic reading of a transaction card.

  • Ubiquitous imaging device based check image capture

    A method or corresponding apparatus for remote transmission of a negotiable instrument. In an example embodiment, the process provides a carrier that secures a negotiable instrument. Next, the process creates a unique identifier, associated with the carrier, and generates an electronic image of the negotiable instrument. After generating the electronic image, the process transmits the electronic image of the negotiable instrument and the unique identifier to a remote location. The negotiable instrument may be transmitted via a fax, a scanner, a device designed to transmit electronic data, other image device compatible with ITU-T recommendations T.30 or T.4, or combination thereof. The process may also verify the negotiable instrument has a valid endorsement, verify image quality of the electronic image to ensure compliance with financial industry standards, or validate any received security information.

  • ATM that places front customer interface in communication with rear servicer interface

    An automatic banking machine operates responsive to data read from data bearing records to cause financial transfers. The machine includes a card reader that reads data corresponding to financial accounts from user cards and carries out transactions related to the accounts. The machine includes a camera, a microphone, and the card reader at a customer interface located at the front of the machine. A servicer display device is at a servicer interface located at the rear of the machine. The customer interface and the servicer interface can be placed in audio/visual communication. Although a first servicer located at the customer interface may not be directly visible to a second servicer located at the servicer interface, they are still able to communicate through the customer interface and servicer interface during machine servicing.

  • Passive magnetic levitation ride for amusement parks

    A track and vehicle assembly for amusement park ride. The assembly includes a track with an arcuate contact surface and banked corners. A levitation circuit is placed along a length of the track with passive electric coils. The assembly includes a vehicle with a body for receiving passengers. The vehicle body includes a bottom surface that is adjacent to the contact surface of the track when the vehicle is positioned on the track. To utilize passive magnetic levitation, the vehicle includes arrays of permanent magnets positioned proximate to the bottom surface of the body. The magnet arrays are arranged, such as Halbach arrays, to produce a substantially one-sided magnetic flux distribution directed outward from the vehicle body. The vehicle is levitated above the track contact surface and allowed to move side-to-side by interaction of the permanent magnets and the coils when the vehicle travels above a minimum velocity.

  • Secure online transaction system and method

    In one embodiment, an online financial account has an associated telephone registered to the account. The financial account may be accessed over a computer network, such as the Internet. Upon receipt of a request to access the account, a text message containing a dynamic password is forwarded to the telephone over a telephone network. The user trying to access the account may use the telephone to reply to the text message with another text message that includes the dynamic password. The request to access the account may be granted if the reply includes a portion that corresponds to the dynamic password.

  • System for secure online selling, buying and bill pay in an electronic commerce setting

    A method and system for biometric-secure online selling, buying and bill paying in electronic commerce and retail point-of-sale settings that also simplifies the checkout process and eliminates fraudulent transactions. The system relies on an exchange service provider (ESP) that hosts multiple servers: one implementing a web portal for secure online banking, auctions and other exchange opportunities, another being a biometric fingerprint device authenticating database, and yet another being a transaction traffic manager. Participating banks and supporting institutions distribute and activate Secure Individual Identity Devices (SIIDs) to registered users, each SIID being a portable biometric activated identification device that locally stores a fraction of the enrolled users fingerprint (minutia) along with an encrypted code that is used to verify and authenticate the user, eliminating the use of personal or financial information for this purpose. The SiiD becomes the user's own personal key for completing secure online transactions. The user simply plugs their SiiD into any USB-equipped device and scans their own fingerprint for each transaction. The encrypted codes are authenticated in the ESP database and the transaction is processed to the appropriate financial institutions.

  • Machine and method for redeeming currency to dispense a value card

    A document processing system comprises an input receptacle for receiving documents. A transport mechanism receives the documents from the input receptacle and transports the documents past a full image scanner and a discrimination unit. An output receptacle receives the documents from the transport mechanism after being transported past the full image scanner and the discrimination unit. The full image scanner includes means for obtaining a full video image of said documents, means for obtaining a image of a selected area of said documents, and means for obtaining information contained in said selected area of said document. The discrimination unit includes means for determining the authenticity of said document. A system controller directs the flows of documents over the transport mechanism.

  • MONITORING SYSTEM, PROGRAM-EXECUTING DEVICE, MONITORING PROGRAM, RECORDING MEDIUM AND INTEGRATED CIRCUIT

    To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules 131 to 133 included in an apparatus 100 each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server 200. The monitoring patterns are restructured by the update server 200 such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.

  • WIRELESS ROUTER SYSTEM AND METHOD

    A wireless router employing a technique to couple a plurality a host services or host systems and a plurality of wireless networks. A method to route data items between a plurality of mobile devices and a plurality of host systems through a common wireless router. A point-to-point communication connection is preferably established between a first host system and a common wireless router, a mobile network message at a mobile device is generated, the mobile network message is transmitted via a wireless network to the common wireless router which in turn routes a data item component of the mobile network message to the appropriate host service.

  • INTERACTIVE TELEVISION SYSTEMS WITH DIGITAL VIDEO RECORDING AND ADJUSTABLE REMINDERS

    An interactive television system is provided in which an interactive television application is used to support network-based or local personal video recorder capabilities. A user may use this application to view lists of program listings. The user may select a program listing of interest. The interactive television application may allow the user to set a reminder for the selected program at the scheduled broadcast time. This application may also allow the user to set a reminder for the selected program at a later time at which the program is not scheduled to be broadcast. The user may be provided with a reminder at this later time. In response, the user may direct the network-based or local personal video recorder to play back the program or may defer the reminder again. The interactive television application may collect information on program usage and popularity to determine how long to retain certain programming.

  • Secure Transaction Execution

    A method and system for executing a transaction is described. A payment obligation for a transaction is issued including a transaction value and details of goods and/or services to be provided by a seller following the transaction. An acceptance of the payment obligation is received from the buyer. A determination may be made regarding whether there is sufficient insured credit issued by an insurer for the buyer to cover the transaction value. A funder may be instructed to pay seller funds covering the transaction value following the buyer's acceptance of the payment obligation. A payment to reimburse the funder such that the transaction is executed may be received from the buyer.

  • INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM PRODUCT

    Aspects of the invention relate to creating virtual data of an effective obligor number N based on setting information, determining ratings after transition of the virtual data for a plurality of scenarios according to rating transition data representing transition of each rating, calculating a risk amount for each of the scenarios based on the rating after transition of the virtual data and specifying a risk amount corresponding to a confidence level as a predicted risk amount of the virtual data, setting a minimum effective obligor number N among the effective obligor numbers N when predicted risk amounts smaller than an allowable risk amount are specified, as a diversification object number, and calculating a credit limit based on the set diversification object number and a total credit.

  • Method for customer selectable overdraft avoidance

    A method for providing a bank customer facing an impending overdraft with options for directing the bank as to which transactions to pay and in what order to pay them.

  • Activity Ranking

    A system and method of ranking activities and/or services to offer to a customer is provided. In some examples, one or more products, activities or services of a financial institution may be ranked for a customer based on customer information. One or more of the ranked products, activities and services may be offered to the customer. The customer's acceptance or refusal of the offered activity may be stored and used in future rankings.

  • MESSAGING INCLUDING VALUE ACCOUNT CONVERSION

    A system, method, and computer-readable storage medium configured to facilitate, for example, point-of-sale check approval in real-time. The system converts a demand type payment transaction into a payment card transaction. A cardholder database contains a cardholder record. The cardholder record includes a demand account and payment card information of a cardholder. A network interface receives point-of-service transaction data. A transaction processor correlates the user with the cardholder record, and generates an authorization request message which is sent to an issuer for approval.

  • DYNAMIC CREDIT MANAGEMENT

    A method for providing a financial evaluation of at least one financial instrument or of an issuer supports the provision of a dynamic credit limit. A dynamic credit limit may be associated with a counterparty or a debt security of the counterparty, for example. The method includes obtaining counterparty credit quality data associated with a transaction of the financial instrument between a party and a counterparty. Debt market data is obtained where the debt market data is associated with or relevant to the transaction. A dynamic credit limit is determined for the counterparty or a financial instrument of the counterparty based on at least one of the inputted counterparty credit quality and the obtained debt market data. The dynamic credit limit may be defined in terms of a credit exposure versus time.

  • Method and System for Reduced-Risk Extension of Credit

    A system and method for extending a firm offer of credit without regard to the credit risk profile of the credit applicant is disclosed. Using seller-defined and/or system and method provider configured business rules and related payment computations, the system derives a series of initial payments representing a "down payment." After the down payment is collected, the goods or services are delivered. The purchaser may elect upfront from a plurality of payment options, including the automatic collection through recurring pre-authorized electronic funds transfers to a deposit account or via authorized and settled credit or debit card authorization(s). A purchaser using either of these options has the option, upon receipt of the goods or services, to pay the remaining balance through the continuation of electronic funds transfers or, at any point prior to completion of payments using a "one-time authorized amount for the balance due" alternative form of payment like cash, credit or debit card, to pay off the remaining balance.

  • Portable Account Number for Consumer Payment Account

    A system, apparatus, and method for providing and using a payment account or payment device identifier when conducting a transaction. The bank identification number (BIN) is decoupled from the primary account number (PAN) or other form of device identifier when generating the payment account or payment device identifier. The payment account or payment device identifier is used to access information regarding the issuer, with that information being used to route a transaction authorization request message to the appropriate entity.

  • FINANCIAL SYSTEM HAVING INCREMENTAL DOLLAR RISK

    A method of comparing at least two purchase scenarios, the method comprising the steps of: determining a first cash flow analysis for a first mortgage scenario including a takeup of a first percentage of ownership of a mortgaged property; determining a potential first capital gain attributable to the first percentage of ownership; determining a second cash flow analysis for a second mortgage scenario for the same property with the second scenario having a takeup of a second percentage of ownership of the mortgage property; determining a potential second capital gain attributable to the second percentage of ownership; determining a first difference between the first and second cash flows; determining a second difference between the first and second capital gains determining the ratio of the second difference to the first difference.

  • Bank Based Advertising System

    Embodiments of the invention include apparatuses, methods, and computer-program products that provide for a unique bank-based advertising system. In one embodiment, the bank-based advertising system receives an authentication request from a user. The system then compares information received with the authentication request to authentication information stored in a memory system to determine that the user is a customer of the bank and has access to a financial account maintained by a bank. The system then provides the user with access to a bank-based advertising system based at least partially on the determination that user is a customer of the bank and has access to the financial account. The system then allows the user to use the bank-based communication system to create an advertisement on behalf of an owner of the financial account for which the user was authenticated. The system then presents the advertisement through one or more banking outlets.

  • BANKING CENTER COMMUNITY DISPLAY

    Embodiments of the present invention provide a system, method and computer program product for providing a new bank-based communication system. For example, embodiments of the invention provide a method for: (1) identifying a user interface, where the user interface is associated with a banking center accessible to a user; (2) identifying a banking center community associated with the banking center; (3) determining content to present on the user interface based at least partially on the banking center community; and (4) presenting the content to the user using the user interface.

  • Bank balance funds check and negative balance controls for enterprise resource planning systems

    A computer implemented method and system for providing automated controls for enterprise resource planning systems comprising a bank balance funds check control and a negative balance control. The bank balance funds check control checks the existing bank balance funds available, and validates a financial transaction on detecting adequate bank balance funds available, or prevents the validation of the financial transaction on detecting inadequate bank balance funds available, thereby preventing negative funds resulting out of outgoing payment, by way of restriction on the standard functionality of bank funds available fluctuating between positive and negative amounts. The negative balance control accepts and processes incoming positive and negative receipts, and manages the situation arising there out of, irrespective of availability of adequate bank balance funds available, resulting in negative bank funds or increase in the existing negative bank funds available, by way of context-sensitive exceptions to the restriction.

  • SYSTEM AND METHOD FOR PROCESSING DATA RELATED TO CONVERTIBLE FINANCIAL INSTRUMENTS

    The present invention provides a system and method for administering an investment option known as a lifetime income share. Lifetime income shares mitigate survival risk, the risk that an individual will outlive his or her assets. More specifically, the purchase of a plurality of lifetime income shares certifies that an individual is entitled to receive a predetermined, periodic income payment for the life of the purchaser. Additionally, the lifetime income shares of the present invention may be purchased and distributed to participants by a third party (e.g. commingled fund). The third party wishing to provide the lifetime income shares of the present invention to participants may purchase a predetermined amount of shares of an annuity from the underwriting organization and distribute it to the participants. This plan has an investment phase, a distribution phase, and a payout phase. Once the payout phase begins, the stream of monthly income commences at a specified age or date.

  • SYSTEM AND METHOD FOR SELECTING SECURITIES FOR AN INVESTMENT PORTFOLIO

    Methods and systems for selecting and weighting securities for an actively managed exchange-traded fund. An initial selection of stocks includes domestic or international stocks, which are selected based at least in part on market capitalization. Each stock is scored using a plurality of growth and value factors to generate one or more growth scores and one or more value scores. A selection score is determined for each stock, and the stocks are ranked according to selection scores. A predetermined amount of stocks are eliminated from the stock portfolio based on selection score ranking, and the remaining stocks are split into a plurality of sub-groups. A stock portfolio is generated by weighting the remaining stocks according to the sub-groups they are in, with each stock being equally weighted within its sub-group. An exchange-traded fund is offered to consumers based on the stock portfolio.

  • Customizable investment fund and investing education

    A comprehensive, convenient, cost-effective, and intuitive mechanism for individuals to create, manage, and modify customized portfolios of assets and liabilities based on the individual's investment preferences, weighting schemes, risk tolerance, and timeframe. The mechanism includes a server (64) that has data storage (66) for the individual's data. The individual input (60) is used in asset and liability selections (62). There are investment tools (62) to educate individuals on investing concepts, terms, definitions, and strategies. Individuals, through an on-line discussion group, can discuss their investing questions with knowledgeable investors and access other individuals' investment related issues and comments. Investing can include fractional shares and odd lots. The system associated with the mechanism aggregates and nets the trading orders to reduce transactional costs.

  • Out of Band Credit Control

    Systems and method for mediating risks associated with orders in an electronic trading system are provided. A front end component includes a plurality of trading engines that receive orders from traders. A back-end component includes a match system. The system includes a credit control module, which may be located at the back-end (e.g., clearinghouse), front end, a combination thereof, or other location that communicates with the plurality of trading engines. The credit control may monitor aggregate risk parameters for the trading engines and requests credits from trading engines.

  • Regulating Order Entry in an Electronic Trading Environment to Maintain an Actual Cost for a Trading Strategy

    A system and method for regulating order entry based on an acceptable slop range for a trading strategy are described. According to one example embodiment, a trader may define an acceptable slop range for a trading strategy as a percentage. The trader may also define a variable to associate with the trading strategy. Using a spread trading algorithm, a spread price axis is generated and the trader may place an order for the trading strategy at a desired price, comprising placing an order in one leg market dependent on the market conditions of another leg market. Using the acceptable slop range, the system keep the net cost to the trader within the acceptable slop range, by regulating orders in the leg markets. Defining an acceptable slop range as a percentage allows the trader to monitor and regulate their profits and loss, regardless of the type of spread trading algorithm used or the placement of an order on the spread price axis.

  • Precious metal financial instrument

    In accordance with the principles of the present invention, a computer-implemented precious metals investment product and process for pricing a precious metals composite product are provided. A measured unit of trade is established. The measured unit of trade comprises a plurality of precious metal components. The measured unit of trade is quoted and traded as a unit, thus allowing for uniformity in the ongoing offers to buy and sell a fixed quantity, or multiples of this fixed quantity, and pricing consistency for the metals. The precious metals components are backed by physical precious metals. The precious metals components are electronically tracked and priced in live market prices. Live pricing of the precious metals composite product is provided utilizing the live pricing of the precious metal components. An investor retains the option to take delivery of their precious metals or to liquidate by a plurality of methods.

  • INVESTMENT COMPANY THAT ISSUES A CLASS OF CONVENTIONAL SHARES AND A CLASS OF EXCHANGE-TRADED SHARES IN THE SAME FUND

    An automated method is provided for administering a single investment company that issues one or more classes of shares that are bought from and redeemed with the single investment company at a net asset value and issues one or more classes of shares that are listed for trading on a securities exchange and that are bought and sold at negotiated market prices. One or more computers maintain account data of the outstanding shares. An owner of any share of any share class has an undivided interest in the single investment company.

  • SYSTEM AND METHOD FOR WAGERING BASED ON THE MOVEMENT OF FINANCIAL MARKETS

    A system for wagering comprises a memory and a processor. The memory stores a bet regarding a plurality of outcomes associated with financial market indicators. The bet comprises a first bet component indicating whether a value of a first financial market indicator will go up or go down in a first predetermined period of time, and a second bet component indicating whether a value of a second financial market indicator will go up or go down in a second predetermined period of time. The processor is coupled to the memory and is operable to determine an outcome of the first bet component, the second bet component, and the overall bet.

  • METHODS AND SYSTEMS FOR ASSESSING FINANCIAL PERSONALITY

    One or more aspects comprise a computer system comprising one or more servers that: (a) provide a financial personality assessment questionnaire to a user; and (b) receive data describing said user's responses to one or more questions in said questionnaire; and one or more processors in communication with said one or more servers that: (a) based on said data describing said user's responses, assess said user's investment-related attitudes across a plurality of scales and produce a multi-dimensional financial personality identifier for said user; and (b) construct a user risk profile for said user derived from said multi-dimensional financial personality identifier.

  • Leveraging to Minimize the Expected Multiplicative Inverse Assets

    The question of how much should be placed at risk on a given investment, relative to the total assets available for investment, is basically that of determining the optimal leverage. An existing well known method for calculating optimal leverage does not appear to be derived from sound principles. The approach taken by the method described in this specification is to optimize the expected future value of a function of the assets, conditioned on the assets having some estimated distribution. Asymptotically over time, the distribution of log-assets becomes Gaussian. Using this analysis, a couple of the more obvious strategies are ruled out, while the strategy of minimizing the reciprocal expected assets yields an elegant result that can also be interpreted in some sense as minimizing the risk of bankruptcy. It seems this strategy is particularly relevant for insurance companies, financial security ratings, and financial leveraging.

  • Systems, Methods, and Apparatus for Creating and Trading Hybrid Derivative Financial Instruments

    Computer systems, methods, and exchanges for generating and trading novel investment products ("Vxlshares") are described. In some embodiments, the computer system comprises a computer-readable storage medium including data encoding a value for the Vxlshare based on an underlying. The computer-readable storage medium further includes data encoding an expiration date for the Vxlshare. The computer-readable storage medium of the computer further includes data encoding a price for trading the Vxlshare, the price for trading being a function of the underlying. The computer-readable storage medium also includes data encoding an alpha-numeric symbol for the Vxlshare. The computer is configured to enable execution of trades of the Vxlshare on a platform, such as options platform, an OTC platform, or a platform especially designed for the trading of Vxlshares, on which shares of fully collateralized instruments are traded.

  • SECURITY LEVEL DETERMINATION OF WEBSITES

    A site analysis system to determine a security level of a website comprises a communication transceiver and a processing system. The communication transceiver is configured to receive content information associated with the website describing a current state of the website, receive historical event information associated with the website, and receive external information associated with the website from a source external to the website. The processing system is configured to process the content information to determine a content score for the website, process the historical event information and the external information to determine a reputational score for the website, and process the content score and the reputational score to generate a final score for the website.

  • ENHANCED MULTI FACTOR AUTHENTICATION

    In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises logic instructions which, when executed by the processor, configure the processor to receive, via a first communication channel, a primary authentication request transmitted from a user from a first device, process the primary authentication request to determine whether the user is authorized to access one or more resources, in response to a determination that the user is authorized to access one or more resources, initiate, a secondary authentication request, and transmit the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel.

  • System and Method for an Extendable Mobile Communications Device User Interface

    A system and method for an extendable software interface includes software architecture for use in a mobile device having a processor and a memory device. The software architecture includes a set of first-order controller software instructions configured to interface the application program with a first-order data model, and a first-order data object stored in the memory device in the form of the first-order data model. The first-order data object includes a second-order data object. A second-order set of controller software instructions configured to interact with the second-order data object is also included in the software architecture.

  • CRYPTOGRAPHIC TOKEN WITH LEAK-RESISTANT KEY DERIVATION

    Methods and apparatuses for increasing the leak-resistance of cryptographic systems are disclosed. A cryptographic token maintains secret key data based on a top-level key. The token can produce updated secret key data using an update process that makes partial information that might have previously leaked to attackers about the secret key data no longer usefully describe the new updated secret key data. By repeatedly applying the update process, information leaking during cryptographic operations that is collected by attackers rapidly becomes obsolete. Thus, such a system can remain secure against attacks involving analysis of measurements of the device's power consumption, electromagnetic characteristics, or other information leaked during transactions. Transactions with a server can be secured with the token.

  • ELECTRONIC PAYMENT AND AUTHENTICATION SYSTEM WITH DEBIT AND IDENTIFICATION DATA VERIFICATION AND ELECTRONIC CHECK CAPABILITIES

    An electronic payment and authentication system that includes features to verify the authenticity of a payer, validate debit data, and facilitate debit (as opposed to credit) payment transactions. The electronic payment system allows a consumer to purchase items and services via a network while utilizing a debit transaction. The invention provides merchants with the ability to verify the identity of the consumer, determine if the consumer is a good debit transaction risk, and retrieve debit data associated with a particular consumer.

  • System and Method for Instant Issue of Personalized Financial Transaction Cards

    In a method for instantly issuing a personalized financial transaction card to a customer a bank employee receives customer information and card information from the customer at a branch location. The card information may include a card personal identification number (PIN) selected by the customer. The operator inputs the customer information and at least some the card information into a data processing terminal at the branch. The customer information and the card information are communicated from the branch across a network to a card services provider. At the card services provider, the PIN is entered into a PIN database and a reference number associated with the customer and a PIN offset is generated. The reference number and at least some of the customer data and card data may be stored in a card file associated with the customer. The reference number is used to retrieve the PIN from the PIN database. The retrieved PIN is then used to apply calculations to the card file. The card file is securely sent from the card services provider across the network to the branch location. Using information from the card file, the financial transaction card is printed for the customer at the branch location. In a preferred embodiment, the personalized card is instantly issued while the customer is present at the branch location.

  • Check Processing And Funds Verification

    A system and method of verifying sufficient funds in an account associated with a negotiable instrument, such as a check, money order, traveler's check, etc., received for payment is provided. The verification of funds may be provided prior to accepting the check as payment. In some examples, the check may be scanned into a funds verification system at a back office or front end system, such as a check out lane, point of sale system, etc., of a merchant, vendor, service provider, etc. receiving the check for payment. The scanned image of the check may be transmitted to a financial institution associated with the merchant, vendor, service provider, etc. and the financial institution may verify that sufficient funds exist. If sufficient funds exist, the check may be deposited into an account of the vendor, merchant, service provider, etc. at the financial institution.

  • CHECK AND U.S. BANK NOTE PROCESSING DEVICE AND METHOD

    A check and U.S. bank note processing device configured to process both checks and U.S. bank notes and a method of using the same. The device comprises an input receptacle configured to receive checks and U.S. bank notes and an output receptacle. The device further comprises a transport mechanism configured to transport the checks and U.S. bank notes from the input receptacle past an image scanner. The image scanner is configured to obtain an image of each check and U.S. bank note transported past the image scanner. The device is configured to determine the denominations of U.S. bank notes transported by the transport mechanism. The device further comprises a memory configured to store the images of checks transported past the image scanner.

  • METHODS FOR PROVIDING STAND-IN SERVICES FOR TRANSACTION CARD CUSTOMIZATION

    The present invention is directed to methods for providing stand-in services for transaction card customization, wherein a transaction card franchiser provides the stand-in services for the transaction card issuer with regard to transaction card applicant email notification with respect to approval/rejection decisions and/or billing the transaction card applicant for the cost of a new transaction card on behalf the transaction card issuer.

  • METHODS AND SYSTEMS FOR VISUAL VOICE CALLS

    In an exemplary method, at least one telephony attribute associated with a voice call directed from a client communication subsystem to a voice network identifier is detected. Visual content that has been predefined as being associated with the at least one telephony attribute is identified. A request for the visual content is initiated in response to the detecting step. The visual content is received, in response to the initiating step, for display at the client communication subsystem.

  • Automated banking machine that operates responsive to data bearing records

    An automated banking machine controlled responsive to data bearing records includes a card reader that can read identifying data from user cards. User operation of the automated banking machine is authorized responsive to the identifying data read by the card reader. The automated banking machine is allowed temporary usage of a machine application that enables the machine to perform an authorized banking transaction requiring operation of the card reader.

  • Core/satellite financial portfolio design methodology, system and computer readable medium

    Investment choices are each within a respective asset class of a defined set of asset classes. Investment choices of a first set of the investment choices (e.g., core investment choices) are within a particular asset class and have a performance factor value that is constrained by a performance factor value range defined by a filter structure. Investment choices of a second set of the investment choices (e.g., satellite investment choices) are within the particular asset class and have a performance factor value that may or may not be constrained by the performance factor value range of the first set, but may have a separate and distinct filter structure. The filter structure specifies unique characteristics desired of a set of investment choices, including a relationship between a benchmark performance factor value and a parameter used for determining the performance factor value range. The performance factor value of each investment choice and the performance factor value of the benchmark investment choice correspond to a common performance factor. A comparative assessment of each investment choice set is performed using a comparative assessment value for each one of the investment choices within each set of investment choices.

  • Insurance Transaction System and Method

    The present invention is a system and method of creating insurance with a switching device that limits the liability of the insurer.

  • SCHEDULING PROFILE MODIFICATION INTERFACE

    Embodiments of the present invention provide an apparatus arranged to modify a scheduling profile according to a gesture of a user, the apparatus comprising a display unit for displaying scheduling profile display data a scheduling profile display data generating unit for generating scheduling profile display data representing the scheduling profile, and outputting the scheduling profile display data to the display unit, a user interface unit for tracking the gesture of the user and providing tracking data, a gesture data generating unit for generating gesture data representing the gesture of the user based on the tracking data, and a modifying unit for modifying the scheduling profile based on the gesture data, wherein the scheduling profile display data generating unit is also operable to generate scheduling profile display data representing the modified scheduling profile, and to output the modified scheduling profile display data to the display unit.

  • DECLARATIVE METHOD FOR HANDLING DEFAULTS

    According to various embodiments, methods, systems, and configuration applications for handling defaults and/or choices in a product configuration are provided. An exemplary method of handling defaults in a product configuration comprises presenting a product configuration to a user via a user interface. The method further comprises receiving a selection from the user of a configuration option via the user interface. The method further comprises determining, using a configuration engine implemented using instructions stored on one or more non-transitory computer-readable media and executable by one or more processors, at least one set of conflicting choices relating to a conflict resulting from the user selection of the configuration option and one or more constraints of the product configuration. The set of conflicting choices includes choices directly contributing to the conflict such that dropping any choice will resolve the conflict. The method further comprises determining, using the configuration engine, a strength level associated with each default selection in the minimal set of conflicting choices. The strength level of each default selection is based on an authority associated with a source of the default selection. The method further comprises determining, using the configuration engine, a default selection to drop based on its strength level. The method further comprises dropping, using the configuration engine, the determined default selection.

  • SEGMENTING FORMS FOR MULTIPLE USER COMPLETION

    The claimed subject matter provides a system and/or a method that facilitates completing multiple electronic document applications. An interface component can receive two or more electronic documents, wherein each electronic document includes at least two or more questions with respective fill-in fields to be completed by a user input. A master field component can create a master field list that includes a first subset of questions and a second subset of questions and the first subset of questions is targeted toward a first user to answer and the second subset of questions are targeted toward second user to answer. A user segregation manager component can ensure an independent and secure log in to the master field list for each user to provide information. A form aggregation component can leverage the master field list to populate or update the electronic document.

  • Method and system for database encryption

    The present disclosure is directed to a method for database encryption, which includes maintaining a database having fields and storing one or more data elements in a location associated with an IP address, wherein the IP address is 128 bits or greater and wherein the location of the IP address is remote from the location at which the database is maintained. The method may include storing, in at least one field of the database, a reference including an IP address corresponding with at least one of the data elements. In addition, the method may include retrieving the reference responsive to a request received from a user. Further, the method may include engaging a security layer around the data element, including performing at least one security check according to a security protocol, and determining whether to grant access to the at least one data element based on the security protocol.

  • Method and System for Screening Using Voice Data and Metadata

    In one embodiment, the invention provides a method, comprising: (a) maintaining a database of known fraudsters, wherein each fraudster has a voice signature and metadata associated therewith; (b) performing a screening operation to match a candidate with a fraudster in the database based on matching a voice signature and metadata for the candidate with a voice signature and metadata for the fraudster in the database.

  • GEOSPATIAL DATABASE INTEGRATION USING BUSINESS MODELS

    In certain examples, a mechanism is provided for automatically performing join operations. Source data is received and a metadata model is received. The metadata model includes a hierarchical structure. The source data is aligned to the hierarchical structure in the metadata model to form a source data hierarchy. Based on the source data hierarchy, the source data is joined to geocoded information.

  • HEALTHCARE COST TRANSPARENCY SYSTEMS AND METHODS

    Disclosed systems and methods provide healthcare cost transparency by enabling consumers to compare cost information for doctors, hospitals, and other healthcare providers before obtaining services. In some web-based server embodiments, a database is provided having available providers indexed by location and practice category. The database includes estimated costs for services from each provider, possibly based on past insurance claims submitted by each provider. A front end system provides access to the database, responding to requests for healthcare providers in a given location and practice category with lists that include an indication of costs charged by each of the listed providers relative to other providers. A user's selection of an individual provider may result in a detailed information page that includes a list of services and an estimate of the provider's fee for each service. The detail page may further include credentials, affiliations, ratings, reviews, and options to set an appointment.

  • Method and system for projecting regulated development outcomes

    A method and system are provided to aggregate real estate data, apply one or more factors based on regulations associated to a real estate development or redevelopment, analyze the projected cost of the development or redevelopment of the real estate in view of the applied factor(s), and determine the economic feasibility of a development or redevelopment project.

  • ACCOUNT OPENING COMPUTER SYSTEM ARCHITECTURE AND PROCESS FOR IMPLEMENTING SAME

    The present invention provides, in alternative embodiments, a computer architecture and/or computer implemented methods for account opening. In some embodiments, the invention provides an integrated, component-based technology platform in which globally standardized, business configurable account opening processes are separate and decoupled from the user interface screens and are directly manageable by business functionality and/or personnel. In various embodiments, the invention provides pause and resume, save and retrieve, cross-channel, metrics, audit tracking, data logging, and/or straight-through processing capabilities for account opening.

  • METHOD AND COMPUTER NETWORK FOR CO-ORDINATING FINANCIAL SERVICE/PRODUCTS

    The invention relates to a method and a computer for coordinating an electronic qualification form between a consumer and a plurality of financial service providers and wholesale investors. After receiving qualification form data, a special processing computer applies a filter to the data. The filter comprises selection criteria provided by financial service providers and wholesale investors which allows these organizations to filter out qualification forms that they do not want. After the data is filtered, the qualification form can be transmitted to those organizations who match the data in the qualification form based on the filtration. According to one exemplary aspect, a financial coordinator who runs a computer matching engine can be a single point of contact for a consumer with respect to several wholesale investors of the financial coordinator who may offer the consumer financial products or services.

  • CREDIT SCORE AND SCORECARD DEVELOPMENT

    Share of Wallet ("SOW") is a modeling approach that utilizes various data sources to provide outputs that describe a consumers spending capability, tradeline history including balance transfers, and balance information. These outputs can be appended to data profiles of customers and prospects and can be utilized to support decisions involving prospecting, new applicant evaluation, and customer management across the lifecycle. The outputs can be used as attributes to consider in developing a credit bureau scorecard.

  • System And Method For Business To Investor Exchange For Raising Capital And For Creating A Secondary Market For Private Equity

    The present invention creates a secondary market in private equities by auctioning venture-backed private equities over the Internet to qualified investors. Typical sources for the private equities will be interests in limited partnerships and pre-IPO or pulled-IPO securities. The operator of the system may sometimes take a position in certain private equities so as to have "inventory" to later sell on the system. In a typical buyer-driven transaction using the present invention, a qualified buyer puts out a bid for private assets in a particular area. Sellers who subscribe to the system receive notice of the bid and can then respond. In a typical seller-driven transaction using the present invention, a seller puts out a notice on the system of equities for sale. Buyers who subscribe to the system receive notice and can respond. Either the buyer or the seller may be charged by the system, depending on the transaction.

  • RECOVERY FROM PARTICIPANT DEFAULT IN A SECURITIES LENDING TRANSACTION

    A stock loan system enables a non-clearing member lender to lend to a non-clearing member borrower; each of the non-clearing members is associated with a respective clearing member. When a clearing member defaults, the stock loan system automatically tries to reassign the loan to a backup clearing member, or if no backup clearing member is available, the stock loan system automatically terminates the stock loan, thereby avoiding the loan being in a legal limbo due to the default of the clearing member.

  • APPARATUS AND METHOD FOR SHORT TERM LOANS

    The present invention comprises an apparatus and method for integrating a payday loan with a preconfigured repayment mechanism via contractual relationships between a lender and at least one of an employer or a payroll processing company. The most preferred embodiments of the present invention provide a mechanism for a worker to take a payroll "advance" against hours worked or hours to be worked, with the repayment of the payroll advance being automatically deducted from one or more subsequently issued paychecks by the payroll processing company or the employer. The most preferred embodiments of the present invention further comprise a series of software and/or hardware components that facilitate the automation of the payday loan process. The automation of the process makes the issuance of payday advances and the repayment of payday advances as streamlined and efficient as reasonably possible, thereby reducing the costs of participation for all parties involved.

  • SYSTEMS AND METHODS FOR MANAGEMENT OF CREDIT GROUPS

    A group management system for managing credit transactions for groups of lenders, borrowers, and/or referencers is described. The system allows the formation of credit groups comprised of one or more of lenders, borrowers, and/or referencers. The system monitors group performance and provides rewards and incentives when milestones are reached. When the group is underperforming, the system allows modification of group paramaters to improve performance. In one embodiment, the system tracks group metrics and provides information to aid in achieving an optimal group configuration.

  • Real Estate Financing System and Method

    A method for facilitating and reducing the risk for both the homebuyer and the investor providing the funds for the purchase of a home includes requiring that the homebuyer execute a non-recourse finance agreement agreement at the time of the purchase of the home. The purchase of the purchase will also include a non-recourse forfeiture agreement by which the homeowner or the investor providing the funds for the purchase of the home may enable the purchase of the home from the homeowner by the investor providing the funds for the purchase of the home.

  • Redemption of Derivative Secured Index Participation Notes

    Techniques are described for securitizing, administrating and trading various index shares securitized by derivative, cash-settled instruments on the underlying index.

  • USER TERMINAL SYSTEM AND METHOD

    A monitoring system for a user terminal, wherein the user terminal comprises at least one application for controlling a user transaction or interaction process of the user terminal, the user transaction or interaction process comprising providing content data to a hardware device of the user terminal and outputting the content data to the user by the hardware device, and the monitoring system comprises monitoring means for monitoring the content data and determining a state of the user transaction or interaction process from the content data.

  • TASK AUTOMATION FOR UNFORMATTED TASKS DETERMINED BY USER INTERFACE PRESENTATION FORMATS

    Methods and systems are provided for web page task automation. In one embodiment, the method comprises of the following steps: i) decomposing the high level task into a sequence of anthropomimetic subroutines, ii) decomposing each routine into a series of anthropomimetic actions or steps, for example stored as a unit shares of work, iii) generating computer code to interact with the content of the webpage, for each unit share of work, iv) executing the generated computer code by a web interface module, and transmitting the results of the execution of computer code, steps iii) and iv) being repeated until all steps of a subroutine have been executed, until the sequence of subroutines for a logical task have been achieved.

  • Transaction Automation And Archival System Using Electronic Contract Disclosure Units

    A transaction automation and archival system is provided for controlling, real-time logging, and archiving complex commercial transactions such as the purchase and financing of an automobile. An electronic contract disclosure unit or ECDU includes a digitizing display that includes a video display for imaging to participants the various documents involved in the transaction and a digitizer for allowing participants to sign, indicate choices, and otherwise interact directly on documents and images presented on the display. A computer controls the progress of the transaction, controlling, for example, the order of presentation of documents to a vehicle purchaser, receiving signatures on the displayed documents, offering choices of various packages to the purchaser, and insuring that the transaction is carried out properly. The transaction is logged for future review which may include a video record. One or more fingerprint readers allow participants to select between options while simultaneously verifying the identity of the individual making the selection.

  • INTERNET-BASED PROXY SERVICE TO MODIFY INTERNET RESPONSES

    A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the proxy server as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server retrieves the requested network resource. The proxy server determines that the requested resource is an HTML page. The proxy server scans the HTML page to locate one or more modification tokens that each indicates content that is subject to being modified. For at least one of the located modification tokens, the proxy server automatically modifies at least a portion of the content of the HTML page that corresponds to that modification token. The proxy server then transmits the modified HTML page to the client device.

  • INTERNET-BASED PROXY SERVICE TO LIMIT INTERNET VISITOR CONNECTION SPEED

    A proxy server for limiting Internet connection speed of visitors that pose a threat. The proxy server receives from a client device a request to perform an action on an identified resource that is hosted at an origin server for a domain. The proxy server receives the request as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server analyzes the request to determine whether a visitor belonging to the request poses a threat. If the proxy server determines that the visitor poses a threat, the proxy server reduces the speed at which the proxy server processes the request while keeping a connection to the client device open.

  • INTERNET-BASED PROXY SERVICE FOR RESPONDING TO SERVER OFFLINE ERRORS

    A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the proxy server as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server transmits the request to the origin server. Responsive to determining that the origin server is offline, the proxy server determines whether the requested resource is available in cache. If it is in cache, the proxy server retrieves the requested resource from the cache and transmits the requested resource to the client device.

  • Virtualization Layer in a Virtual Computing Infrastructure

    A cloud computing environment having a plurality of computing nodes is described. The plurality of computing nodes may be organized into a plurality of clusters, each of the plurality of clusters including a cluster controller. A virtual computing environment is created on each of the plurality of computing nodes. Communication with the virtual computing environment is enabled. An authorization to service a launch plan is received from a user. The launch plan includes at least one instance to launch. Bandwidth information is requested from each of the cluster controllers of the plurality of clusters. A score is computed for each of the plurality of clusters that responded to the requested bandwidth information. The launch plan is assigned to a cluster from the plurality of clusters based on the computed scores.

  • System and Method for Analyzing Investments

    An online investment advisory and management tool providing a system, method and apparatus for analyzing the actual cost of ownership, over time, of mutual funds and comparing those costs to the costs associated with a determined comparable exchange traded fund(s) (ETFs). The method includes an analysis of investment costs and the implicit asset allocation of the funds entered. According to one method, a user inputs mutual fund information into a client and the data is sent to a server. In an alternative embodiment, the user entitles the client to determine actual account information from a third party communicating with the user's financial institution(s). The server analyzes the mutual funds, and determines comparable ETFs. Alternatively, the user may select ETFs. After an ETF is determined, the system provides an analysis of the costs and performance of the mutual funds and the comparable ETFs and estimates the total cost of ownership. The embodiments further include a marketing tool.

  • SYSTEM, NON-TRANSITORY MEMORY WITH COMPUTER PROGRAM, AND ASSOCIATED METHODS FOR MICRO-CREDIT TO PREPAID CARDS

    A lending institution computer establishes a line of credit coupled to a prepaid card account and makes available draws to the line of credit line in an authorization stream for a proposed purchase using the prepaid card account as payment. When the line of credit is accessed, the prepaid card account is loaded with an additional value of one or more predetermined loan increments so that the prepaid card account then has a new amount totaling a previous amount plus the amount of value of the one or more preselected loan increments and so that the new amount exceeds or equals the value of a proposed purchase. Next, a new value for a line of credit balance available is determined, accounting for value loaded onto the prepaid card account and a predetermined loan advance fee for each loan increment loaded onto the prepaid card account.

  • SYSTEMS AND METHODS FOR RISK TRIGGERING VALUES

    Systems and methods for facilitating risk assessment for point of sale transactions utilizing at least one risk triggering value (RTV) is disclosed. An RTV is a condensed version of a set of complex risk data and strategies usually found in central processing sites. After receiving a request for payment authorization, a risk value is calculated for the request. The distributed processing site compares the risk value to the RTV to determine whether to authorize payment. If the risk value is less than or equal to the RTV, the payment is authorized while a risk value greater than the RTV will not be authorized. The central site calculates a new RTV for the account and distributes the new RTV to the distributed processing site.

  • PROCESSING LOAN TRANSACTIONS

    In an exemplary embodiment, a method includes receiving first financial information associated with a first loan system, wherein the first financial information is in a first format associated with the first loan system and converting, by a processor, the first financial information to a common format. The method also includes receiving second financial information associated with a second loan system, wherein the second financial information is in a second format associated with the first loan system; converting, by a processor, the second financial information to the common format; and communicating the first financial information and the second financial information to a user.

  • REAL-TIME PROFESSIONAL SERVICES MOBILE APPLICATION SYSTEM, METHOD, AND STORAGE MEDIUM

    A mobile application providing access to data stored within the content management system of a company.

  • METHOD AND SYSTEM FOR OFFLINE INDEXING OF CONTENT AND CLASSIFYING STORED DATA

    A method and system for creating an index of content without interfering with the source of the content includes an offline content indexing system that creates an index of content from an offline copy of data. The system may associate additional properties or tags with data that are not part of traditional indexing of content, such as the time the content was last available or user attributes associated with the content. Users can search the created index to locate content that is no longer available or based on the associate attributes.

  • ENERGY MANAGEMENT SYSTEM

    An energy management system includes a controller located at a site and configured to establish at least one network capable of communicating with at least one of a smart meter and at least one device disposed at the site. The controller is also configured to receive energy information of the site from the smart meter and receive energy information of the at least one device from the at least one network. The controller is also configured to communicate the energy information of the site and the at least one device to a display device associated with the site.

  • SYSTEM AND METHOD FOR PHYSICALS COMMODITY TRADING

    A method and system for an electronic commodities trading marketplace along with ancillary tools provide an electronic trading center for world market commodity importers, exporters, and the intermediaries and processors between them. This trading center is offered through its website centered around a 24-hour exchange that provides trading markets for commodities such as coffee, sugar, cocoa and cotton. The scalable system provides aggregated third party services linked to both front and back office operations. These services can include items such as live futures quotes and real-time news, futures brokerage, banking and finance links and resources, and a suite of applications tailored to members' specific risk-management and end-to-end contract execution needs. The system also provides access to shipping related services such as freight brokerage, direct booking for liner transport, load and discharge supervision and laboratory testing.

  • SYSTEM AND METHOD FOR PHYSICALS COMMODITY TRADING

    A method and system for an electronic commodities trading marketplace along with ancillary tools provide an electronic trading center for world market commodity importers, exporters, and the intermediaries and processors between them. This trading center is offered through its website centered around a 24-hour exchange that provides trading markets for commodities such as coffee, sugar, cocoa and cotton. The scalable system provides aggregated third party services linked to both front and back office operations. These services can include items such as live futures quotes and real-time news, futures brokerage, banking and finance links and resources, and a suite of applications tailored to members' specific risk-management and end-to-end contract execution needs. The system also provides access to shipping related services such as freight brokerage, direct booking for liner transport, load and discharge supervision and laboratory testing.

  • NETWORK SECURITY MANAGEMENT FOR AMBIGUOUS USER NAMES

    A method of managing network security can include receiving a user input comprising a user name and a password, determining whether the input user name potentially corresponds to a plurality of user accounts, determining whether the password is valid, and determining whether each of the user accounts is locked. The method can include selecting a security response to the user input based upon whether the input user name potentially corresponds to the plurality of user accounts, whether the password is valid, whether each of the user accounts is locked, and outputting the security re

  • METHOD AND SYSTEM FOR MATCHING SEGMENT PROFILES TO A DEVICE IDENTIFIED BY A PRIVACY-COMPLIANT IDENTIFIER

    The present relates to a method and system for matching segment profiles to a device identified by a privacy-compliant identifier. For doing so, the present method and system records at least one segment profile consisting of at least one criterion. The method and system allocates a unique segment identifier to the at least one segment profile. The method and system generates in real time a correlation between each specific segment profile and devices matching the at least one criterion of the specific segment profile. The method and system receives a query with a privacy-compliant identifier corresponding to a specific device; and sends a response with at least one matching segment identifier corresponding to at least one matching segment profile. For each of the at least one matching segment profile, the specific device identified by the privacy-compliant identifier matches the at least one criterion of the matching segment profile.sponse.

  • METHOD AND SYSTEM FOR MATCHING SEGMENT PROFILES TO A DEVICE IDENTIFIED BY A PRIVACY-COMPLIANT IDENTIFIER

    The present relates to a method and system for matching segment profiles to a device identified by a privacy-compliant identifier. For doing so, the present method and system records at least one segment profile consisting of at least one criterion. The method and system allocates a unique segment identifier to the at least one segment profile. The method and system generates in real time a correlation between each specific segment profile and devices matching the at least one criterion of the specific segment profile. The method and system receives a query with a privacy-compliant identifier corresponding to a specific device; and sends a response with at least one matching segment identifier corresponding to at least one matching segment profile. For each of the at least one matching segment profile, the specific device identified by the privacy-compliant identifier matches the at least one criterion of the matching segment profile.sponse.

  • ACTIVE POLICY ENFORCEMENT

    A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes.

  • SYSTEM AND METHOD FOR DETECTING, COLLECTING, ANALYZING, AND COMMUNICATING EVENT-RELATED INFORMATION

    A system and method involves detecting operational social disruptive events on a global scale, assigning event staging and warnings to express data in more simplistic terms, modeling data in conjunction with linguistics analysis to establish responsive actions, generating visualization and modeling capabilities for communicating information, and modeling propagation of events for containment and forecasting purposes.

  • LICENSE MANAGEMENT SYSTEM, SALES MANAGEMENT APPARATUS, AND LICENSE MANAGEMENT APPARATUS

    A disclosed license management system includes a sales management apparatus and a license management apparatus. The sales management apparatus includes a transmission unit that transmits a registration request including configuration information of a group including a combination of plural selected programs; a product registration unit that receives an input of license information corresponding to the group, associates and stores the license information with the group, in a product information storage unit as product information; and a sales management unit that transmits a list of the product information in response to a reception of a purchase request for purchasing the program, the product information being stored in the product information storage unit. The license management apparatus includes a group information storage unit that stores the configuration information included in the registration request.

  • SYSTEMS METHODS AND COMPUTER PROGRAM PRODUCTS FOR ENCODING AND DECODING TAX RETURN DATA

    Tax data, e.g., Form W2 data, is encoded as a two-dimensional machine readable representation, such as a QR CODE. Certain tax data is encoded as segments of a QR CODE, and a tax form generated by an employer or payroll processing service and provided to an employee or user includes the QR CODE representing certain W-2 or other tax data. An image of the QR CODE is acquired using a camera of a mobile communication device or computer or other image capture device. When using a Smartphone, a tax preparation application executing on the Smartphone decodes the QR CODE image to determine the tax data, and populates fields of an electronic tax return with decoded data, thus allowing a consumer to prepare an electronic tax return using a mobile communication device.

  • MULTI-PARTY PAYMENT OBJECT ORIENTED SYSTEM AND METHOD

    The present invention involves a server for accommodating multiple e-commerce payments. The server includes a processor with a communications device and software modules. The vendor software module receives payment requirements from a vendor, and also receives payment parameters from an initiator. The payment parameters include an item payment amount and an identification of contributors. The contributor software module obtains payment information from the initiator and/or contributors sufficient to authorize the commitment of funds to a transaction. The aggregation software module sends participation messages to contributors. The participation messages include information on the item, the item payment amount, and directions for the contributor to interact with the contributor module. Further, the aggregation software module maintains a total of committed funds and initiates a payment transaction when the committed funds are sufficient to pay the vendor.

  • Method for Sorting and Displaying Items in a Virtual Catalog

    A computing appliance is provided and includes a processor, an Internet interface, a data store containing virtual catalog items for service through a website, and software executing from a machine-readable physical medium causing the computing appliance to record the number of impressions of each of the items that has occurred over a defined period, record the number of sales of each of items that has occurred over the defined period, calculate the average sales price for each of the items for the defined period, multiply the average sales price by the number of sales calculated previously for each item, divide the total sales figure derived for each item by the total number of impressions calculated for that item over the defined period deriving a revenue contribution value for each item, and in response to a request to display items, serving the items included in the request according to highest revenue contribution value.

  • System for Targeting Advertising to Mobile Communication Facilities Using Third Party Data

    A system for targeting advertising content includes the steps of: (a) receiving first and second requests for advertising associated with first and second users, wherein the users are identified; (b) retrieving data pertaining to the users from a data provider; (c) selecting respective advertising content from the first and second sponsors based at least on a determination of relevancy of each advertising content to the data provider's data, wherein the relevancy determination generates respective relevancy scores; (d) determining the advertising content of the first sponsor is more relevant to the first user and the advertising content of the second sponsor is more relevant to the second user based on the respective relevancy scores; and (e) transmitting the advertising content of the first sponsor to the first mobile communication facility for display and transmitting the advertising content of the second sponsor to the second mobile communication facility for display.

  • SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ENHANCED PERFORMANCE MANAGEMENT

    A method for performance management including receiving performance data for a project, receiving risk data for the project, developing an estimate to complete (ETC) based on the performance data, adjusting the ETC based on the risk data, and developing an estimate at completion (EAC) based on the adjusted ETC.

  • PHARMACEUTICAL DATA INTEGRATION & ANALYSIS TOOL

    A system and processes are used to strategically evaluate opportunities for developing and producing generic pharmaceuticals. The system includes a knowledge driven optimization tool that efficiently analyzes pharmaceutical opportunities after merging pharmaceutical records from multiple sources. The analytical system allows users to filter the integrated records and evaluate the integrated records using patterns in the data. The system calculates historical trends of generic pharmaceutical compositions, and a user can select a market entry template that is based on the historical trends which the system then applies to a current pharmaceutical composition to create a forecast.

  • System and Method for Providing a Pre-Paid Rebate Card

    A system and method for providing pre-paid rebate cards. A rebate offer may be provided to a consumer in relation to a particular purchase. The consumer may then submit a request for redemption of the rebate. A rebate processing center may validate the request for redemption from the consumer and notify a financial institution of the request. The financial institution may subsequently issue the pre-paid rebate card to the consumer. In the case of a reusable rebate card, the financial institution may subsequently add value in the amount of the rebate to a pre-existing reusable rebate card. The financial institution may further fulfill payment obligations upon consumer use of the pre-paid rebate card.

  • System and Method for Providing a Pre-Paid Rebate Card

    A system and method for providing pre-paid rebate cards. A rebate offer may be provided to a consumer in relation to a particular purchase. The consumer may then submit a request for redemption of the rebate. A rebate processing center may validate the request for redemption from the consumer and notify a financial institution of the request. The financial institution may subsequently issue the pre-paid rebate card to the consumer. In the case of a reusable rebate card, the financial institution may subsequently add value in the amount of the rebate to a pre-existing reusable rebate card. The financial institution may further fulfill payment obligations upon consumer use of the pre-paid rebate card.

  • APPARATUS AND METHOD OF A DISTRIBUTED CAPITAL SYSTEM

    Methods, systems, and articles of manufacture consistent with the present invention provide for conducting financial transactions over a network. A user requests to execute at least one financial transaction with at least one of a number of parties, each of the parties corresponding to a data processing system on the network. Real-time financial information relating to the financial transaction is obtained, and the user can test and confirm that the financial transaction with the at least one party can take place prior to execution of the financial transaction.

  • SYSTEMS AND METHODS FOR PROVIDING MARKET INSIGHT

    The present disclosure includes a system, method, and article for providing market insight. The system may generate a market profile based upon actual purchase data. The market profile may include one or more of the following: a pricing trend, a high price, a low price, an average price, a median price, a mean price, a modal price, a most frequently paid price, an optimal date to make a purchase, an optimal date to redeem a purchase, an optimal merchant from which to purchase, and an optimal location to make a purchase. The system may further transmit the market profile to a client.

  • System and Method for Providing Competitive Pricing for Automobiles

    The invention provides information to the potential customer about the vehicle for sale, including information relating to other similar vehicles for sale in a particular geographical area that can be accessed at the point of sale, or by the customer at a later time and place. The party offering the product for sale is informed each time the customer accesses the information, thereby indicating the level of interest by the customer.

  • Management of an Offer for a Financial Incentive

    A way of providing offers for financial incentives to users as part of an electronic customer loyalty, rewards, or discount program involving one or more merchants is provided. For example, an offer criterion is received from a merchant. The offer criterion is established by the merchant for each user and associated with one or more products or services offered by the merchant. First data indicative of at least partial satisfaction of the offer criterion by a user is received. It is determined whether the first data has caused the user to satisfy the offer criterion for that user. Upon determining that the first data has caused the user to satisfy the offer criterion for that user, second data is provided to a mobile device associated with the user. The second data is representative of an offer for a financial incentive redeemable with the merchant

  • PROCESSING TRANSACTIONS OF DIFFERENT PAYMENT DEVICES OF THE SAME ISSUER ACCOUNT

    Each portable payment device associated with a single account within a payment processing system is distinguished using track data. The track data from the portable payment device is read at each of a plurality of merchant point of sale terminals (POS). Rather than relying on the PAN alone, a merchant may utilizes the track data, or a proxy thereof, as the unique identifier for the portable payment device. The merchant may then process transactions involving the portable payment device based on the unique identifier. For example, in the transit environment the transit fare for each rider with different portable payment devices but the same account can be calculated using the unique identifier, such as the full track data read from both tracks of the corresponding portable payment devices

  • METHOD FOR PERSONALIZED GUIDANCE FOR REFERENCE DATE DEPENDENT INVESTMENTS

    A system and method is provided to generate personalized savings recommendation and/or needed assignments of reference-date dependent investments. Recommendations and assignments are based on differences between a investor profile and an ideal representative that was used to construct the investments. The system provides a configurable increasing level of financial service based on a Methodology Publisher's configuration for reference date based investments. A forecast simulation system is provided for each investor with various optimizers by the Methodologically Publisher to provide various level of financial services and portfolio recommendations for reference date dependent investments. Reports may be provided to investors illustrating progress toward goals and highlighting distribution of potential risky outcomes. An online inter-active mode may allow an investor to provide further profile information and customize a solution to their needs.

  • Trade-Credit Exchange Apparatus

    An apparatus configured with software that enables participants to exchange trade-credit comprising one or more databases and processing components and which utilizes automated value matching algorithms and trade search engine algorithms to discover and process exchange paths.

  • SYSTEM AND METHOD FOR GROUP BIDDING ACCORDING TO AN OVERALL GROUP BID

    A system and method for group bidding in which the supplier accepts or rejects the bids of the group as a group according to at least the overall group bid of the group, without being allowed to select or remove individual user bids, and optionally based upon one or more other characteristics of the group.

  • Payment Network Facilitating Multi-Currency Trade Finance

    A system makes payments to vendors, including providing early pay financing of vendor's invoice in a multicurrency environment. Each invoice specifies a transaction currency. At least one of the transaction currency, a payer funding currency, the vendor remittance currency, and the finance currency is of a different currency denomination than the other two. A financier funding amount is the net payment converted to the financier currency at a market exchange rate plus a margin. A vendor resulting remittance is the net payment converted to the vendor remittance currency at a market exchange rate plus a margin. Early payment includes receiving, in a settlement account denominated in the financer currency, the financer funding amount and generating a payment of the resulting remittance amount to a vendor remittance account from a settlement account denominated in the vendor remittance currency.

  • SEAMLESSLY CAPTURING TRANSACTIONAL DATA AT THE MERCHANT'S POINT OF SALE ENVIRONMENT AND CREATING ELECTRONIC RECEIPTS, ALL IN REAL-TIME

    Series of processes and methods designed to seamlessly capture detailed transactional data from merchants' Point of Sale environments and generate final presentments of electronic receipts for both consumers and merchants, is accessible from their destination accounts, all in real time. Objectives are to: migrate all printed paper receipts to electronic forms; enable customer facing post-sales management capabilities; increase self serve; create new shopping and post-shopping experiences and satisfaction rates; significantly reduce administrative and storage requirements and costs, and provide more time for work productivity. Customers and merchants are able to create various reports and are able to directly submit them from their destination accounts for: expenditure accounting and tax purposes, payment processing, and for other company expenses. Further capabilities include creating: supplementary accounts; spend alerts; merchant driven targeted profile marketing initiatives, and business directory listings with mapping capabilities.

  • SEAMLESSLY CAPTURING TRANSACTIONAL DATA AT THE MERCHANT'S POINT OF SALE ENVIRONMENT AND CREATING ELECTRONIC RECEIPTS, ALL IN REAL-TIME

    Series of processes and methods designed to seamlessly capture detailed transactional data from merchants' Point of Sale environments and generate final presentments of electronic receipts for both consumers and merchants, is accessible from their destination accounts, all in real time. Objectives are to: migrate all printed paper receipts to electronic forms; enable customer facing post-sales management capabilities; increase self serve; create new shopping and post-shopping experiences and satisfaction rates; significantly reduce administrative and storage requirements and costs, and provide more time for work productivity. Customers and merchants are able to create various reports and are able to directly submit them from their destination accounts for: expenditure accounting and tax purposes, payment processing, and for other company expenses. Further capabilities include creating: supplementary accounts; spend alerts; merchant driven targeted profile marketing initiatives, and business directory listings with mapping capabilities.

  • Automated Stock Donation System

    A computer system is provided for donating securities to an organization. The method of carrying out the donation process comprises the steps of (a) receiving transaction authorization from a donor, (b) generating a securities management account for an organization, wherein said account comprises information for accessing the organization's financial institution, (c) receiving authorization from a donor to donate securities to said organization, wherein said authorization comprises quantity of a particular security and donor's financial institution information, (d) communicating with donor's financial institution, (e) receiving securities from donor's financial institution; and (f) liquidating said securities on a securities market. The system can comprise one or more processors arranged to carry out the steps. Also, the system can comprise one or more computer-readable mediums encoded with executable code for carrying out the steps.

  • Value Banking System And Technique Utilizing Complementary Value Currency

    A new physical currency and any electronic token thereof is exchangeable for tangible goods or intangible services and has a value that is stabilized by an underlying stock portfolio or other asset having intrinsic value, the short term market value of which is arbitrated directly or indirectly by a central value bank.

  • Value Banking System And Technique Utilizing Complementary Value Currency

    A new physical currency and any electronic token thereof is exchangeable for tangible goods or intangible services and has a value that is stabilized by an underlying stock portfolio or other asset having intrinsic value, the short term market value of which is arbitrated directly or indirectly by a central value bank.

  • Method of authorizing automated banking machine use responsive to user data read from data bearing records

    An automated banking machine operates responsive to data read from data bearing records, such as user cards, to cause machine user authorization and financial transfers. Account data read from a user card is associated in a data store with instructions for displaying a customer interface uniquely associated with the particular bank where the user holds the account. The customer interface includes user-selectable financial transaction options. The arrangement enables the customer interface of the user's home bank, with which the user is familiar, to also be automatically displayed when the user operates automated banking machines of other banks.

  • System and method for providing a platform for the trade of financial instruments

    The present invention is a system and method for providing a trading platform for the trade of F.I.s. According to some embodiments of the present invention, there may be provided a server or server cluster including at least one Interfacing Server adapted to interface with a user, possibly via a distributed data network such as the interne. The IS1 may be adapted to present to a user a trading platform, to receive from a user trade instructions, via the platform, and execute them. The trading platform may include innovative trade options including mid-trade options (e.g. trade insurance), batch trade options, series trade options, parlay trade options and "close now"/"extend" options.

  • Order risk management for financial product processing

    Systems and methods are provided for processing derivative product orders at an exchange. Traders provide derivative product order risk data to the exchange. The order risk data may include maximum delta, gamma and/or vega utilization values for derivative product contracts based on the same underlying product. Before executing a trade, a match system analyzes the trader's current utilization state and the utilization that would result after the trade. The match system may then execute all or a portion of the trade.

  • Managing consistent interfaces for business document message monitoring view, customs arrangement, and freight list business objects across heterogeneous systems

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a business document message monitoring view, a customs arrangement, and/or a freight list business object.

  • Consistent set of interfaces derived from a business object model

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction.

  • Inventory control system

    The inventory control system includes a portable controller for receiving information relating to an item to be tracked by the inventory control system. The portable controller is in communication with a database that stores the information relating to the item. Preferably, the item includes a readable tag having a unique identification code affixed thereto. A sensor may monitor the general location of the tag after the item is entered into the inventory control system. Furthermore, a tag reader associated with the portable controller is able to pinpoint the specific location of the item via a laser-light beam within the area generally identified by the sensor.

  • Size and effort estimation in testing applications

    Size of a software application testing project is determined, and person/hours required for the testing project is estimated. The software application is sized by counting the number of different parameter types that occur within testing activities associated with the application. The parameter type numbers are then divided by a scaling weight to arrive at a Testing Unit number, which is then divided by a Testing Unit rate, e.g., person hours associated with each testing unit, to arrive at an estimated testing project effort. Some embodiments include an uncertainty calculation that potentially increases testing time based on clarity of the project requirements, the tester familiarity with the application area and the tester familiarity with the domain. Some embodiments calculate separate testing project times for different phases of the testing project.

  • Auditing a device

    Auditing a device is disclosed. One or more hardware parameters that correspond to a hardware configuration is received. A sequence of modifications to the physical memory is performed. Results are provided to a verifier. Optionally, once it is determined that no evasive software is active in the physical memory, a scan is performed.

  • Portable consumer device configured to generate dynamic authentication data

    Embodiments of the invention provide a portable consumer device configured to store dynamic authentication data in memory. The portable consumer device also includes an interface for transmitting data to and receiving power from an external device. The dynamic authentication data is read from the memory by a read-write device located on the portable consumer device. The authentication data is updated and the updated data may be written into memory using the read-write device. In some embodiments, an authentication value read from the memory may be used to generate another authentication value based on an algorithm. The portable consumer device is further configured to transmit authentication data to an external device. The process of reading, updating, generating, transmitting, and rewriting the authentication data may occur each time external power is provided to the portable consumer device via the interface. The power for operating the components of the portable consumer device may be drawn exclusively from the power received from the external device (i.e., the external power). In some embodiments, a portion of the external power may be temporarily stored on an energy storage means of the portable consumer device.

  • Portable consumer device configured to generate dynamic authentication data

    Embodiments of the invention provide a portable consumer device configured to store dynamic authentication data in memory. The portable consumer device also includes an interface for transmitting data to and receiving power from an external device. The dynamic authentication data is read from the memory by a read-write device located on the portable consumer device. The authentication data is updated and the updated data may be written into memory using the read-write device. In some embodiments, an authentication value read from the memory may be used to generate another authentication value based on an algorithm. The portable consumer device is further configured to transmit authentication data to an external device. The process of reading, updating, generating, transmitting, and rewriting the authentication data may occur each time external power is provided to the portable consumer device via the interface. The power for operating the components of the portable consumer device may be drawn exclusively from the power received from the external device (i.e., the external power). In some embodiments, a portion of the external power may be temporarily stored on an energy storage means of the portable consumer device.

  • Password input system using alphanumeric matrices and password input method using the same

    The present invention relates to a password input algorithm, more particularly to a password input system and method using alphanumeric matrices. An aspect of the invention can provide a password input system and method using alphanumeric matrices that can defend against keylogging attacks and shoulder surfing attacks by including a movable second alphanumeric matrix and a fixed first alphanumeric matrix and enabling a user to input a password by moving the password letters of the second alphanumeric matrix to the user-defined value of the first alphanumeric matrix. Another aspect of the invention can provide a password input system and method using alphanumeric matrices that can defend against shoulder surfing attacks by enabling a user to input a password by dividing the password by every two digits and moving the cross-points for the two digits, respectively, to the user-defined value of the first alphanumeric matrix.

  • Ordered scheduling of suspended processes based on resumption events

    A method includes receiving a plurality of resumption events associated with a plurality of suspended processes. Each resumption event is associated with a suspended process. Each resumption event also includes an execution time and a resumption time window. The method includes determining resumption deadlines for the suspended processes and determining a resumption order based on the resumption deadlines. The resumption deadline for a suspended process is based on the execution time and the resumption time window of the corresponding resumption event. The suspended processes are scheduled for execution in accordance with the resumption order.

  • Method and system for secure remote transfer of master key for automated teller banking machine

    A method for securely transferring a master key from a host to a terminal, such as an automated teller machine, is disclosed. Each of the host and terminal is initialized with a certificate, signed by a certificate authority, and containing a public key used in used in connection with public key infrastructure communication schemes. An identifier of an authorized host is stored in the terminal. Upon receiving a communication from a host including a host certificate, the terminal validates whether it is already bound to a host, if not, whether the host identifier of the remote host matches the preloaded authorized host identifier, before further communicating with the remote host, including the exchange of certificates. In this way, the terminal is protected against attacks or intruders. Following the exchange of certificates, the host may securely transfer the master key to the terminal in a message encrypted under the terminal's public key. The terminal may decrypt the message, including the master key, using its corresponding secret key.

  • Firmware-based trusted platform module for arm processor architectures and trustzone security extensions

    A "Firmware-Based TPM" or "fTPM" ensures that secure code execution is isolated to prevent a wide variety of potential security breaches. Unlike a conventional hardware based Trusted Platform Module (TPM), isolation is achieved without the use of dedicated security processor hardware or silicon. In general, the fTPM is first instantiated in a pre-OS boot environment by reading the fTPM from system firmware or firmware accessible memory or storage and placed into read-only protected memory of the device. Once instantiated, the fTPM enables execution isolation for ensuring secure code execution. More specifically, the fTPM is placed into protected read-only memory to enable the device to use hardware such as the ARM.RTM. architecture's TrustZone.TM. extensions and security primitives (or similar processor architectures), and thus the devices based on such architectures, to provide secure execution isolation within a "firmware-based TPM" without requiring hardware modifications to existing devices.

  • Credit card relationship derivation (AcctID) from historic data

    Systems and methods for credit card relationship derivation from historic data are provided. A single credit card relationship between a membership organization and a member can be very long-lived and identified by many different account numbers over time. For example, a new card with a new number can be issued if the card is lost, stolen, the member changes the card type (Standard, Gold or Platinum) or the card number is thought to be compromised. Sometimes, data security compromises committed by third-parties can result in a simultaneous mass re-issue of many cards. Various embodiments of the present invention create a common key and ordinal numbers that identifies the account throughout its life by resolving ambiguities and inconsistencies in historical data.

  • On-line payments facility

    A computer system implements a counterparty management module and a payment module for processing employee direct payroll deposits. The counterparty management module permits an employer to add employee bank accounts to a funds transfer system provided by a banking institution. The employee bank accounts are respectively associated with different employees of the employer. The employer has a bank account at the banking institution. The counterparty management module is accessible to the employer by way of an online banking area of a website of the banking institution. The counterparty management module also permits the employer to specify a payroll-related pay group that includes the employee bank accounts and to specify characteristics of the transferring of funds to the pay group as a whole. The payment module generates payment instructions for transferring funds from the employer bank account to the employee bank accounts.

  • Educational and Game-Based Banking Application whereby Youth Earn Real Money toward Specific Savings, Spending and Charity Goals

    A money management method that teaches financial literacy is described. An account owner--including but not limited to a parent, grandparent, or legal guardian--makes money available to be earned through the system. An account beneficiary--including but not limited to a minor under the age of 18--earns money by completing a series of educational lessons and games (known in the system as "challenges"). Once earned, money is allocated by the beneficiary to specific savings, spending, and charity goals (known as "funds"). The amount of money earned for a given challenge is dependent upon the goal ("fund") to which it is allocated. Account owners can make additional moneys available (known as a "match") for specific savings and charity goals. Funds integrate on the back-end with traditional financial products--including but not limited to checking, savings, 529 and/or Prepaid accounts. The system is managed on web, mobile and tablet platforms.

  • COMPUTER IMPLEMENTED MULTI-LEVEL TRANSACTION AUTHORIZATION BANKING SUPPORT SYSTEM AND METHOD THEREOF

    A computer implemented system and method for multi-level transaction authorization in a banking support unit. The system includes a data center with a cluster further including: (i) a host for processing transactions, (ii) a security module authenticating and generating a customer personal identification number (PIN), authentication means for authenticating a point-of-sales (POS) terminal, and encryption means for encrypting all information and POS transactions. The system further includes a maker-checker unit further comprising: a token number generator for conducting sensitive transactions on said POS by unique tokens validated for adaptability with said cluster; and an authorization cards array to configured to effectuate multi-level authorization of primary and subsidiary transactions while selectively linking said primary and subsidiary transactions to said token number generator.

  • System and Method for Identifying Banking Errors

    A computer-implemented method for customer relationship management is provided. The method may include receiving bank data including bank lending credit risk management data. The method may further include receiving one or more business rules configured to perform computations upon the bank data. The method may also include identifying one or more anomalies associated with at least one of a credit risk modeling calculation and a capital adequacy calculation based upon, at least in part, the bank data. The method may additionally include generating at least one report identifying at least one loan data record for investigation.

  • AUTOMATED TELLER MACHINE WITH VIRTUAL BANK SHARING

    An automated teller machine (ATM) which includes a plurality of peripherals including a user interface for interacting with a user providing user information; a plurality of virtual automated teller machines (VATMs) resident in the ATM, the VATMs networked to a plurality of financial institutions, each VATM capable of using its own ATM software application and capable of providing its own menu of banking options to the user ; and an interface to communicate between the VATMs and the plurality of peripherals, receive the user information from the user interface, identify the user's financial institution, link the user with the user's financial institution through a selected VATM corresponding to the user's financial institution and provide the menu of banking options to the user as if the user were using an ATM dedicated to the user's financial institution.

  • Wagering Web Service System and Method

    A system to coordinate a wagering event using a virtual Web server with an administration application and a server database. The administration application is executable code which can generate a first event page from an event category page. The administration application also has a player management page, a pool page and a ticket management set of pages. The administration application interoperates with a banking application and a casino application. The administration application will send the event information to the casino application, receive wager information from the casino application, coordinate wager amounts with the banking application, close the wagering, monitor the event, update pool, close the pool, and allocate the winnings and losses.

  • SYSTEM AND METHOD FOR PROVIDING COMBINED COUPON/GEOSPATIAL MAPPING/ COMPANY-LOCAL & SOCIALLY CONSCIOUS INFORMATION AND SOCIAL NETWORKING (C-GM-C/L&SC/I-SN)

    Alternative computer based systems and methods are provided for mobile device, mobile banking, server and/or cloud based internet access to a geospatial website for a multidimensional representation of information and/or scalable versions of web content that comprises social networking and/or socially conscious information and/or activities, digital coupons and discounts, and multi-dimensional and scalable geospatial mapping associated with entities providing and/or members of the coupons and/or social networking.

  • THIRD-PARTY PAYMENTS FOR ELECTRONIC COMMERCE

    Providing for third-party payments for mobile electronic commerce is described herein. By way of example, an electronic transaction initiated at a first subscriber account can be funded at least in part from a second subscriber account. Particularly, the first subscriber account associated with a mobile terminal can select an item for purchase with a content browsing application on the first mobile terminal. A request for payment can be sent from the first mobile terminal to a second mobile terminal, associated with the second subscriber account. Funds transferred from the second mobile terminal to a banking account associated with the first mobile terminal can then be utilized to purchase the item and complete the electronic transaction. In an aspect, information pertaining to respective accounts can be masked from respective subscribers to provide financial privacy in conjunction with third party financing of electronic commerce.

  • COMPUTER IMPLEMENTED MULTI-LEVEL TRANSACTION AUTHORIZATION BANKING SUPPORT SYSTEM AND METHOD THEREOF

    A computer implemented system and method for multi-level transaction authorization in a banking support unit. The system includes a data center with a cluster further including: (i) a host for processing transactions, (ii) a security module authenticating and generating a customer personal identification number (PIN), authentication means for authenticating a point-of-sales (POS) terminal, and encryption means for encrypting all information and POS transactions. The system further includes a maker-checker unit further comprising: a token number generator for conducting sensitive transactions on said POS by unique tokens validated for adaptability with said cluster; and an authorization cards array to configured to effectuate multi-level authorization of primary and subsidiary transactions while selectively linking said primary and subsidiary transactions to said token number generator.

  • SYSTEM AND METHOD FOR CONDUCTING FINANCIAL TRANSACTIONS

    Systems and method of the present invention include a comprehensive system architecture that enables access to Non-bank financial institutions (NFBIs) and banks through point-of-sale devices and mobile telephones, for example. The present invention involves use of a modified ISO 8583 standard to allow users to interface with a front end processing system directly from non-traditional devices. The present invention also allows mobilebanking with the NBFI through use of an application residing in a user's mobile telephone, which allows the encapsulation of user information as XML, for example, and the transmission of those over http while complying with the ISO 8583 standard, and further allowing encryption of certain user data, without having to resort to access to mobile banking website. In one aspect of the invention, a POS application may run on top of PCI to enable users to make purchases using funds pre-deposited in an NBFI account.

  • COMPUTER CUSTOMIZATION OF PROVIDED PRODUCTS AND SERVICES

    A method, apparatus, computer-readable medium and system are disclosed for providing a computerized algorithm for customizing products and/or services provided to a user. The products and/or services may be related to banking and/or accounts. In some embodiments, a device may access and analyze historical information associated with a user. Based at least in part on the analysis, the device may determine whether the user has an option to customize a product or service, such as terms or conditions associated with a product or service offering. When the user has the option to customize the product/service, the device may transmit a recommendation to the user, where the recommendation comprises a suggested value to be associated with the product/service.

  • DATA MINING

    A method, apparatus, computer-readable medium and system are disclosed for acquiring data with respect to a user. In some embodiments, a computational algorithm may determine whether to provide one or more products and/or services to a user. The products and/or services may be related to banking. In some embodiments, a device may receive a request for products/services. After an initial examination of the request, the device may make a determination that more information is needed. A request for the additional information may be transmitted, and the transmitted request may include one or more incentives for voluntarily disclosing the information. In some embodiments, the requested additional information may include verified income and/or expenses. A response to the request for additional information may be received at the device. The device may analyze the response and may extend an offer for products/services. The device may further include in the offer at least one incentive as a function of information included in the response.

  • Cross-Currency Implied Spreads

    The disclosed systems and methods relate to allowing trading of over the counter ("OTC") foreign exchange ("FX") contracts on a centralized matching and clearing mechanism, such as that of the Chicago Mercantile Exchange's ("CME"'s) futures exchange system (the "Exchange"). The disclosed systems and methods allow for anonymous transactions, centralized clearing, efficient settlement and the provision of risk management/credit screening mechanisms to lower risk, reduce transaction costs and improve the liquidity in the FX market place. In particular, the disclosed embodiments increase speed of execution facilitating growing demand for algorithmic trading, increased price transparency, lower cost of trading, customer to customer trading, and automated asset allocations, recurring trades as well as clearing and settlement efficiencies.

  • METHOD AND SYSTEM FOR CREATING AND FACILITATING THE TRADING OF A FINANCIAL PRODUCT

    A method and system for intra-period estimation of index value includes the steps of providing an intra-period estimation of index value software program in a computer readable medium that is maintained in a host computer. Information is received concerning a financial investment from a data contributor, and the information includes data reported on a predetermined basis. A value is determined for each financial investment using the information. Additional information concerning the financial investment is received that includes observable data regarding each financial investment. An intra-period index is calculated using the additional information that is used in valuation of the financial activity.

  • APPARATUS AND A METHOD FOR SUPPLYING INFORMATION

    An apparatus is provided with a first receiver for receiving changing information relating to a plurality of different sets of data such as financial data and a second receiver for receiving said changing information in synchronism with said first receiver means. A data base is provided to store information received by the first receiver and a subscriber profile store stores information associating a subscriber with a group of said different sets of data. The apparatus is arranged to supply, via the mobile telecommunications network, information from the data base for the group of data sets associated in the subscriber profile store with a subscriber when communication with that subscriber is first established and thereafter to supply changing information relating to the group of data sets associated with that subscriber directly to the subscriber from the second receiver.

  • SYSTEM AND METHOD FOR ASSESSING AND RANKING NEWSWORTHINESS

    A system and method for determining a newsworthiness score for a news story, including the steps of receiving data describing a news story from a client, comparing the data describing the news story to a set of pre-determined factors, locating the factors that are present on the set of pre-determined factors in the data, adding pre-calculated values to a running total, the newsworthiness score, for each factor found in the data.

  • DEVICE, METHOD AND SYSTEM OF AUTOMATICALLY DEFINING A FINANCIAL INSTRUMENT

    Devices, systems and methods of automatically defining financial derivative instruments. For example, a computer-based method may include receiving, by a computing device, an input sequence including a sequence of a plurality of input tokens; and based on the input sequence, defining, by the computing device, a financial derivative instrument by determining, based the plurality of input tokens, values of a plurality of parameters configuring the financial derivative instrument.

  • DEVICE, METHOD AND SYSTEM OF AUTOMATICALLY DEFINING A FINANCIAL INSTRUMENT

    Tools are provided for identifying outliers or variations in trade data derived from financial asset transactions, such as securities lending transactions, foreign exchange transactions, over the counter and exchange traded derivative transactions, and equity and fixed income transactions. Such outliers may provide an indication that a given trade is suspicious or potentially inappropriate from a customer relationship point of view, a regulatory perspective, or a legal standpoint. Trades identified as outliers can be utilized in regression analyses to analyze specific trades, trader-broker relationships, or other trading activity.

  • PROCESS TRANSFORMATION AND TRANSITIONING APPARATUSES, METHODS AND SYSTEMS

    The PROCESS TRANSFORMATION AND TRANSITIONING APPARATUSES, METHODS AND SYSTEMS ("PTT") transform unoptimized locally-deployable baseline processes via PTT components into custom globally optimized processes and transition materials. In one implementation, the PTT obtains a baseline process optimization request via a processor, including a unoptimized locally-deployable baseline process. The PTT provides a notification of receipt of the baseline process optimization request, obtains a sub-process identification input, and resolves, via the processor, the unoptimized locally-deployable baseline process into one or more baseline sub-processes. Also, the PTT accesses a process template database for sub-process templates matching the resolved baseline sub-processes, and identifies, via the processor, sub-process templates matching the resolved baseline sub-processes using a matching procedure. The PTT modifies, via the processor, the identified sub-process templates according impact determinations generated using the matching procedure to generate custom globally optimized sub-processes, and stores the modified custom globally optimized sub-processes in a database.

  • Enhanced Clearing House Collateral Management System with Capabilities to Transfer Excess Collateral to Other Users

    Systems and methods are disclosed involving central clearing of forward contracts and/or other financial instruments. In particular, systems and methods for, among other things, transferring excess collateral between clearing members of a clearing house are disclosed. In some examples, systems and methods for efficient transfer of excess forward position collateral between the clearing members of a clearing house is disclosed. In some examples, the transferring may occur in the form of a sale and repurchase transaction (e.g., a "repo" transaction).

  • CHECK CASHING BANKING SYSTEM THAT OPERATES RESPONSIVE TO DATA READ FROM DATA BEARING RECORDS

    A card actuated automated banking machine (152, 198, 200) includes a plurality of transaction function devices. The transaction function devices include a card reader (170), a printer (174), a bill dispenser (176), a display (182), a check imaging device (186), and at least one processor (190). The machine is operative, responsive to receiving a check and certification data, to dispense cash in exchange for the check. The person presenting the check to the machine need not provide user identifying inputs through input devices of the machine in order to receive cash for the check. Furthermore, prior to accepting the check as a payment, the person can communicate with at least one computer (204) through at least one consumer interface device (208) to verify that the check is payable for the check amount.

  • DETERMINATION OF IMPLIED ORDERS IN A TRADE MATCHING SYSTEM

    A computer implemented method for determining implied orders in an electronic trading system is provided. The method comprises receiving a first set of one or more real orders, wherein the orders are not tradable against each other. One or more implied orders are identified within the first set of real orders. Market data corresponding to the implied orders can also be identified. At least one additional order is received and the tradability of the additional order is determined against the real or implied orders within the first set of real orders. A resting set of orders is determined from those real and implied orders within the first set of orders not affected by the tradability of the additional order. Implied orders are determined from within the set of resting orders.

  • METHOD AND SYSTEM OF TRADING A STANDARDIZED CONTRACT

    A system, method, and corresponding computer program product facilitates trading of a standardized contract. The terms of the contract may be such that it provides a payout from one party to the other based on the price, yield, level or other measure of an asset, basket, index, financial contract, other financial instrument or some economically significant variable observed at or around two specified times, both such times being after the time that the standardized contract is first available for trading. Alternatively, the terms of the contract may be such that it provides that one party has the right but not the obligation either to purchase or to sell some asset at a price which is determined at a first specified time, such right to be exercised at some time not later than the second specified time, both such times being after the time that the standardized contract is first available for trading. These and other related contracts are described.

  • Rate of Return Stops and Capital Return Transactions

    A method and system for managing and selling investments via electronic means. An investor can establish sell order criteria based upon a preset desired rate of return. The broker thereby monitors the investment and automatically sells it on behalf of the investor once the prescribed sell order criteria are met. The investor can effectively lock in a rate of return prior to its sale without monitoring. Also provided is a method and system for returning to the investor a portion of the initial investment. Once the investment reaches a predetermined value, three simultaneous events occur. A portion or all the initial invested capital is returned to the investor for purposes of reinvestment. The investment instrument is transferred to the broker as collateral, given that its value appreciated relative to the initial purchase amount. Yet the investor still owns the "rights" to the capital appreciation for the life of the investment.

  • PROVIDING POLICY EDUCATION BASED ON TRIGGERS

    Systems and methods for promoting policy education associated with one or more accounts of a financial institution are provided herein. The system receives account data associated with the one or more accounts; stores the account data in a storage device; identifies account activity subject to regulations based on the account data; and identifies triggers comprising account costs incurred by outbound transactions based on the account activity. The system then informs the user of institutional or governmental policy related to the triggers. In some situations, the system determines when a trigger indicates unavailable funds or that an account has gone to loss and informs the user of policy related to these accounts. In other situations, the system may also provide suggestions or alternatives to address these accounts.

  • SYSTEM AND METHOD OF CLASSIFYING FINANCIAL TRANSACTIONS BY USAGE PATTERNS OF A USER

    Disclosed herein is a method of classifying financial transactions by usage patterns of a user. The method includes analyzing metadata extracted from the information associated with financial transactions in accordance with at least one business rule. Where the analysis includes sequentially analyzing the metadata using a constant-time lookup data structure, a Radix tree, a Lucene tree and fuzzy logic methods, until a unique identifier is found that is associated with the metadata. The metadata with the unique identifier is then added to the constant-time lookup data structure to update the constant-time lookup data structure. The transaction data is then classified based on the unique identifier.

  • SYSTEM AND METHOD OF CLASSIFYING FINANCIAL TRANSACTIONS BY USAGE PATTERNS OF A USER

    Systems and methods for producing and maintaining account related triggers are provided herein. The systems and methods develop effective communication routines to aid in trigger delivery. In the systems and methods, account data associated with one or more account are received and the account data is stored in a storage device; patterns of account activity are determined based on the account activity; parameters associated with the patterns of activity are identified; and triggers are formed based on the pattern of account activity and parameters.

  • System and Method for Associating Financial Transaction Data with a User's Project Data Using a Portable Electronic Device

    This invention relates to a system for viewing and manipulating a user's financial transaction data and a method for associating financial transaction data with a user's project data using a portable electronic device.

  • SYSTEM AND METHOD FOR MANAGING SAVINGS OPPORTUNITIES

    Disclosed herein is a method of providing a user with one or more savings opportunities. The method comprising, gathering transaction data from a user's financial account, analyzing the transaction data for indications of savings opportunities, identifying savings opportunities from a database based on analysis and communicating the savings opportunities to the user.

  • FINANCIAL ACCOUNT RELATED TRIGGER FEATURE FOR DETECTING CHANGES IN FINANCIAL RATIOS

    Systems and methods for producing and maintaining account related triggers are provided herein. The systems and methods may be utilized for monitoring of one or more accounts of a financial institution. Triggers may be executed to monitor financial account ratios. Offers may be triggered based on the account ratios or changes in the account ratios.

  • METHOD AND SYSTEM FOR FINANCING SELF-SUFFICIENT ENERGY SYSTEMS

    An object of the present invention is to provide a method for financing the conversion of an entity from a traditional energy system to a self-sufficient energy system having the following steps: receiving the conversion cost of the self-sufficient energy system; receiving the energy cost of the traditional energy system, the energy cost determined over at least one interval; amortizing the conversion cost of the self-sufficient energy system over the at least one interval to generate an amortized interval cost; comparing the amortized interval cost to the energy cost of the traditional energy system to determine a cost ratio; comparing the cost ratio to a predetermined cost threshold; and approving the financing of the conversion of the entity from the traditional energy system to the self-sufficient energy system if the cost ratio is less than or equal to the predetermined cost threshold.

  • SYSTEM AND METHOD OF CLASSIFYING FINANCIAL TRANSACTIONS BY USAGE PATTERNS OF A USER

    Disclosed herein is a method of classifying financial transactions by usage patterns of a user. The method includes analyzing metadata extracted from the information associated with financial transactions in accordance with at least one business rule. Where the analysis includes sequentially analyzing the metadata using a constant-time lookup data structure, a Radix tree, a Lucene tree and fuzzy logic methods, until a unique identifier is found that is associated with the metadata. The metadata with the unique identifier is then added to the constant-time lookup data structure to update the constant-time lookup data structure. The transaction data is then classified based on the unique identifier.

  • SYSTEM AND METHOD OF CLASSIFYING FINANCIAL TRANSACTIONS BY USAGE PATTERNS OF A USER

    Disclosed herein is a method of classifying financial transactions by usage patterns of a user. The method includes analyzing metadata extracted from the information associated with financial transactions in accordance with at least one business rule. Where the analysis includes sequentially analyzing the metadata using a constant-time lookup data structure, a Radix tree, a Lucene tree and fuzzy logic methods, until a unique identifier is found that is associated with the metadata. The metadata with the unique identifier is then added to the constant-time lookup data structure to update the constant-time lookup data structure. The transaction data is then classified based on the unique identifier.

  • System and Method for Associating Financial Transaction Data with a User's Project Data Using a Portable Electronic Device

    This invention relates to a system for viewing and manipulating a user's financial transaction data and a method for associating financial transaction data with a user's project data using a portable electronic device.

  • System and Method for Associating Financial Transaction Data with a User's Project Data Using a Portable Electronic Device

    This invention relates to a system for viewing and manipulating a user's financial transaction data and a method for associating financial transaction data with a user's project data using a portable electronic device.

  • SYSTEM AND METHOD FOR MANAGING SAVINGS OPPORTUNITIES

    Disclosed herein is a method of providing a user with one or more savings opportunities. The method comprising, gathering transaction data from a user's financial account, analyzing the transaction data for indications of savings opportunities, identifying savings opportunities from a database based on analysis and communicating the savings opportunities to the user.

  • APPLICATION QUALITY PARAMETER MEASUREMENT-BASED DEVELOPMENT

    A development environment provides warnings based on one or more application categories set for an application. Each warning has a trigger threshold and a warning action. Different application categories have different warnings. The development environment proactively tests for trigger conditions and provides triggered warnings within a workflow that includes application designing, code editing, building, and running. For instance, a Social Networking application whose start-up time is greater than desired for Social Networking applications will trigger a warning. Password Manager or Finance applications that should use a more secure approach to store user data will trigger a warning not given to applications in other categories. A News application may trigger a warning from the development environment that application content is not easily readable if a user switches to a light color theme on a device. The application category is selected by the developer or set proactively by the development environment.

  • METHOD AND SYSTEM FOR SCORING A SOFTWARE ARTIFACT FOR A USER

    A software artifact is scored for a user. Metadata associated with an artifact about project activity of how active an artifact project is to which the artifact belongs, a security risk indicated in the metadata of the artifact, or a license indicated in the metadata of the artifact, is collected from a software repository. A weighting of the artifact alone is determined from the metadata associated with the artifact that indicates desirability of the project activity, the security risk, or the license. The metadata associated with the artifact is compared to appropriateness with a metadata of a user project to which the user belongs as indicated by a profile of the user, so as to provide a score considering the determined weighting of the artifact and a appropriateness of the artifact for the user with respect to an intended use of the artifact by the user.

  • METHODS AND SYSTEMS FOR PROVIDING CUSTOMIZED RISK MITIGATION/RECOVERY TO AN INSURANCE CUSTOMER

    A loss mitigation computer system includes a customer interface electronically receiving customer information data from a customer computer system via a communications network, a risk assessment computer processing module processing the customer information data and identifying at least one peril associated with the customer information data, a risk mitigation computer processing module generating at least one risk mitigation option based on the at least one peril and receiving customer selected risk mitigation options responsive to the generated at least one risk mitigation option from the customer computer system; and a customization computer processing module generating at least one of a calculated insurance premium, a current risk assessment, a future risk assessment, recommendations, and a gap analysis based on the received at least one customer selected risk mitigation option. Various alternative embodiments are also disclosed, including a computer implemented loss mitigation method and/or loss recovery system.

  • SYSTEMS AND METHODS FOR PERFORMING FINANCIAL TRANSACTIONS

    Systems, methods and computer-readable media for initiating, facilitating and/or performing financial transactions are disclosed. A request associated with a financial transaction may be received on behalf of a requestor. At least one financial account to be debited and at least one financial account to be credited in connection with the financial transaction may be identified based on information included or provided in association with the request. Respective payment networks that provide access to the financial accounts may be identified. One or more of the financial accounts may be accessible in real-time via a respective payment network. A respective debit or credit instruction may be transmitted to each of the identified payment networks to post a debit or credit to a corresponding financial account. Corresponding debit and/or credit status information may be received, and various status indications may be generated and transmitted, potentially for presentation to the requestor.

  • FUND SHARING METHOD AND APPARATUS

    A system, method, and computer-readable storage medium configured to enable the pooling and sharing of funds to cover shared expenses. An electronic basket is created. The electronic basket includes a virtual prepaid payment card with a unique identifier and associated with a user. The user is prompted for potential contributors to the electronic basket. A network interface electronically contacts the potential contributors, and the electronic basket is stored in a user-card database.

  • Trading Exposure Management System and Method

    Aspects of the present invention are directed to a computer-implemented trading exposure management method and system for centrally managing trading exposures within an industry. The method may include receiving a client request for additional exposure capacity above a predetermined client exposure limit with respect to a particular counterparty and selecting a third party with available exposure capacity with respect to the particular counterparty. The method may additionally include transferring at least a portion of the selected third party's available exposure capacity with respect to the particular counterparty to the client.

  • COMPUTERIZED METHOD TO ACCEPT AND SETTLE CASH TRANSACTION PAYMENTS

    A system and method is provided to accept and settle transaction payments for a consumer. The consumer initiates a transaction with a merchant, and the merchant transmits transaction information to a central processing unit using an initiating processing unit. The central processing unit generates a unique transaction identifier. The system may provide the merchant and consumer the nearest payment processing unit. At the payment processing unit, the consumer presents the unique transaction identifier, which is transmitted to the central processing unit for validation. The consumer makes payment at the payment processing unit, and the payment information is transmitted to the central processing unit. The system remits the payment to the merchant.

  • ENSURING SECURE ELECTRONIC TRANSACTIONS WITH A CLUSTER OF SERVICE FACILITIES

    Ensuring secure electronic transactions between clusters of service facilities and at least one electronic transaction facility provided at a user device involves enrolling and registering the electronic transaction facility with a main service facility via software delivered from the main service facility to the user device, establishing security credentials for the clusters of service facilities with the main service facility, and configuring the electronic transaction facility with transaction credentials of at least one service facility in the clusters of service facilities when a user opts to avail a service from the service facility.

  • SYSTEM AND METHOD FOR PURCHASING A FINANCIAL INSTRUMENT INDEXED TO ENTERTAINMENT REVENUE

    A method for purchasing a securities bundle indexed to entertainment revenue comprises selecting a securities bundle offered by a special-purpose entity. The securities bundle comprises a first security and a second security and the securities bundle is associated with a closing date. The first security is associated with a first entertainment event and the second security is associated with a second entertainment event. The method continues by identifying a return value associated with the securities bundle, and by identifying a purchase price associated with the securities bundle. The method concludes by purchasing the selected securities bundle at least partially based on the purchase price and the return value.

  • KIT, SYSTEM AND ASSOCIATED METHOD AND SERVICE FOR PROVIDING A PLATFORM TO PREVENT FRAUDULANT FINANCIAL TRANSACTIONS

    A system and associated method and service for providing a platform that prevents fraudulent transactions by allowing for the deposit, withdrawal, transfer, and exchange of denomination, including cash, international currencies, digital currency, hard and soft commodities, and coupons to and from members and non-members, in a mobile telecommunications environment, without tendering a financial instrument, such as a credit card or a check.

  • STANDARDIZATION AND MANAGEMENT OF OVER-THE-COUNTER FINANCIAL INSTRUMENTS

    A method of managing financial products is disclosed. The method includes receiving transaction parameters associated with a financial transaction, determining a standardized financial product, wherein the standardized financial transaction reflects the transaction parameters associated with the financial position, calculating a net present value position between the financial position and the standardized financial product, and clearing the net present value position through a clearing party.

  • Determination of Account Status

    According to an embodiment, status of an account is determined. A plurality of graphic areas is displayed. Each of the graphic areas is associated with a client application. In a first graphic area of the plurality of graphic areas, a first image is displayed that indicates a first status associated with the account. A communication associated with the account is received. In response to receiving the communication, the first image in the first graphic area is replaced with a second image indicative of a second status associated with the account.

  • CONSISTENT INTERFACE FOR FINANCIAL INSTRUMENT IMPAIRMENT EXPECTED LOSS ANALYTICAL RESULT

    A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to a financial instrument impairment expected loss analytical result business object.

  • HYBRID ACCOUNT

    A system, according to one embodiment, includes a hybrid account provided by an issuer to a user, the hybrid account having a balance, the balance being either positive, zero, or negative; and a financial instrument including a hybrid card, the hybrid card providing access to the hybrid account, in which transactions using the hybrid card provide interchange income to the issuer, the issuer charges interest to the hybrid account when the balance is negative, and the issuer pays interest to the hybrid account when the balance is positive.

  • FINANCIAL GOAL VISUALIZATION SYSTEM

    A method for visualizing a financial goal includes receiving a selection of a financial goal from a user device of a user over a network. The financial goal includes a plurality of financial sub-goals, each of which is associated with a different image in a database. A plurality of first financial data is retrieved from user accounts of the user, and a first financial goal status is determined using the first financial data. An image for each financial sub-goal of the financial goal is provided based on the first financial goal status in order to display a storyboard having a plurality of images for visualizing progress related to the financial goal on a display device. As the financial goal status changes according to financial data retrieved from the users accounts, the image displayed for may financial sub-goal may be changed, visually indicating the users progress towards their financial goals.

  • TECHNIQUES FOR PURCHASING BY CREDITING A MERCHANT'S CARD

    An indication that a consumer wishes to check-out in connection with an on-line purchase of goods is obtained at a server of a merchant. Responsive to obtaining the indication, a total transaction amount, a credit-only payment card account number of the merchant, and a reference number assigned to the on-line purchase of goods are sent to the consumer. A guarantee that the consumer will cause the total transaction amount to be credited to the credit-only payment card account number of the merchant is obtained at the server of the merchant, from a bank of the merchant which issues the credit-only payment card account. The guarantee is associated with the reference number. Responsive to obtaining the guarantee, the goods are shipped to the consumer.

  • SMARTPHONE BARCODE TRANSACTIONS

    Systems and methods for processing payments using a dynamic security code are provided. An account authorization system may generate a plurality of dynamic security codes and transmit the plurality of dynamic security codes to a portable consumer device. The portable consumer device may generate a payment code comprising a transaction account number and a dynamic security code. A merchant may scan the payment code and transmit a transaction request to the account authorization system. The account authorization system may compare the transaction account number and dynamic security code in the transaction request to a transaction account number and dynamic security code stored in a database. The account authorization system may transmit an authorization message to the merchant.