FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Den patents



      
           
This page is updated frequently with new Den-related patent applications. Subscribe to the Den RSS feed to automatically get the update: related Den RSS feeds. RSS updates for this page: Den RSS RSS


System and method for a secure environment that authenticates secure data handling to the user

System and method for a secure environment that authenticates secure data handling to the user

System and method for a secure environment that authenticates secure data handling to the user

Facilitation of social interactions

Date/App# patent app List of recent Den-related patents
11/13/14
20140338071
 Nucleotide sequences mediating male fertility and method of using same patent thumbnailNucleotide sequences mediating male fertility and method of using same
Nucleotide sequences mediating male fertility in plants are described, with dna molecule and amino acid sequences set forth. Promoter sequences and their essential regions are also identified.
11/13/14
20140338005
 Information processing apparatus, system management method, and recording medium patent thumbnailInformation processing apparatus, system management method, and recording medium
In an information processing apparatus, software is installed to build a system providing a predetermined function. The information processing apparatus includes a generating unit configured to generate system identification information for identifying the system built by installing the software, the system identification information being generated from authentication information obtained by performing license authentication on the software; and a registering unit configured to send the system identification information generated by the generating unit to a management device that manages a plurality of the systems via a predetermined data transmission line, to register the system identification information in the management device as management information..
11/13/14
20140338004
 System and method for a secure environment that authenticates secure data handling to the user patent thumbnailSystem and method for a secure environment that authenticates secure data handling to the user
A system and method is introduced for combining a secure device with a non secure user machine for using and sharing secure data seamlessly through the non secure user machine. The secure device runs in a separate, “parallel world” to the user machine so that the user machine cannot access secure data while it is being used.
11/13/14
20140338002
 Facilitation of social interactions patent thumbnailFacilitation of social interactions
Embodiments relate to facilitating social interactions. An aspect includes determining that a first communications device is in communicative contact with a second communications device, identifying at least one artifact relating to a user of the first communications device, and searching at least one database for information about a user of the second communications device that is in common with the user of the first communications device with respect to the artifact.
11/13/14
20140338001
 Collaborative parental control of streaming media patent thumbnailCollaborative parental control of streaming media
A network device receives a request for a selected video from a first user at a client device, and determines similarities between a second user associated with the first user and other parents in a collaborative community, wherein the similarities are determined based on the second user's, and the other users', prior censoring of videos. The network device obtains all exclusions applied by the second user, and the other users, in the collaborative community to the selected video, wherein each of the exclusions comprises a portion of the selected video identified for censoring by one of the users in the collaborative community.
11/13/14
20140337999
 System and method for access control and identity management patent thumbnailSystem and method for access control and identity management
In a computer environment, a mechanism for the flow of access by means of derivation is provided. Typically, access rights granted with respect to an access point flow (or derive from) an access provider to an access recipient.
11/13/14
20140337998
 Automatic application dependent anonymization patent thumbnailAutomatic application dependent anonymization
Disclosed are various embodiments for facilitating the anonymization of unique entity information when transmitting data to services. A content server may store entity identifiers that respectively represent entities associated with the content server.
11/13/14
20140337997
 Method and system for blocking transmission of data on a mobile device patent thumbnailMethod and system for blocking transmission of data on a mobile device
A software application stored in a memory in a mobile device for selectively blocking data transmission via a mobile device over a communication network, comprising means for identifying a software application of interest from among a plurality of software applications stored in a memory of the mobile device, means for determining a categorization of the software application of interest based on data provided over the communication network from a database, and means for selectively restricting transmission of data to or from the software application of interest over the communication network based on the determined categorization, wherein personally identifiable information is prevented from being transmitted by the software application of interest if the determined categorization indicates that transmission of date to or from the software application of interest is to be restricted.. .
11/13/14
20140337995
 Systems and method for identifying and mitigating information security risks patent thumbnailSystems and method for identifying and mitigating information security risks
Methods and systems for sustained testing and awareness refresh against phishing threats (star*phish™) are disclosed. In an embodiment, a method assigns schemes and unique identifiers to target e-mail addresses associated with a user accounts.
11/13/14
20140337982
 Risk prioritization and management patent thumbnailRisk prioritization and management
Methods for managing and prioritizing risk include receiving a data set and analyzing the data set for duplicates, false positives, false negatives, and tool errors. Said duplicates, false positives, false negatives and results of tool errors are removed from the data set, creating an input file.
11/13/14
20140337981
Fingerprint analysis for anti-virus scan
Disclosed are systems and methods for fingerprint analysis for anti-virus scanning in an embodiment, a method of scanning for infected data items is disclosed. The method provides identifying a plurality of changed data items on a server machine.
11/13/14
20140337979
Using telemetry to reduce malware definition package size
Clients send telemetry data to a cloud server, where the telemetry data includes security-related information such as file creations, timestamps and malware detected at the clients. The cloud server analyzes the telemetry data to identify malware that is currently spreading among the clients.
11/13/14
20140337977
Automated deployment of protection agents to devices connected to a distributed computer network
Network traffic is monitored to detect attempted inter-network communications, including attempts by devices internal to the network to communicate with resources external to the network and attempts by devices external to the network to establish vpn sessions with resources internal to the network. Upon detecting an attempted inter-network communication, the device responsible for initiating such communication is identified.
11/13/14
20140337974
System and method for semantic integration of heterogeneous data sources for context aware intrusion detection
A semantic approach to intrusion detection is provided that can utilize traditional as well as nontraditional data sources collaboratively. The information extracted from these traditional and nontraditional data sources is expressed in an ontology, and reasoning logic rules that correlate at least two separate and/or distinct data sources are used to analyze the extracted information in order to identify the situation or context in which an attack can occur.
11/13/14
20140337972
Social threat scoring
A method includes identifying data on a social network that is associated with a social entity, and determining one or more characteristics of the identified data. A reference to the identified data is generated for each of the one or more characteristics.
11/13/14
20140337965
Method and system for access to development environment of another with access to intranet data
A method for secure external access to a collaborative design system is provided that includes establishing a virtual private network (vpn) tunnel between an engagement virtual machine and an external computer system, wherein the external user provides a user id and password for authorization to establish the vpn tunnel, receiving the user id and password in a web interface of the collaborative design system and identifying the engagement virtual machine the external user is allowed to access based on the user id and password, prompting the external user to log into the engagement virtual machine, wherein the user id and password are again received from the external user, issuing a security ticket to the external user when the user logs into the engagement virtual machine, and using the security ticket to authenticate accesses initiated by the external user to engagement files stored in a file system in an intranet.. .
11/13/14
20140337964
Software firewall control
A software firewall that may be configured using rules specified for types of network interfaces rather than individual network interfaces. The network types may be specified with type identifiers that have a readily understandable meaning to a user, facilitating ease of configuring the firewall.
11/13/14
20140337960
Trusted service interaction
In one embodiment a controller comprises logic configured to receive, from an application executing on an untrusted execution complex of the electronic device, a request for a secure communication session with a remote service, verify a security credential received from the remote service, establish a secure communication connection between the secure controller and the remote service, establish a secure user interface, collect one or more authentication credentials from a user via the secure user interface, forward the one or more authentication credentials to the remote service, and conduct a secure communication session with the remote service. Other embodiments may be described..
11/13/14
20140337958
Security framework for http streaming architecture
Methods and apparatus for preventing unauthorized access to online content, including in particular streaming video and other media, are provided. In various embodiments, techniques are provided to authorize users and to authenticate clients (e.g., client media players) to a content delivery system.
11/13/14
20140337957
Out-of-band authentication
In one aspect, the present disclosure is generally directed to a hardware token for completing an out-of-band authentication. In one embodiment, the hardware token performs a method that comprises: receiving an out-of-band encryption key from a client computing device; deriving a security credential that uniquely identifies the hardware token; transmitting the derived security credential and received out-of-band encryption key over the out-of-band communication channel to a network backend over a wireless network; receiving an in-band encryption key over the out-of-band communication channel; and transmitting the received in-band encryption key to the paired client computing device..
11/13/14
20140337954
Method and apparatus for providing federated service accounts
An approach is provided for determining that a user has been authenticated for an access to at least one service using a federated identity (401). The approach also comprises determining federated account information associated with the user based, at least in part, on one or more user accounts associated with the federated identity, the at least one service, the at least one or more other services, or a combination thereof (403).
11/13/14
20140337952
Method and devices for running push-button configuration sessions
A method and a network node device run push-button configuration sessions within a heterogeneous network, ieee 1905.1, using a push button configuration mechanism that ensures that only one single new network node device is registered for a single push button key press event and thus overlapping push-button configuration sessions within a heterogeneous network are prevented. After finishing the push button configuration mode, the number of new nodes is checked.
11/13/14
20140337950
Method and apparatus for secure communications in a wireless network
A method and apparatus for secure communications between an access point and a station in a wireless network is provided. The station receives a first message from the access point in the wireless network, the first message includes a first hashed service set identifier (ssid) generated by the access point by performing a first hash function on an ssid associated with the access point.
11/13/14
20140337949
System and method for generating a biometric identifier
Systems and methods are provided for recording a user's biometric features and generating an identifier representative of the user's biometric features using mobile device such as a smartphone. The systems and methods described herein enable a series of operations whereby a user using a mobile device can capture imagery of a user's face, eyes and periocular region.
11/13/14
20140337948
System and method for determining liveness
Systems and methods are provided for recording a user's biometric features and generating an identifier representative of the user's biometric features and whether the user is alive (“liveness”) using mobile devices such as a smartphone. The systems and methods described herein enable a series of operations whereby a user using a mobile device can capture imagery of a user's face, eyes and periocular region.
11/13/14
20140337947
Method of improving online credentials
The invention comprises a method of providing additional assurance regarding a websites authenticity. The assurance is provided by using a credential that contains an image of the website operator or the website operator's business operations.
11/13/14
20140337944
Systems and methods for processing and transmitting sensor data
Systems and methods for continuous measurement of an analyte in a host are provided. The system generally includes a continuous analyte sensor configured to continuously measure a concentration of analyte in a host and a sensor electronics module physically connected to the continuous analyte sensor during sensor use, wherein the sensor electronics module is further configured to directly wirelessly communicate sensor information to one or more display devices.
11/13/14
20140337941
Methods and devices for providing warnings associated with credentials to be stored in a credential store
Methods and devices for providing a warning associated with credentials to be stored in a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises receiving a request to store, in the credential store, at least one credential for a specified service, determining whether a secure connection between the computing device and the specified service is available, associating the specified service with a level of security based on at least one of an availability of the secure connection or one or more properties of the secure connection, and providing a warning in response to determining that at least one credential stored in the credential store corresponds to the at least one credential for the specified service and is for a service that is associated with a level of security different from the level of security with which the specified service is associated..
11/13/14
20140337940
Remote provisioning of 3gpp downloadable subscriber identity module for virtual machine applications
A method is presented of providing a subscriber identity for the provision of services on behalf of the subscriber in a virtual computing environment. The method includes receiving a request to establish an execution environment for a virtual machine-to-machine equipment, vm2 m e.
11/13/14
20140337937
Methods and devices for detecting unauthorized access to credentials of a credential store
Methods and devices for detecting unauthorized access to credentials of a credential store on a computing device are disclosed herein. In one broad aspect, the method comprises monitoring a plurality of credentials of the credential store accessed within a period associated with a first setting, and responsive to determining that a number of credentials accessed within the period exceeds a threshold associated with a second setting, outputting, in a user interface, an indication of potential unauthorized access to the credential store.
11/13/14
20140337935
Fast-accessing method and apparatus
A fast-accessing method may comprise: establishing a first security connection between a first network node and a user equipment; obtaining first information from a second network node, wherein the first information comprises at least one of system information of the second network node and an identifier of a security algorithm selected by the second network node for the user equipment; providing second information to the second network node, in response to an indication of the second network node from the user equipment, wherein the second information comprises security information related to the user equipment; and sending the first information to the user equipment for establishing a second security connection between the user equipment and the second network node.. .
11/13/14
20140337934
System and methods for access control based on a user identity
System and methods for access control in a universal plug and play (upnp) network are based on a user identity. A control point has an identity assertion capability for identifying a user.
11/13/14
20140337930
System and method for authorizing access to access-controlled environments
Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with fixed pc's, servers and mobile devices (e.g., smartphones) operated by users.
11/13/14
20140337927
Authorization of media content transfer between home media server and client device
A method for authorizing media content transfer between a home media server and a client device and provisioning drm credentials on the client device, the method comprising receiving a service authorization credential at a client authorization server from a pki provisioning server, wherein the service authorization credential is associated with a client device, and sending a validation response from the client authorization server to the pki provisioning server if the client authorization server determines that the service authorization credential was previously provided by the client authorization server to the client device, wherein the validation response releases the pki provisioning server to send drm credentials to the client device.. .
11/13/14
20140337920
Secure element as a digital pocket
The disclosure includes a system and method in which one or more virtual resources are presented to a secure element; and the one or more virtual resources are mapped to available resources based on a model architecture for the secure element in order to provide hardware abstraction, the available physical resources varying based on the model architecture and an associated host device, the virtual resources allowing consistent interaction with the virtual resources regardless of variation in the physical resources available and their location. The hardware abstraction increases the versatility of the secure element and may contribute to the secure element's functionality.
11/13/14
20140337918
Context based switching to a secure operating system environment
Generally, this disclosure provides devices, systems, methods and computer readable media for context based switching to a secure os environment including cloud based data synchronization and filtration. The device may include a storage controller to provide access to the secure os stored in an initially provisioned state; a context determination module to monitor web site access, classify a transaction between the device and the website and identify a match between the web site and a list of web sites associated with secure os operation or a match between the transaction classification and a list of transaction types associated with secure os operation; and an os switching module to switch from a main os to the secure os in response to the identified match.
11/13/14
20140337917
Verifying access-control policies with arithmetic quantifier-free form constraints
A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (qff) constraint and identifying the particular constraint as a second qff constraint.
11/13/14
20140337914
Policy-based automated consent
A technique for intelligent automated consent is described by which a client may be automatically authorized to access a resource owner's protected information (e.g., a profile) based on the owner's previous authorization decisions and/or other client classifications. Using this approach to granting consent, the resource owner is not required to intervene during the authorization step for each client that is requesting access.
11/13/14
20140337910
Method, system and apparatus for image capture, analysis and transmission
A method, system and apparatus for image capture, analysis and transmission are provided. A link aggregation method involves identifying controller network ports to a source connected to the same subnetwork; producing packets associating corresponding controller network ports selected by the source cpu for substantially uniform selection; and transmitting the packets to their corresponding network ports.
11/13/14
20140337908
System for retrieval of executable applications
A system for retrieval of executable applications, comprising: a broadcast tele-vision receiver apparatus; and a server; wherein the broadcast television receiver apparatus includes a communication unit having an interface for bidirectional communication with a network and adapted to determine channel information from a currently decoded channel carried in a broadcast television signal, the channel information identifying the currently decoded channel, the communication unit being further adapted to send the channel information to a server over the network, and to receive application information from the server, the application information describing a set of applications which are available for execution, and to receive executable code components for the set of applications corresponding to the application information, and wherein the broadcast television receiver apparatus further includes a data processor adapted to execute the application whilst the channel is decoded; and wherein the server is adapted to receive the channel information over the network, to determine the application information by analyzing the channel information, and to send the application information to the communication unit.. .
11/13/14
20140337905
System and method for delivering extended media content
A system and method for identifying and delivering extended media content. An extended content system receives requests to record or play identified broadcast content.
11/13/14
20140337899
Methods, systems and computer program products for providing a media file to a designated set-top box
Methods of providing a media file include receiving the media file and an identification of a destination set-top box for the media file at a server device. The received media file is transmitted from the server device to the identified set-top box in an internet protocol television (iptv) multimedia format..
11/13/14
20140337889
System and method for presenting information associated with a media program
A system that incorporates teachings of the present disclosure may include, for example, an apparatus having a processor adapted to receive a message from a portable communication device communicatively coupled to a set-top box presenting a media program and to retrieve from the message a media descriptor associated with the media program. The processor is further adapted to identify according to the media descriptor one or more images of one or more performers commonly presented in the media program, to monitor one or more frames of a live media feed including the media program, and compare the one or more human figures to the one or more images of performers.
11/13/14
20140337885
Queue based advertisement scheduling and sales
In accordance with the invention, advertisement identifiers are stored in a queue in memory in the set top box or elsewhere corresponding to individual subscribers of a television service delivery network. The advertisements are retrieved and displayed in the order dictated by the queue as advertisement avails are detected in the particular channel information stream being watched by that subscriber.
11/13/14
20140337875
Close fulfillment of content requests
Systems and methods are described for subscriber-driven resource shifting in an attempt to maximize delivery of desirable content to subscribers while minimizing the impact of that content delivery to network infrastructure resources. When a media plan subscriber requests access to media content, and the requested object is determined not to be “watch-nowable” (e.g., it would be undesirable to deliver the object in substantially real time to the subscriber given present communications resource availability) embodiments identify a number of content objects that are presently watch-nowable content objects with respect to the requesting subscriber.
11/13/14
20140337874
Reception device, reception method, program, and information processing system
Provided is a reception device including a reception part configured to receive first content, a feature amount extraction part configured to extract a feature amount from data of the received first content, an identification result acquisition part configured to acquire an identification result for the first content identified using the extracted feature amount, a command acquisition part configured to acquire a command for controlling an operation of changing over between the first content and second content different from the first content depending on the acquired identification result, and a control part configured to control an operation of changing over from the first content to the second content in response to the acquired command.. .
11/13/14
20140337865
Object-oriented class hierarchy for workflow execution targets
A method is provided for managing an application program interface and may include identifying a creation of a new target type in an orchestrator, wherein the orchestrator has the application programming interface; identifying a set of properties of the new target type; and generating a new routine in the application program interface using the set of properties.. .
11/13/14
20140337862
Methods, devices, and systems for communicating behavioral analysis information
Methods, systems and devices for communicating behavior analysis information using an application programming interface (api) may include receiving via the api a request to register the second module to access an operation of a behavioral monitoring system of the mobile computing device, and exchanging authentication information between the first module and the second module to accomplish mutual authentication. Aspects may include receiving via the api a request for version identification information that may be used by the server to determine how to interpret, evaluate, or crowd-source information, and exchanging version identification information between the first module and the second module to cause the second module to send the information to the server.
11/13/14
20140337861
Method of using use log of portable terminal and apparatus using the same
A method of determining a second application related to a first application being executed by using a use log of a portable terminal and executing the second application according to a user input and an apparatus for supporting the same are provided. The portable terminal may determine the second application related to the first application being executed, based on a use log collected in a previous context state identical or similar to a current context state of a user.
11/13/14
20140337860
Method and architecture for data channel virtualization in an embedded system
A method for providing data channel virtualization between one or more devices and one or more applications is disclosed. In one example, a device policy manager (dpm) is initialized by creating an instance of the dpm before creating any application.
11/13/14
20140337855
Termination of requests in a distributed coprocessor system
A system and method of terminating processing requests dispatched to a coprocessor hardware accelerator in a multi-processor computer system based on matching various fields in the request made to the coprocessor to identify the process to be terminated. A kill command is initiated by a write operation to a coprocessor block kill register and has match enable and value for each field in the coprocessor request to be terminated.
11/13/14
20140337835
Efficient sharing of graphics resources by multiple virtual machines
Graphics resources are shared among a plurality of virtual machines (vms) running on a host. In one embodiment, a request to create a graphics resource is received from a first vm, the request including a graphics object id corresponding to the graphics resource to be created.
11/13/14
20140337834
User-influenced placement of virtual machine instances
A service provider network includes functionality for allowing a customer to influence the placement of virtual machine instances on server computers by specifying a placement strategy. Placement strategies may be shared among customers of the service provider network, and the placement strategies and the publishers of the placement strategies might be rated.
11/13/14
20140337833
User-influenced placement of virtual machine instances
A service provider network includes functionality for allowing a customer to influence the placement of virtual machine instances on server computers by specifying a placement strategy. Placement strategies may be shared among customers of the service provider network, and the placement strategies and the publishers of the placement strategies might be rated.
11/13/14
20140337832
User-influenced placement of virtual machine instances
A service provider network includes functionality for allowing a customer to influence the placement of virtual machine instances on server computers by specifying a placement strategy. Placement strategies may be shared among customers of the service provider network, and the placement strategies and the publishers of the placement strategies might be rated.
11/13/14
20140337831
Application system, application server, and program
A system includes a designation information transmitter and an application installer transmitter. The designation information transmitter is configured to transmit a designation information to a computer.
11/13/14
20140337830
Automated template deployment to computing platforms
Various embodiments include at least one of systems, methods, and software for automated deployment of a deployment template to computing systems. Some embodiments include receiving a selection of a deployment template from an entity via a network, identifying platforms of the entity compatible with the compatibility information, receiving a selection of a target platform, validating the selected deployment template for deployment to the selected platform, and deploying the selected deployment template to the selected platform.
11/13/14
20140337822
Storage of software execution data by behavioral identification
Methods and systems for analyzing software. For example, one method can include executing a software program including a function by a computer.
11/13/14
20140337821
Generating test scripts through application integration
This claimed subject matter relates to techniques for generating. A test script from a pre-existing script for testing a graphical user interlace (gui) comprising: parsing a pre-existing test script; parsing the model associated with the gui; identifying gui actions that that are identified by keywords and associated parameters that exist in the pre-existing test script; and generating a new test script by adding the identified actions..
11/13/14
20140337820
Source code flow analysis using information retrieval
According to an example, source code flow analysis may include receiving source code for an application, and identifying virtual flow documents for the application from the source code. The virtual flow documents may represent ordered sequences of method calls for the application.
11/13/14
20140337806
Interfacing with a computing application using a multi-digit sensor
A technology is described for interfacing with a computing application using a multi-digit sensor. A method may include obtaining an initial stroke using a single digit of a user on the multi-digit sensor.
11/13/14
20140337800
Recognition interfaces for computing devices
A computing device can utilize a recognition mode wherein an interface utilizes graphical elements, such as virtual fireflies or other such elements, to indicate objects that are recognized or identified. As objects are recognized, fireflies perform one or more specified actions to indicate recognition.
11/13/14
20140337796
Methods and systems for selecting a displayed aircraft approach or departure
A system and method are provided for highlighting and selecting one of a plurality of graphical ifr procedure depiction on an aircraft display. A displayed legend includes a plurality of textual procedure identifications, one each for each of the graphical ifr procedure depictions.
11/13/14
20140337779
Interactive design variations interface
One embodiment of the present invention sets forth a technique for generating design variations. The technique involves identifying a first design variable and a second design variable associated with a first design.
11/13/14
20140337777
Shop order status visualization system
A method and apparatus for visualizing an assembly of parts for an aircraft. A shop order instance is identified for the assembly of parts for the aircraft.
11/13/14
20140337764
Online platform for design, creation, maintenance, and information sharing of a garden
The present disclosure describes an online platform for the design, creation, maintenance, and information sharing of a garden by a user. The online platform is an online environment where users (gardeners) go to plan, create, grow and/or share gardens with other users.
11/13/14
20140337756
Systems and methods for user interaction based on license or other identification information
Methods and systems for facilitating user interaction are described. One such method includes receiving, from a first user device, identification information associated with a targeted user and retrieving, from a database, contact information associated with the identification information.
11/13/14
20140337754
Enablement of performance of a transaction
A method and system for enabling performance of a transaction. A client computer displays a first representation of a transaction policy depicting transaction policy options for fulfilling the transaction policy.
11/13/14
20140337745
Enhanced buddy list using mobile device identifiers
A graphical user interface on a display device of a computer enables communications using a computer service. The graphical user interface includes a list of potential message recipients selected by a user as significant to the user.
11/13/14
20140337733
Intuitive computing methods and systems
A smart phone senses audio, imagery, and/or other stimulus from a user's environment, and acts autonomously to fulfill inferred or anticipated user desires. In one aspect, the detailed technology concerns phone-based cognition of a scene viewed by the phone's camera.
11/13/14
20140337725
Systems and methods for providing feedback cues for touch screen interface interaction with chemical and biological structure drawing applications
Creating a graphical representation of at least one of a chemical structure and a biological structure using a touch screen interface may include identifying connection location(s) of an in-progress structure and connection location(s) of a separate structure element, determine, upon receipt of a gesture input moving the structure element towards the in-progress structure, that a distance between a first connection location of the in-progress structure and a first connection location of the structure element signals an intended connection of the structure element to the in-progress structure at or about the corresponding connection locations, analyze a resultant structure formed by connection of the in-progress structure and the structure element at or about the corresponding connection locations to determine a response, and provide a visible cue, an audible cue, and/or a haptic cue corresponding to the response.. .
11/13/14
20140337718
Graphical marking to indicate edited data
A method and system to indicate edited cells during an editing session are described. The method includes displaying a plurality of cells, of the plurality of cells being editable by a user.
11/13/14
20140337715
Computer language source code visualization
The present invention creates visual depiction of implied delineation within the source code of programming and markup languages for the purpose of simplifying visual and manual navigation. The present invention can easily identify where commands start and stop, making the writing and debugging process much easier.
11/13/14
20140337711
Automatic website generation
Automatically generating a fully functional website from multiple different third-party websites associated with a common user may include receiving input identifying multiple third-party websites, establishing communication with the multiple third-party websites, aggregating existing digital content residing at each of the third-party websites, generating a new website based on at least some of the aggregated existing digital content, and deploying the generated new website. Changes made to the content at the new website may be propagated back to the original websites from which the content originated, thereby keeping the user's information consistent and up-to-date across multiple platforms..
11/13/14
20140337703
Identifying and abstracting the visualization point from an arbitrary two-dimensional dataset into a unified metadata for further consumption
A system and method for determining a set of visualization points from any given two-dimensional dataset to best describe a given visual analytic. A first user selection is received in a data processing apparatus for a chart.
11/13/14
20140337699
Method and apparatus for extracting web page content
Methods and apparatus for extracting web page content are provided herein. An exemplary method can be implemented by a mobile terminal.
11/13/14
20140337697
System and method for providing content to an apparatus based on location of the apparatus
Provided are a system, an apparatus, and a method for providing content, based on a location of the apparatus. An apparatus for receiving content associated with a second user of an external device includes a communicator configured to receive identifier (id) information of the external device that is located within a predetermined distance from the apparatus and transmit the received id information of the external device to a content providing server; and a controller configured to request the content providing server for the content associated with the second user from among content of a first user of the apparatus stored in at least one from among another apparatus of the first user, the content providing server, and a social networking service (sns) server, wherein the communicator receives the content associated with the second user from the content providing server in response to the request..
11/13/14
20140337686
Dispersed storage having snapshot clones and methods for use therewith
A directory file includes a plurality of entries, wherein an entry of the plurality of entries includes a file or directory name field, and a snapshot list field that includes a snapshot list. A clone snapshot identifier (id) is determined for a data file.
11/13/14
20140337685
Dispersed storage having a plurality of snapshot paths and methods for use therewith
A directory file includes a plurality of entries, wherein an entry of the plurality of entries includes a file or directory name field, and a snapshot list field that includes a snapshot list in accordance with one of a plurality of snapshot paths of a snapshot tree. A new snapshot identifier (id) is determined for a data file.
11/13/14
20140337683
Crc counter normalization
The ability to accurately and efficiently calculate and report communication errors is becoming more important than ever in today's communications environment. More specifically calculating and reporting crc anomalies in a consistent manner across a plurality of communications connections in a network is crucial to accurate error reporting.
11/13/14
20140337675
Computer system and its event notification method
If a failure occurs in physical resources constituting a virtual volume, a management server device is notified of information required by a user. A computer system includes a server device for managing a plurality of virtual volumes, a storage apparatus having a storage unit equipped with a plurality of storage devices, and a controller for controlling data input to, or output from, the storage unit, a management server device which is an access target of a user terminal, and an event management device for managing an event(s) generated by the server device or the storage apparatus, wherein when the event management device receives the event, it judges the content of the event and identifies a virtual volume to be affected by the event; and if a service level that should be satisfied by the identified virtual volume is defined for the identified virtual volume, the event management device identifies, based on the content of the received event, whether an incident in violation of the service level has occurred or not, and then notifies the management server device of the identified content as an event based on an event filter..
11/13/14
20140337672
Reducing false-positive errors in a software change-impact analysis
A method and associated systems for reducing false-positive errors in a software change-impact analysis of a basepoint variable. A processor of a computer system identifies a first generation of change-affected parts of one or more computer programs, where each identified part is affected by a change to the basepoint variable.
11/13/14
20140337647
Systems and methods for managing current consumption by an electronic device
Systems and methods for managing current consumption by an electronic device are provided. The electronic device includes first and second clock units.
11/13/14
20140337639
Steganographic embedding of executable code
A method for digital immunity includes identifying a call graph of an executable entity, and mapping nodes of the call graph to a cipher table of obscured information, such that each node based on invariants in the executable entity. A cipher table maintains associations between the invariants and the obscured information.
11/13/14
20140337636
Simplified multi-factor authentication
A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element.
11/13/14
20140337635
Biometric verification with improved privacy and network performance in client-server networks
The present invention relates to improving the privacy of biometric information used in biometric authentication of identity by retaining all biometric information corresponding to a given user, and conducting all transactions related thereto (i.e., the actual authentication process) on a client (i.e., user) side of the system, thereby maximizing the user's control over biometric information corresponding to himself and preventing the storage of biometric templates on third-party servers outside of the control of the concerned individual. In a particular example of the present invention, security for the biometric information is further enhanced by encrypting the biometric template (used as a comparison reference during authentication, as is known) stored on the client side and completely destroying an original unencrypted version of the template.
11/13/14
20140337634
Biometric authentication substitute for passwords on a wearable computing device
Methods, apparatus, and computer-readable media are described herein related to biometric authentication. A first computing device can detect a machine-readable code displayed by a second computing device, where the machine-readable code can identify protected information viewable via the second computing device.
11/13/14
20140337633
System and method for indicating a service set identifier
A method for securing communications between an access point and a station includes generating a first hashed service set identifier (ssid) by applying a first hash function to a first ssid known by the station, transmitting a first message to the access point, wherein the first message includes the first hashed ssid, and receiving a second message from the access point, wherein the second message includes a second hashed ssid generated by the access point by applying a second hash function to a second ssid associated with the access point. The method also includes generating a third hashed ssid by applying the second hash function to the first ssid, determining if the third hashed ssid matches the second hashed ssid, and transmitting a third message to the access point if the third hashed ssid matches the second hashed ssid..
11/13/14
20140337631
Method for copy-protected storage of information on a data carrier
A method for storing digital data information on a data carrier and for reading the information therefrom uses a disk having an individual digital identifier. A signature is formed, and the information includes information items, which can be processed by a first electronic data processing device only if the identifier and the signature are in a predefined relation to one another.
11/13/14
20140337628
Systems and methods for providing a secure data exchange
A system, a method, and a computer program product for a data exchange are provided. A first application generates a first key for exchange of data between the first application and a second application.
11/13/14
20140337624
System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
The invention provides secure and private communication over a network, as well as persistent private storage and private access control to the stored information, which is accomplished by imposing mechanisms that separate a user's actions from their identity. The system provides (i) anonymous network browsing, in which event the anonymity system is unaware of both the user's identity and browsing activities, (ii) private network storage and retrieval of data such as passwords, profiles and files in a manner such that the data can be stored into the system and later retrieved without the system knowing the contents or owners of the data, and (iii) the ability of the user to control and manage access to the remotely stored data without the system knowing the contents, owners, or accessors of the data..
11/13/14
20140337623
Data security in a disconnected environment
Systems and methods are provided for the detection and prevention of intrusions in data at rest systems such as file systems and web servers. The systems and methods regulate access to sensitive data with minimal dependency on a communications network.
11/13/14
20140337620
System and method for local generation of streaming content with a hint track
Embodiments of a system and method for local generation of streaming content with a hint track are described. Embodiments may include receiving a first version of encrypted content comprising encrypted content samples that each include media content and non-content information.
11/13/14
20140337619
Derived certificate based on changing identity
A first device with a changing identity establishes a secure connection with a second device in a network by acting as its own certificate authority. The first device issues itself a self-signed root certificate that binds an identity of the first device to a long-term public key of the first device.
11/13/14
20140337615
One-time pad communications network
A system and method for providing secure and anonymous communication between a plurality of individuals relying on the cryptographic method of the one-time pad (otp) is described. Unique, randomly generated blocks of data are generated to serve as one-time pads, and each is given a unique identification that serves as a system address.
11/13/14
20140337595
Information processing apparatus, and information processing method
Provided is an information processing apparatus capable of reducing time required for a move or copy of a file. The information processing apparatus includes a resident module (72) that, when detecting a selection operation of a move source or a copy source of data from an os (70), reads target data, and starts writing the data into a predetermined area.
11/13/14
20140337591
Systems and methods for increasing restore speeds of backups stored in deduplicated storage systems
A computer-implemented method for increasing restore speeds of backups stored in deduplicated storage systems may include (1) identifying a backup that includes data stored in at least one data container within a deduplicated storage system, (2) detecting a subsequent backup that includes additional data, (3) calculating an amount of duplication between the additional data included in the subsequent backup and the data stored in the data container, (4) determining that the amount of duplication between the additional data and the data stored in the data container is below a predetermined threshold, (5) identifying at least one additional data container to store the additional data instead of deduplicating the additional data with respect to the data container, and then (6) storing the additional data in the additional data container to facilitate increasing a restore speed of the subsequent backup. Various other methods, systems, and computer-readable media are also disclosed..
11/13/14
20140337590
Smart digital message archival
A device may receive information identifying an attribute to be used when determining whether to archive a digital message. The attribute may be associated with the digital message.
11/13/14
20140337583
Intelligent cache window management for storage systems
Methods and structure for intelligent cache window management are provided. The system comprises a memory and a cache manager.
11/13/14
20140337572
Noncontiguous representation of an array
A system and method for storing a composite array including a reference array and one or more arraylets is provided. A set of contiguous memory locations for a reference array including one or more slots is allocated based on a quantity of bits in a binary representation of a logical array length.
11/13/14
20140337544
Transport mode for wireless serial bus (wsb) service
Techniques are described for establishing a wireless serial bus (wsb) service to transport data using a media agnostic universal serial bus (mausb) protocol according to a selected transport mode in a wsb session of the wsb service. The mausb protocol may be deployed either over an internet protocol (ip) stack or directly over a media access control (mac) layer.
11/13/14
20140337537
Method and system for facilitating communication between message consumers and message producers
A method and system for facilitating communication between message producers and message consumers is disclosed. When a message producer is interested in identifying a message consumer for processing generated messages, the message producer declares a consumer identification rule.
11/13/14
20140337535
System and method for providing a fate sharing identifier in a network environment
A method is provided in one example embodiment and includes, at a first call agent, receiving from a first endpoint, a first identifier associated with communication sessions involving the first endpoint. The method also includes receiving from a second call agent associated with a second endpoint, a second identifier associated with communication sessions involving the second endpoint.
11/13/14
20140337534
Server virtualization
A resource requirements method and system is provided. The method includes identifying dependencies and calculating a utilization value for a source server.
11/13/14
20140337529
Placing a network device into a maintenance mode in a virtualized computing environment
Techniques for placing a first network device into maintenance mode are described. In one embodiment, a first host computing system coupled to the first network device is identified.
11/13/14
20140337527
Platform shape shifter
Systems and method to facilitate provisioning of a plurality of platforms are provided. First information enabling unique identification of a first provider may be processed.
11/13/14
20140337520
Attribution of mobile device data traffic to end-user application based on socket flows
A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic.. .
11/13/14
20140337519
Techniques for attribution of mobile device data traffic to initiating end-user application
A method performed by a network system communicatively coupled to a device over a wireless access network, the method comprising transmitting a traffic flow to, or receiving the traffic flow from, a software application on the device, the traffic flow comprising one or more related data transfers over the wireless access network, the traffic flow being routed between the software application and the network system through an assisting element comprising a control application or a proxy agent on the device, wherein the traffic flow has a characteristic associating the traffic flow with the first software application, the characteristic preserving the association between the traffic flow and the software application when the traffic flow is routed by the one or more assisting elements; identifying the characteristic; and implementing at least a portion of a control, accounting, or notification service policy based on the identified characteristic.. .
11/13/14
20140337513
Cross platform user joining
Techniques for cross platform user joining are disclosed. In some embodiments, cross platform user joining includes associating a first user identification (uid) and a second uid with one or more internet protocol addresses (ips); associating the first uid and the second uid with one or more monitored behaviors; and joining the first uid and the second uid based on the one or more ips and the one or more monitored behaviors..
11/13/14
20140337512
Obstruction determination device
A obstruction determination process by a program stored in a recording medium comprises (i) in cases in which a connection data has been received from a plurality of transfer devices connected to a non-transmitting transfer device which is not transmitting the connection data, identifying a non-transmitting transfer device transfer path on which the non-transmitting transfer device is positioned; and (ii) determining for each of the identified transfer paths whether or not an obstruction has occurred on the identified transfer path, and in cases in which the identified transfer path is the non-transmitting transfer device transfer path identified, employing the transfer volume data that has been received from another transfer device positioned on the non-transmitting transfer device transfer path as the transfer volume data of the non-transmitting transfer device to determine whether or not an obstruction has occurred on the identified transfer path.. .
11/13/14
20140337497
System and method of subnetting a virtual network identifier
A method and apparatus that determines a plurality of matching policies for a segment of a dynamic virtualized network is described. A device retrieves a virtual network identifier of the segment, where the virtual network identifier includes a plurality of bits and a plurality of subnets and each of the plurality of subnets is a different subset of the plurality of bits.
11/13/14
20140337496
Embedded management controller for high-density servers
The described embodiments comprise an embedded management controller for managing a server on a sled device. The embedded management controller on the sled device comprises a processing mechanism; a plurality of internal interfaces coupled to the processing mechanism, each internal interface coupled to a corresponding interface of the server; and an external interface coupled to the processing mechanism, the external interface configured to be coupled to a system management controller separate from the sled device.
11/13/14
20140337484
Server side data cache system
In an example embodiment, a system and method to store and retrieve application data from a cache and a database are provided. The example method may comprise receiving location data associated with application data from a user device, using the location data to determine a cache or database on which the application data is stored, and requesting application data from the cache or database.
11/13/14
20140337478
Peer-to-peer network communications
In order to capture additional network address information that potentially is useful for establishing peer-to-peer connections, client nodes collect network address information from one another. In some examples, the client nodes perform their own independent asymmetric discovery for network addresses that may be sent to a server node for distribution to other client nodes and used to establish peer-to-peer connections between client nodes.
11/13/14
20140337471
Migration assist system and migration assist method
A system for assisting migration between first and second information processing systems includes a table retaining communication information on communication between first nodes constituting the first information processing system; a table retaining a design requirement being a condition for a second node constituting the second information processing system; an identifier configured to identify the communication information on the first node which is to be migrated; a comparator configured to acquire the design requirement associated with the identified communication information; a mapper configured to determine based on the design requirement whether addition or deletion of the second node is necessary or not; and a generator configured to generate tenant design properties based on the determination on whether addition or deletion is necessary or not, the tenant design properties being information necessary for the migration and containing a configuration of the second node constituting the second information processing system.. .
11/13/14
20140337464
System and method for inline http notification
Various exemplary embodiments relate to method performed by a router. The method may include: receiving a http get request from a user device; forwarding the http get request; receiving a response to the http get request; determining whether to intercept the response based on flow selection criteria; and replacing the response with a modified response.
11/13/14
20140337462
Delivering identity related data
Method and apparatus for delivering from a storage node to an end device, a subset of data stored in the storage node and relates to an identity that uniquely identifies the identity module comprised in the end device. The storage node receives from the end device a request for the subset of the data, the request comprises the identity.
11/13/14
20140337458
Managing a local cache for an online content-management system
The disclosed embodiments relate to techniques for managing a local cache on a computing device that stores content items for an online content-management system. These techniques generally operate by gathering information that is available on the computing device (such as information about user actions, information about which applications are executing, and information about the location of the computing device) and using this information to identify relevant content items that are likely to be accessed in the near future.
11/13/14
20140337454
Information processing system and content download method
In an information processing system, a speculative dl content information acceptor 324 accepts identification information of content selected by a server. A list generator 352 generates a speculative dl list 388 of the accepted content identification information.
11/13/14
20140337451
Notifications regarding interesting or unusual activity detected from an activity monitoring device
A method is provided, including: processing requests from a plurality of users to join a group event, the group event defined for an activity metric for each of the plurality of users for a period of time; analyzing the activity metrics of the plurality of users to determine a ranking of the plurality of users based on their activity metrics, and to identify a change in relationship between activity metrics of two or more of the plurality of users; generating a message, wherein generating the message includes, identifying, based on the identified change in relationship, one or more user accounts of select ones of the plurality of users to receive the message, selecting a message template based on the identified change in relationship, and populating the message template to generate a message describing the change in relationship; sending the message to the one or more user accounts.. .
11/13/14
20140337450
Fitness activity related messaging
In one embodiment, a method for generating a message to a friend of a user is provided, comprising: processing activity data of a first user measured by an activity monitoring device to update a value of an activity metric for the first user; identifying a change in an inequality relationship between the value of the activity metric for the first user and a value of the activity metric for a second user; in response to identifying the change in the inequality relationship, prompting the first user to generate a message to the second user.. .
11/13/14
20140337448
System and method for aggregating and responding to communications
The present application is directed to a method of aggregating and responding to communications. The method includes receiving incoming communications from a plurality of network connected communication sources, and automatically receiving, at a computing device, incoming communications from a plurality of network connected communication sources; and automatically sending to each of the plurality of network connected communication sources a customized message that is based on at least identification information associated with a sender of the respective incoming communication..
11/13/14
20140337445
System, method, and apparatus for data processing
A data process system including a unit receiving a mail data including an output data or a target output data via a network, a unit identifying a user-identification data to be associated with the output data based on an address data of a transmission source of the mail data by referring to first and second units, the first unit storing a first address data in correspondence with each user-identification data, the second unit storing a second address data in correspondence with each user-identification data, a unit storing data-identification data in correspondence with the output data in a unit in a case where the user-identification data is identified by referring to the second unit instead of by the first unit, a unit notifying the data-identification data via the network, and a unit transmitting the output data corresponding to the user-identification data or the data-identification data received via the network.. .
11/13/14
20140337441
System and method for providing visual representations of email to enable efficient email processing
An email system is disclosed which provides annotations associated with email to recipients and allows the recipients to interact with annotated email. The system receives email and determines whether the received email includes items that should be annotated.
11/13/14
20140337440
Historical context for communication
A method, computer program product, and system is described. A communication session transcript is identified.
11/13/14
20140337438
System and method for suggesting a phrase based on a context
A method and a system to suggest a content item to be included in a message based on a determined context are provided. A context of a message that user is composing via a composition interface is determined based on one or more properties of the message.
11/13/14
20140337436
Identifying relevant feed items to display in a feed of an enterprise social networking system
Disclosed are methods, apparatus, systems, and computer program products for identifying relevant feed items to display in a feed of an enterprise social networking system. A plurality of data items from one or more of a plurality of data sources may be identified as relevant to a user by satisfying one or more relevancy parameters comprising: a data source providing the data item being one of an inner circle of data sources, content of the data item being identifiable using an interest graph associated with the user, the data item comprising a mention of the user, and the data item being designated as relevant to a group or an organization with which the user is associated.
11/13/14
20140337434
Timing system and method with integrated event participant tracking management services
An automated system and method for managing a tracking and an automated real-time remote reporting thereof of a participant's participation in an event having a participant event management system (pems) that receives a request for tracking of the participant, a participant proximity detector detects the proximity of the participant to a detection point, a location detection system receiving and transmitting participant location data, the timing system receives the preorder request from the pems, determines a time of passing of the detection point of the participant, receives the location data and associates the participant event number with the participant identifier number, and transmits the location data forming at least a part of the participant tracking data to an output interface.. .
11/13/14
20140337429
Industrial data analytics in a cloud platform
Cloud-aware industrial devices feed robust sets of data to a cloud-based data analyzer that executes as a service in a cloud platform. In addition to industrial data generated or collected by the industrial devices, the devices can provide device profile information to the cloud-based analyzer that identifies the device and relevant configuration information.
11/13/14
20140337428
Facilitation of social interactions
Embodiments relate to facilitating social interactions. An aspect includes determining that a first communications device is in communicative contact with a second communications device, identifying at least one artifact relating to a user of the first communications device, and searching at least one database for information about a user of the second communications device that is in common with the user of the first communications device with respect to the artifact.
11/13/14
20140337418
Information providing system, server device, recording medium, and control method
An information providing system includes: a server device that is communicably connected to an external server device, the external server device accumulating review management information that includes review information that indicates a review of a piece of content by a first user and first identification information that corresponds to the first user and providing a first service that includes a browsing service that makes the review of the piece of content by the first user browsable, the server device providing a second service to each second user; and a terminal device that the second user operates. Upon receiving a request from the terminal device, the server device acquires and sends, to the terminal device, review management information regarding a piece of content based on a favorite piece of content that has been registered beforehand with the external server device by the user.
11/13/14
20140337398
Inclusive or bit matrix to compare multiple corresponding subfields
A computer system is operable to identify subfields that differ in two data elements using a bit matrix compare function between a first matrix filled with pattern elements and a reference pattern.. .
11/13/14
20140337396
Data processing apparatus and method for performing a transform between spatial and frequency domains when processing video data
A data processing apparatus and method are provided for performing a transform between spatial and frequency domains when processing video data. The data processing apparatus comprises transform circuitry configured to receive n input values and to perform a sequence of operations to generate n output values representing the transform of the n input values between the spatial and frequency domains.
11/13/14
20140337392
Flexible partitioning of data
Disclosed are various embodiments of a flexible application-level partitioning scheme for data storage components. A data store is accessible by one or more computing devices and includes multiple partitions.
11/13/14
20140337388
Enhanced data container with extensible characteristics and a system and method of processing and communication of same
A variety of tools and techniques are disclosed for creating and managing an enhanced data container. The enhanced data container is comprised of extensible characteristics that when processed interact with a variety of computing devices and computing device components.
11/13/14
20140337383
Partial match derivation using text analysis
A natural language processing system and method resolves partial matches when a natural language input query does not fully specify an entity. The input query is tokenized into a set of query tokens, which are compared to contents of a searchable index, the contents representing entities, each of which is tokenized into a set of entity tokens associated with the tokenized entity.
11/13/14
20140337381
Method and system for capturing and exploiting user intent in a conversational interaction based information retrieval system
Systems and methods are disclosed for processing a search request received from a user. A method includes providing access to content items associated with metadata.
11/13/14
20140337380
Expert locator based on user polling
According to one embodiment of the present invention, a method for locating experts is provided. The method includes receiving a first query from a first user requesting the identity of persons having desired skills.
11/13/14
20140337376
History-based tracking of user preference settings
A process is disclosed for using the existing universal resource identifier (uri) history feature of browsers to maintain user preference settings, or other state information, used by one or more web sites or other systems. In one embodiment, when a user makes a particular preference selection on a web site, the user's selection is recorded in the browser's uri history by causing the browser to access a uri (or a set of uris) representing the particular selection.
11/13/14
20140337375
Data search and storage with hash table-based data structures
Provided are computer devices and methods for improved data storage, indexing and search. The methods entail the use of hash tables incorporated into nodes of search trees so as to increase the capacity of the nodes and reduce the size of the tree; hence reducing the time to identify a node while searching in the tree.
11/13/14
20140337370
Method of and system for real time feedback in an incremental speech input interface
The present disclosure provides systems and methods for selecting and presenting content items based on user input. The method includes receiving first input intended to identify a desired content item among content items associated with metadata, determining that an input portion has an importance measure exceeding a threshold, and providing feedback identifying the input portion.
11/13/14
20140337368
Duplicate content search
A system may store information regarding a set of items of content, receive sample content from a user, determine whether the sample content matches content of one or more of the items of content, and notify the user whether the sample content matches one or more of the items of content without identifying the one or more items of content to the user.. .
11/13/14
20140337367
Forensic system, forensic method, and forensic program
Embodiments of the inventive concept can extract digital document information related with a specific individual to achieve a work load reduction associated with evidentiary material preparation for litigation. A specific individual is selected from at least one individual included in user information.
11/13/14
20140337365
Method for identifying network similarity by matching neighborhood topology
A similarity measure is computed between nodes of first and second networks. Sets of pairwise scores are computed to find nodes in the individual networks that are good matches to one another.
11/13/14
20140337364
Comparing database performance without benchmark workloads
Database operation records are sequentially read from two or more log files. If the transaction identifier is new and the record is not an end-of-transaction record, an open transactions list entry is created.
11/13/14
20140337363
Subsegmenting for efficient storage, resemblance determination, and transmission
Transmitting or storing subsegments is disclosed. A data stream or a data block is received and broken into a plurality of segments.
11/13/14
20140337359
Systems and methods for estimation and application of causal peer influence effects
The present disclosure describes systems and methods for quantifying causal peer influence within a social network for improved business intelligence. Influencers of a group, or individuals with a greater amount of influence on the group, may be identified and their amount of influence on the group or a subset of the group estimated.
11/13/14
20140337357
Document tagging and retrieval using per-subject dictionaries including subject-determining-power scores for entries
Techniques for managing big data include tagging of documents and subsequent retrieval using per-subject dictionaries having entries with subject-determining-power scores. The subject-determining-power scores provide an indication of the descriptive power of the term with respect to the subject of the dictionary containing the term.
11/13/14
20140337356
Identifying communities within a social network based on information propagation data
Methods and systems for identifying communities based on information propagation data are described. One of the methods includes receiving a social graph, which includes nodes and relationships between the nodes.
11/13/14
20140337337
Similarity score lookup and representation
Facilitating information retrieval and improving similarity score computations among objects, via a compactor component that interacts with a layered memory structure. Data structures (e.g., tuples) that are associated with objects can be compacted into a condensed format, via employing a layered memory structure.
11/13/14
20140337332
Search and search optimization using a pattern of a location identifier
Systems and methods for search and search optimization using a pattern in a location identifier is disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of search and search optimization.
11/13/14
20140337331
Methods and systems for discovery of linkage points between data sources
Data records are linked across a plurality of datasets. Each dataset contains at least one data record, and each data record is associated with an entity and includes one or more attributes of that entity and a value for each attribute.
11/13/14
20140337329
Providing answers to questions using multiple models to score candidate answers
A method, system and computer program product for generating answers to questions. In one embodiment, the method comprises receiving an input query; conducting a search to identify candidate answers to the input query, and producing a plurality of scores for each of the candidate answers.
11/13/14
20140337327
Supporting enhanced content searches in an online content-management system
The disclosed embodiments relate to techniques for supporting enhanced content-item searches in an online content-management system. These techniques generally operate by gathering information that is available in the online content-management system (such as how often each content item has been updated, how many users have accessed the content item, and how many identical copies of the content item are stored in the online content-management system) and using this information to identify relevant content items that are likely to be important to a user.
11/13/14
20140337319
Smart phone application for retrieving and displaying vehicle history report information
A system and method for utilizing a hand held electronic device, such as a smart phone to retrieve and display information related to the vehicle history of a vehicle. In particular, the smart phone may be used to take a picture of the vehicle's vehicle identification number (vin) and upload the vin to a remote vehicle history database which matches the vin with stored vehicle history information.
11/13/14
20140337317
Approximate privacy indexing for search queries on online social networks
In one embodiment, a method includes receiving from a first user of an online social network a search query, searching data stores to identify objects that match the search query, where identifying the objects is also based in part on the privacy setting for each object, determining for each identified object a visibility of the object with respect to the first user, and generating one or more search results corresponding to the search query.. .
11/13/14
20140337316
Informative communication history
An approach for retrieving and storing telephone numbers along with related contextual information associated with inbound/outbound communications to/from a device. The approach includes a method that includes combining, by at least one processing device, identification information of an entity and a related communication mechanism used to initiate a communication to a device.
11/13/14
20140337305
Geographic coordinates based content search
Apparatuses, methods and storage medium associated with geographic coordinates based content search are disclosed herein. In embodiments, a search service may be configured to analyze a plurality of contents having non-geographic coordinate content items.
11/13/14
20140337304
Application retention metrics
The disclosure relates to methods and systems for generating application retention metrics. In one aspect, a method for generating coupled application retention metrics is disclosed.
11/13/14
20140337299
Method and apparatus for content-aware and adaptive deduplication
A method, a system, an apparatus, and a computer readable medium for transmission of data across a network are disclosed. The method includes receiving a data stream, analyzing the received data stream to determine a starting location and an ending location of each zone within the received data stream, based on the starting and ending locations, generating a zone stamp identifying the zone, the zone stamp includes a sequence of contiguous characters representing at least a portion of data in the zone, wherein the order of characters in the zone stamp corresponds to the order of data in the zone, comparing the zone stamp with another zone stamp of another zone in any data stream received, determining whether the zone is substantially similar to another zone by detecting that the zone stamp is substantially similar to another zone stamp, delta-compressing zones within any data stream received that have been determined to have substantially similar zone stamps, thereby deduplicating zones having substantially similar zone stamps within any data stream received, and transmitting the deduplicated zones across the network from one storage location to another storage location..
11/13/14
20140337297
System and method for marine debris management
Authenticating marine debris prior to recovery by: generating sonar signal data related to the bottom of a body of water; processing the data to identify the presence or absence of debris targets; generating an image of the objects detected; storing the image in an assessment database; associating each image stored in the assessment database with position information and dimensions of that debris target; generating a side scan sonar report including an image of debris target detected on the ocean or lake floor, object position and dimension data; transmitting the sonar report to an offsite or on site debris image processor for identification of the target; comparing the target reported in the sonar report with a database to determine whether the target object is storm debris; transmitting a signal to ship for target pickup if it is determined that the target object is a storm debris object. The system and method further includes verification where upon recovering and imaging the target object or the target site post recovery; the image is processed and compared with the authentication database..
11/13/14
20140337293
Data redistribution in data replication systems
Data replication is disclosed. Originator data subsets are redistributed among a plurality of originator nodes from an initial distribution arrangement to a new distribution arrangement.
11/13/14
20140337291
Top down delete or unsynchronization on delete of and depiction of item synchronization with a synchronization client to a cloud-based platform
Embodiments of the present disclosure include systems and methods to facilitate top down delete or un-synchronization on delete of a synchronization client to a cloud-based platform. The disclosed technology innovates the mechanism the synchronization client processes local deletes so that instead of synchronizing the delete of each individual item across to the cloud-based platform, it can accumulate the individual item deletes into a top-level folder delete and that top-level folder delete can be what is communicated across to the cloud-based platform.
11/13/14
20140337288
Parting data to improve system performance
In some examples, a method is described. The method may include parting a data item into multiple data units based on update frequencies of the data units.
11/13/14
20140337283
Comparing database performance without benchmark workloads
Database operation records are sequentially read from two or more log files. If the transaction identifier is new and the record is not an end-of-transaction record, an open transactions list entry is created.
11/13/14
20140337282
Deploying database upgrades to multiple environments in a different order
A virtualization manager receives a request to install a new feature in a first virtualization environment. The virtualization manager identifies a first database upgrade script corresponding to the new feature and compares a first identification number of the first database upgrade script to a second identification number of a second database upgrade script, the second database upgrade script previously run on a management database for the first virtualization environment.
11/13/14
20140337281
Method and system for sharing documents between on-demand services
A method for sharing documents between on-demand services is provided. In an embodiment, a user of a first on-demand service may be able to view a list of content that includes content stored at the first on-demand service and content stored at a second on-demand service.
11/13/14
20140337280
Systems and methods for data analysis
Described herein are methods and systems for hierarchically mapping, ranking, and labeling data sets automatically. Also provided are methods for browsing and navigating a hierarchically mapped data set, and start identifying changes in network structure over time.
11/13/14
20140337277
Industrial device and system attestation in a cloud platform
An industrial attestation service executing on a cloud platform collects industrial data from multiple levels of an industrial enterprise and identifies subsets of the industrial data that characterize normal operation. In the cloud platform, baselines are generated for diverse aspects of the industrial enterprise based on the identified subsets, where the baselines characterize normal operation.
11/13/14
20140337272
Systems and methods for interactive displays based on associations for machine-guided rule creation
This disclosure provides a computer-program product, system, method and apparatus for accessing a representation of a category or item and accessing a set of multiple transactions. The transactions are processed to identify items found amongst the transactions, and the items are ordered based on an information-gain heuristic.
11/13/14
20140337271
System for efficiently generating k-maximally predictive association rules with a given consequent
This disclosure provides a computer-program product, system, method and apparatus for accessing a representation of a category or item and accessing a set of multiple transactions. The transactions are processed to identify items found amongst the transactions, and the items are ordered based on an information-gain heuristic.
11/13/14
20140337267
Geographic coordinates based social network
Embodiments relate to methods, apparatuses, and media configured to identify user characteristics based at least in part on the user's association with geographic coordinates or ranges defining locations or areas of earth's surface. Recommendations may then be provided to the user based at least in part on the identified user characteristics based on geographic coordinates.
11/13/14
20140337260
System and method for identifying offline consumer interests for online personalization by leveraging multimedia inputs
A system, method and computer implemented program product for enabling a user to retrieve information from a telecommunication network. The system, in accordance with the present invention comprises a handheld device, using which multimedia inputs, typically photographs of objects of interest could be captured.
11/13/14
20140337253
Transmitting charge event information to electrical utility through telematics communication infrastructure
Implementations of the present invention contemplate using the communicative connections between a telematics unit in a vehicle and a telematics service provider (tsp) to transmit information pertaining to a vehicle charging event from the vehicle to the tsp and ultimately to electrical power utility companies that provide the electrical power used to charge the vehicle. Specifically, implementations of the present invention contemplate provisioning electrical vehicle supply equipment (evse) by linking the evse to a particular energy user metering device (eumd).
11/13/14
20140337251
Information providing system, server device, recording medium, and control method
An information providing system includes: a server device that is communicably connected to an external server device, the external server device accumulating review management information that includes review information that indicates a review of a piece of content by a first user and first identification information that corresponds to the first user and providing a first service that includes a browsing service that makes the review of the piece of content by the first user browsable, the server device providing a second service to each second user; and a terminal device that the second user operates. Upon receiving a request from the terminal device, the server device acquires and sends, to the terminal device, review management information regarding a piece of content based on preference information of the second user.
11/13/14
20140337250
Information providing system, server device, recording medium, and control method
An information providing system having a server device connected to an external server device, which accumulates review management information, including review information indicating a review of a piece of content by a first user and first identification information that corresponds to the first user and history information that indicates a service usage history of the first user and provides a first service that includes a browsing service making the review of the piece of content by the first user browsable. The server device provides a second service to each second user; and a terminal device that the second user operates.
11/13/14
20140337249
Ratings from communication sessions
A method, computer program product, and system is described. An electronic communication session including a first individual and a second individual is identified.
11/13/14
20140337241
Method and apparatus for maintaining high data integrity and for providing a secure audit for fraud prevention and detection
Any of various comparisons of computer folders from different points in time is performed. Such comparisons provide the ability to discover missing documents or documents with modification dates that have changed when there would otherwise have been no need to change them and thus allows discovery of missing documents to discover fraud or to search for evidence after a fraud is suspected.
11/13/14
20140337235
Person-to-person electronic payment processing
A method of person-to-person anonymous electronic payment processing may involve a payment processing server receiving from a payor payment device a payment initiation request for a payment from a payor account. The payment initiation request may identify a payment amount and excludes payee particulars and the payee account.
11/13/14
20140337233
Methods, apparatus and media for use in association with identification token and/or in docking
In some embodiments, a method includes supporting an identification token, issued to an account holder by a non-card shaped body of a device; communicating with a proximity coupling device via a wireless interface of the identification token; electrically connecting a communication device to an electrical connector attached to the non-card shaped body; and resetting a security parameter in the identification token in response, at least in part, to at least one signal from the communication device. In some embodiments, the non-card shaped body of the device is a non-card shaped body of a device issued to the account holder.
11/13/14
20140337227
System and method of selecting a virtual card application
A novel system and methodology for conducting financial and other transactions using a wireless device. Credentials may be selectively issued by issuers such as credit card companies, banks, and merchants to consumers permitting the specific consumer to conduct a transaction according to the authorization given as reflected by the credential or set of credentials.
11/13/14
20140337225
Biometric-based transaction fraud detection
A method of identifying potentially fraudulent electronic transactions at an electronic transaction device may involve the transaction device receiving a transaction request for an electronic transaction. The transaction request may include a biometric credential sample and an authentication credential.
11/13/14
20140337221
Systems and methods for biometric authentication of financial transactions
Systems and methods are provided for authorizing a user in connection with a transaction at a transaction terminal. The systems and methods described herein enable a series of operations whereby a user using a mobile device can capture a code that uniquely identifies a transaction terminal.
11/13/14
20140337219
Secure data storage and transaction system
Embodiments of the invention are directed to a system, method, or computer program product for a transaction apparatus for secure data storage and consolidation of data for easy implementation and utilization during a transaction. The transaction apparatus may be configured, in various embodiments, for receiving, storing, encrypting, decrypting, encoding, decoding, accessing, transferring, writing, and/or presenting transaction data including, but not limited to, financial data, authentication data, identification data, health care data, access data, personal data, and/or other data associated with a user.
11/13/14
20140337218
Fraud prevention for transactions
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for fraud prevention. A method includes receiving registration information for a user, including identities of the user and an authenticating device and a payment source identifier, and storing the registration information.
11/13/14
20140337216
Fraud prevention for transactions
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for fraud prevention. A method includes receiving registration information for a user, including identities of the user and an authenticating device and a payment source identifier, and storing the registration information.
11/13/14
20140337215
System and method for updating cardholder personal data with avs synchronization
A computer-implemented method of processing updated payment cardholder personal data. The method includes receiving, by a at least one processing device, updated personal data associated with the payment cardholder; obtaining, by the at least one processing device, data identifying at least one payment system entity with which the payment cardholder has a transaction history; and transmitting, by the at least one processing device, notification of the payment cardholder's personal data update to the identified at least one payment system entity.
11/13/14
20140337214
Method and apparatus for money transfer
A staged bill payment transaction method comprises receiving transaction information from a user terminal at a kiosk, building a staging record at a data center in communication with the kiosk, and providing a retrieval key to the sender. The transaction information includes sender and biller information, for example where the sender has an account with the biller.
11/13/14
20140337213
Automated teller machine enabling video consultation with consultant during financial transactions and transaction method using the same
Disclosed is an automated teller machine (atm) which includes a financial transaction input unit to receive input of a financial transaction request, a first communication unit to communicate with a first server to process at least part of a plurality of steps corresponding to the financial transaction request, a consulting service input unit to receive input of a request for a consulting service associated with the financial transaction request in the plurality of steps, an identification unit to identify a step in which the request for the consulting service is input in response to the consulting service request among the steps, a generation unit to generate financial transaction information corresponding to the identified step, and a second communication unit to request a consulting service associated with the identified step to a second server based on the financial transaction information.. .
11/13/14
20140337210
Methods and systems for routing payment transactions
Methods and systems for routing payment transactions electronically involve interrogating by computer logic each payment transaction received by a payments interface processor to identify a payment destination and a payment source and to determine, according to pre-defined parameters, whether the payment transaction is eligible for processing via an internal payment transaction processor of the financial institution that minimizes processing costs. Eligible payment transactions may be routed, for example, to an internal debit or credit card processor or ach processor, and ineligible payment transactions may be routed to external card processing networks..
11/13/14
20140337206
Electronic currency system
An electronic currency system having currency issuing authorities that are coupled to a money generator device for generating and issuing to subscribing customers electronic currency backed by correspondent currency issuing authorities and participating financial institutions that accept and distribute the electronic money; a plurality of devices that are used by subscribers for storing electronic money and for performing money transactions with other participants and participating currency issuing authorities and authorized financial institutions, for exchanging electronic money with other like transactions; and verification arrangement for maintaining the integrity of the system, and for detecting counterfeiting and tampering within the system. The electronic currency consists of data in a form suitable to be stored in a participant's data storage medium, comprising information on the currency value, authentication values, certificate chain, and identification of the participants' devices..
11/13/14
20140337205
Systems and methods to identify merchants
A system and method including a mobile application installed on a mobile device and configured to authenticate a merchant represented by a unique identifier, determine a position of the mobile device while the mobile device is co-located with a transaction terminal of the merchant, communicate the position to a portal to associate the position with the unique identifier and to receive an account number, and provide the account number to generate an authorization request on the transaction terminal. The authorization request includes a terminal identifier of the transaction terminal.
11/13/14
20140337201
Method of doing business for auctioning a defaulted loan
A method of doing business includes identifying an owner of property willing to sell his property by an online auction, entering into a contract with the owner obligating him to complete the sales of his property conducted pursuant to terms of the contract; pre-arranging a minimum auction price for his property that accounts for the owner's interest, plus costs and fees, conducting the on-line auction with a plurality of bidders for his property whereby at the on-line auction's conclusion there is a winning bidder and ensuring the transfer of the winning bidder's funds to the escrow holder.. .
11/13/14
20140337192
Method and apparatus for facilitating an ipr market
A method is disclosed for establishing communication in a network between a seller of intellectual property rights (ipr) using a first node at a first address, and a buyer of iprs using a second node at a second address. The method uses a third node at a third address to provide ipr data, ipr attribute information, and a first address associated with the identifier.
11/13/14
20140337191
Recycling collection payout
One or more embodiments of techniques or systems for recycling collection payout are provided herein. In some embodiments, a user can place objects into a recycling collection payout system, the system sorts or identifies recyclable objects, gathers or stores the recyclable objects, and pays the user for the recyclable objects.
11/13/14
20140337182
System and method for processing gifts from a giver to a recipient
Processing gifts from a giver to a recipient is addressed. The system receives an identification of a product or service as a gift and a recipient.
11/13/14
20140337180
Best-deal list generation
In response to receipt of a best-deal request specifying requested feature levels for products, feature sufficiency for each of said products is evaluated. Each feature sufficiency indicates whether or not a given product meets a respective requested feature level.
11/13/14
20140337179
System and method for service provider search
A system and method are disclosed for the creation of future time based search. Service providers identify their availability.
11/13/14
20140337177
Associating analytics data with an image
A device and method of capturing one or more images and determining associated interest information are provided. After receiving a data input, an item is identified based on the data input.
11/13/14
20140337176
Performing image searches in a network-based publication system
Methods and systems to perform image searches in a network-based publication system, such as image searches for items available for purchase via the network-based publication system, are described. In some example embodiments, the methods and systems access an image of an item, identify a purchaser of and/or user associated with the item in the image, query, using the image, a collection of images whose contents include items that are associated with the purchaser and that are offered for purchase by a network-based publication system, and match the item in the image to one or more of the items offered for purchase based on a result of the query.
11/13/14
20140337174
Augmented reality recomendations
Various embodiments enable a computing device to perform tasks such as processing an image to recognize text or an object in an image to identify a particular product or related products associated with the text or object. In response to recognizing the text or the object as being associated with a product available for purchase from an electronic marketplace, one or more advertisements or product listings associated with the product can be displayed to the user.
11/13/14
20140337170
Increasing reliability of information available to parties in market transactions
Aspects and examples are disclosed for facilitating and signaling market transactions between providers of products or services and clients that consume or otherwise use the products and services. In one example, a processing device of a server system receives, via a data network, data from a computing system describing attributes of a client that uses the computing system.
11/13/14
20140337169
Online and offline collaboration associated with shopping and purchasing
Techniques are provided that include using a collaborative arrangement between a first entity associated with a physical location, such as a physical store or residence that has or sells one or more products of a first product type, and a second entity, such as a web site offering for purchase products of the first product type. According to some such arrangements, if, for example, a user purchases a product from the web site after the user evidently made a visit to the physical location, or received a display or demonstration of a product of the first product type at the physical location, then revenue or value resulting from the purchase may be split or shared between entities including the first entity and the second entity..
11/13/14
20140337165
Mobile application enabling product discovery and obtaining feedback from network
A system and method are disclosed automating the provision and consumption of social media product recommendations in a. Mobile environment.
11/13/14
20140337163
Forward-looking recommendations using information from a plurality of picks generated by a plurality of users
A system and method are disclosed for automating the provision of social media product recommendations in an electronic commerce environment. A user navigates to a merchant website that has implemented the picks system.
11/13/14
20140337162
Process to display picks on product category pages
A system and method are disclosed for automating the provision of social media product recommendations in an electronic commerce environment. In various embodiments, web page data associated with a merchant's website is processed to identify a set of product category pages.
11/13/14
20140337160
Considering social information in generating recommendations
Transaction data is obtained from sellers. The data identifies individuals and products or items that they have purchased from the sellers.
11/13/14
20140337159
System and method for creating a personalized consumer product
A system and method for creating a personalized consumer product are provided. The system and method of the present disclosure enables a user, e.g., a consumer, to customize products containing solids and/or fluids by allowing a server communicating over the global computer network, e.g., the internet, to provide product preferences of a user to a product or a mixing device, e.g., a product or beverage dispenser.
11/13/14
20140337150
Automatic receipt logging and notifications for transactions
Methods, systems, and apparatus include computer programs encoded on a computer-readable storage medium, and include a method for managing and processing receipt information including identifying a user associated with a transaction; receiving a receipt for the transaction from a merchant system or a payment source used to fund the transaction; logging the receipt in a database associated with the user; providing an acknowledgement to an entity associated with the transaction and providing a notification of the transaction to a device associated with the user.. .
11/13/14
20140337148
Method and apparatus for providing an application marketplace
An approach is provided for providing an application marketplace where applications are marketed, purchased, and operationally linked, that has a framework for developers to contribute product, share revenue and communicate with one another. The approach involves determining one or more unique identifiers for one or more applications sold by way of one or more application stores.
11/13/14
20140337142
Sponsored stories application programming interface (api)
To provide a sponsored story unit, the social networking system receives a story request from an advertiser. The story request specifies properties of content used to generate the sponsored story.
11/13/14
20140337138
Payment codes for enhanced consumer experience
Methods and systems for facilitating payments with a mobile device are described. The methods include detecting a location of a mobile device, receiving identifying information from a user through the mobile device when the mobile device is near at least one merchant without a request from the user, generating a payment code without a request from the user, transmitting the payment code to the mobile device, receiving the payment code and a payment request from a merchant, and processing the payment request..
11/13/14
20140337137
Digital billboard advertising
An advertising campaign is provided for display on one or more digital billboards. Information about a geographic location of the digital billboard and an available inventory of time intervals for display of digital content is established.
11/13/14
20140337135
Parking locator system providing variably priced parking fees
A parking locator system providing variably priced parking includes one or more parking sensors and one or more parking kiosks. The parking sensors may generate parking information identifying one or more occupied parking spaces and one or more unoccupied parking spaces within a vicinity.
11/13/14
20140337132
Dynamic text replacement in e-books for advertising
Techniques are provided in which advertisements are presented to a user via access to electronic reading content. A first set of information is obtained regarding electronic reading content evidenced as being accessed by the user.
11/13/14
20140337131
Keyword determinations from voice data
Topics of potential interest to a user, useful for purposes such as targeted advertising and product recommendations, can be extracted from voice content produced by a user. A computing device can capture voice content, such as when a user speaks into or near the device.
11/13/14
20140337130
System and method for identifying a high-value advertising base
Improved systems and methods for identifying online advertisement conversions, and for identifying high-value targets for the delivery of subsequent advertising impressions. Travel reservation data is communicated to an ad network to determine populations of potential travelers.
11/13/14
20140337118
Method and system for generating social signal vocabularies
A social analytic system may identify the social signals associated with a brand, campaign, or any other topic. The social analytic system may generate a vocabulary associated with the brand, campaign, or topic based terms used in the associated social signals.
11/13/14
20140337117
Store solutions
Disclosed are systems and methods that time correlate input at a point of entry of consumer data of least two identifications for products, prescriptions, vouchers, or codes, uses positive correlation determinations for triggering output of predetermined information. The time correlation of identifications may be used to build a time correlation database, and thereafter use that database for targeted communications.
11/13/14
20140337115
System and method for tracking and rewarding users
Systems and methods of tracking and rewarding users of any of a variety of content hosting systems, such as search engines. In one embodiment, a method of rewarding a user of a search engine includes receiving secure identification information identifying a user, retrieving user account information using the secure identification information, receiving a search query associated with the user account information, crediting the user account with a reward that is directly related to providing the search query, and returning search results in response to the received search query..
11/13/14
20140337111
Rewarding online advocates
A method and associated systems for rewarding online advocates. The invention identifies a primary advocate as a person or entity that endorses or advocates a product or service.
11/13/14
20140337105
Product evaluation system and product evaluation method
A product evaluation system and a product evaluation method allow people to quickly, inexpensively, and accurately evaluate large amounts of products including those that do not have information attached in advance in the manufacturing stage. The system comprises an i/o component that functions as a product identification mechanism that identifies product type including at least one of product, product group, product brand, or product category, a characteristic acquisition mechanism that acquires characteristic information of the product, an evaluator that performs authentication and value estimations of products, and a data store that stores information related to the product.
11/13/14
20140337101
System and method for businesses to collect personality information from their customers
A web-page or customer interface, that enables a business to increase their customer satisfaction levels, etc. Based on the business' improved capability to predict the wants and needs of their customers as a result of it using such an interface to assess the personalities of their customers, includes: (a) dichotomous, personality traits, (b) photographic images to which are assigned ranked dichotomous personality traits based on the psychological content of the respective photographic images, (c) an image viewer adapted to present to a customer these images so as to identify with which of these images the customer elects to be associated, (d) personality types into which a customer is categorized, and wherein each of these personality types is differentiated by the specific set of dichotomous, personality traits associated with it, and (e) an algorithm adapted to categorize one into a personality types..
11/13/14
20140337099
Identifying and facilitating hospitality customer needs
Systems, methods and computer program products for providing customized customer service and ensuring appropriate gratuity payment in hospitality environments are disclosed. In an aspect, customers may provide information about the service level they request from their server or other hospitality worker and motivate the server by indicating an associated minimum tip level.
11/13/14
20140337094
Accredited advisor management system
Systems and methods for an accredited advisor management are provided. First information enabling unique identification of a first advisor may be processed.
11/13/14
20140337092
Systems and methods for predicting occurrences of consumers returning purchased devices
Systems and methods are provided for reducing consumer electronic device returns. According to various aspects, a server receives (505) usage data of an electronic communication device by a consumer.
11/13/14
20140337090
Systems and methods to measure influcence power
A system and method to determine influence power of users based on transaction data and social networking data. An influence score represents the effectiveness of users in influencing the purchase decisions of others.
11/13/14
20140337089
Systems and methods to connect information
A system and method to link online and offline user data via transaction data. Online and/or offline user data can be tracked via various anonymous tracking methods that do not require the users to explicitly identify themselves.
11/13/14
20140337088
Weather risk management system
This disclosure relates to a system for managing financial risk associated with weather-based service contracts, and more specifically, to a system based on the purchase of weather derivatives to select, manage, minimize, and redistribute financial burdens associated with costs incurred from the payment of services related to greater than average weather-based events. An option contract having a tick price, and an associated premium at a fixed strike price is selected at a desired coverage, in one embodiment, the desired coverage is associated with a payout with the associated tick price that covers the base price of performing the service for a nominal weather condition, the premium of buying the option, and the price of performing the services for exceptional weather precipitations of a three standard deviation from the nominal value.
11/13/14
20140337087
Identification and risk evaluation
Methods, systems, and machine-readable media are disclosed for identification of an individual and evaluation of risk from doing business with that individual. In one embodiment a method of evaluating a risk from conducting business with an individual comprises receiving identity information related to the individual.
11/13/14
20140337086
Risk assessment for industrial systems using big data
A cloud-based risk assessment service collects industrial data from multiple relevant and connected sources for storage and analysis on a cloud platform. The service analyzes gathered data from internal and external sources and customers across different industries to identify operational trends as a function of industry type, application type, equipment in use, device configurations, and other such variables.
11/13/14
20140337084
Method and system for associating it assets with business functions
A method is provided herein, comprising identifying activated business functions being part of a business application; tracing it assets, each being a software and/or a hardware component, running over a computerized system; associating the traced it assets with the identified activated business function; and constructing, based on reiterated tracing and associating with respect to the business functions, a representation of an association of the it assets with the business functions.. .
11/13/14
20140337083
System and method for supply chain optimization
Method and systems for supply chain optimization include receiving information relating to a plurality of independent process flows which make up a supply chain of a technology organization, comparing the plurality of independent process flows with an integrated supply chain process flow comprising a plurality of interconnected stages to identify gaps in the integrated supply chain process flow relative to the plurality of independent process flows, the plurality of interconnected stages corresponding to all of the processes in a supply chain, modifying the integrated supply chain process flow based at least in part on the identified gaps to generate a customized integrated supply chain process flow that is customized to the supply chain of the technology organization, receiving one or more configuration parameters corresponding to the supply chain of the technology organization, and updating the customized integrated supply chain process flow with the one or more configuration parameters.. .
11/13/14
20140337080
Radio frequency identification meeting initiation
A facility scheduling system comprises an rfid reader, a user interface device, a control processor and one or more preset resources. The rfid reader receives information pertaining to a user and a meeting.
11/13/14
20140337079
Fluid based resource allocation and appointment scheduling system and method
A scheduling system and method for managing resource allocation by service providers. The system includes a type-constrained appointment book wherein appointment windows are assigned to client types and a scheduler for receiving scheduling requests clients, identifying their characteristic client-type and allocating at least one appointment window assigned to the characteristic client-type to the client.
11/13/14
20140337077
Task assignment and verification system and method
A method, computer program product, and computer system for determining, at a first computing device, an occurrence of an event. A task associated with the event to be completed is sent based upon, at least in part, the occurrence of the event.
11/13/14
20140337069
Deriving business transactions from web logs
Computer-implemented systems, methods, and computer-readable media for deriving probable business transactions from a log file, the log file including a plurality of entries corresponding to traffic on a web server, each entry including a plurality of fields, including: pre-processing the log file to remove one or more fields and one or more entries unrelated to probable business transactions; processing the entries in the log file to identify one or more transactions; and processing the one or more transactions to identify one or more probable business transactions.. .
11/13/14
20140337068
Systems and methods for minimizing travel costs for multi-night stays
A lowest rate on a multi-night lodging stay is achieved by obtaining lodging rate information for a first lodging location from a plurality of lodging rate sources. The information is correlated with each night of a window during which a consumer is available to travel.
11/13/14
20140337066
Large venue security method
A method for reducing violence within crowded venues is provided. The method includes reading license plates of vehicles passing into entry ports of a parking area, and capturing facial images of persons seeking admission to the venue.
11/13/14
20140337065
Information processing device, information processing method, and program for information processing device
Vacant seat information for specifying the number of vacant seats in a store and store identification information for identifying the store are acquired from a mobile terminal device of a user of the store. The vacant seat information is registered in a storage in association with the store identification information.
11/13/14
20140337064
Nosql online analytical processing architecture
A breadth-first join module receives, at a runtime, a query for travel data, wherein the travel data is stored in a data store, the data store comprising parent and child data structures arranged in a hierarchy. The breadth-first join module identifies a first child data structure associated with the travel data, the first child data structure comprising a plurality of pointers, wherein each of the plurality of pointers is associated with one of a plurality of first level parent data structures in the data store and queries each of the plurality of first level parent data structures to resolve the plurality of pointers in the first child data structure, wherein the plurality of first level parent data structures comprise travel data objects associated with the plurality of pointers, and wherein at least one of the plurality of first level parent data structures comprises a pointer to a second level parent data structure.
11/13/14
20140337061
Electronic data insurance management system and method
An electronic data insurance management system may prompt a user, for a selected insurance product, to identify an indemnity level for insuring against loss to one or more electronic data sets, receive input identifying the indemnity level, and link an identifier for one of the one or more electronic data sets with a data insurance policy or policy certificate defined by the identified indemnity level. The system may also create a data storage account for the one of the one or more electronic data sets on a data management system using the identifier such that an association is formed between the data storage account and the data insurance policy or policy certificate..
11/13/14
20140337056
Sampling method for performing sampling in an unmistakeable manner
The invention relates to a sampling method for performing sampling in an unmistakeable manner with execution on a data processing system having a data memory, wherein the data memory stores a plurality of sample-related and analysis-related data records and wherein the analysis-related data records are relationally linked to the sample-related data records, and wherein a user interface having an input/output apparatus is present which is communicatively connected to the data processing system. In this case, an order data record is produced from a captured first identification marker, particularly an identifier, from a first person and the subset of analysis-related data records and is stored in the data memory.
11/13/14
20140337049
Automated system for medical item dispensing, billing, and inventory management
An inventory management system provided by an inventory management service provider senses removal of medical items from inventory to be dispensed to a patient. The system processes billing information to identify the patient's medical insurance provider, to identify a medical item supplier that is the preferred biller for the patient's medical insurance provider, and to determine whether the inventory management service provider is the identified preferred biller.
11/13/14
20140337048
Conversational virtual healthcare assistant
A conversation user interface enables patients to better understand their healthcare by integrating diagnosis, treatment, medication management, and payment, through a system that uses a virtual assistant to engage in conversation with the patient. The conversation user interface conveys a visual representation of a conversation between the virtual assistant and the patient.
11/13/14
20140337044
Detecting and identifying erroneous medical abstracting and coding and clinical documentation omissions
A method and computer program product for implementing a clinical documentation, code and abstract errors and omissions detector and characterizer (the “code error detector”) are disclosed. Concepts represented in the linguistic surface forms of clinical text data source documents are mapped onto an ontology being indexed as component codes and reference codes where component codes index primitive concepts and reference codes index fully-defined concepts that are produced as linguistic cognitive grammar compositions of the primitive concepts that are indexed by the component codes.
11/13/14
20140337043
Contact lens cutting file distribution system and method
A non-transitory computer readable medium having computer executable program code embodied thereon, the computer executable program code configured to cause a computing device to: receive an order for cutting a contact lens from a contracted manufacturer at an exchange; uniquely identify and authorize the manufacturer and a user entering the order; pre-validate the order for consistency based on predetermined rules; place the order with an exchange engine and authenticate the order; determine whether a required parameter file is already generated and available via a cutting file database; if the required parameter file already exists, instruct the cutting file database to package the available data and deliver the appropriate encrypted package back to the engine for delivery to a lathe gateway computer; if the required parameter file does not exist, forward the order to a lathe file generator to create the parameter file and enter it into the cutting file database; and deliver the encrypted package to the lathe gateway computer.. .
11/13/14
20140337035
Gem tester
A gem tester for testing a gem under test and a kit including a horizontal recharging stand are disclosed. In one embodiment of the gem tester, an elongated body has a line-of-sight contour tapering from a bulbous end to a radially deviating frontal nose having a probe extending therefrom.
11/13/14
20140337034
System and method for analysis of power relationships and interactional dominance in a conversation based on speech patterns
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for evaluating dominance of participants in a conversation or interaction. An example system configured to practice the method first receives interaction data involving a plurality of participants, and can identify a type of interaction based on the interaction data.
11/13/14
20140337023
Speech to text conversion
Embodiments that relate to converting audio inputs from an environment into text are disclosed. For example, in one disclosed embodiment a speech conversion program receives audio inputs from a microphone array of a head-mounted display device.
11/13/14
20140337014
Voice recording and playback device, and control method for voice recording and playback device
A voice recording and playback device of the present invention is capable of storage management of generated voice data, to which date information has been attached, as voice files, and comprises a display section capable of calendar display, and a control section for, at the time of retrieving voice files from a storage section, performing movable identification on a calendar display, as well as retrieving voice files that have been stored in the storage section based on date information attached to the files, and performing display of results of this retrieval indicating the existence of voice files close to day display on the calendar display, wherein the control section moves the identification position based on an instruction operation by the retrieval instructions section, and generates a notification in accordance with voice files that exist on the date of the identification position that has been moved.. .
11/13/14
20140337013
Processing messages in a communication network
A method and a system for processing messages in a communication network are described herein. In one implementation, the method includes organizing a plurality of messages in an input queue of a communication terminal (102).
11/13/14
20140337010
Interactive acquisition of remote services
A natural language specification of at least one high level information technology services requirement is obtained from a user, via a conversational interface; the same is parsed into first pre-defined semi-structured data, using a conversation parser. Based on the first pre-defined semi-structured data, a subset of candidate information technology services is identified, with a dialog engine, from a plurality of candidate information technology services provided by a plurality of vendors, the dialog engine is used to formulate a response including second pre-defined semi-structured data.
11/13/14
20140337002
Method and instrumentation for sustainable energy load flow management system (selfmaster(tm))
Disclosed is a method and instrumentation for predictive and adaptive controllers devised to ensure uninterrupted operation of standalone electrical supply systems powered by sustainable energy sources. The device hereby referred to as selfmaster™ is an expert system that manages the energy conversion, storage, and consumption in an isolated electric grid based on data collected during past and current operation of the system and predicted future states of the primary energy sources, storage level, and demand.


Popular terms: [SEARCH]



Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Den for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Den with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         



Key IP Translations - Patent Translations



1.9415

7097

8 - 0 - 261